Dr. T. Venkat Narayana Rao

Professor
Sreenidhi Institute of Science and Technology, India


Highest Degree
Ph.D. in Computer Science and Engineering from Jawaharlal Nehru Technological University, India

Share this Profile

Area of Interest:

Computer Sciences
Embedded Systems
Computer Application
Software Engineering
Computer Networks

Selected Publications

  1. Krishna, S.C.S., G.S. Sri, V. Samhitha and T.V.N. Rao, 2020. Augmented reality for smart store assistant: An application to club virtual aspects into real world mall experience. Int. J. Recent Technol. Eng., 8: 4338-4342.
    CrossRef  |  Direct Link  |  

  2. Goel, H. and T.V.N. Rao, 2019. Data visualization in e-commerce an indispensable implementation in real world business scenario. Int. J. Sci. Technol. Res., 8: 2447-2450.
    Direct Link  |  

  3. Shaik, K., N.S. Kumar and T.V.N. Rao, 2017. Implementation of encryption algorithm for data security in cloud computing. Int. J. Adv. Res. Comput. Sci., 8: 579-583.
    Direct Link  |  

  4. Rao, T.V.N., S.K. Saheb and A.J.R. Reddy, 2017. Design of architecture for efficient integration of internet of things and cloud computing. Int. J. Adv. Res. Comput. Sci., 8: 392-396.
    CrossRef  |  Direct Link  |  

  5. Rao, T.V.N., S.A. Shaik and S.M. Kaur, 2017. Predictive analytics-the cognitive analysis. Oriental J. Comput. Sci. Technol., 10: 187-193.
    Direct Link  |  

  6. Rao, T.V.N., N.K. Reddy and S. Sangam, 2017. Application of fuzzy logic in financial markets for decision making. Int. J. Adv. Res. Comput. Sci., 8: 382-386.
    CrossRef  |  Direct Link  |  

  7. Rao, T.V.N., K.Y. Reddy and D.K. Ganji, 2017. Securing transactions in e-commerce using visual cryptography and steganography. Int. J. Adv. Res. Comput. Sci., 8: 584-591.
    Direct Link  |  

  8. Varanasi, A., T.V.N. Rao and S. Maithreyi, 2016. Implementation of android app for retail price statistics. Int. J. Comput. Sci. Eng. Technol., 6: 361-365.
    Direct Link  |  

  9. Varanasi, A., S.M. Kaur and T.V.N. Rao, 2016. Conspiring open source technologies. Int. J. Comput. Sci. Eng. Technol., 6: 24-26.
    Direct Link  |  

  10. Rao, T.V.N., S. Shayideep and J. Jahagirdar, 2016. Internet of things: Security challenges and issues. Int. J. Sci. Eng. Comput. Technol., 6: 414-418.
    Direct Link  |  

  11. Rao, T.V.N., R.V. Jangam and S.M. Kaur, 2016. Collaborative augmented reality-Current and future prospects. Int. J. Comput. Trends Technol., 34: 103-108.

  12. Rao, T.V.N. and K.R. Yellu, 2016. Automatic safety home bell system with message enabled features. Int. J. Comput. Sci. Eng. Technol., 6: 410-413.
    Direct Link  |  

  13. Rao, T.V.N. and J. Shruthi, 2016. Implementation of rainfall record and statistical application for android platform. Int. J. Comput. Sci. Eng. Comput. Technol., 6: 356-360.
    Direct Link  |  

  14. Rao, T.V.N. and A. Mandala, 2016. A novel feature extraction method based on re-retrieval phase using image processing. Int. J. Sci. Eng. Comput. Technol., 6: 366-369.
    Direct Link  |  

  15. Naveena, K. and T.V.N. Rao, 2016. A survey on big data predictions. Int. J. Adv. Comput. Tech. Applic., 4: 163-166.
    Direct Link  |  

  16. Kumar, R.A., D.S. Kumar and T.V.N. Rao, 2016. Digital image watermarking based on genetic algorithm approach. Int. J. Comput. Organiz. Trends, 38: 1-4.
    Direct Link  |  

  17. Kumar, A.R., B. Buchibabu and T.V.N. Rao, 2016. Ranking based techniques using optimised recommendation diversity. Int. J. Sci. Eng. Comput. Technol., 6: 387-391.
    Direct Link  |  

