Research Publications

Papers Published in Journals 2010-11
  • "Privacy Preserving Data Mining using Particle Swarm Optimization trained Auto-Associative Neural Network: an Application to Bankruptcy Prediction in Banks"
    -- International Journal of Data Mining, Modeling and Management, 2011 by Paramjeet Gupta, V. Ravi and N. Naveen.
  • "A Particle Swarm Optimization"
    -- Threshold Accepting Hybrid Algorithm For Unconstrained Optimization, Neural Computing and Applications, 2011 by Y. Maheshkumar, V. Ravi and A. Abraham.
  • "Bacterial foraging trained wavelet neural networks: Application to bankruptcy prediction in banks"
    -- International Journal of Data Analysis Techniques and Strategies, 2010 by Paramjeet Gupta and V. Ravi.
  • "A Hybrid Harmony Search and Modified Great Deluge Algorithm for Unconstrained Optimization"
    -- International Journal of Computational Intelligence Research, 6, 4, 755-761, 2010 by R. Chowdhuri, V. Ravi and Y. Mahesh Kumar.
  • "Detection of Financial Statement Fraud and Feature Selection Using Data Mining Techniques"
    -- Decision Support Systems, 2010 (In Press) by P. Ravisankar, V. Ravi, G. Raghava Rao & I. Bose.
  • "Application of Machine Learning techniques to predict Software Reliability"
    -- International Journal of Applied Evolutionary Computation, 2010 by R. Mohanty, V. Ravi & M. R. Patra.
  • "Foreign Exchange Rate prediction using Computational Intelligence methods"
    -- International Journal of Computational Intelligence Research, 2010 by V. Ravi, Ramanuj Lal, & N. Raj Kiran (In Press).
  • "Detection of Financial Statement Fraud and Feature Selection Using Data Mining Techniques"
    -- Decision Support Systems, 2010 by P. Ravisankar, V. Ravi, G. Raghava Rao & I. Bose (In Press).
  • "Machine Learning Techniques Applied To Profile Mobile Banking Users In India"
    -- International Journal of Information Systems in the Service Sector by Carr, M., Ravi, V., Reddy G. S. and Veeranna, D. (2011), (In Press).
  • "Computational Intelligence Hybrids applied to Software Cost Estimation"
    -- International, Journal of Computer Information Systems and Industrial Management Applications, Vol. 2, pp. 104-112 by Pahariya, J. S., Ravi, V., Carr, M. and Vasu, M. (2010)
  • "Client Side protection from Phishing attack"
    -- IJAEST -International Journal of Advanced Engineering Sciences and Technologies, Vol No. 3, Issue No. 1, 039 – 045 by Venkata Prasad Reddy, V.Radha and Manek Jindal.
  • "An ECC based Two-Party Authenticated Key Agreement Protocol for MANETs"
    -- Journal of Computers, Vol. 6, No. 9, 2011 by Kavitha Ammayappan , Atul Negi , V. N. Sastry and Ashok Kumar Das.
  • "A new Secure Route Discovery Protocol for MANET to prevent Hidden Channel Attacks"
    -- International Journal of Network Security, 2011 by Kavitha Ammayappan, V. N. Sastry and Atul Negi.
  • "A New Route Discovery Design for Routing Misbehavior Prevention in multi hop Wireless Sensor Networks"
    -- International Journal of Autonomous and Adaptive Communication Systems, Vol.7, No.3, 2014 by Kavitha Ammayappan, Atul Negi and V. N. Sastry.
  • "Knowledge Management for Indian Banks"
    -- The Indian Banker, 5 (12) pp 45-47 by Mahil Carr.
Papers Published in Conferences 2010-11
  • "A novel soft computing hybrid for data imputation"
    -- DMIN, Las Vegas, USA, 2011 by N. Ankaiah and V. Ravi.
  • "Rules Extracted from SVM using Modified ALBA: an Application to Churn Prediction in Bank Credit Cards"
    -- KES, UK, 2010, LNAI by M. A. H. Farquad, V. Ravi & S. Bapi Raju.
  • "Data Mining via Rules Extracted from GMDH: An Application to Predict Churn in Bank Credit Cards"
    -- KES, UK, 2010, LNAI by N. Naveen, V. Ravi, C. Raghavendra Rao.
  • "Credit Scoring using PCA-SVM hybrid Model"
    -- Second International Conference on Recent Trends in Information, Telecommunication and Computing – ITC 2011, March 10-11, Bangalore, India by M. A. H. Farquad, V. Ravi , Sreeramji, G. Praveen.
  • "Forecasting using Rules Extracted from Privacy Preserving Neural Network"
    -- MIWAI, LNAI, Hyderabad, 2011 by N. Naveen, V. Ravi, C. Raghavendra Rao.
  • "A Modified Harmony Search Threshold Accepting Hybrid Optimization Algorithm"
    -- MIWAI, LNAI, Hyderabad, 2011 by Y. Maheshkumar and V. Ravi.
  • "Bankruptcy prediction in banks by Threshold Accepting trained Principal Component Analysis and Wavelet Neural Network Hybrid"
    -- DMIN, Las Vegas, USA, 2011 by M. Vasu and V. Ravi.
  • "Rule Extraction from Privacy Preserving Neural Network: Advanced materials Research V. 403-408/2012"
    -- ICCRC, New Delhi, 2011 by N. Naveen, V. Ravi, C. Raghavendra Rao.
  • "Differential Evolution Based Fuzzy Clustering Algorithms"
    -- SEMCCO, 2010 by V. Ravi, N. Aggarwal, & N. J. Chauhan.
  • "Application of Fuzzy Multi Attribute decision making using Web services"
    -- IEEE NWeSP, Goa, 2010 by R. Mohanty, V. Ravi & M. R. Patra.
  • "Feature Selection for Network Intrusion Detection using SVM-RFE"
    -- CNC – Communication, Networks and Computing – 2010, Pages: 14-18 by Radha V. and Kranti K.
  • "Prevention of Buffer Overflow attacks using Advanced Stack Guard"
    -- CNC – Communication, Networks and Computing – 2010, Pages: 357-359 by Radha V., and Kumar Verma D.
  • "Dematerialized Deposits using XSI"
    -- CCSEIT -2011, by Radha V., Surabhi U, Ramesh G, Vijay B (Accepted).
  • "E-Lending Platform"
    -- CCSEIT -2011 by Radha V., Vijay B (Accepted).
  • "Prevention of Malware infection attacked via PDF and MS-Word Documents"
    -- International Conference on Information Security – 2011 by G.Vinayak Rao and Radha V.
  • "Subset Selection Approach for Watermarking Relational Databases"
    -- International Conference on Data Engineering and Management, (ICDEM 2010) July 2010 by Burepalli V S Rao and Munaga V N K Prasad.
  • "A Secure Mobile Payment Framework using WPKI for India"
    -- International Workshop on Information Security Applications (WISA 2011), Aug 22, 2011 - Aug 24, 2011, Jeju Grand Hotel, Jeju Island, Korea http://www.wisa.or.kr/ by S.Pavan, Shakeel Ahamad Shaik, V.N.Sastry & Siba K. Udgata.