You are on page 1of 40

Name

Dr. N.Kasiviswanth
Dr. D.kavitha
Dr. D.kavitha
Dr. D.kavitha
Dr. D.kavitha

Dr.S. ZahoorulHuq

Dr.S. ZahoorulHuq

Dr.S. ZahoorulHuq
Dr.S. ZahoorulHuq
Dr.S. ZahoorulHuq
C.Sreedhar
C.Sreedhar

K. IshthaqAhamed

K. IshthaqAhamed

K. IshthaqAhamed
K. Kalpana
J.SwamiNaik

J.SwamiNaik
J.SwamiNaik
L. Sudha Rani

T.Swathi
K. Srikanth

P. Penchala prasad

Title

A Survey on Routing Protocols in Mobile Ad-hoc Networks


Scaling Apriori Algorithm For Generating Frequent Item Sets
Dynamic Ip Auto-Configuration in MANETs

Performance Evaluation of L3 Handover latency in MIPv6


Autonomic Diffusion based spray routing in intermittently Connected Mobile Network with Multiple
Copies.

Quality of service metrics for data transmission in Mesh topologies

Dynamic Ip Auto-Configuration in MANETs

Results Analysis of Ip Address Auto-Configuration in Wireless MANETs


A Study on Wireless multicast and resource allocation in it
An Effective Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks

Efficient and fair Exchange of digital Signatures Based on RSA Algorithm


Secure Forwarding in Routing Infrastructure

Survey On Computer Worms

A Reliable Approach for Detecting Compromised Router in Network


On Demand Multicast Routing with Unidirectional Links

Active and Passive Network Measurements: A Survey


A study on flexible deterministic packet marking an Ip Trace Back System
Energy Efficient Cluster Based Routing Mechanism For Wireless Sensor Networks
Full proof Secured Environment for Wireless Sensor Networks
Detection and Prevention of Wormhole attack in stateless Multicasting

Resource Exploit and Replicate Algorithm in distributed systems for global states
Anomaly Detection using k-means based Clustering Algorithm

A Survey of Evaluation Systems of Recommendation Tasks

Journal Name

National Conference on Communications, Networking and Mobile Computing


International Conference on Information, Computing and Telecommunications
Springer Link, Communications in Computer and Information Science 2011,Volume 142,part 3,
International Journal of Computer and Engineering
Internal Conference on Computer Science & Information Technology, CSIT

International Journal of Engineering Trends and Technology ,June 2011

Springer Link, Communications in Computer and Information Science 2011,Volume 142,part 3,

International Journal of Engineering and Technology Volume3(5),


International Journal of advanced Engineering science and technology , Vol 9,Issue no1,August 2011
National Conference on High Performance Computing and Networking
International Journal of Computer Technology & Applications,Vol.3(2),
National Conference on Advances in Computational Intelligence (NCACI11)

Computer Science and Information Technology

International Journal of advanced engineering Sciences and technology

International Journal of advanced engineering Sciences and technology,Vol9,Issue no1


International Journal of Computer Science and Information Technologies ,Vol2,
International Journal of advanced engineering Sciences and technology,Vol9,Issue no1 ,August 2011
International Conference Of Computer Science And Information Technology
International Organization of Scientific Research Journal of Engineering
1ST International Conference on Networks and Cyber Security

ICCSIT
National Conference on convergence of IT Research

National Conference on convergence of IT Research

Page No

Month Year

164-170

cited index
th

77-80

30th Dec 2011

452-457

2011
JUNE 6 2011

461-466

international database

20 & 21
Jan 2012
th

1 Yes
Yes

2011

Jun-11
NO

452-457
1 YES

OctoberNovember2011
1 YES

Jun-11
32-33

NO

2011
YES

797-803

2011

YES

133-137

2011

YES
YES

448-455

24th& 25th July 2011


YES

VolNo.8,Iss
ue
No.2,247255

Jun-11

--

13th& 14th Aug 2011

No

YES

-5-Jan

Aug-11
,August 2011
2012
2012

--

5th& 6th Jan 2012

7 YES
No
YES
1 YES

--

2012

--

16th March 2011

--

16th March 2011

IF 2.804

IF 2.716
IF 2.716

AUTHOR
ATION TYPE JOURNAL/CONFERENCE
Dr.N.KasiViswanath

DETAILS Of PAPER
Devolopment and Perfomance Evaluation Of
Adhoc Wireless Test bed, Vol 2, Issue 8, pp:
1369-1372