  18. Suhail, A.M., A. Vyas, M. Gudivada and T.V.N. Rao, 2015. New cryptographic technique for enhancing security. Int. J. Scient. Eng. Res., 6: 449-455.
    Direct Link  |  

  19. Singh, A.K., U.K. Singh, M. Penmetsa and T.V.N. Rao, 2015. AIDE-aid for heads up display navigation. Oriental J. Comput. Sci. Technol., 8: 65-71.
    Direct Link  |  

  20. Rao, T.V.N., S.N. Tadichetty and L. Cheruku, 2015. Location tracking system for academics using GPS and android system. Int. J. Sci. Eng. Comput. Technol., 5: 410-413.

  21. Rao, T.V.N., M.J. Rani, C. Swetha and A. Satyam, 2015. Sustainable environment friendly green computing for futuristic technologies. J. Inform. Sci. Comput. Technol., 2: 128-132.
    Direct Link  |  

  22. Rao, T.V.N., M. Simhachalam, S. Bandyala and B.V. Devi, 2015. Enabling new generation security paradigm with quantum cryptography. Oriental J. Comput. Sci. Technol., 8: 103-109.
    Direct Link  |  

  23. Rao, T.V.N., M. Rithika, K. Pradhyumna and R. Rakesh, 2015. Extracting and analyzing data on social networking sites. J. Curr. Comput. Sci. Technol., 5: 1-7.
    Direct Link  |  

  24. Rao, T.V.N., J. Shruthi and T. Sneha, 2015. Website injection for fraudulent activities and ways to combat. Oriental J. Comput. Sci. Technol., 8: 124-130.
    Direct Link  |  

  25. Rao, T.V.N., D.V. Reddy and R.V. Jangam, 2015. Face detection E-attendence system. Int. J. Comput. Trends Technol., 27: 152-155.
    Direct Link  |  

  26. Rao, T.V.N., D. Hiranmayi, G.S. Priya and G. Ravi, 2015. Assessment of manifestation of agile methodology and computing. Int. J. Comput. Sci. Eng. Technol., 4: 358-363.
    Direct Link  |  

  27. Rao, T.V.N., A. Khan, M. Maschendra and M.K. Kumar, 2015. A paradigm shift from cloud to fog computing. Int. J. Comput. Sci. Eng. Technol., 5: 385-389.
    Direct Link  |  

  28. Rao, G. R., A. Konduri and V.N. Rao, 2015. Simulation of rank correlation based detection mechanism for distributed denial of services attacks. Int. J. Comput., 16: 1-8.
    Direct Link  |  

  29. Kalyani, G., K.K. Jyothi, T.V.N. Rao and D. Rambabu, 2015. A comprehensive study of mechanisms dealing credit cards to defy social engineering crimes. Int. J. Comput. Trends Technol., 19: 23-29.
    Direct Link  |  

  30. Jyothi, K.K., G. Kalyani and T.V.N. Rao, 2015. Approaches and scenarios to combat cyber crime. Int. J. Comput. Sci. Eng. Technol., 4: 376-383.
    Direct Link  |  

  31. Geeta, V., P.S. Jyothi and T.V.N. Rao, 2015. A big data analytics for detection of frauds in matrimonial websites. Int. J. Comput. Sci. Eng. Technol., 5: 57-61.
    Direct Link  |  

  32. Chowdhary, L. and T.V.N. Rao, 2015. Object detection algorithm for moving objects using K-map. Int. J. Embedded Software Comput., 5: 1590-1594.
    Direct Link  |  

  33. Singh, A., S. Mishra and T.V.N. Rao, 2014. Oculus wearable technology-vision for blind. Int. J. Comput. Sci. Mobile Comput., 3: 482-487.

  34. Rao, T.V.N., A.M. Suhail and D. Rambabu, 2014. Responsive web design with generic coding principle for modern devices. Int. J. Adv. Eng. Technol., 1: 9-15.
    Direct Link  |  

  35. Rao, T.V.N., 2014. Implementation of TCP congestion control mechanism for wireless networks using TCP reserved field and signal to noise ratio (SNR). IJC., 15: 14-28.

