Reach us throug careers@cjits.org
"Disaster Recovery of servers using virtualized cloud computing International Scientific Journal on Science Engineering & Technology Vo1ume 17, No. 05, June 2014"
Standard Securities for End user access in cloud computing Vo1ume 17, No. 05, June 2014
Sound pattern classification based on feature clustering alg
End user can quickly & Securely access through processing capabilities by using SaaS VSRD International Journal of Computer Science &Information Technology, Vol. IV Issue VII July 2014, e-ISSN : 2231-2471, p-ISSN : 2319-2224 © VSRD International Journals
Designing High to low cost solution for crash recovery of servers through virtualization using cloud computing International Scientific Journal on Science Engineering & Technology Vo1ume 17, No. 05, June 2014
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Computing, e-ISSN : 2231-2471 : 23499745, Volume 2, Issue 1; January 2015
OneTK: Key Distribution Center at Cloud Providers towards End to End, Security the Services through Session Keys & alerts, e-ISSN : 2231-2471 : 23499745
"Audio 120 kbps Classification Based on Feature Clustering Algorithm International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 12, [December – 2015] ISSN (Online):2349–9745 ; ISSN (Print):2393-8161"
Photography Is My Decision and My Privacy Controls Online Social Network Sharing Volume No: 2 (2016), Issue No: 4 (September)
Efficiency, Reliability and Flexibility, Combining Information Services Resource Volume No: 3 (2016), Issue No: 9 (September)
Energy Efficiency through Trust System Watchdog Optimization for WSN Volume No: 2 (2016), Issue No:5 (October)
Protecting Federal Systems from Advanced Threats NCARC -2013
Cloud computing –Cost Free Technology , Today and Tomorrow in NCARC-2013
Excellent Manner of Using Secure way of data storage in cloud computing IJMTER-vol-2 issue-1 jan-2015
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Computing IJMTER-vol2-issue-1 jan-2015
Empirical Performance Evaluation of Relational Keyword Search Techniques vol-5 issue-3 June-2015
Secured Connectivity in Wireless Sensor Networks IJMTER Vol 2-issue-12 dec-2015
Reduction of computation cost for Dynamic users in the Cloud -Vol 2-issue-12 dec-2015
MALWARE TEST ON CLOUD COMPUTING INFRASTRUCTURE ijirt- Volume 4 Issue 9 February 2018
Improve dynamic view and optimization for data transfer in cloud data centers Volume 4 Issue 11 November - 2018 in IJTIMES.
Attended six days workshop organized by Oracle Academy at Chrsitu Jyothi Institute of Technology &Science, Jangaon
Sucessfully Completed SAP Business course module
Improving Performance In Wireless Sensor Networks Using MEMS Technology IJECCE Volume 3,Issue 1 2249-071X
A Frame Work For Secure Data Processing In Cloud Computing IJRCT Volume 8, Issue 1 0975-5662 2016
Slicing:Privicay Protecting Data Publishing Using L-Diversity Algorithm in NCARC-2013
A Self Configurable New Generation Child Trackng System based on RFID,GPS and ANDRIOD Mobile Terminals in NCARC-2013
Improving security features in MANET authentication through scrutiny of the Certification Revocation List Servers status IJMTER-vol2-issue-1 jan-2015
Analysis on Efficient content distributed and control mechanism ijcsee-vol5-issue1-june 2015
Optimizes Multi Casting Routing Algorithm Based on tree structure in Manets ijcsee-vol5-issue1-june2015
Secured Connectivity in Wireless Sensor Networks IJMTER-Vol 2-issue-12 dec-2015
Reduction of computation cost for Dynamic users in the Cloud, -Vol 2-issue-12 dec-2015
PASSWORD BASED SHADOW ATTACK: QUANTITATIVE TESTING ANALYSIS Volume ijirt-4 Issue 9 February 2018
Proximity: A new privacy model for data publishing NCARC13 National
Disaster Recovery of Servers using virtualized cloud computing ISBN/ISSN 978-93-82338-97-0 ICARIMMIEM14 INTERNATIONAL
Standard Securities For End User Access In Cloud Computing ISBN/ISSN978-93-82338-97-0 ICARIMMIEM14 INTERNATIONAL
Protect Confidential Information in PPH Cloud environments By Using End-End access in Secure Way ISBN / ISSN 978-81-925233-3-0 ASDF14 INTERNATIONAL
Designing High to Low Cost Solution for Crash Recovery of Servers through Virtualization using Cloud Computing ISBN / ISSN 6814-4794 ISJSET14 JOURNAL
End User cans Quickly & Securely Access through Processing Capabilities by Using SaaS ISBN / ISSN 2231-2471 VSRD14 JOURNAL
Audio 120 kbps Classification Based on Feature Clustering Algorithm ISBN / ISSN 2349–9745 IJMTER15 JOURNAL
OneTK: Key Distribution Center at Cloud Providers towards End to End, Security the Services through Session Keys & alerts ISBN / ISSN 2231-2471 IJMTER15 JOURNAL
Protecting Data in Cloud Storage Using BlowfishEncryption Algorithm and Image-Based One-Time Password ISBN / ISSN 2454-1362 IJIR16 JOURNAL
Authored research paper on “ Future Opportunities and Challenges in Sentiment Analysis: An Overview” in International Journal of Computer Sciences and Engineering Open Access, Review Paper Volume-5, Issue-12 E-ISSN: 2347-2693, Dec 2017
