{"id":2277,"date":"2019-07-25T09:49:34","date_gmt":"2019-07-25T09:49:34","guid":{"rendered":"https:\/\/dnrcet.org\/web\/?page_id=2277"},"modified":"2024-02-09T10:54:05","modified_gmt":"2024-02-09T10:54:05","slug":"publications","status":"publish","type":"page","link":"https:\/\/dnrcet.org\/web\/departments\/cse\/faculty\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2277\" class=\"elementor elementor-2277\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-29771de elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"29771de\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-25f923e\" data-id=\"25f923e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c08d3d9 elementor-widget elementor-widget-accordion\" data-id=\"c08d3d9\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2011\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2011\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Assessment Period: 2021-22<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2011\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2011\"><table width=\"111%\"><tbody><tr><td width=\"6%\"><p><strong><span style=\"color: #003366;\">S.<\/span><\/strong><\/p><p><strong><span style=\"color: #003366;\">No<\/span><\/strong><\/p><\/td><td width=\"18%\"><p><strong><span style=\"color: #003366;\">Name of the Faculty<\/span><\/strong><\/p><\/td><td width=\"29%\"><p><strong><span style=\"color: #003366;\">Title<\/span><\/strong><\/p><\/td><td width=\"15%\"><p><strong><span style=\"color: #003366;\">Name of the Journal\/ Conference\/ Event<\/span><\/strong><\/p><p><strong><span style=\"color: #003366;\">\/ Publisher<\/span><\/strong><\/p><\/td><td width=\"7%\"><p><strong><span style=\"color: #003366;\">Year<\/span><\/strong><\/p><\/td><td width=\"13%\"><p><strong><span style=\"color: #003366;\">Vol\/ Issue<\/span><\/strong><\/p><\/td><td width=\"9%\"><p><strong><span style=\"color: #003366;\">ISSN. No<\/span><\/strong><\/p><\/td><\/tr><tr><td width=\"6%\"><p><span style=\"color: #000000;\">1<\/span><\/p><\/td><td rowspan=\"4\" width=\"18%\"><p><span style=\"color: #000000;\">Dr. A Ramamurthy<\/span><\/p><\/td><td width=\"29%\"><p><span style=\"color: #000000;\">Applications hybrid machine learning framework based on personal Data analytics for privacy preserving Applications<\/span><\/p><\/td><td width=\"15%\"><p><span style=\"color: #000000;\">Journal of Interdisciplinary Cycle Research<\/span><\/p><\/td><td width=\"7%\"><p><span style=\"color: #000000;\">Mar-2022<\/span><\/p><\/td><td width=\"13%\"><p><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/ieeexplore.ieee.org\/xpl\/tocresult.jsp?isnumber=9091956&amp;punumber=6488907\">Volume: 7 Issue: 5<\/a><\/span><\/p><\/td><td width=\"9%\"><p><span style=\"color: #000000;\">1961-1243<\/span><\/p><\/td><\/tr><tr><td width=\"6%\"><p><span style=\"color: #000000;\">2<\/span><\/p><\/td><td width=\"29%\"><p><span style=\"color: #000000;\">Statistical Extrapolation for Massive Digital Crime Data Analysis<\/span><\/p><\/td><td width=\"15%\"><p><span style=\"color: #000000;\">\u00a0International journal of analytical and experimental modal analysis<\/span><\/p><\/td><td width=\"7%\"><p><span style=\"color: #000000;\">Mar-2022<\/span><\/p><\/td><td width=\"13%\"><p><span style=\"color: #000000;\">Volume: I Issue:3<\/span><\/p><\/td><td width=\"9%\"><p><span style=\"color: #000000;\">0886-9367<\/span><\/p><\/td><\/tr><tr><td width=\"6%\"><p><span style=\"color: #000000;\">3<\/span><\/p><\/td><td width=\"29%\"><p><span style=\"color: #000000;\">An Enhanced cloud Computing resource allocation method vehicle networks<\/span><\/p><\/td><td