  36. Rao, T.V.N. and A. Govardhan, 2014. Classical and novel diagnosis techniques for early breast cancer detection-A comparative approach. Int. J. Eng. Math. Comput., 3: 12-16.
    Direct Link  |  

  37. Kandala, P., T.V.N. Rao and S.M. Ahamed, 2014. Interfacing the cloud using diffutils algorithm. Int. J. Adv. Res. Comput. Sci. Technol., 2: 7-10.

  38. Kandala, P., J. Kaur and T.V.N. Rao, 2014. Optimizing programs using call graphs. COMPUSOFT, Int. J. Adv. Comput. Technol., 3: 561-565.

  39. Kandala, P., J. Kaur and T.V.N. Rao, 2014. Demonstration of software for optimizing machine critical programs by call graph generator. IJC., 12: 16-22.

  40. Aasha, S.A., M. Sravanthy and T.V.N. Rao, 2014. Principles of ubiquitous computing systems. Int. J. Eng. Sci. Res. Technol., 2: 673-688.

  41. Sujitha, Priyanka, T.V.N. Rao and S. Dara, 2013. Telemedicine-A revolutionary paradigm in rural health care services. Int. J. Adv. Res. Comput. Commun. Eng., 2: 1029-1033.

  42. Sravanthi, G., T.V.N. Rao and S. Dara, 2013. An assessment on computational models for expressive music. Int. J. Adv. Res. Comput. Sci. Software Eng., 3: 1274-1281.

  43. Rohitha, P., P.R. Kumarm, K. Anjaneylu and T.V.N. Rao, 2013. Remote tracking and breaking system for vehicles. Int. J. Eng. Trends Technol., 4: 430-435.

  44. Rao, T.V.N., T.R. Kiran and D. Saidulu, 2013. Recovering human motion tracking system using Gaussian process. Int. J. Eng. Sci. Res. Technol., 2: 159-164.

  45. Rao, T.V.N. and A. Govardhan, 2013. Low cost mammography image enhancement and analysis mechanisms. Int. J. Electron. Commun. Comput. Eng., 4: 24-28.

  46. Rao, T.V.N. and A. Govardhan, 2013. Assessment of diverse quality metrics for medical images including mammography. Int. J. Comput. Sci. Network Security, 14: 42-47.

  47. Pavani, S., Shivani, T.V.N. Rao and D. Shekar, 2013. Similarity analysis of images using content based image retrieval system. Int. J. Eng. Comput. Sci., 1: 251-258.

  48. Madhurima, V., T.V.N. Rao and S. Bhargavi, 2013. Analysis of popular stemming algorithms supporting information retrieval system. Int. J. Comput. Organiz. Trends, 3: 377-388.

  49. Madhurima, V., T.V.N. Rao and L. Nayak, 2013. Heterogeneous mobility management and vision for wireless networks. Int. J. Eng. Comput. Sci., 2: 1142-1146.

  50. Kumar, P.R., R. Ramesh, T.V.N. Rao and S. Dara, 2013. Software quality prediction: A review and current trends. Int. J. Eng. Comput. Sci., 2: 1147-1155.

  51. Devi, S., T.V.N. Rao and Y.R. Kumar, 2013. Human brain to computer- communication for disabled with E-interface. Int. J. Eng. Sci. Res. Technol., 2: 951-955.

  52. Charana, M.B., T.V.N. Rao and V.S. Chandr, 2013. 3D password enabling using gait technology. Am. Scient. Res. J. Eng. Technol. Sci., 6: 12-19.
    Direct Link  |  

  53. Basha, D.K., G.S. Reddy and T.V.N. Rao, 2013. Enhanced contour based segmentation for fingerprint extraction. Int. J. Adv. Res. Comput. Sci. Software Eng., 3: 277-281.

  54. Reddy, S. and T.V.N. Rao, 2012. Monitoring interactions in component-based systems. Int. J. Adv. Res. Comput. Sci. Software Eng., 2: 77-85.

  55. Reddy, G.S., T.V.N. Rao and K.V. Reddy, 2012. Automatic fingerprint recognition scheme and enhancement. Int. J. Applic. Innov. Eng. Manage., 1: 41-47.

  56. Reddy, G.S., T.V.N. Rao and D.V.S.N. Kumar, 2012. An intrusion tolerance approach for internet security. Int. J. Adv. Res. Comput. Commun. Eng., 1: 536-543.

