2f0e14d05ab0f51d3fe6857f5c6986fc.ppt
- Количество слайдов: 46
SREENIDHI INSTITUTE OF SCIENCE & TECHNOLOGY Yamnampet, Ghatkesar, Hyderabad – 501 301. Hearty Welcome To The Chairman and to the Members of the Expert Committee Constituted By IIIT, Hyderabad 1 1
INFORMATION AT A GLANCE Presented by School of Computer Science and Informatics ( Comprising the departments CSE, IT and MCA) SREENIDHI INSTITUTE OF SCIENCE & TECHNOLOGY Yamnampet, Ghatkesar, Hyderabad – 501 301.
OVERVIEW OF THE PRESENTATION 1. Salient Features of the School of Computer Science and Informatics 2. List of faculty 3. Information about Ph Ds 4. List of Research publications
Brief history of the school The School of Computer Science & Informatics was established in the year 1997. Over a period of 14 years the school has grown to the status of one of the leading centers of learning in the state. It comprises the following three departments: Computer Science and Engineering (Started in 1997). Information Technology (Started in 1997). Computer Applications (Started in 2006). Faculty: The School has excellent faculty which is the heart of the Institution. They have exposure to Research and Academics in India & abroad and have shaped the Department in an exemplary manner. The School has 8 Professors, 20 Associate Professors & 49 Assistant Professors.
Achievement of the CSE Department Accredited by NBA for a period of 3 years in the year 2003. Re-accredited by NBA for a period of 5 years in the year 2007. Started an M. Tech course in Software Engineering discipline in the year 2005. Offered training for fresh recruits of Cognizant Technology Solutions Limited for 2 consecutive years i. e. 2006 and 07. Received World Bank funds under TEQIP program. Designed and established a campus wide network with fiber optic backbone and Wi-Fi facility. Established state of the art computing facilities. Prof. V. Umakanta Sastry, Director School of Computer Science and Informatics received the Best professor in the state Award in Computer Science and Engineering for the year 2008 from the ISTE (AP Chapter).
Achievement of the IT Department It was first accredited for three years in the year 2003. Later it was accredited again for three more years in the year 2007. Conducting M. Tech course under Homibaba university for the employees of Nuclear Fuel Complex, Hyderabad.
Faculty in the School of Computer Science & Informatics Computer Science & Engineering – 38 Professors Associate Professors Assistant Professors Information Technology – 28 Professors Associate Professors Assistant Professors -4 - 12 - 22 -3 -6 - 19 Computer Applications – 11 Professors Associate Professors Assistant Professors -1 -2 -8
Faculty with Ph. D. Qualification Computer Science & Engineering: 3 1. Dr. V. U. K. Sastry, Director School of Computer science and informatics, Dean (R and D), Dean (Admn) 2. Dr. Kumar Eswaran, Professor 3. Dr. D. Ratna Deepthi, Professor 4. Prof. N. Ravi Shankar (submitted Ph. D thesis), Dean (placement and training) 5. Prof. Aruna Varanasi (submitted Ph. D thesis), HOD, CSE
Information Technology : 4 Dr. D. S. R. Murthy, Associate Dean (Admn), Associate Dean ( R & D), Chief Superintendent of Examinations (Autonomous) Dr. V. V. S. S. S. Balaram, Professor and HOD Dr. G. V. S. Acharyulu, Professor Dr. Sasidhar Kothuru, Associate Professor
Number of Faculty who are pursuing Ph. D Computer Science & Engineering: 4 Mr. N. Murali Krishna Mr. K. Anup Kumar Mr. P. Sreedhar Mrs. K. Shirisha Information Technology: 3 Mr. Ch. Samson Mr. Sunil Buttada Mr. Sri Ram Murthy Computer Applications: 1 Mr. M. A. Wazeed
Dr. V. Umakanta Sastry, Director School of Computer Science & Informatics Qualifications: M. A. , DIIT. , Ph. D Formerly, Professor, I. I. T. , Kharagpur, Experience: 35 years of experience at IIT, Kharagpur. Total experience is over 45 years. One of the founding Member of the team which started country’s first M. Tech. , course in the field of Computer Science and Engineering, Even before a formal B. Tech course is started in the country.
Total no. of Ph. Ds guided: 14 No. of Ph Ds produced for the last 5 years: 3 No. of research scholars submitted their : thesis under his guidance 2 No. of Research scholars doing Ph D under: his guidance 4 Guided a number of Ph. D. s in the field of Computer Science both at IIT, Kharagpur and in JNTU, Hyderabad.