Authored research paper on Useful Privacy Promotion Keyword Search Mode in October 2017 | IJIRT | INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY Volume 4 Issue 5 | ISSN: 2349-6002
Authored Research paper on “A Survey on Storage Security using Privacy preserving public Auditing in Cloud Computing” in International Journal of computer science and Electronics Engineering UK In Oct 2015 ISSN: 0975-5664
Authored research article titled “ Disruption Tolerant Networks , Efficient data Access in the Cooperative Caching” for journal publication in IJMETMR ( A peer review open access journal ) EISSN 2348-4845 and ISSN 2320-3706 ( Print )
Authored research article titled “a Stochatistic model to investigate data center performance and QoS in LAAS Cloud Computing System “ for journal publication in IJMETMR ( A peer review open access journal ) EISSN 2348-4845 and ISSN 2320-3706 ( Print )
Authored research article titled “The Detection of abnormal social currents linking discovering emerging issues “ for journal publication in IJMETMR ( A peer review open access journal ) EISSN 2348-4845 and ISSN 2320-3706 ( Print )
Authored paper titled “Improving Security Features in MANET authentication through scrutiny of the certificate revocation list server’s status in international Journal of modern trends in engineering and research E-ISSN 2394-9745 Vol 02, Issue 01 January 2015.
Authored paper on “Effective Ways Cloud Computing Can Contribute to Education Success” in Advanced Computing: an International Journal ISSN/EISSN: 2229726X 22296727, 2013 volume: 4 issue: 4, Publisher: Academy & Industry Research Collaboration Center (AIRCC)
Presented paper titled “ A comprehensive analysis of risks, threats and vulnerabilities in cloud computing “ at International conference ICIEMS 2014 organised by ASDF, ISBN 978-81-925233-3-0
Presented paper titled “Authenticated data dynamics and TPA based public auditability for storage security in cloud computing “ at national conference on “advances in computing and Networking “ NCAN-13 on 6th and 7th December 2013 organized by Department of CSE, JNTU Hyderabad college of engineering Manthani ISBN No: 978 93 83038 11 4 © 2014 JNTUH Manthani
Presented paper at International Conference on “Ergonomics at workplace-a study of contemporary issues” as First author at CJITS Jangaon for the ICARIMMIEM-2014 (Advance Research and innovations in mechanical, material, industrial Engineering & Management on 6 & 7 January 2014 ISBN 978-93-82338-97-0 © 2014 Bonfring
Presented paper at national conference on “Achieving secure scalable and fine grained data access control in cloud computing” organized by CJITS, National conference on Advanced Research in computing 2013, NCAN-2103. ISBN 978-81-8424-876-0 © 2013 .WDES Warangal
Presented paper on “ Protecting against attacks by using synopsis diffusions approach in sensor networks “ at CJITS Jangaon for National conference on Advanced Research in computing 2013 “ NCAN-2103 organized by dept of CSEISBN 978-81-8424-876-0 © 2013 .WDES Warangal
Recommendations are based on the fundamental questions of the monitoring document S.vijaya laxmi K.Mamatha conference
Search suggest a novel model of localization consumer confidence K.Mamatha S.vijaya laxmi conference
Negative IP Traceability S.vijaya Laxmi, S.Prasanna Laxmi Journal ISSN No: 2348-4845 International Journal
Negative IP Traceability S.vijaya Laxmi, S.Prasanna LaxmiJournal ISSN No: 2554-423X International Journal
Collecting Data Secure in the Wireless Sensor Network: Filters Striker Impressed Ayesha Nuzhath1 S.Vijaya Laxmi Journal ISSN No 2395 – 0420 InternationalJournal
Securing against attacks by using synopsis diffussion apporach NCAR 2013
The deployment of scalable and reliable service based on a system to match The content. IJRACSE 2015
Key Distribution center at cloud providers towards End to end security the services through session keys & alerts. IJMTER vol 2 Issue 01 2015
provable security against minibus attacks & Dos attacks securing from wireless AD HOC sensor Networks. IJMETMR 2016
A cocktail Approach for Travel Package Recommendation International Journal Of Computer science and Electronics Engineering UK VOL 5, ISSUE 2 MAY- 2015 ISSN -0975-5664
Cloud computing –Cost Free Technology , Today and Tomorrow in NCARC-2013
Attended six days workshop organized by Oracle Academy at Chrsitu Jyothi Institute of Technology & Science, Jangaon
Attended one day workshop program organized by SAMSUNG on Tizen Operating Systems at keshv Memorial Engineering College, Naryanaguda.
Attended one day workshop program organized by SAP Labs collaboration with University of Alliance, Germany held at Bangalore.
Guided 2 batches (8 students) in developing apps in Mobiles using Tizen Operating Systems collaboration with SAMSUNG.
