Papers Published in Journals 2010-11 |
- "Privacy Preserving Data Mining using Particle Swarm Optimization trained Auto-Associative Neural Network: an Application to Bankruptcy Prediction in Banks"
-- International Journal of Data Mining, Modeling and Management, 2011 by Paramjeet Gupta, V. Ravi and N. Naveen.
|
- "A Particle Swarm Optimization"
-- Threshold Accepting Hybrid Algorithm For Unconstrained Optimization, Neural Computing and Applications, 2011 by Y. Maheshkumar, V. Ravi and A. Abraham.
|
- "Bacterial foraging trained wavelet neural networks: Application to bankruptcy prediction in banks"
-- International Journal of Data Analysis Techniques and Strategies, 2010 by Paramjeet Gupta and V. Ravi.
|
- "A Hybrid Harmony Search and Modified Great Deluge Algorithm for Unconstrained Optimization"
-- International Journal of Computational Intelligence Research, 6, 4, 755-761, 2010 by R. Chowdhuri, V. Ravi and Y. Mahesh Kumar.
|
- "Detection of Financial Statement Fraud and Feature Selection Using Data Mining Techniques"
-- Decision Support Systems, 2010 (In Press) by P. Ravisankar, V. Ravi, G. Raghava Rao & I. Bose.
|
- "Application of Machine Learning techniques to predict Software Reliability"
-- International Journal of Applied Evolutionary Computation, 2010 by R. Mohanty, V. Ravi & M. R. Patra.
|
- "Foreign Exchange Rate prediction using Computational Intelligence methods"
-- International Journal of Computational Intelligence Research, 2010 by V. Ravi, Ramanuj Lal, & N. Raj Kiran (In Press).
|
- "Detection of Financial Statement Fraud and Feature Selection Using Data Mining Techniques"
-- Decision Support Systems, 2010 by P. Ravisankar, V. Ravi, G. Raghava Rao & I. Bose (In Press).
|
- "Machine Learning Techniques Applied To Profile Mobile Banking Users In India"
-- International Journal of Information Systems in the Service Sector by Carr, M., Ravi, V., Reddy G. S. and Veeranna, D. (2011), (In Press).
|
- "Computational Intelligence Hybrids applied to Software Cost Estimation"
-- International, Journal of Computer Information Systems and Industrial Management Applications, Vol. 2, pp. 104-112 by Pahariya, J. S., Ravi, V., Carr, M. and Vasu, M. (2010)
|
- "Client Side protection from Phishing attack"
-- IJAEST -International Journal of Advanced Engineering Sciences and Technologies, Vol No. 3, Issue No. 1, 039 – 045 by Venkata Prasad Reddy, V.Radha and Manek Jindal.
|
- "An ECC based Two-Party Authenticated Key Agreement Protocol for MANETs"
-- Journal of Computers, Vol. 6, No. 9, 2011 by Kavitha Ammayappan , Atul Negi , V. N. Sastry and Ashok Kumar Das.
|
- "A new Secure Route Discovery Protocol for MANET to prevent Hidden Channel Attacks"
-- International Journal of Network Security, 2011 by Kavitha Ammayappan, V. N. Sastry and Atul Negi.
|
- "A New Route Discovery Design for Routing Misbehavior Prevention in multi hop Wireless Sensor Networks"
-- International Journal of Autonomous and Adaptive Communication Systems, Vol.7, No.3, 2014 by Kavitha Ammayappan, Atul Negi and V. N. Sastry.
|
- "Knowledge Management for Indian Banks"
-- The Indian Banker, 5 (12) pp 45-47 by Mahil Carr.
|
Papers Published in Conferences 2010-11 |
- "A novel soft computing hybrid for data imputation"
-- DMIN, Las Vegas, USA, 2011 by N. Ankaiah and V. Ravi.
|
- "Rules Extracted from SVM using Modified ALBA: an Application to Churn Prediction in Bank Credit Cards"
-- KES, UK, 2010, LNAI by M. A. H. Farquad, V. Ravi & S. Bapi Raju.
|
- "Data Mining via Rules Extracted from GMDH: An Application to Predict Churn in Bank Credit Cards"
-- KES, UK, 2010, LNAI by N. Naveen, V. Ravi, C. Raghavendra Rao.
|
- "Credit Scoring using PCA-SVM hybrid Model"
-- Second International Conference on Recent Trends in Information, Telecommunication and Computing – ITC 2011, March 10-11, Bangalore, India by M. A. H. Farquad, V. Ravi , Sreeramji, G. Praveen.
|
- "Forecasting using Rules Extracted from Privacy Preserving Neural Network"
-- MIWAI, LNAI, Hyderabad, 2011 by N. Naveen, V. Ravi, C. Raghavendra Rao.
|
- "A Modified Harmony Search Threshold Accepting Hybrid Optimization Algorithm"
-- MIWAI, LNAI, Hyderabad, 2011 by Y. Maheshkumar and V. Ravi.
|
- "Bankruptcy prediction in banks by Threshold Accepting trained Principal Component Analysis and Wavelet Neural Network Hybrid"
-- DMIN, Las Vegas, USA, 2011 by M. Vasu and V. Ravi.
|
- "Rule Extraction from Privacy Preserving Neural Network: Advanced materials Research V. 403-408/2012"
-- ICCRC, New Delhi, 2011 by N. Naveen, V. Ravi, C. Raghavendra Rao.
|
- "Differential Evolution Based Fuzzy Clustering Algorithms"
-- SEMCCO, 2010 by V. Ravi, N. Aggarwal, & N. J. Chauhan.
|
- "Application of Fuzzy Multi Attribute decision making using Web services"
-- IEEE NWeSP, Goa, 2010 by R. Mohanty, V. Ravi & M. R. Patra.
|
- "Feature Selection for Network Intrusion Detection using SVM-RFE"
-- CNC – Communication, Networks and Computing – 2010, Pages: 14-18 by Radha V. and Kranti K.
|
- "Prevention of Buffer Overflow attacks using Advanced Stack Guard"
-- CNC – Communication, Networks and Computing – 2010, Pages: 357-359 by Radha V., and Kumar Verma D.
|
- "Dematerialized Deposits using XSI"
-- CCSEIT -2011, by Radha V., Surabhi U, Ramesh G, Vijay B (Accepted).
|
- "E-Lending Platform"
-- CCSEIT -2011 by Radha V., Vijay B (Accepted).
|
- "Prevention of Malware infection attacked via PDF and MS-Word Documents"
-- International Conference on Information Security – 2011 by G.Vinayak Rao and Radha V.
|
- "Subset Selection Approach for Watermarking Relational Databases"
-- International Conference on Data Engineering and Management, (ICDEM 2010) July 2010 by Burepalli V S Rao and Munaga V N K Prasad.
|
- "A Secure Mobile Payment Framework using WPKI for India"
-- International Workshop on Information Security Applications (WISA 2011), Aug 22, 2011 - Aug 24, 2011, Jeju Grand Hotel, Jeju Island, Korea http://www.wisa.or.kr/ by S.Pavan, Shakeel Ahamad Shaik, V.N.Sastry & Siba K. Udgata.
|