Areas of specialization: Genetic Algorithm Cryptography and Network Security Image Processing Image Cryptography Data Warehousing and Data Mining Total No. of papers published in journals: International: 75 No of papers published in conferences: i. International: 5 ii. National: 5
ACHIEVEMENTS/COMMENDATIONS/AWARDS Sl. NO NAME OF THE FACULTY & DESIGNATION AWARD 1 Dr. V. Umakanta Sastry, Director, SCSI “Best Computer Science Faculty in AP State”, Awarded by ISTE AP Chapter, for the year 2008
The number of Ph. Ds awarded in the area of Network Security and Cryptography under the Guidance of Dr. V. Umakanta Sastry. Sl. No Name of candidate & Designation Title of thesis Guides Remarks 1 S. Udaya Kumar SNIST ( on lien) Some Block Ciphers in Cryptography for Information and Network Security Dr. V. Umakanta Sastry & Dr. Vinaya Babu, JNTUCEH Ph. D. Awarded in August 2007 2 V. Janaki Principal, Ramappa Engineering College, Warangal A Study of some problems in the security of files and images Dr. V. Umakanta Sastry SNIST & Dr. Kamakshi Prasad JNTUCEH. Ph. D. Awarded in February 2009 3 Mr. D. S. R. Murthy Professor, IT Department SNIST A study of Some Problems in Cryptography and Image Processing Dr. V. Umakanta Sastry & Dr. Durga Bhavani JNTUCEH Ph D awarded in November 2011
The number of faculty submitted Ph. D thesis in the area of Network Security and Cryptography under the Guidance of Dr. V. Umakanta Sastry. Sl. No Name of candidate & Designation Title of thesis Guides Remarks 1 Prof. N. Ravi Shankar Dean placements and training A Study of Some Block Ciphers for Secure Transmission of Information Dr. V. Umakanta Sastry & Dr. Durga Bhavani, JNTUCEH Submitted Advanced Hill Ciphers using Involutory Matrix Dr. V. Umakanta Sastry SNIST & Dr. A. Udaya Kumar Principal. MVSR engineering college Submitted 2 V. Aruna Head, CSE dept.
List of faculty registered for Ph. D in the areas of Network Security and Cryptography, image Processing, Data warehousing & Data Mining under the guidance of Dr. VUK Sastry S. No Candidate & Designation Name of the Institution to which the candidate belongs to 1. Mr. Ch. Samson Associate Professor, IT Department SNIST 2. Mr. N. Murali Krishna Associate Professor, CSE Department SNIST 3. Mr. K. Anup Kumar Associate Professor, CSE Department 4. Mrs. K. Shireesha Associate Professor, CSE Dept SNIST
Dr. V. V. S. S. S. Balaram Head of the department, IT Qualifications: Ph. D. Publications International Journals: 6 Experience: 15 Years of Teaching and Research.
List of faculty registered for Ph. D in the area of Network Security, Data warehousing and data mining under the guidance of Dr. Balaram S. No Candidate & Designation Name of the Institution to which belongs 1 Mr. Sunil Bhutada Associate Professor, IT Department SNIST Gitanjali colloege of engineering, JNTU Ananthapur 2 Mrs. Indira Chakravarthy Associate Professor, IT Department, 3. Mr. Jaffer SNIST 4. Mr. Mustaq Ahmad SNIST
School of Computer Science and Informatics Dr. Kumar Eswaran, Professor , CSE Dept. Teaching and Industrial. Experience : 39 years Ph Ds Guided: 6
Master of Computer Applications Dr. C. V. Sastry, Professor and HOD, MCA. Foremerly Professor in NIT Rourkela Teaching Experience : 45 years Ph Ds guided: 5
SPONSORED RESEARCH PROJECTS / CONSULTANCY ACTIVITIES Sl. No. Project title Amount received 1. Training fresh Recruits of CTS, 2006 Rs. 5 Lakhs 2. Training fresh Recruits of CTS, 2007 Rs. 4. 00 lakhs 3. Jump Start for Fresh Recruits, 2011 1. 35 Lakhs Funding agency Cognizant Technology Solutions, Hyderabad WIPRO
Reviewers in International Journals Dr. V U K Sastry is a editorial member and Reviewer of IJCIIS. Dr. V U K Sastry is a Reviewer of IJACSA, IJCSIT, IJARCS. Prof. D. S. R. Murthy is a Reviewer of IJCIIS, IJCSIT, IJCSA, IJARCS, ICMLC- 2011.