Journal
Dr.N.KasiViswanath

Performance Analysis Of Secure Routing


Protocols in Mobile Adhoc Networks, Vol. 3,
Issue 1, pp: 693-697

Dr.R.Praveen Sam

Modified Approach to Multipath Routing


Protocols In Mobile Adhoc Networks

Dr.R.Praveen Sam

Dynamic Adress Management in Mobile Adhoc


Networks

Dr.S.Zahoor-Ul-Huq

Devolopment and Perfomance Evaluation Of


Adhoc Wireless Test bed, Vol 2, Issue 8, pp:
1369-1372

Dr.S.Zahoor-Ul-Huq

Providing MDM for Pharma-industries to


Bloster Profitability and Reduce Operational
Costs and Adhere to Regularity Compliance,
Volume 2, Issue 9, pp: 407-412

Dr.S.Zahoor-Ul-Huq

Self Directed Reconfigurable Adhoc Networks,


Vol 2(5), 577-583.

Dr.D.Kavitha

Remote Sensing Data as a Service inHybrid


Clouds: Security Challenges and Trusted Third
Prty Auditing Mechanisms, Vol. 1, Issue 7, 481486.

Dr.D.Kavitha

High Quality Monitoring with Location


Annonymization for WSN, Volume 2, Issue 9
(September 2012), PP 42-49

J.SwamiNaik

Energy Efficient Cluster Based Routing


Mechanism For Wireless Sensor Networks

J.SwamiNaik

Using Proxmity search to Estimate Authority


Flow

Journal

Journal
Journal

Journal

Journal

Journal

Journal

Journal
Conferenc
e
Journal

J.SwamiNaik

Full proof Secured Environment for Wireless


Sensor Networks, Volume 2, Issue 9 (September
2012), PP 01-05

K.Isthaq Ahmed

Location Aware Routing in Intermittently


Connected Manets

K.Isthaq Ahmed

Clustering of Web Text, Vol.1 (2), pp:53-56.

K.Isthaq Ahmed

Structured Data Extraction from Deep net, Vol.


2, Issue 5, September- October 2012, pp.632640.

K.Kalpana

P2P Reputation Management Scheme Using


Cryptogaraphic Protocal, Volume 2, Issue 10
(October 2012), PP 01-08.

Y.Rama Mohan

Clustering of Web Text, Vol.1 (2), pp:53-56.

S.Aarthi

Discovery of Direction-Finding Misconduct in


MANETS Using 2ACK Scheme, Vol. 3, Issue 3,
pp: 562-570.

D.Meenakshi

Evaluating QOSMOS using Markov Decision


Process Model, Volume 1, Issue 7, pp: 105-108.

Journal
Journal

Journal

Journal

Journal

Journal

Journal

Journal
Conferenc M.Lakshmi Neelima
e

Efficient Sreaming Processing of SOAP


messages with Attachments

YEAR OF PUBLICATIONS TITLE OF THE JOURNAL


Aug-12

Jan-Mar 2012

Int. DB

Citations

IF

International Journal of
Computer Science
Engineering and Technology
(IJCSET)
yes
International Journal of
Computer Science And
Technology (IJCST)

0.6

yes

1.02

International Journal of
Computer Science
Engineering and Technology
(IJCSET)
yes

0.6

International Journal of
Advanced Research in
Computer Science and
Software Engineering
(IJARCSSE)

yes

2.5

International Journal of
Computer Science &
Communication Networks

yes

5.09

May-12
Aug-12

Aug-12

Sep-12

Oct-Nov 2012

Sep-12

International Journal of
Advanced Research in
Computer and
Communication Engineering yes

