Classification of tweets data based on polarity using improved RBF kernel of SVM AP Gopi, RNS Jyothi, VL Narayana, KS Sandeep International Journal of Information Technology, 1-16, 2020 | 186 | 2020 |
Visual Cryptography for gray scale images with enhanced Security mechanisms VL Narayana, AP Gopi Traitement du Signal, 2017 | 57 | 2017 |
Protected strength approach for image steganography GA Peda, VL Narayana Traitement du Signal, 2017 | 55* | 2017 |
Enhanced Identity Based Cryptography for Mobile Adhoc Networks VL NARAYANA Journal of Theoretical and Applied Information Technology 95 (5), 1173-1181, 2017 | 54 | 2017 |
IDENTITY BASED CRYPTOGRAPHY FOR MOBILE AD HOC NETWORKS VL NARAYANA, DCR BHARATHI Journal of Theoretical and Applied Information Technology 95 (5), 1173-1181, 2016 | 54 | 2016 |
Avoiding Interoperability and Delay in Healthcare Monitoring System Using Block Chain Technology KC Vejendla Lakshman Narayana*, Arepalli Peda Gopi Revue d'Intelligence Artificielle 33 (1), 45-48, 2019 | 53 | 2019 |
Dynamic load balancing for client server assignment in distributed system using genetical gorithm AP Gopi, VL Narayana, JA Kumar Ingenierie des Systemes d'Information, 2018 | 44 | 2018 |
Different techniques for hiding the text information using text steganography techniques: A survey VL Narayana, AP Gopi, JA Kumar Ingenierie des Systemes d'Information, 2018 | 38 | 2018 |
Effective multi-mode routing mechanism with master-slave technique and reduction of packet droppings using 2-ACK scheme in MANETS VL Narayana, CR Bharathi Modelling, Measurement and Control A 91 (2), 73-76, 2018 | 36 | 2018 |
Using Customized Active Resource Routing and Tenable Association using Licentious Method Algorithm for Secured Mobile Ad-Hoc Network Management VL Narayana, CR Bharathi Advances in Modelling and Analysis B 60 (1), 270-282, 2017 | 35* | 2017 |
Certified Node Frequency in Social Network Using Parallel Diffusion Methods APGLN Vejendla Ingénierie des Systèmes d' Information 24 (1), 113-117, 2019 | 34 | 2019 |
Multi-mode Routing Mechanism with Cryptographic Techniques and Reduction of Packet Drop Using 2ACK Scheme MANETs VL Narayana, CR Bharathi SIST Springer 2 (1), 649-658, 2018 | 34 | 2018 |
Design and Analysis of CMOS LNA with Extended Bandwidth For RF Applications LN Vejendla, AP Gopi Journal of Xi'an University of Architecture & Technology 12 (3), 3759-3765, 2020 | 32 | 2020 |
ACCURATE IDENTIFICATION AND DETECTION OF OUTLIERS IN NETWORKS USING GROUP RANDOM FOREST METHODOLY VP V. Lakshman Narayana, A. Peda Gopi, Sk. Reshmi Khadherbhi Journal of Critical Reviews 7 (6), 2020 | 25 | 2020 |
A brief review of electrospinning of polymer nanofibers: history and main applications R Amna, K Ali, MI Malik, SI Shamsah Journal of New Materials for Electrochemical Systems 23 (3), 151-163, 2020 | 24 | 2020 |
IDENTIFICATION OF ATTACKERS USING BLOCKCHAIN TRANSACTIONS USING CRYPTOGRAPHY METHODS VLN Sandhya Pasala, V. Pavani, G. Vidya Lakshmi Journal of Critical Reviews 7 (6), 2020 | 20 | 2020 |
WITHDRAWN: Implementation patterns of secured internet of things environment using advanced blockchain technologies SK Kotamraju, PG Arepalli, LN Vejendla, SS Kanumalli Materials Today: Proceedings, 2021 | 17 | 2021 |
Use of Blockchain in Malicious Activity Detection for Improving Security BTRVLNVPP Anusha International Journal of Advanced Science and Technology 29 (3), 2020 | 16 | 2020 |
Enhanced Morphological Operations for Improving the Pixel Intensity Level VRMKMLPAVL Narayana International Journal of Advanced Science and Technology 29 (3), 2020 | 16 | 2020 |
FUZZY BASE ARTIFICIAL NEURAL NETWORK MODEL FOR TEXT EXTRACTION FROM IMAGES PA V. Lakshman Narayana, B. Naga Sudheer, Venkata Rao Maddumala Journal of Critical Reviews 7 (6), 2020 | 16 | 2020 |