Research publications List of research publications for the last 5 years. 1. 2. 3. 4. V. U. K. Sastry, Aruna Varanasi, “ A Modified Hill Cipher Involving Permutation, Iteration and the Key in a Specified Position” (IJCNS) International Journal of Computer and Network Security, Vol. 2(10), PP. 157 -162, October 2010. V. U. K. Sastry, Aruna Varanasi, and S. Udaya Kumar “ A Modified Hill Cipher Involving a Pair of Keys and a Permutation” (IJCNS) International Journal of Computer and Network Security, Vol. 2(9), PP. 105 -108, September 2010. V. U. K. Sastry, Aruna Varanasi, S. Udaya Kumar, “Advanced Hill Cipher Involving Permutation and Iteration”, International Journal of Advanced Research in Computer Science, Vol. 1(4), pp. 141 -145, Nov-Dec. 2010. V. U. K. Sastry, Aruna Varanasi, S. Udaya Kumar, “Advanced Hill Cipher Handling the Entire Plaintext as a Single Block”, International Journal of Advanced Research in Computer Science, Vol. 1(4), pp. 180 -184, Nov-Dec. 2010.
5. 6. 7. 8. V. U. K. Sastry, Aruna Varanasi, S. Udaya Kumar, “Advanced Hill Cipher Involving a Key Applied on Both the Sides of the Plaintext”, International Journal of Computational Intelligence and Information Security, Vol. 1(9), pp. 70 -78, November 2010. V. U. K. Sastry, Aruna Varanasi, S. Udaya Kumar, “Advanced Hill Cipher Involving a Pair of Keys”, International Journal of Computational Intelligence and Information Security Vol. 2(1), pp. 100 -108, January 2011. V. U. K. Sastry, Aruna Varanasi, S. Udaya Kumar, “A Modern Hill Cipher Involving a Permuted Key and Modular Arithmetic Addition Operation”, International Journal of Advanced Research in Computer Science Vol. 2(1), pp. 162 -165, Jan-Feb 2011. V. U. K. Sastry, Aruna Varanasi, S. Udaya Kumar, “A Modern Hill Cipher Involving XOR operation and a Permuted Key”, International Journal of Advanced Research in Computer Science, Vol. 2(1), pp. 153 -155, Jan. Feb 2011.
9. V. U. K. Sastry, Aruna Varanasi, S. Udaya Kumar, “A Modern Advanced Hill Cipher Involving a Permuted Key and Modular Arithmetic Addition Operation”, International Journal of Global Research in Computer Science, Vol. 2(4), pp. 92 -97, April 2011. 10. V. U. K. Sastry, Aruna Varanasi, S. Udaya Kumar, “A Modern Advanced Hill Cipher Involving XOR operation and a Permuted Key”, International Journal of Global Research in Computer Science, Vol. 2(4), pp. 98 -102, April 2011. Aruna Varanasi, V. U. K. Sastry, S. Udaya Kumar, “A Modern Hill Cipher Involving a Pair of Keys, Modular Arithmetic Addition and Substitution”, International Journal of Advanced Research in Computer Science, Vol. 2(3), pp. 460 -464, May-June 2011. 12. Aruna Varanasi, V. U. K. Sastry, S. Udaya Kumar, “A Modern Hill Cipher Involving a Pair of Keys, XOR operation and Substitution”, International Journal of Advanced Research in Computer Science, Vol. 2(3), pp. 496 -500, May-June 2011.
13. Aruna Varanasi, V. U. K. Sastry, S. Udaya Kumar, “A Modern Advanced Hill Cipher Involving a Pair of Keys, Modular Arithmetic Addition and Substitution”, International Journal of Global Research in Computer Science, Vol. 2(5), pp. 58 -65, May 2011. 14. Aruna Varanasi, V. U. K. Sastry, S. Udaya Kumar, “A Modern Advanced Hill Cipher Involving a Pair of Keys, XOR operation and Substitution”, International Journal of Global Research in Computer Science, Vol. 2(5), pp. 52 -57, May 2011. 15. Aruna Varanasi, S. Udaya Kumar, “A Block Cipher using Feistel’s approach involving Permutation and Mixing of the Plaintext and the Additive Inverse of Key Matrix”, International Journal of Computer Science, Vol. 4(2), pp. 117 -124, May 2008. 16. V. U. K. Sastry, N. Ravi Shankar, “Modified Hill Cipher with Interlacing and Iteration”, Journal of Computational Science, Vol. 3(11), pp. 854 – 859, 2007. 17. V. U. K. Sastry, N. Ravi Shankar, “Modified Hill Cipher for a large block of plaintext with Interlacing and Iteration”, Journal of Computational Science, Vol. 4(1), pp. 15 – 20, 2008.