5.332

Sep-12
IOSR Journal of Engineering
(IOSRJEN)
yes
Sep-12
no
Oct-12

no

1.649

Sep-12
IOSR Journal of Engineering
(IOSRJEN)
yes
Jul-Aug-2012

July-Dec 2012

Sep-Oct 2012

1.649

no
International Journal of
Computers Electrical and
Advanced Communications
Engineering

yes

International Journal of
Engineering Research and
Applications (IJERA)

yes

1.69

IOSR Journal of Engineering


(IOSRJEN)
yes

1.649

Oct-12

July-Dec 2012

July-Sep-2012

Sep-12

Aug-12

International Journal of
Computers Electrical and
Advanced Communications
Engineering

yes

International Journal of
Computer Science And
Technology

yes

1.02

International Journal of
Advanced Research in
Computer Engineering &
Technology (IJARCET)

yes

3.696

no

AUTHOR
ATION TYPE JOURNAL/CONFERENCE
Journal
Dr..N.KasiViswanath
Journal
Dr.R.Praveen Sam
Journal
Dr.R.Praveen Sam
Journal
Dr.R.Praveen Sam
Journal

conference
conference

Dr.R.Praveen Sam
Dr.R.Praveen Sam

Dr.R.Praveen Sam
Journal
Dr.R.Praveen Sam
Journal

Journal
Journal
Journal

Dr.R.Praveen Sam
Dr.R.Praveen Sam
Dr.R.Praveen Sam

Dr.D.Kavitha,T.Swathi,M.Mamath
a
Journal
C.Sreedhar
Journal
C.Sreedhar
Journal
K.Istaq Ahmad

Journal
K.Istaq Ahmad
Journal

M.Padma,T.Swathi,M.Lakshmi
Neelima

DETAILS Of PAPER
Cross-Layer Based Secure Routing in MANETS, Vol. 3,
Issue 5, Sep-Oct 2013, pp.725-731.

YEAR OF PUBLICATIONS
Oct-13

Mobile Location Based Tour Guide Syatem, volume4


Issue5, pp: 1287-1290.

May-13

Packet Loss Control Using Packet Droppes and Modifies


Techniques in Wireless Sensor Networks

Dec-13

A Network Coding Equivalent Content Distribution Scheme


for Efficient Peer-to-Peer Interactive VOD Streaming

Dec-13

An ACM Computing Survey for Identifying System Level


Tolerent Assignment, Vol. 1, Issue 1, Feb 2014, 51-53

Dec-13

Efficient Type Ahead Search in XML Data


Solving load Rebalancing for Distributed File System in
Cloud

Feb-13

Dec-13

Minimising the Cost in SWNET with Distributed


Cooperative Cashing

Dec-13

SHARING WORKLOADS IN CLOUDS WITH NEFELI,


Vol-1, Iss.-3, JUNE 2014, 38-42.

Dec-13

Cloud Based Novel Mobile Social Tv Syatem


Public Cloud Storsge Using Privacy Peserving
A Survey On Automatic Question-Answering Techniques,
VOLUME NO. 3 (2013), ISSUE NO. 10 (OCTOBER)

Dec-13
Dec-13
Oct-13

Cross-Layer Based Secure Routing in MANETS, Vol. 3,


Issue 5, Sep-Oct 2013, pp.725-731.

Oct-13

Network Attacks Control Process, volume 4 Issue 8, pp:


2661-2666.

Aug-13

OPASS Implementation for Confirmation Protocol System


in Net Security

Oct-13

Of Multi Level Security System Using Click Based Authentication, Vol.2 - Issue 8 Aug-13
(August - 2013)
Global State Recognition In Distributed Systems

Jul-13

TITLE OF THE JOURNAL

Int DB

Int. Journal of Engineering


Research and Applications
(IJERA)

yes

International Journal of
Computer Trends and
Technology (IJCTT

Yes

No

No
International Journal of Advances
in Applied Science and
Engineering (IJAEAS)
Yes

No
2 nd International Conference on
Emerging Trends on Engineering
and Techno-Sciences (ETETS)13th April 2014 ISBN: 978-9381693-68-7
Yes

No
International Journal of Advances
in Applied Science and
Engineering (IJAEAS)
Yes

No
No
INTERNATIONAL JOURNAL OF
RESEARCH IN COMPUTER
APPLICATION & MANAGEMENT

Yes

Int. Journal of Engineering


Research and Applications
(IJERA)