width=\"15%\"><p><span style=\"color: #000000;\">The International journal of analytical and experimental modal analysis-<\/span><\/p><\/td><td width=\"7%\"><p><span style=\"color: #000000;\">Mar-2022<\/span><\/p><\/td><td width=\"13%\"><p><span style=\"color: #000000;\">Volume 15\u00a0\u00a0\u00a0 Issue-02<\/span><\/p><\/td><td width=\"9%\"><p><span style=\"color: #000000;\">\u00a00886-9367<\/span><\/p><\/td><\/tr><tr><td width=\"6%\"><p><span style=\"color: #000000;\">4<\/span><\/p><\/td><td width=\"29%\"><p><span style=\"color: #000000;\">An Enhanced Deep Learning methods for Defect Analysis in source code<\/span><\/p><\/td><td width=\"15%\"><p><span style=\"color: #000000;\">Journal of Interdisciplinary Cycle Research<\/span><\/p><\/td><td width=\"7%\"><p><span style=\"color: #000000;\">Mar-2022<\/span><\/p><\/td><td width=\"13%\"><p><span style=\"color: #000000;\">Volume XIV, Issue III,<\/span><\/p><\/td><td width=\"9%\"><p><span style=\"color: #000000;\">0022-1945<\/span><\/p><\/td><\/tr><tr><td width=\"6%\"><p><span style=\"color: #000000;\">5<\/span><\/p><\/td><td rowspan=\"5\" width=\"18%\"><p><span style=\"color: #000000;\">Dr.BuddharajuVenkataSubrahmanya Varma<\/span><\/p><\/td><td width=\"29%\"><p><span style=\"color: #000000;\">An Enhanced Cloud Computing Resource Allocation Method for Vehicle Networks 1292-1298<\/span><\/p><\/td><td width=\"15%\"><p><span style=\"color: #000000;\">The international journal of analytical and experimental model analysis<\/span><\/p><\/td><td width=\"7%\"><p><span style=\"color: #000000;\">Mar-2022<\/span><\/p><\/td><td width=\"13%\"><p><span style=\"color: #000000;\">Volume XIV, Issue III,<\/span><\/p><\/td><td width=\"9%\"><p><span style=\"color: #000000;\">ISSN: 0886-9367<\/span><\/p><\/td><\/tr><tr><td width=\"6%\"><p><span style=\"color: #000000;\">6<\/span><\/p><\/td><td width=\"29%\"><p><span style=\"color: #000000;\">An Enhanced Deep Learning methods for Defect Analysis in source code- 715-720<\/span><\/p><\/td><td width=\"15%\"><p><span style=\"color: #000000;\">Journal of Interdisciplinary cycle research<\/span><\/p><\/td><td width=\"7%\"><p><span style=\"color: #000000;\">Mar-2022<\/span><\/p><\/td><td width=\"13%\"><p><span style=\"color: #000000;\">Volume XIV, Issue III,<\/span><\/p><\/td><td width=\"9%\"><p><span style=\"color: #000000;\">ISSN: 0022-1945<\/span><\/p><\/td><\/tr><tr><td width=\"6%\"><p><span style=\"color: #000000;\">7<\/span><\/p><\/td><td width=\"29%\"><p><span style=\"color: #000000;\">Statistical extrapolation for massive digital crime data analysis1018-1024<\/span><\/p><\/td><td width=\"15%\"><p><span style=\"color: #000000;\">The international journal of analytical and experimental model analysis<\/span><\/p><\/td><td width=\"7%\"><p><span style=\"color: #000000;\">Mar-2022<\/span><\/p><\/td><td width=\"13%\"><p><span style=\"color: #000000;\">Volume XIV, Issue III,<\/span><\/p><\/td><td width=\"9%\"><p><span style=\"color: #000000;\">ISSN: 0886-9367<\/span><\/p><\/td><\/tr><tr><td width=\"6%\"><p><span style=\"color: #000000;\">8<\/span><\/p><\/td><td width=\"29%\"><p><span style=\"color: #000000;\">Hybrid machine Learning framework based on personal data analytics for privacy preserving applications638-643<\/span><\/p><\/td><td width=\"15%\"><p><span style=\"color: #000000;\">Journal of Interdisciplinary cycle research<\/span><\/p><\/td><td width=\"7%\"><p><span style=\"color: #000000;\">Mar-2022<\/span><\/p><\/td><td width=\"13%\"><p><span style=\"color: #000000;\">Volume XIV, Issue III,<\/span><\/p><\/td><td width=\"9%\"><p><span style=\"color: #000000;\">ISSN: 