18. V. U. K. Sastry, N. Ravi Shankar, S. Durga Bhavani, “A Modified Playfair Cipher for a Large Block of Plaintext”, International Journal of Computer Theory and Engineering (IJCTE), Dec 2009. 19. V. U. K. Sastry, N. Ravi Shankar, S. Durga Bhavani, “A Modified Playfair Cipher Involving Interweaving and Iteration”, International Journal of Computer Theory and Engineering (IJCTE), Dec 2009. 20. V. U. K. Sastry, N. Ravi Shankar, S. Durga Bhavani, “A Modified Hill Cipher Involving Interweaving and Iteration”, International Journal of Network Security, 2009. 21. V. U. K. Sastry, N. Ravi Shankar, S. Durga Bhavani, “A Large Block Cipher with the Blending of the Hill Cipher and the Playfair Cipher”, International Journal of Information Sciences and Technology, 2009. 22. V. U. K. Sastry, N. Ravi Shankar, S. Durga Bhavani, “A Novel Block Cipher with the Blending of the Hill Cipher and the Playfair Cipher”, International Journal of Information Sciences and Technology, 2009. 23. V. U. K. Sastry, S. Udaya Kumar, and A Vinaya Babu, “A Block Cipher Basing upon Permutation, Substitution, and Iteration”, Journal of Information Privacy and Security, Vol. 3(1), 2007.
24. V. U. K. Sastry, S. Udaya Kumar, and A Vinaya Babu, “A Block Cipher Using an Iterative Method and the Modular Arithmetic Inverse of a key Matrix”, International Journal of Scientific Computing, Vol. 1(1), pp. 69 – 78, Jan – Jun 2007. 25. V. U. K. Sastry, S. Udaya Kumar, and A Vinaya Babu, “A Block Cipher Involving Interlacing and Decomposition”, Information Technology Journal, Vol. 6(3), pp. 396 – 404, 2007. 26. V. U. K. Sastry, S. Udaya Kumar, and A Vinaya Babu, “A Large Block Cipher Using an Iterative Method and the Modular Arithmetic Inverse of a key Matrix”, IAENG International Journal of Computer Science, Vol. 32(4), pp. 395 – 401, 2006. 27. V. U. K. Sastry, S. Udaya Kumar, and A Vinaya Babu, “A Block Cipher Basing upon a Revisit to the Feistel Approach and the Modular Arithmetic Inverse of a key Matrix”, IAENG International Journal of Computer Science, Vol. 32(4), pp. 386 – 394, 2006. 28. V. U. K. Sastry, S. Udaya Kumar, and A Vinaya Babu, “An Iterative Process Involving Interlacing and Decomposition in the Development of a Block Cipher”, International Journal of Computer Science and Network Security, Vol. 6(10), pp. 236 – 245, Oct 2006.
29. V. U. K. Sastry, S. Udaya Kumar, and A Vinaya Babu, “A Block Cipher Using an Iterative Method and the Modular Arithmetic Inverse of a key Matrix”, International Journal of Scientific Computing, Vol. 1(1), pp. 69 – 78, Jan – Jun 2007. 30. V. U. K. Sastry, V. Janaki, “On the Modular Arithmetic Inverse in the Cryptology of Hill Cipher”, Proceedings of North American Technology and Business Conference, Sep. 2005. 31. V. U. K. Sastry, V. Janaki, “A Block Cipher Using Linear Congruences”, Journal of Computer Science 3(7), pp. 556 – 561, 2007. 32. V. U. K. Sastry, V. Janaki, “A Large Block Cipher Using Linear Congruences”, Proceedings of WCECS, California, pp. 294 – 298, 2007. 33. V. U. K. Sastry, V. Janaki, “A Modified Hill Cipher with Multiple Keys”, International Journal of Computational Science, Vol. 2(6), pp. 815 – 826, Dec. 2008. 34. V. U. K. Sastry, K. Anup Kumar, “Modified Feistel Cipher Involving Interlacing and Decomposition”, IJCNS International Journal of Computer and Network Security 1(2), pp. 77 -82, November, 2009. 35. V. U. K. Sastry, K. Anup Kumar, “Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition”, IJCNS International Journal of Computer Science 6(2), pp. 133 – 0 140, 201.