Yes

International Journal of
Computer Trends and
Technology (IJCTT)

Yes
No

Citations

International Journal of Engineering


Research & Technology

Yes
No

AUTHOR
LICATION TYPE JOURNAL/CONFERENCE
Journal
Dr..N.KasiViswanath,Dr .S.Zahoor
UlqHuq,B .Dilip Kumar Reddy
Journal

Dr..N.KasiViswanath

Journal

Dr .R.Praveen Sam

Conference

Dr.R.Praveen Sam

Journal

Dr.R.Praveen Sam

Conference

Dr .R.Praveen Sam

Journal

Dr.R.Praveen Sam,K.Istaq Ahmad

Conference

Dr.R.Praveen Sam

Journal

Dr.R.Praveen Sam,G.vijaya
Kumar,A.VishnuVardhan Reddy

Journal

Dr.R.Praveen Sam

Journal

Dr.R.Praveen Sam

Journal

Dr.R.Praveen Sam

Conference

Dr .R.Praveen Sam

Journal

Dr.D.Kavitha

Journal

Dr.D.Kavitha,C.Sreedhar,K.Asha Rani

Journal

Dr.D.kavitha,K.AshaRani,C.Sreedhar

Journal

K.Ishthaq Ahamed Reddy

Journal

Journal

J.Swami
Naik,D.Meenakshi,M.Raghavendra
Reddy

Journal

G.vijaya Kumar

Journal

Y.Rama Mohan

Journal

G.vijaya Kumar,A.VishnuVardhan
Reddy

Journal

A.Vineela

Journal

M.Padma

Journal

A. Vineela,P. Penchala Prasad,Y.


Janardhan Reddy

Journal

A. Vineela,P. Penchala Prasad,Y.


Janardhan Reddy

Journal

T.Swathi

Journal

M.Padma,M.Lakshmi Neelima

Journal

M.Padma,M.Lakshmi Neelima

Journal

T.Swathi,K.SrikanthS.Raghunath
Reddy

Journal

T.Swathi,K.Srikanth,S.Raghunath
Reddy

Journal

T.Swathi,K.Srikanth,S.Raggunath
Reddy

Journal

L. Sudha Rani,K. Sudhakar,S. Vinay


Kumar

Journal

L. Sudha Rani,K. Sudhakar,S. Vinay


Kumar

Journal

L. Sudha Rani,K. Sudhakar,S. Vinay


Kumar

Journal

K.Bala Chowdappa,P.N.V.S Pavan


Kumar,S.SubbaLakshmi

Journal

K.Bala Chowdappa,P.N.V.S Pavan


Kumar,S.SubbaLakshmi

Journal

K.Bala Chowdappa,P.N.V.S Pavan


Kumar,S.SubbaLakshmi

Journal

Y.R.Janardhan Reddy,A.Vineela

Journal

V.Spoorthy,M.Mamatha,B.Santosh
Kumar

Journal
Journal

B. Rajesh, Y.R. Janardhan Reddy, B.


Dillip Kumar Reddy
B. RAJESH, D. L. SRINIVAS

DETAILS Of PAPER
YEAR OF PUBLICATIONS
Peer to Peer Distributed Data Storage With Security
in Cloud Computing, 3(6), pp: 402-406.
Jun-14
An Approach for Preserving Cost of Intermediate
Datasets in Cloud, Volume 4, Issue 5, May 2014.

May-14

Collaborative Computing and its Driven


Applications in Real Time Environment, Vol.2.,
Issue.5, 2014, pp: 13-16

Sep-14

Economic Based Pricing Srategies for


Communication Networks

Apr-14

On Optimizing Overley Topologies for Search in


Unstructured Peer to Peer Networks, Vol. 1, Issue
2, Apr 2014, 43-48.