0022-1945<\/span><\/p><\/td><\/tr><tr><td width=\"6%\"><p><span style=\"color: #000000;\">9<\/span><\/p><\/td><td width=\"29%\"><p><span style=\"color: #000000;\">Detection of fake accounts of twitter using machine learning 2536-2541<\/span><\/p><\/td><td width=\"15%\"><p><span style=\"color: #000000;\">The International journal of analytical and experimental modal analysis<\/span><\/p><\/td><td width=\"7%\"><p><span style=\"color: #000000;\">Dec-2021<\/span><\/p><\/td><td width=\"13%\"><p><span style=\"color: #000000;\">Volume XIII, Issue XII,<\/span><\/p><\/td><td width=\"9%\"><p><span style=\"color: #000000;\">ISSN: 0886-9367<\/span><\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-12aebff elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"12aebff\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3beb1ed\" data-id=\"3beb1ed\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4908e1e elementor-widget elementor-widget-accordion\" data-id=\"4908e1e\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-7651\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-7651\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Assessment Period : 2020-21<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-7651\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-7651\"><table width=\"683\"><tbody><tr><td width=\"48\"><p><span style=\"color: #003366;\"><strong>S.<\/strong><\/span><\/p><p><span style=\"color: #003366;\"><strong>No<\/strong><\/span><\/p><\/td><td width=\"119\"><p><span style=\"color: #003366;\"><strong>Name of the Faculty<\/strong><\/span><\/p><\/td><td width=\"204\"><p><span style=\"color: #003366;\"><strong>Title<\/strong><\/span><\/p><\/td><td width=\"108\"><p><span style=\"color: #003366;\"><strong>Name of the Journal\/ Conference\/ Event<\/strong><\/span><\/p><p><span style=\"color: #003366;\"><strong>\/ Publisher<\/strong><\/span><\/p><\/td><td width=\"48\"><p><span style=\"color: #003366;\"><strong>Year<\/strong><\/span><\/p><\/td><td width=\"96\"><p><span style=\"color: #003366;\"><strong>Vol\/ Issue<\/strong><\/span><\/p><\/td><td width=\"61\"><p><span style=\"color: #003366;\"><strong>ISSN. No<\/strong><\/span><\/p><\/td><\/tr><tr><td rowspan=\"2\" width=\"48\"><p>\u00a0<\/p><p>\u00a0<\/p><p>\u00a0<\/p><p><span style=\"color: #000000;\">1<\/span><\/p><\/td><td rowspan=\"2\" width=\"119\"><p>\u00a0<\/p><p>\u00a0<\/p><p>\u00a0<\/p><p><span style=\"color: #000000;\">Dr. A Ramamurthy<\/span><\/p><\/td><td width=\"204\"><p><span style=\"color: #000000;\">An Innovative artificial intelligence approach using datamining clustering algorithm<\/span><\/p><\/td><td width=\"108\"><p><span style=\"color: #000000;\">Turkish journal of computer and\u00a0 mathematics education-<\/span><\/p><\/td><td width=\"48\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">Nov 2020<\/span><\/p><\/td><td width=\"96\"><p><span style=\"color: #000000;\">Vol-11Issue3<\/span><\/p><\/td><td width=\"61\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">2168-2175<\/span><\/p><\/td><\/tr><tr><td width=\"204\"><p><span style=\"color: #000000;\">Design and Implementation of Cloud Computing Based Mixed Big Data Mining<\/span><\/p><\/td><td width=\"108\"><p><span style=\"color: #000000;\">Test Engineering and Management<\/span><\/p><\/td><td width=\"48\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">Dec 2020<\/span><\/p><\/td><td width=\"96\"><p><span style=\"color: #000000;\">Vol-83,<\/span><\/p><p><span style=\"color: #000000;\">Page No:129-138<\/span><\/p><\/td><td width=\"61\"><p><span style=\"color: #000000;\">0193-4120<\/span><\/p><\/td><\/tr><tr><td