|
|
|
Prof.Dr.G.Manoj Someswar,M.Malla Reddy
In the present day situation, individuals are on a typical stage in that they should be associated with the Internet to anyplace and at whenever throught the world. This can be incredibly ascribed to advancement of Information correspondence innovations ...
ver más
|
|
|
|
|
|
|
M.Uday Kumar,S Vidhya,Prof.Dr.G.Manoj Someswar
The authors have plagiarized part of a paper that had already appeared in IEEE Transactions on Knowledge and Data Engineering, 28(2), 411?424. doi:10.1109/tkde.2015.2485222. One of the conditions of submission of a paper for publication is that authors d...
ver más
|
|
|
|
|
|
|
M. Parimala,Sunil Deva,Prof.Dr.G.Manoj Someswar
The authors have plagiarized part of a paper that had already appeared in IEEE Transactions on Knowledge and Data Engineering, 28(4), 939?950. doi:10.1109/tkde.2015.2492540. One of the conditions of submission of a paper for publication is that authors d...
ver más
|
|
|
|
|
|
|
K.Ruben Raju,Danekula Rajya Lakshmi,Prof.Dr.G.Manoj Someswar
The authors have plagiarized part of a paper that had already appeared in IEEE Transactions on Cloud Computing, 1?1. doi:10.1109/tcc.2016.2545668. One of the conditions of submission of a paper for publication is that authors declare explicitly that thei...
ver más
|
|
|
|
|
|
|
Vankudoth Bhavani,K. Mahesh,Prof.Dr.G.Manoj Someswar
The authors have plagiarized part of a paper that had already appeared in IEEE Transactions on Parallel and Distributed Systems, 25(7), 1808?1818. doi:10.1109/tpds.2013.79 . One of the conditions of submission of a paper for publication is that auth...
ver más
|
|
|
|
|
|
|
B. Premlatha,K.Pradeep Reddy,Prof.Dr.G.Manoj Someswar
The authors have plagiarized part of a paper that had already appeared in IEEE Transactions on Knowledge and Data Engineering, 26(4), 984?996. doi:10.1109/tkde.2013.57. One of the conditions of submission of a paper for publication is that authors declar...
ver más
|
|
|
|
|
|
|
Marigay Lavanya,M. Parimala,Prof.Dr.G.Manoj Someswar
The authors have plagiarized part of a paper that had already appeared in IEEE Transactions on Dependable and Secure Computing, 12(3), 270?283. doi:10.1109/tdsc.2013.2297709 . One of the conditions of submission of a paper for publication is that authors...
ver más
|
|
|
|
|
|
|
Dr.Vinukonda Rajesh,Dr.Rajesh Kumar Singh,Prof.Dr.G.Manoj Someswar
Preparing students of technical communication in the twenty-first century means training them to rhetorically utilize a wide variety of online tools. Technical communicators are now required to employ social media applications on a daily basis to communi...
ver más
|
|
|
|
|
|
|
Prof.Dr.G.Manoj Someswar,A.Suman Kumar Reddy
The plan of current implanted frameworks is obliged by the necessities of present day installed applications. A considerable lot of these applications require not just supported operation for drawn out stretches of time, yet additionally to be executed o...
ver más
|
|
|
|
|
|
|
Prof.Dr.G.Manoj Someswar,B.Babu Rajesh
Testing low power very large scale integrated (VLSI) circuits in the recent times has become a critical problem area due to yield and reliability problems. This research work lays emphasis on reducing power dissipation during test application at logic le...
ver más
|
|
|
|
|
|
|
Ganji Vivekanand,Prof.Dr.G.Manoj Someswar
Enormous Data investigation has pulled in exceptional premium as of late for its endeavour to remove data, learning and insight from Big Data. In industry, with the advancement of sensor innovation and Information and Communication Technologies (ICT), re...
ver más
|
|
|
|
|
|
|
Prof.Dr.G. Manoj Someswar,SSN Anjaneyulu
This research work is concerned about issues of identifying with the administration of information security in associations, accompanied by the requirement for cost e?cient data security. It depends on the suspicion that: with a specific end goal to acco...
ver más
|
|
|
|
|
|
|
Prof.Dr.G. Manoj Someswar,D.Narasimha Raju
We propose the principal completely homomorphic encryption plot, tackling a focal open issue in cryptography. Such a plan enables one to figure subjective capacities over encoded information without the decoding key { i.e., given encryptions E(m1); : ; E...
ver más
|
|
|
|