Blockchain technology for fraudulent practices in insurance claim process J Gera, AR Palakayala, VKK Rejeti, T Anusha 2020 5th international conference on communication and electronics systems …, 2020 | 21 | 2020 |
A survey on the present state-of-the-art of explosives, detection methods and automatic explosive detection using wireless sensor network RK Kumar, G Murali International Journal of Applied Engineering Research 11 (1), 504-510, 2016 | 6 | 2016 |
Distributed denial of service attack prevention from traffic flow for network performance enhancement VKK Rejeti Proceedings of the second international conference on smart electronics and …, 2021 | 4 | 2021 |
EFFECTIVE ROUTING PROTOCOL IN MOBILE AD-HOC NETWORK USING INDIVIDUAL NODE ENERGY DVKK Rejeti International Journal of Advanced Research in Engineering and Technology 12 …, 2021 | 3* | 2021 |
An Accurate Methodology to Identify the Explosives Using Wireless Sensor Networks K Rejeti, G Murali, BS Kumar Proceedings of International Conference on Sustainable Computing in Science …, 2019 | 2 | 2019 |
Wireless Nano Senor Network (WNSN) for Trace Detection of Explosives: The Case of RDX and TNT RVK Kumar, GM Naik, G Murali | 2* | |
Efficient associated feature vector using Two level recurrent neural network For cardiovascular disease classification AS Kumar, H Dand, VKK Rejeti Journal of Pharmaceutical Negative Results, 1630-1641, 2022 | 1 | 2022 |
Optimizing ZnO/CdS/CdTe bilayer structures for enhanced CdTe solar cell efficiency: A machine learning approach VV Krishnaiah, VNV Prakash, GR Chandra, PGK Sirisha, KJ Mohan, ... MRS Advances, 1-6, 2024 | | 2024 |
Appointment Scheduler for VIP Using Python and Twilio Check for updates NH Krishna, VSH Krishna, SN Basha, VD Polineni, A Vinjam Expert Clouds and Applications: Proceedings of ICOECA 2023 673, 403, 2023 | | 2023 |
Sensor-Based Open Channel Blockage Detection System GL Narayana, T Sowmya, S Jyothi, RA Devi, YSL Sowmya 2023 IEEE 12th International Conference on Communication Systems and Network …, 2023 | | 2023 |
Virtual Fit using Computer Vision and Trimesh VKK Rejeti, S Abdul, PH Prasanth, S Ashok, SM Sameer 2023 Second International Conference on Electronics and Renewable Systems …, 2023 | | 2023 |
UTILIZING MULTI-STAGE AUTHENTICATION AND AN OPTIMIZED BLOWFISH ALGORITHM FOR EFFECTIVE SECURE DATE RETRIEVAL ON CLOUD COMPUTING KK Durga, VKK Rejeti, GR Chandra, R Ramesh Journal of Data Acquisition and Processing 38 (4), 1418, 2023 | | 2023 |
IOT-ENABLED CYBER PHYSICAL SYSTEMS TOWARDS CYBER-ATTACK DETECTION AND ATTRIBUTION E Padmavathi, GR Chandra, VKK Rejeti, R Ramesh Journal of Data Acquisition and Processing 38 (4), 1383, 2023 | | 2023 |
Distributed Denial of Service Attack Prevention from Traffic Flow for Network Performance Enhancement J Gera, VKK Rejeti, JNC Sekhar, AS Shankar 2021 2nd International Conference on Smart Electronics and Communication …, 2021 | | 2021 |
System and also Network Control using Virtual Machine Migration VKK Rejeti International Journal of Innovative Technology and Exploring Engineering 9 …, 2019 | | 2019 |
Explosive Detection Using Remote Nano Sensor Network R kumar IJET 7 (2.33), 2018 | | 2018 |
Automated and Specific State Detection of RDX and TNT using Wireless Sensor Networks R kumar JEAS 13 (9), 2018 | | 2018 |
A Study on Explosive Detection Utilizing Wireless Sensor Networks R kumar JARDCS 10 (4), 2018 | | 2018 |
Distinguish DDoS Attacks and Suggesting Some Counter Measures For Distributed P2P Networks R kumar IJERCSE 4, 2017 | | 2017 |
Virtual Fit Using Computer Vision And Trimesh M Sameer | | |