Apr-14

Filtering Restrictive Messages from OSN user


walls

Sep-14

A Survey on IP Conflicts in MANETS, Volume 2,


Issue 2, May 2014, PP 138-142

May-14

Statestical Framework Based Source Anonymity in


Sensor Networks

Apr-14

A Study on Medium Access Control Protocols in


Wireless Mesh Networks, Volume 3, Issue 5, May
2014, pp: 1832-1838

May-14

AZURE-A Strategy of PaaS(Platform as a service

Jan-14

The Exploring the Business Economics of Cloud


computing

Jan-14

Attracting Force Applications Over Behavioural


Outsourcing Data

Apr-14

A Composite Service Composition in Mobile


Adhoc Networks Based on Novel Nade Model

Sep-14

Analysis of Privacy Preserving Methods for


Storage in cloud, Vol.03,Issue.06,
May-2014,
Pages:0979-098.

May-14

Big Data and Hadoop, Volume 3 Issue 5, May2014,


pp: 1571-1575.

May-14

Survey of Virtual Computing Systems, Volume 2,


Issue 6, June 2014 pg. 112-115.

Implement of SCHS and AONT Method for Packet


Hiding in Wireless Networks
Virtualization IPTV Services Through Cloud
Optimization, Vol.03,Issue.16
July-2014,
Pages:3397-3400

Jun-14

Jun-14

Jul-14

Software Testing Techniques in Software


Development Life Cycle, Vol. 5 (3) , 2014, 37293731.

2014

Efficient Information Extraction Using Web


Service, Vol.7, Issue .II
pp: 579-584.

Jul-14

Ecpm And Icpm Based Profile Matching With


Privacy Preservation In Mobile Adhoc Networks
Anonymously

Jul-14

Simulation Based Performance Analysis of Snoop


and obTCP for Vehicle to Vehicle Communication,
Vol. 3, Issue 5, May 2014, pp: 6539-6543

May-14

A Paper on Big Data - Survey, Volume 4 Issue 5


(September 2014), pp: 755-760.

Sep-14

A Scheme of Privacy Preserving Mechanism in


Social Networks to a Cloud, Vol.03,Issue.21
September-2014,
Pages:4267-4270

Sep-14

Invisible Blind Marking Method Using Hybrid


Digital Embedding Technique, Volume 4, Issue 1,
January 2014, PP: 1175-1179

Jan-14

A Signature-Based Indexing Method for Efficient


Content-Based Retrieval of Relative Temporal
Patterns, Vol. 5 (3) , 2014, 2800-2802.

May-14

Privacy Preserving in Public Clouds using BGKM,


Vol.03,Issue.11
June-2014,
Pages:2308-2314.

Jun-14

A Study on Cloud Storage, Vol.3 Issue.5, May2014, pg. 966-971.

May-14

Mobile Cloud Computing:Issues from Security


Perspective, Vol.3 Issue.5, May- 2014, pg. 972-977.

May-14

Virtualization in Cloud Computing, Vol.3 Issue.5,


May- 2014, pg. 540-546.

May-14

A Novel Supervised Machine Learning Algorithm


for Intrusion Detection:K-prototype+ID3, Vol. 3 Issue 5 (May - 2014).

May-14

Secure Image Encryption and Decryption in Full


Motion Video, Vol. 5 (3) , 2014, 3259 - 3261.

May-14

Emerging Technology Li-Fi over Wi-Fi, Volume-2,


Issue-3, pp: 5-6.

Feb-14

Distributed File Systems: A Survey, Vol. 5 (3) ,


2014, 3716-372.

May-14

A View on Cloud Computing in the Banking


Sector, Vol. 5 (3) , 2014, 3305 - 3308.

May-14

Ethical Hacking Techniques with Penetration


Testing, Vol. 5 (3) , 2014, 3389-3393.

May-14

A Survey on Bitemporal Data Warehousing System


and Data Warehouse Design Techniques, Vol. 5 (3)
, 2014, 3227 - 3231.

May-14

Discovering the Genuineness of Information on the


web, Volume-4, Issue-2, Page Number: 58-61.

Apr-14

Cloud Computing in Digital Archives, Volume-4,


Issue-3, Page Number: 310-313
A Survey on Data Storage and Security in Cloud
Computing, Vol. 3, Issue. 6, June 2014, pg.306
313.