36. Dr. V. U. K. Sastry, Prof. D. S. R. Murthy, Dr. S. Durga Bhavani, “A Block Cipher Involving a Key Applied on Both the Sides of the Plain Text”, International Journal of Computer and Network Security (IJCNS), Vol. 1, No. 1, pp. 27 – 30, Oct 2009. 37. Dr. V. U. K. Sastry, Prof. D. S. R. Murthy, Dr. S. Durga Bhavani, “A Large Block Cipher Involving a Key Applied on Both the Sides of the Plain Text as a Multiplicant”, International Journal of Computer and Network Security (IJCNS), Vol. 2, No. 2, pp. 10 – 13, Feb 2010. 38. Dr. V. U. K. Sastry, Prof. D. S. R. Murthy, Dr. S. Durga Bhavani, “Cryptography of a Gray Level Image Using a Modified Hill Cipher”, International Journal of Computer and Network Security (IJCNS), Vol. 2, No. 6, pp. 89 – 92, Jun 2010. 39. V. U. K. Sastry, Prof. D. S. R. Murthy, Dr. S. Durga Bhavani, “A Modified Feistel Cipher involving Modular Arithmetic and a Key on both the sides of the Plain Text Matrix”, International Journal of Computational Intelligence and Information Security (IJCIIS), Special Issue, Jun 2010. 40. Dr. V. U. K. Sastry, Prof. D. S. R. Murthy, Dr. S. Durga Bhavani, “A Novel Block Cipher involving Feistel Structure and Modular Arithmetic”, International Journal of Computational Intelligence and Information Security (IJCIIS), Special Issue, Jun 2010.
41. Dr. V. U. K. Sastry, Prof. D. S. R. Murthy, Dr. S. Durga Bhavani, “Cryptography of a Binary Image Using Modified Hill Cipher”, International Journal of Advanced Research in Computer Science (IJARCS), Vol. 1, No. 2, Jul – Aug 2010. 42. Dr. V. U. K. Sastry, Prof. D. S. R. Murthy, “Modular Arithmetic Inverse of a Rectangular Matrix”, International Journal of Advanced Research in Computer Science (IJARCS), Vol. 1, No. 2, Jul – Aug 2010. 43. Dr. V. U. K. Sastry, Prof. D. S. R. Murthy, Dr. S. Durga Bhavani, “A Modified Feistel Cipher Involving Modular Arithmetic and Interlacing”, International Journal of Computer and Network Security (IJCNS), Paper-ID 100912, Vol. 2, No. 9, pp. 70 – 72, Sep. 2010. 44. Dr. V. U. K. Sastry, Prof. D. S. R. Murthy, Dr. S. Durga Bhavani, “A Block Cipher Having a Key on One Side of the Plain Text Matrix and its Inverse on the Other Side”, International Journal of Computer Theory and Engineering (IJCTE), Vol. 2, No. 5, pp. , Oct 2010. 45. Dr. V. U. K. Sastry, Prof. D. S. R. Murthy, Dr. S. Durga Bhavani, “Cryptography of a Gray Level Image Using a Novel Block Cipher Involving Feistel Structure and Modular Arithmetic”, International Journal of Advanced Research in Computer Science (IJARCS), Vol. 1, No. 3, Sep. – Oct 2010.
