Forced degradation studies: practical approach-overview of regulatory guidance and literature for the drug products and drug substances K Hotha, S Phani, K Reddy, LK Ravindranath Education, Jul 2012, 2009 | 70 | 2009 |
A secured cryptographic system based on DNA and a hybrid key generation approach MI Reddy, APS Kumar, KS Reddy Biosystems 197, 104207, 2020 | 28 | 2020 |
Classification of Child and Adulthood Using GLCM Based On Diagonal LBP KS Reddy iCATccT, 2015 | 21 | 2015 |
A Practical Approach for Secured Data Transmission using Wavelet based Steganography and Cryptography MI Reddy, V UdayKumar, KS Reddy International Journal of Computer Applications 67 (10), 18-23, 2013 | 5 | 2013 |
Key Distillation Process on Quantum Cryptography Protocols in Network Security R M. Indra Sena Reddy, K. Subba Reddy, M International Journal of Advanced Research in Computer Science and Software …, 2012 | 5* | 2012 |
Classification of textures using a new descriptor circular and elliptical-LBP (CE-ELBP) KS Reddy, VV Kumar, APS Kumar International Journal of Applied Engineering Research 12 (19), 8844-8853, 2017 | 4 | 2017 |
An extended visual methods to perform data cluster assessment in distributed data systems K Subba Reddy, K Rajendra Prasad, GR Kamatam, ... The Journal of Supercomputing 78 (6), 8810-8829, 2022 | 3 | 2022 |
A ROBUST COLOR FILTER ARRAY INTERPOLATION TECHNIQUE FOR COLOR IMAGE ENHANCEMENT CS C.Naga raju, K.Subba reddy International Journal of Emerging Trends & Technology in Computer Science 2 …, 2013 | 3* | 2013 |
Secured Data Transmission using Wavelet based Steganography and Cryptography MIS Reddy, KS Reddy, VU Kumar International Journal of Computers and Technology 6 (2), 311-316, 2013 | 3 | 2013 |
A Practical Approach for Implementation of Public Key Infrastructure for Digital Signatures MISR KSREDDY International Journal Of Engineering Research and Applications 1 (2), 2011 | 3 | 2011 |
An extended fuzzy C-means segmentation for an efficient BTD with the region of interest of SCP R Prasad International Journal of Information Technology Project Management (IJITPM …, 2021 | 2 | 2021 |
Texture classification based on first order circular and elliptical ternary direction pattern matrix KSRVVKAPS Kumar International Journal Of Engineering & Technology, 2018 | 2 | 2018 |
Host Based Information Gathering Honeypots for Network Security MP Reddy, KS Reddy, MIS Reddy, G Sreenivasulu International Journal Of Computational Engineering Research 2 (2), 369-374, 2012 | 2* | 2012 |
Different Medias of Steganography-An Emerging Field of Network Security MIS Reddy, MP Reddy, KS Reddy | 2 | 2012 |
Performance evaluation of SRAM cell using FinFET KS Reddy, MSV Reddy, SSH Phani, M Chaitanya 2022 3rd International Conference on Electronics and Sustainable …, 2022 | 1 | 2022 |
Wireless Application Protocol for Potential Threats to Mobile Agent Network Security MIS Reddy, KS Reddy, PJ Bhatt, R Chetwani Journal of Electronic science and Technology 10 (3), 215-219, 2012 | 1 | 2012 |
An enhanced speaker identification model for effective IoT communication KS Reddy, JC Preethi, B Swapna, MS Vyshnavi, M Reddy, K Charan AIP Conference Proceedings 2821 (1), 2023 | | 2023 |
Implement topic models for an effective assessment of social healthcare data clusters KS Reddy, K Narasimhulu, K Muneeswari, P Haritha, PS Charitha, ... AIP Conference Proceedings 2821 (1), 2023 | | 2023 |
An efficient hybrid fuzzy image encryption models for the secured cloud accessing in portable robotics devices KS Reddy, KR Prasad, KN Reddy, P Anjaiah Soft Computing, 1-11, 2023 | | 2023 |
A sophisticated semantic analysis framework using an intelligent tweet data clustering and classification methodologies SR Kunam, MR Babu, PNS Kumar Microprocessors and Microsystems 98, 104793, 2023 | | 2023 |