Open Access
Issue
MATEC Web Conf.
Volume 392, 2024
International Conference on Multidisciplinary Research and Sustainable Development (ICMED 2024)
Article Number 01112
Number of page(s) 11
DOI https://doi.org/10.1051/matecconf/202439201112
Published online 18 March 2024
  1. S. Chaudhari, M. Pahade, S. Bhat, C. Jadhav, and T. Sawant, “A research paper on new hybrid cryptography algorithm.” [Google Scholar]
  2. K. Jakimoski, “Security techniques for data protection in cloud computing,” International Journal of Grid and Distributed Computing, vol. 9, no. 1, pp. 49–56, 2016. [CrossRef] [Google Scholar]
  3. A. A. Soofi, I. Riaz, and U. Rasheed, “An enhanced vigenere cipher for ` data security,” Int. J. Sci. Technol. Res, vol. 5, no. 3, pp. 141–145, 2016. [Google Scholar]
  4. P. Kumar and S. B. Rana, “Development of modified aes algorithm for data security,” Optik, vol. 127, no. 4, pp. 2341–2345, 2016. [CrossRef] [Google Scholar]
  5. A. Saraswat, C. Khatri, P. Thakral, P. Biswas et al., “An extended hybridization of vigenere and caesar cipher techniques for secure com- ´ munication,” Procedia Computer Science, vol. 92, pp. 355–360, 2016. [CrossRef] [Google Scholar]
  6. J. Chen and J. S. Rosenthal, “Decrypting classical cipher text using markov chain monte carlo,” Statistics and Computing, vol. 22, no. 2, pp. 397–413, 2012. [CrossRef] [Google Scholar]
  7. M. B. Pramanik, “Implementation of cryptography technique using columnar transposition,” International Journal of Computer Applications, vol. 975, p. 8887, 2014. [Google Scholar]
  8. C. Sanchez-Avila and R. Sanchez-Reillol, “The rijndael block cipher (aes proposal): a comparison with des,” in Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No. 01CH37186). IEEE, 2001, pp. 229–234. [Google Scholar]
  9. Q.-A. Kester, “A cryptosystem based on vigenere cipher with varying ` key,” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 1, no. 10, pp. 108–113, 2012. [Google Scholar]
  10. C. Bhardwaj, “Modification of vigenere cipher by random numbers, ` punctuations & mathematical symbols,” Journal of Computer Engineering (IOSRJCE) ISSN, pp. 2278–0661, 2012. [Google Scholar]
  11. F. M. S. Ali and F. H. Sarhan, “Enhancing security of vigenere cipher ` by stream cipher,” International Journal of Computer Applications, vol. 100, no. 1, pp. 1–4, 2014. [Google Scholar]
  12. P. Gutmann, Cryptographic security architecture: design and verification. Springer Science & Business Media, 2003. [Google Scholar]
  13. A. P. U. Siahaan, “Protection of important data and information using gronsfeld cipher,” 2018. [Google Scholar]
  14. S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data security using vigenere cipher and goldbach codes algorithm,” ` Int. J. Eng. Res. Technol, vol. 6, no. 1, pp. 360–363, 2017. [Google Scholar]
  15. M. Maity, “A modified version of polybius cipher using magic square and western music notes,” International Journal For Technological Research In Engineering, ISSN, pp. 2347–4718, 2014. [Google Scholar]
  16. Syed Umar, Yerragudipadu Subbarayudu, K. Kiran Kumar, N. Bashwanth, “Designing of Dynamic Re-clustering Leach Protocol for Calculating Total Residual Time and Performance”,International Journal of Electrical and Computer Engineering (IJECE)Vol.7, No.3, June2017, pp. 1286~1292ISSN:2088-8708, DOI: 10.11591/ijece.v7i3.pp1286-1292 [Google Scholar]
  17. Yerragudipadu Subba Rayudu, R M Noorullah and C Praveen Kumar, Scribble Legalization Cryptographic Aspect Based On Data Access Control For Steam Count, VOL. 13, NO. 8, APRIL 2018 ISSN 1819-6608, “ARPN Journal of Engineering and Applied Sciences” ©2006-2018 Asian Research Publishing Network (ARPN). [Google Scholar]
  18. Subbarayudu Y,Reddy R.O. Anjaiah, P. “A study on user mobility in device to device (D2D) networks through distrubted catching”, IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017.2018 DOI: 10.1109/ICPCSI.2017.8391798 EID: 2-s2.0-85050095042, URL: http://www.scopus.com/inward/record.url?Eid=2-s2.0-85050095042&partnerid=MN8TOARS [Google Scholar]