46. Dr. V. U. K. Sastry, Prof. D. S. R. Murthy, Dr. S. Durga Bhavani, “Cryptography of a Gray Level Image Using a Modified Feistel Cipher”, International Journal of Advanced Research in Computer Science (IJARCS), Vol. 1, No. 3, Sep. – Oct 2010. 47. Dr. V. U. K. Sastry, Prof. D. S. R. Murthy, Dr. S. Durga Bhavani, “A Large Block Cipher Having a Key on One Side of the Plain Text Matrix and its Inverse on the Other Side as Multiplicants”, International Journal of Advanced Research in Computer Science (IJARCS), Vol. 1, No. 4, Nov. – Dec 2010. 48. VUK Sastry, Ch. Samson, A Novel Approach for Lossy Compression using Modified Gray Scale Quantization, International Journal of Computer and Network Security, Volume. 2, No. 7 , July 2010. 49. VUK Sastry, Ch. Samson, Key Based Steganography Involving Permutation and XOR Operation, Journal of Global Research in Computer Science, Volume. 2, Issue VI, 2011. 50. VUK Sastry, Ch. Samson, Key Based Steganography Involving Permutation and Modular Arithmetic Addition, Journal of Global Research in Computer Science, Volume. 2, Issue VI, 2011.
51. E. V. Prasad, D. S. R. Murthy, “Reduced Connection Multiple Bus Schemes – An Efficient Modelling Technique”, National Symposium pm Modern Trends in Electronics and Communication Systems (NASMTECS-94), Dept. of ECE, A. U. College of Engineering, Visakhapatnam, Feb. 23 – 25, 1995. 52. Sastry B R, Murty K N, Balaram VVSSS, “General First order matrix Difference System – existence and uniqueness via New Lattice based Cryptographic constriction” , Electronic Modeling, V. 29, No. 2 07. 53. Balaram VVSSS, Murthy KN, and Sastry BR, “Public-key encryption using Decoder Algorithm”, International Journal of Computer Science and Network Security, Vol. 8, pp. 217 -221. 54. Murthy K. N, Balaram VVSSS, and Viswanadh K “Solutions of Kronecker Product Initial value problems associated with first order difference system via tensor-based hardness of the shortest vector problem” Electronic Modeling. V. 30 No. 6 08. 55. Ramesh. N, Murthy K. N, and Balaram V V S S S “Control of time scale dynamical system with an application to concurrency control for real time Data Base Management System” Electronic modeling. V. 32 No. 3 10.
56. A. S. Malleswari, A. Poongodai and Dr. V. V. S. S. S. Balaram “Detection and Removal of short Gun Surgery Bad Smell” International Journal of computational Intelligence and Information Security, Vol. 1 No. 8, October 2010. 57. Indira Chakravarthy, Dr. VVSSS. Balaram, Dr. Eswara Reddy “Cancelable Biometrics – A Survey” International journal of computer science and Information Security, Vol. 9 No. 5. May 2011. 58. VVSSS Balaram, K. Vamsee Krishna, and N. Chaitanya Kumar “Generation of Multiple session keys using Diffie Hellmann Technique” International Conference ITFRWP 09’, Vaagdevi Engineering Colleg, Warangal(India), 2010. 59. E. V. Prasad, D. S. R. Murthy, Mrs. S. Nayanatara, “Symbolic Reliability Algorithms Based on t-out-of-s System Evaluation Principle”, ISTAM-94, A. U. College of Engineering, Visakhapatnam, Dec. 27 – 30, 1994. 60. E. V. Prasad, D. S. R. Murthy, Mrs. S. Nayanatara, “Computing kout-of-n System Reliability – An Alternative Recursive Approach”, Eighteenth National Systems Conference (NSC-94), Dayalbagh College of Engineering, Dayalbagh, Agra, Jan. 14 – 16, 1995. Adjudged Best Paper Presentation Award of the session.
61. Ch. Samson, Unsupervised texture segmentation, National conference on Converging Technologies , JCET, Hyderabad during Feb. 2 - 3, 2007. 62. Ch. Samson, Supervised texture segmentation using Wavelet Transform, National conference on Emerging Trends in Information Technology, SNIST, Hyderabad , 2009. 63. Sasidhar Kothuru “Multi Modal Biometric Systems – Improving Accuracy and Performance” International Journal of Computer Science & Engineering Survey (IJCSES) Vol. 1, No. 2, November 2010. PP: 54 - 61. DOI: 10. 5121 / ijcses. 2010. 1205. 64. Sasidhar Kothuru “Automated Authentication using feature extraction and Score Normalization in Multimodal Biometric Systems” International Journal of Computer Science and Information Technology (IJCSIT) ISSN: 0975 -9646 Vol 2(3), 2011.