Jun-14
Jun-14

A Survey Paper on Malicious Computer Worms

Apr-16

ND SCALABLE DATA SHARING IN CLOUD STORAGE WITH KEY-AGGREGATE


16-Jun
CRYPTOSYSTEM

TITLE OF THE JOURNAL

Int DB

INTERNATIONAL JOURNAL OF
ENGINEERING SCIENCES & RESEARCH
TECHNOLOGY

yes

International Journal of Advanced


Research in Computer Science and
Software Engineering

yes

International journal of Engineering


Research-Online

yes
no

International Journal of Advances in


Applied Science and Engineering (IJAEAS)

yes
no

International Journal of Emerging


Engineering Research and Technology

yes
no

International Journal of Advanced


Research in Computer Engineering &
Technology (IJARCET)

yes
no
no
yes

no
International Journal of Scientific
Engineering and Technology Research
(IJSETR)

yes

International Journal of Advanced Research in


Computer Engineering & Technology (IJARCET)

yes

Citations

International Journal of Advance Research in


Computer Science and Management Studies
(IJARSCMS)

yes

no

International Journal of Scientific


Engineering and Technology Research
(IJSETR)

yes

(IJCSIT) International Journal of Computer


Science and Information Technologies

yes

International Journal Of Advanced


Research and Innovation

yes

no

International Journal of Advanced


Research in Computer and Communication
Engineering
yes
International Journal of Electronics
Communication and Computer Technology
(IJECCT)
yes

International Journal of Scientific


Engineering and Technology Research
(IJSETR)

yes

International Journal of Advanced


Research in Computer and Communication
Engineering
yes

(IJCSIT) International Journal of Computer


Science and Information Technologies

yes

International Journal of Scientific


Engineering and Technology Research
(IJSETR)

yes

International Journal of Computer Science and


Mobile Computing

yes

International Journal of Computer Science and


Mobile Computing

yes

International Journal of Computer Science and


Mobile Computing

yes

International Journal of Engineering Research &


Technology
yes
(IJCSIT) International Journal of Computer
Science and Information Technologies

yes

International Journal of Inventive Engineering


and Sciences (IJIES)

yes

(IJCSIT) International Journal of Computer


Science and Information Technologies

yes

(IJCSIT) International Journal of Computer


Science and Information Technologies

yes

(IJCSIT) International Journal of Computer


Science and Information Technologies

yes

(IJCSIT) International Journal of Computer


Science and Information Technologies

yes

International Journal of Engineering and


Management Research

yes

International Journal of Engineering and


Management Research
International Journal of Computer Science and
Mobile Computing

yes
yes

International Journal of Advanced Research


in Computer Science & Technology
International Journal of Research in computers

yes
yes

ATION TYPE JOURNAL/CONFERENCE


AUTHOR

Journal

K.Sudhakar,P.N.V.S.PAVAN
KUMAR,Y.Rama Mohan,B.Santhosh
Kumar,S.Vinay Kumar

Journal

T.Jhansi Rani

Journal

Conference

A.V.R.Mayuri,K.AshaRani

Journal
Journal
Journal

P.Srilakshmi,S.Aarthi,S.Subbalakshmi
P.N.V.S.PAVAN KUMAR

Journal
journal

Journal

B RAJESH,Y R JANARDHAN REDDY,C.V.


CHAKRADHAR

Journal

B.Thimma Reddy,K.Bala
Chowdappa,S.Raghunath Reddy

Journal

Journal

S.Aarthi,P.Srilakshmi

Journal
Journal

M.Lakshmi Neelima

Journal

B.Santhosh Kumar

Journal

Journal

Journal

K.Srikanth

Journal

Dr.S.Zahoor-Ul-Huq

Journal

K.Isthaq Ahamed

Journal

Journal
Journal

C.Sreedhar

Journal

C.Sreedhar,B.Santhosh Kumar

Journal

M.Padma

Journal

M.Raghavendra
Reddy,Meenakshi,K.BalaChowdappa

Conference

D.Meenakshi

DETAILS Of PAPER

Assured Sensitive Data Sharing on a Big Data Platform Using Proxy ReEncryption Algorithm,Volume:5,Issue:5

Impact of Big Data in cloud environment,Volume 5 Issue 2;pp: 37-42


Efficient Management of unstructured data in big data
environment,Volume 5 Issue 4; pp:47-49