width=\"48\"><p>\u00a0<\/p><\/td><td width=\"119\"><p>\u00a0<\/p><\/td><td width=\"204\"><p><span style=\"color: #000000;\">An innovative artificial intelligence approach using datamining clustering algorithm<\/span><\/p><\/td><td width=\"108\"><p><span style=\"color: #000000;\">Turkish Journal of Computer and Mathematics Education<\/span><\/p><\/td><td width=\"48\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">Nov 2020<\/span><\/p><\/td><td width=\"96\"><p><span style=\"color: #000000;\">Vol-11 Issue 3<\/span><\/p><\/td><td width=\"61\"><p><span style=\"color: #000000;\">2168-2175<\/span><\/p><\/td><\/tr><tr><td width=\"48\"><p>\u00a0<\/p><\/td><td width=\"119\"><p>\u00a0<\/p><\/td><td width=\"204\"><p><span style=\"color: #000000;\">Design and Analysis of performance of cloud server embedded with cryptography and dynamic access<\/span><\/p><p><span style=\"color: #000000;\">control mechanism<\/span><\/p><\/td><td width=\"108\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">Alochana Chakra Journal<\/span><\/p><\/td><td width=\"48\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">July 2020<\/span><\/p><\/td><td width=\"96\"><p><span style=\"color: #000000;\">Volume: IX, Issue<\/span><\/p><p><span style=\"color: #000000;\">VII<\/span><\/p><\/td><td width=\"61\"><p><span style=\"color: #000000;\">2231-3990<\/span><\/p><\/td><\/tr><tr><td rowspan=\"2\" width=\"48\"><p><span style=\"color: #000000;\">2<\/span><\/p><\/td><td rowspan=\"2\" width=\"119\"><p><span style=\"color: #000000;\">Dr. BuddharajuVenkataSubrahmanya Varma<\/span><\/p><\/td><td width=\"204\"><p><span style=\"color: #000000;\">Achieving data integrity of encrypted cloud data using bloom filter<\/span><\/p><\/td><td width=\"108\"><p><span style=\"color: #000000;\">Alochana Chakra Journal<\/span><\/p><\/td><td width=\"48\"><p><span style=\"color: #000000;\">July 2020<\/span><\/p><\/td><td width=\"96\"><p><span style=\"color: #000000;\">Volume: VI,\u00a0 Issue VII<\/span><\/p><\/td><td width=\"61\"><p><span style=\"color: #000000;\">2231-3990<\/span><\/p><\/td><\/tr><tr><td width=\"204\"><p><span style=\"color: #000000;\">Design and Implementation of Cloud Computing Based Mixed Big Data Mining<\/span><\/p><\/td><td width=\"108\"><p><span style=\"color: #000000;\">Test Engineering and Management<\/span><\/p><\/td><td width=\"48\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">Dec 2020<\/span><\/p><\/td><td width=\"96\"><p><span style=\"color: #000000;\">Vol-83,<\/span><\/p><p><span style=\"color: #000000;\">Page No:129-138<\/span><\/p><\/td><td width=\"61\"><p><span style=\"color: #000000;\">0193-4120<\/span><\/p><\/td><\/tr><tr><td width=\"48\"><p><span style=\"color: #000000;\">3<\/span><\/p><\/td><td width=\"119\"><p><span style=\"color: #000000;\">Mr. E. Yohoshva<\/span><\/p><\/td><td width=\"204\"><p><span style=\"color: #000000;\">Dynamic and Advanced Security Approach for Data Storage in Distributed Environment<\/span><\/p><\/td><td width=\"108\"><p><span style=\"color: #000000;\">IOSR Journal of Engineering<\/span><\/p><\/td><td width=\"48\"><p><span style=\"color: #000000;\">Jan2020,<\/span><\/p><\/td><td width=\"96\"><p><span style=\"color: #000000;\">Vol-10,<\/span><\/p><p><span style=\"color: #000000;\">Issue 1<\/span><\/p><\/td><td width=\"61\"><p><span style=\"color: #000000;\">2250-3021<\/span><\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-62db674 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"62db674\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-691caeb\" data-id=\"691caeb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-97ef825 elementor-widget elementor-widget-accordion\" data-id=\"97ef825\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1591\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1591\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Assessment Period: 2019-20<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1591\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1591\"><table width=\"680\"><tbody><tr><td width=\"48\"><p><span style=\"color: #003366;\"><strong>S.