65. Sasidhar Kothuru “Software Requirements & Quality Approaches through MDRE and BESPOKE Process Models” International Journal of Computer Science and Information Technology (IJCSIT) ISSN: 09759646 66. Sasidhar Kothuru “Soft Biometrics Feature Extraction”, IEEE International conference MIPPSCON, April 2011 at GMRIT, Rajam. 67. Sasidhar Kothuru “A Study on Improving Quality in Search Engines from web content mining to NLP”, ICSCI-2010, January 2010. www. icsci. net CI-3. 4 68. Sasidhar Kothuru “Named Entity Recognition Systems”, ICSCI-2011, January 2011 www. icsci. net CI-10. 4 69. Sasidhar Kothuru “Text Categorization study”, ICSCI-2011, January 2011 www. icsci. net CI-10. 5 70. Sasidhar Kothuru “Virtual Library – Increasing its Strength through Data warehousing, Data Mining & Biometric tools” Trends and Challenges in Management and Corporate Libraries in Technological Era organized by Sivasivani Business School, Section C, Page No. 356 71. Sasidhar Kothuru “Data Mining in Crime Detection” National Conference at MRCET, Hyderabad. pp. 42— 46 72. Sasidhar Kothuru “Recommender Systems” National Conference at MRCET, Hyderabad. page. No. 110 -- 112
73. Allam Appa Rao, P. V. Ratnam, G. V. S. Acharyulu, Mathematics Requirement in Indian Software Training Scenario, 1 st Asia-Pacific Forum on Engineering and Technology Education, Monash University, Australia, 1997. 74. Gomatam V. S. Acharyulu, Matrix Representable SO-Rings, Semigroup Forum, 46, 1993, pp 37 -47. 75. Gomatam V. S. Acharyulu, An Approach to Matrix Multiplication, The Mathematics Education, 28, 1984. 76. C. V. Sastry, Algorithmic comparison between polynomial base and matrix base NTRU cryptosystems Accepted for publication in International Journal for computer networks and security. 2010. 77. C. V. Sastry, Rakesh Navak, Javaram Pradhan, “A Matrix formulation for NTRU cryptosystem”, in proceedings of IEEE International Conference in Computer Networks, held at IIT Roorkee during Dec 1314, 2008. 78. C. V. Sastry, “A matrix formulation of NTRU cryptosystem”. IEEE international Conference at IIT, Roorkee, 2008. 79. C. V. Sastry, “Storage And Retrieval of Indefinite Information from Data Warehouse”, National Conference on Emerging trends in Data Mining, Warehousing and Computer Communication (NETDC 09) June 29 – 30, 2009 conducted by SNIST.
80. C. V Sastry, Rakesh Nayak, Dr. Jayaram Pradhan , “NTRU Cryptosystem For Block Cipher ”, National Conference on Emerging trends in Data Mining, Warehousing and Computer Communication (NETDC 09) June 29 – 30, 2009 conducted by SNIST. 81. C. V. Sastry, Rakesh Nayak, Jayaram Pradhan, “NTRU Digital Signature Scheme – A matrix approch”, International Journal of Advanced Research in Computer Science(IJARCS) Vol. 2, Jan-Feb 2011. 82. C. V. Sastry, Rakesh Nayak, Jayaram Pradhan, ” Reaction attacks in the Matrix Scheme of NTRU Cryptosystem”, Proceedings International Conference on Advance in information Technology and Mobile Communication(AIM-2011), Nagpur, from date 21 st-22 nd Apr 2011 83. C. V Sastry, Ch. Raja Ramesh, DVManjula, Dr. G. Jena, “Dimensionality Reduction For Optimal Clustering In Data Mining” International Journal on Computer Science and Engineering (IJCSE), Vol. 3 No. 10 October 2011. 84. C. V. Sastry, Rakesh Nayak, Jayaram Pradhan, ”Dependent private key generation in NTRU cryptosystems” International Journal for Computer Applications.
85. M. A. Wajeed, T. Adilakshmi “Text Classification Using Machine Learning” International Journal of Theoretical and Applied Information Technology Vol. 7 No. 2 Pages 119 -123, 2009. 86. M. A. Wajeed, T. Adilakshmi “Text Classification Using Machine Learning” International Journal of Theoretical and Applied Information Technology Vol. 7 No. 2 Pages 119 -123, 2009. 87. M. A. Wajeed, T. Adilakshmi “Different Similarity Measures for Text Classification Using KNN ” in the proceedings of the International Conference on Computer & Communication Technology (ICCCT)-2011 held at National Institute of Technology Allahabad during September 15 -17, 2011. 88. M. A. Wajeed, N. Rama Devi, “Sensor Networks”, in the proceedings of the (International Conference) IEES held at Jadavpur University Kolkata, in January 2007. 89. M. A. Wajeed, N. Rama Devi, “Ethno-Computing”, in the proceedings of the (International Conference) of ICORG held at JNTU Hyderabad, in June 2006.