Effective Utilization of Hardware with Association Rule Mining at the 2nd National Conference on Control, Communication and Computer Technology (CCCT-2011).
Scalable And Efficient Sleep Scheduling By Avoiding Delay in Wireless And Sensor Networks at NCARC’13.
Clattering Recall using Self Encryption Scheme in a Distributed Data Storage System at ijcset journal(FEB-2013).
An Algorithm for Estimating User Search Goals with Feedback Sessions at journal(ijdcst)issn-2320-7884 (online) issn-2321-0257 (print)
Effective Skyline Maintenance on Big Data At IJDCST @Jan-2015, Issue- V-3, I-2, SW-08ISSN-2320-7884 (Online) ISSN-2321-0257 (Print)
Domain Specific Search using Rankig Model Adoptation journal(ijarcsst) v-6, i -1.
Distribution Storage Deduplication with Improved Reliability systems in Advanced Computer science Engineering VOL 1, ISSUE 7 DEC 2015 ISSN -2454423X
An Algorithm for Estimating under search goals with feed session I IJDCST ,JAN2015,VOL 1 ISSUE 2 ISSN 23207884
Domain Specific Search using Rankig Model Adoptation Journal(ijarcsst) v-6, i -1.ISSN No: 2348-4845
Effective Skyline Maintenance on Big Data At IJDCST @Jan-2015, Issue- V-3, I-2 SW-08ISSN-2320-7884 (Online) ISSN-2321-0257 (Print)
Online transactions using asp.net & ado.net in IIEMS May-2014 at CJITS
Simulation of rank correlation based detection mechanism for distributed denial of services attacks ISSN 2307-4523
Software-as-a-service clouds scalable distributed service integrity attestation ISSN 23248-4845 Enhanced synonym queries supported encrypted cloud multi-keyword ranked search system ISSN 23248-4845
Designing high to low cost solution for crash recovery of servers through virtualization using cloud computing( International Scientific Journal on Science Engineering & Technology Vo1ume 17, No. 05, June 2014)
Disaster recovery of servers using virtualized cloud computing ICARIMMSIEM AT CJITS ISBN-978-9382338
The detection of abnormal social currents linking discovering emerging issues ISSN 23248-4845
Mobile social networks to support the evaluation of a service-oriented reliable service ISSN 23248-4845 End user cans quickly & securely access through processing capabilities by using saas p-ISSN : 2319-2224
Fuzzy sound patterns classification based on feature clustering algorithm NCACPR-14 AT JNTUHCEJ -ISBN-9789383038176
A multilingual reference based on cloud pattern ISSN : 2349 - 6002
End user cans quickly & securely access through processing capabilities by using saas p-ISSN : 2319-2224 July 2014
The collection of multi user transmission data using common currency auditing ISSN 2454-423X
Performance of cloud-based data protection using principle of a hybrid circuit ISSN 2454-423X
Making the test of digital issues using web ISSN 2454-423X
Organized links and social learning to recognize anomalous behavior ISSN 2454-423X
Dynamic and cloud computing data storage systems to support indirect mutual trust ISSN 23248-4845
Key distribution center at cloud providers towards secured services IMECS 2015
Hellman key exchange to share data in the cloud-based active multi key shared data
Standard securities for end user access in cloud computing ICARIMMSIEM AT CJITS ISBN-978-9382338
Multipath switching system with load balancing flow slice granularity NCARC-13 at CJITS ISBN 978-81-8424-876-0
WEBSERVICES IN THE ACTIVITIES OF COLLABORATIVE TRUST WORTHY COMMUNICATIONS IN THE WEB SERVICE OF CLOUD DATA CENTER ICICSE-2014
RESOURCE RENTING FOR PERIODICAL CLOUD WORKFLOW APPLICATIONS Published in IJTIMES, Volume 04 Issue 11, November-2018 e-issn 2455-2585
Application of a novel time-slot utility mechanism for pricing cloud resource to optimize preferences for different time slots 2319-7471 IJER INTERNATIONAL 2013
Private Cloud Security in Cloud Computing NCARC National 2013
Better Control Authority Flow Using Topicality with Proximity Search NCARC National 2013
A Noval Conditional Shortest Path RoutingProtocolby Using Conditional Intermitting Time ASDF14 INTERNATIONAL 2014-2015
Flixible Distributed Storage Integrity Auditing Mechanism to Acieve a Secure and Dependable Cloud Storage Service in Cloud Computing 2321-1776 IJITE JOURNAL 2015
Maximizing the lifetime of wireless Sensor Networks using CRT based packet splitting Algorithm International journal of Advancements in research & Tech Volume 2,Issue 4,April 2013 .ISSN 2278-7763.
Effective ways cloud computing can contribute to Education sucess Advanced Computing: An International Journal (ACIJ ), Vol.4, No.4, July 2013 2013.4402
Knowledge of the Elements in Groups Question International Journal Of Research In Advanced Computer Science & Engineering 2015
PURIFICATION DETECTION AND RECTUS DISTORTED FINGERPRINT International Journal of Modern Trends in Engineering & Research 2015