<\/strong><\/span><\/p><p><span style=\"color: #003366;\"><strong>No<\/strong><\/span><\/p><\/td><td width=\"114\"><p><span style=\"color: #003366;\"><strong>Name of the Faculty<\/strong><\/span><\/p><\/td><td width=\"204\"><p><span style=\"color: #003366;\"><strong>Title<\/strong><\/span><\/p><\/td><td width=\"108\"><p><span style=\"color: #003366;\"><strong>Name of the Journal\/ Conference\/ Event<\/strong><\/span><\/p><p><span style=\"color: #003366;\"><strong>\/ Publisher<\/strong><\/span><\/p><\/td><td width=\"48\"><p><span style=\"color: #003366;\"><strong>Year<\/strong><\/span><\/p><\/td><td width=\"92\"><p><span style=\"color: #003366;\"><strong>Vol\/ Issue<\/strong><\/span><\/p><\/td><td width=\"66\"><p><span style=\"color: #003366;\"><strong>ISSN. No<\/strong><\/span><\/p><\/td><\/tr><tr><td rowspan=\"2\" width=\"48\"><p>\u00a0<\/p><p>\u00a0<\/p><p>\u00a0<\/p><p><span style=\"color: #000000;\">1<\/span><\/p><\/td><td rowspan=\"2\" width=\"114\"><p>\u00a0<\/p><p>\u00a0<\/p><p>\u00a0<\/p><p><span style=\"color: #000000;\">Dr. A Ramamurthy<\/span><\/p><\/td><td width=\"204\"><p><span style=\"color: #000000;\">An Innovative Artificial Intelligence Approach Using Data Mining Clustering Algorithm<\/span><\/p><\/td><td width=\"108\"><p><span style=\"color: #000000;\">Turkish Journal Of\u00a0 Computer\u00a0 And Mathematics Education<\/span><\/p><\/td><td width=\"48\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">2020<\/span><\/p><\/td><td width=\"92\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">Vol-11<\/span><\/p><\/td><td width=\"66\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">2168-2175<\/span><\/p><\/td><\/tr><tr><td width=\"204\"><p><span style=\"color: #000000;\">Minimizing energy consumption based on neural network in clustered wireless Sensor Networks<\/span><\/p><\/td><td width=\"108\"><p><span style=\"color: #000000;\">Journal of Computational and Theoretical Nanoscience<\/span><\/p><\/td><td width=\"48\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">Nov2019<\/span><\/p><\/td><td width=\"92\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">Vol.16<\/span><\/p><\/td><td width=\"66\"><p><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"http:\/\/dx.doi.org\/10.1166\/jctn.2019.7757\">DOI: 10.1166\/<\/a><\/span><\/p><p><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"http:\/\/dx.doi.org\/10.1166\/jctn.2019.7757\">(http:\/\/dx.doi.org\/10.1166\/jctn.2019.7757)jctn.<\/a>(http:\/\/dx.doi.org\/10.1166\/jctn.2019.7757)2019.7757 (http:\/\/dx.doi.org\/10.1166\/jctn.2019.7757)<\/span><\/p><\/td><\/tr><tr><td width=\"48\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">2<\/span><\/p><\/td><td width=\"114\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">Dr. B V S Varma<\/span><\/p><\/td><td width=\"204\"><p><span style=\"color: #000000;\">An optimized hybrid model for load balancing in cloud using machine learning<\/span><\/p><\/td><td width=\"108\"><p><span style=\"color: #000000;\">Journal of critical reviews<\/span><\/p><\/td><td width=\"48\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">Dec 2019<\/span><\/p><\/td><td width=\"92\"><p><span