Follow
Sirisha Aswadhati
Sirisha Aswadhati
Assistant Professor of MCA
Verified email at vignanvizag.com - Homepage
Title
Cited by
Cited by
Year
intrusion detection models using supervised and unsupervised algorithms a comparitive estimation
A Sirisha
international journal of safety and security engineering 11 (18), 51-58, 2021
182021
Providing data security in a distributed networks using clustered approach
aswadhati. sirisha
IJAST 28 (16), 1907-1914, 2019
72019
On the reduction of partial products using Wallace tree multiplier
AS Ramya, B Ramesh Babu, KSN Raju, B Ravi Chandra, A Sirisha, ...
Smart Computing and Informatics: Proceedings of the First International …, 2018
52018
an adaptive hello interval for AODV THROUGH anfis to improve the performance of MANETS
A Sirisha
KES journal, 235-242, 2021
1*2021
ONLINE VOTING SYSTEM USING CONVOLUTIONAL NEURAL NETWORK
A SIRISHA
JOURNAL OF EDUCATION 6 (No.6 ISSN: 0972-7175), 67-75, 2022
2022
Web Based Faculty Management System
A SIRISHA
veda samskrita academy, 58-63, 2022
2022
Waste Separation from Sea by using Smart Boat
KH Krishna, A Sirisha, VM Reddy
Mathematical Statistician and Engineering Applications 70 (2), 309-313, 2021
2021
CELLULAR ACCOUNT CLUSTERING TECHNIQUES FOR IDENTIFICATION OF LOCATION OF USERS
A Sirisha
International journal of advanced science and technology 29 (5), 12724-12733, 2020
2020
A SURVEY ON ANOMALY DETECTION OF BIG DATA USING MACHINE LEARNING TECHNIQUES
BP A.Sirisha
journal of critical reviews 7 (18), 2775-2784, 2020
2020
Eelectronic Governance of Housing Price using Boston Dataset Implementing through Deep Learning Mechanism
A Sirisha
IJRTE 7 (6S2), 560-563, 2020
2020
Plant Disease Identification Using Naïve Naive Bayes classification Algorithm
A Sirisha
international journal of management technology and engineering 9 (5), 4553-4562, 2019
2019
Design and analysis of a novel extended 3 tier security scheme for efficient data transfer in mobile networks
aswadhati. sirisha
internationsl journal of computing applications 1 (6), 2016
2016
Enhanced Cryptography Technique: By Integrating Color and Arm Strong Numbers for Data Transfer
A Sirisha
Journal of Computing Technologies 4 (8), 78-83, 2015
2015
Intrusion Detection Models Using Supervised and Unsupervised Algorithms-A Comparative Estimation Intrusion Detection Models Using Supervised and Unsupervised Algorithms-A …
A Sirisha, K Chaitanya, KVSSR Krishna, SS Kanumalli
CONSTRUCTING A UNIQUE EFFECTIVE KEY MANAGEMENT (UEKM) TECHNIQUE FOR A SECURE DATA TRANSMISSION IN A HYBRID WIRELESS SENSOR NETWORKS
P ANKAMMARAO, A SIRISHA, DB PRAKASH
The system can't perform the operation now. Try again later.
Articles 1–15