  19. Subbarayudu Y. Rakesh, M. Lingappa, E. Umar, S.,” Overview of the new bioinformatics virus goes from the front of next generation sequencing in genomics based on datamining”, Proceedings of the 2017 International Conference on Intelligent Computing and Control Systems,2018, DOI:10.1109/ICCONS.2017.8250670, EID: 2-s2.0-85047447491, URL:http://www.scopus.com/inward/record.url?Eid=2-s2.0-85047447491&partnerid=MN8TOARS [Google Scholar]
  20. “Subbarayudu Y. ” “Patil, S. ” “ Ramyasree, B. ” “ Praveen Kumar, C. ” “Geetha, G ”, Assort-EHR graph based semi-supervised classification algorithm for mining health records, Journal of Advanced Research in Dynamical and Control Systems 2017 .EID: 2-s2.0-85058439255 [Google Scholar]
  21. Umar, S., Sridevi, G., Subbarayudu Y., Nath, N.Y. “Datamining based multimode approach for estimating the risk under heart failure cases” , Journal of Theoretical and Applied Information Technology Volume 95, Issue 16, 31 August 2017, Pages 3879-3883 [Google Scholar]
  22. Yerragudipadu subbarayudu, alladi Sureshbabu “Distributed Multimodal Aspective on Topic Model Using Sentiment Analysis for Recognition of Public Health Surveillance” Expert Clouds and Applications, 16 July 2021, DOI:https://doi.org/10.1007/978-981-16-2126-0_38 Springer, Singapore Print ISBN 978-981-16-2125-3 Online ISBN 978-981-16-2126-0 [Google Scholar]
  23. Yerragudipadu Subbarayudu, Adithi Soppadandi, Shreya Vyamasani and Supriya Bandanadam1, The Distributed Deep Learning Paradigms for Detection of Weeds from Crops in Indian Agricultural Farms, E3S Web of Conferences 391, 01057 (2023) https://doi.org/10.1051/e3sconf/202339101057 ICMEDICMPC 2023. [CrossRef] [EDP Sciences] [Google Scholar]
  24. Subbarayudu Yerragudipadu, Vijendar Reddy Gurram, Navya Sri Rayapudi, Bhavana Bingi, Likhitha Gollapalli 1 and Ukritha peddapatlolla, An Efficient Novel Approach on Machine Learning Paradigmsfor Food Delivery Company through Demand Forecastıng in societal community, E3S Web of Conferences 391, 01089 (2023) https://doi.org/10.1051/e3sconf/202339101089ICMEDICMPC 2023. [CrossRef] [EDP Sciences] [Google Scholar]
  25. Yerragudipadu Subbarayudu, G Vijendar Reddy, M Vamsi Krishna Raj, K Uday, MD Fasiuddin, and P Vishal, An efficient novel approach to E-commerce retail price optimization through machine learning, E3S Web of Conferences 391, 01104 (2023) https://doi.org/10.1051/e3sconf/202339101104 ICMED-ICMPC 2023. [CrossRef] [EDP Sciences] [Google Scholar]
  26. Subbarayudu, Y., Sureshbabu, A. (2023). A distributed densely connected convolutional network approach for enhanced recognition of health-related topics: A societal analysis case study. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, pp. 677-684. https://doi.org/10.18280/isi.280317 [Google Scholar]
  27. P. Gopal Krihsna, Yerragudipadu Subbarayudu, S. Sai Siva Kumar, D. Naveen, Abhishek Srivastava and K. Thangamani “IoT Sensor-based sustainable smart home management for human needs through Micro Controller” Published online: 06 October 2023 DOI: https://doi.org/10.1051/e3sconf/202343001079 [Google Scholar]
  28. P. Gopal Krihsna, Yerragudipadu Subbarayudu, S. Sai Siva Kumar, D. Naveen, Abhishek Srivastava and K. Thangamani IoT Sensor-based sustainable smart home management for human needs through Micro Controller Published online: 06 October 2023 DOI: https://doi.org/10.1051/e3sconf/202343001079 [Google Scholar]
  29. P. Gopal Krihsna, Yerragudipadu Subbarayudu, K. Mythili Rao, V. Jyoshna, Jumaid Aman and G. Vijendar Reddy An Efficient, Novel, and Sustainable IoTBased Approach for Attendance Detection through RFID Module and IR Sensor Published online: 06 October 2023 DOI: https://doi.org/10.1051/e3sconf/202343001096 [Google Scholar]
  30. Subbarayudu Yerragudipadu, Alladi Sureshbabu, ”The Evaluation of Distributed topic models for recognition of health-related topics in social media through Machine Learning Paradigms” International Journal of Intelligent Systems and Applications in Engineering (IJISAE), https://ijisae.org ISSN:2147-6799,2023 [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.