  57. Reddy, G.S., T.V.N. Rao and A.Govardhan, 2012. Investigation and analysis of vulnerability of attacks on watermarked image and its enhancement. Int. J. Modern Eng. Res., 2: 3869-3875.

  58. Reddy, G.S., K.V. Reddy and T.V.N. Rao, 2012. Design and implementation of a network layer for distributed programming platforms. Int. J. Comput. Sci. Eng. Technol., 2: 1510-1515.

  59. Rao, T.V.N., V. Tejaswini and K. Preethi, 2012. Defending against web vulnerabilities and cross-site scripting. J. Global Res. Comput. Sci., 3: 61-64.
    Direct Link  |  

  60. Rao, T.V.N., S. Sukruthi and G.G. Raj, 2012. Biochip technology-A gigantic innovation. Int. J. Emerg. Technol. Adv. Eng., 2: 129-135.
    Direct Link  |  

  61. Rao, T.V.N. and A. Govardhan, 2012. Assessment of diverse quality metrics for medical images including mammography. Int. J. Comput. Applic., 83: 42-46.

  62. Rohitha, P. and T.V.N. Rao, 2011. Organic electronics. Res. Computeria, 2: 18-28.

  63. Rao, T.V.N., S.N. Kumar and K. Madhuri, 2011. Scheduling and monitoring spatial queries using continuous KNN and shortest path. Int. J. Eng. Res. Applic., 1: 1547-1553.

  64. Rao, T.V.N., S.A. Aasha and H.K. Chowdary, 2011. Brain finger printing. Res. Computeria, 2: 1-8.

  65. Rao, T.V.N., A. Govardhan and S.J. Badashah, 2011. Statistical analysis for performance evaluation of image segmentation quality using edge detection algorithms. Int. J. Adv. Networking Applic., 3: 1184-1193.
    Direct Link  |  

  66. Rao, T.V.N., 2011. Partition based face recognition system. Global J. Res. Comput. Sci., 2: 34-38.

  67. Rao, T.V.N. and K. Vedavathi, 2011. Authentication using mobile phone as a security token. Int. J. Comput. Sci. Eng. Technol., 1: 569-574.

  68. Ranganath, K., M. Rajeshwar, N.K. Laskari and T.V.N. Rao, 2011. Hotspot detection by using GPS and GPRS system. Int. J. Comput. Sci. Eng. Technol., 1: 1-5.

  69. Panchamukesh, C., T.V.N. Rao and A.V. Kumar, 2011. An implementation of BLOWFISH encryption algorithm using KERBEROS authentication mechanism. Int. J. Comput. Technol. Applic., 2: 816-822.
    Direct Link  |  

  70. Sreevani, Y.V. and T.V.N. Rao, 2010. Identification and evaluation of functional dependency analysis using rough sets for knowledge discovery. Int. J. Adv. Comput. Sci. Applic., 1: 50-55.
    Direct Link  |  

  71. Rao, T.V.N., R. Moghekar, G. Vani and S.J. Rao, 2010. Improved and secured routing using s-DSR in mobile AD-HOC networks. Int. J. Adv. Res. Comput. Sci., 1: 75-82.
    Direct Link  |  

  72. Rao, T.V.N., A. Govardhan and S.J. Badashah, 2010. Improved lossless embedding and extraction-a data hiding mechanism. Int. J. Comput. Sci. Inform. Technol., 2: 75-86.

  73. Rao, T.V.N. and S. Pathania, 2010. The next generation computing brainwave-quantum computing. Int. J. Adv. Res. Comput. Sci., 1: 113-119.

  74. Rao, T.V.N. and S. Madiraju, 2010. Genetic algorithms and programming-An evolutionary methodology. Int. J. Comput. Sci. Inform. Technol., 1: 427-437.
    Direct Link  |  

  75. Rao, T.V.N. and K. Preethi, 2010. Future of human security based on computational intelligence using palm vein technology. Global J. Comput. Sci. Technol., 10: 68-73.
    Direct Link  |  

  76. Hashmathur, R., A. Govardhan and T.V.N. Rao, 2010. Design and implementation of RADIUS-An network security protocol. Global J. Comput. Sci. Technol., 10: 48-54.

  77. Rao, T.V.N. and A. Govardhan, 2009. Reversible watermarking mechanisms-a new paradigm in image security. Indian J. Sci. Technol., 2: 23-28.
    Direct Link  |