style=\"color: #000000;\">Vol-7 Issue18<\/span><\/p><\/td><td width=\"66\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">2394-.5125<\/span><\/p><\/td><\/tr><tr><td width=\"48\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">3<\/span><\/p><\/td><td width=\"114\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">Mr. K S Ram Prasad<\/span><\/p><\/td><td width=\"204\"><p><span style=\"color: #000000;\">A novel mechanism to extract relevant files from document streams based on content search<\/span><\/p><\/td><td width=\"108\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">IJMTE<\/span><\/p><\/td><td width=\"48\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">Dec2019<\/span><\/p><\/td><td width=\"92\"><p><span style=\"color: #000000;\">Vol-IX,<\/span><\/p><p><span style=\"color: #000000;\">Issue V<\/span><\/p><\/td><td width=\"66\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">2249-7455<\/span><\/p><\/td><\/tr><tr><td rowspan=\"2\" width=\"48\"><p><span style=\"color: #000000;\">4<\/span><\/p><\/td><td rowspan=\"2\" width=\"114\"><p><span style=\"color: #000000;\">Mr. D DDSuribabu<\/span><\/p><\/td><td width=\"204\"><p><span style=\"color: #000000;\">Automatic Detection and Prevention of faculty nodes in a distributed network by using dynamic path identifiers<\/span><\/p><\/td><td width=\"108\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">IJMTE<\/span><\/p><\/td><td width=\"48\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">May2019<\/span><\/p><\/td><td width=\"92\"><p><span style=\"color: #000000;\">Vol-IX,<\/span><\/p><p><span style=\"color: #000000;\">Issue V<\/span><\/p><\/td><td width=\"66\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">2249-7455<\/span><\/p><\/td><\/tr><tr><td width=\"204\"><p><span style=\"color: #000000;\">Design and Analysis of a Tweet Alert System for identifying Real Time Traffic using k-Means clustering algorithm<\/span><\/p><\/td><td width=\"108\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">IJMTE<\/span><\/p><\/td><td width=\"48\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">Dec2019<\/span><\/p><\/td><td width=\"92\"><p><span style=\"color: #000000;\">Vol-8 Issue-4<\/span><\/p><\/td><td width=\"66\"><p>\u00a0<\/p><p><span style=\"color: #000000;\">2278-3075<\/span><\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Assessment Period: 2021-22 S. No Name of the Faculty Title Name of the Journal\/ Conference\/ Event \/ Publisher Year Vol\/ Issue ISSN. No 1 Dr. A Ramamurthy Applications hybrid machine learning framework based on personal Data analytics for privacy preserving <a href=\"https:\/\/dnrcet.org\/web\/departments\/cse\/faculty\/publications\/\" class=\"read-more\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":2260,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/dnrcet.org\/web\/wp-json\/wp\/v2\/pages\/2277"}],"collection":[{"href":"https:\/\/dnrcet.org\/web\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dnrcet.org\/web\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dnrcet.org\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dnrcet.org\/web\/wp-json\/wp\/v2\/comments?post=2277"}],"version-history":[{"count":36,"href":"https:\/\/dnrcet.org\/web\/wp-json\/wp\/v2\/pages\/2277\/revisions"}],"predecessor-version":[{"id":11426,"href":"https:\/\/dnrcet.org\/web\/wp-json\/wp\/v2\/pages\/2277\/revisions\/11426"}],"up":[{"embeddable":true,"href":"https:\/\/dnrcet.org\/web\/wp-json\/wp\/v2\/pages\/2260"}],"wp:attachment":[{"href":"https:\/\/dnrcet.org\/web\/wp-json\/wp\/v2\/media?parent=2277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}