YEAR OF
PUBLICATIONS

January 2016

March 2016

May 2016

MPGA: QOS Adequacy Latitude aware Cooperative Spectrum


Sensing in Cognitive wireless mesh networks by Meticulous
Progression based GA
Survey on Various Big Data Analytics Platform

May 2016

Privacy my Decision:Control of Photo Sharing on Online Social Networks

April 2016

Survey: Opinion Spam Detection Approaches and Techniques

April 2016

A Hadoop Framework for Addressing Big Data Challenges: A Survey

May 2016

Privacy my Decision:Control of Photo Sharing on Online Social Networks

April 2016

Efficient Detection of Malicious Worms with different Analysis methods


and Techniques,Volume:5,Issue:4, pp:1144.-1148

April 2016

Cloud Security using Blowfish and Key Management Encryption


Algorithm,vol 2,Issue 6
Survey on Various Big Data Analytics Platform,Volume 6, Issue 5 ; PP670-677

June 2015
May 2016

A Vision entitled transforming Big data to Analytics:Methodology and


future trends,Volume 6, Issue 5 ; PP- 617-625

May 2016

A Vision entitled transforming Big data to Analytics:Methodology and


future trends,Volume 6, Issue 5 ; PP- 617-625
Big Data :An emerging Technology

May 2016
July,2015

An Energy Efficient Data Centre Selection Framework for Virtualized


Cloud Computing Environment,Volume-3,Issue-7
Formation Of Virtual Topology On Fiber Optic Networks With Source
A Simulation
of Load
Balancing
Of Virtual
Machines In
a Cloud
Based
Approach
On Link
FailurePolicy
NetworksA Comparative
Study,volume
Computing
3 issue 9 Environment,Volume-3,Issue-5

Formation of Virtual Topology on Fiber Optic Networks with HLDA on Link


Failure Networks- a Comparative Studyvolume 4 issue 5

December,2015
May,2016
May
2016

May 2016

A Hadoop Framework for Addressing Big Data Challenges: A Survey


,Volume 4, Issue 5, pp: 9157-9166

May 2016

A Hadoop Framework for Addressing Big Data Challenges: A Survey


,Volume 4, Issue 5, pp: 9157-9166

May 2016

Plan and Implementation of new super resolution algorithm using


repaiting,Volume 4, Issue 7, pp: 32-35

July-2015

Survey on Artificial Neural Network Learning Technique Algorithm,Volume


3, Issue 2, pp: 36-39

Feb-2016

A Comprehensive Study on Various Neural Network FrameworksVolume


5, Issue 3, pp: 110-114
A Survey on Big Data Management and Job Scheduling,Volume 130 - No.
13 pp:41-49

March-2016
Nov-15

Cloud Security using Blowfish and Key Management Encryption Algorithm

A survey on Technologies,Applications,Challenges in IOT


Achieving High Message Delivery Ratio through CASER Protocol in
Wireless Sensor Networks,Vol.05,2319-8885, Issue 16
SMAC technologies and its role in Education and E-Governance

16-Jun

JOURNAL NAME

cited index
international database

Impact Factor

IJSET

yes

1.651

(JCT)Journal of Computing
Technologies

yes

3.017

(JCT)Journal of Computing
Technologies

yes

3.017

IJARCSSE

yes

2.5

IJCSIT

yes

3.32

yes

3.32

IJIRCCE

yes

6.577

IJCSIT

yes

3.32

IJSETR

yes

3.762

IJEAS

yes

1.227

IJARCSSE

yes

2.5

IJARCSSE

yes

2.5

IJARCSSE
IJARCSA

0
0

yes
yes

2.5
1.496

INDJST

yes

5.02

IJISET
IJIFR

yes

4.332

IJEERT

yes

1.222

IJCSIT

IJIRCCE

yes

6.577

IJIRCCE

yes

6.577

International Journal of
Computer Scheme and
Mobile Computing

yes

5.258

International Research
Journal of Engineerig and
Technology

yes

4.45

International Journal of
Latest Technology In
Engineering Management
and Applied Science

yes

2.115

IJCA

yes

IJEAS

yes

International Journal of
Computer Science
&Engineering Technology

yes

IJSETR

1.227

3.762

mpact Factor

You might also like