90. M. A. Wajeed, T. Adilakshmi “Different Similarity Measures in Semisupervised Text Classification” in proceedings of IEEE International conference INDICON 2011 to be held at Bits Pilani Hyderabad Campus December 2011. The proceedings of the conference are published through the IEEE EXplore after the conference. 91. M. A. Wajeed, T. Adilakshmi “Incorporating Fuzzy Clusters in Semi. Supervised Text Categorization Using Enhanced KNN Algorithm” in proceedings of International conference Soft Computing for Problem Solving (Soc. Pro. S) 2011 to be held at IIT Roorkee December 2011. The proceedings of the conference are published through "Advances in Intelligence and Soft computing (AISC)" series of Springer‘ 92. M. A. Wajeed, T. Adilakshmi “Fuzziness in Text Classification Using Different Similarity Metrics” in the proceedings of the International conference CCSIT 2012 to be held at Banglore January 2012. The proceedings of the conference will be published by Springer in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST)
93. M. A. Wajeed, T. Adilakshmi “Using KNN Algorithm for Text Categorization” in the proceedings of the International conference CIIT 2011 to be held at Pune 2011. The proceedings of the conference will be published by Springer in Lecture Notes in Computer Sciences (LNCS) 94. M. A. Wajeed, “Trust Enhanced Secure Mobile Ad-Hoc Network Routing” in the proceedings of National Conference on Emerging trends in Data Mining, Warehousing and Computer Communication (NETDC 09) held at SNIST in june 29 -30, 2009. 95. M. A. Wajeed, T. Adilakshmi “Semi-Supervised Text Classification Using Enhanced KNN Algorithm” in proceedings of IEEE International conference World Congress on Information and Communication Technologies (WICT 2011) Co-Organized by Machine Intelligence Research Labs (MIR Labs) and University of Mumbai. The proceedings of the conference are published through the IEEE EXplore after the conference.
96. M. A. Wajeed, T. Adilakshmi “Incorporating Fuzzy Clusters in Semi-supervised Text Categorization ” in proceedings of IEEE NUi. CONE 2011 to be held at Nirma University Ahmedabad in December. The proceedings of the conference are published through the IEEE EXplore after the conference. (International Conferences) 97. G. Harish Reddy, “Simulation of secure image transmission through wireless channels”. In the proceedings of International conference on Emerging trends in signal processing and VLSI design held at GNEC, Hyderabad during June 11 -13, 2010. 98. G. Harish Reddy, “Study and Simulation of three party quantum key distribution protocols”. In the proceedings of International conference on Emerging trends in signal processing and VLSI design held at GNEC, Hyderabad during June 11 -13, 2010. 99. P. Radha. Devi, P. Vijayram Reddy, “Secure Image Transmission Through Unreliable Channels”, International Journal on Computer Science and Engineering, Vol. 02, No. 06, 2010, 20532058
100. Dasika Ratna Deepthi, P V S Kishore Kumar, “ A Novel Approach to Unsupervised Pattern Recognition”, International Journal for Advances in Computer Science, Vol. 2(1), PP. 1 -10, March 2011. 101. Dasika Ratna Deepthi, T. Sujanavan, “ A More Secure Authentication through a Simple Virtual Environment”, International Journal of Advanced Research in Computer Science, Vol. 2(3), PP. 113 -116, May. June 2011. 102. Dasika Ratna Deepthi, K Eswaran, “ A Mirroring Theorem and its application to a New method of Unsupervised Hierarchical Pattern Classification”, International Journal of Computer Science and Information Security, Vol. 6(1), PP. 16 -25, 2009. 103. Dasika Ratna Deepthi, K Eswaran, “ A New Hierarchical Pattern Recognition method using Mirroring Neural Networks”, International Journal of Computer Applications, Vol. 1(12), PP. 88 -95, 2010. 104. Srinivas V. Parasa and K. Eswaran. “Quantum Pseudo-fractional transform and its application to quantum phase estimation method” Proceedings of the World Conference on Fundamentals of Computer Science, Las Vegas Nevada, 2009.