Biosketch
Name: KVSVN Raju
Area Interest: Data Engineering
Phone: 0891 2552905
Experience: 41 years of teaching
Andhra University : Worked as a Asst. Professor, Asso. Professor and Professor for 32 years at Dept. of Computer Science and Systems Engineering, College of Engineering, Andhra University from 6th February 1979 to 31st January 2011.
Anil Neerukonda Institute of Technology & Sciences: worked as Director(R&D) & Professor, CSE Dept. from 4th February 2011 to 3oth November 2017.
Engineering & Technology Program, Gayatri Vidya Parishad College for Degree and PG Courses,: Worked as a professor, Dept. of CSE from 5th December 2017 to 3rd October 2020.
Research : since 1977
Education:
Ph.D.(Computer Science & Technology) IIT, Kharagpur
M.E (Control Systems), AU College Of Engineering, Visakhapatnam
B.E (Electrical Engineering), Govt. College of Engineering, Kakinada
Professional Organization Memberships:
Member (8426178), Association for Computing Machinery (ACM)
Fellow (F116016), Institution of Electronics and Telecommunication Engineers
Sr. Member (SM l0015556), Computer Society Of India
Member (104272/O), Institute of Engineers (I)
Member(LM3734), Indian Society for Technical Education.
I am proud that I had the opportunity to be one of the first generation educationists of Computer Science and Engineering in India.
Research Activities:
Ph Ds Supervised:
Personalized Privacy Preserving Data Publishing Of Incremental Data Through Optimal Generalization, June, 2020 (Dr S. Ram Prasad Reddy)
A Trust Evaluation Framework for Participant Driven Privacy Control in Participatory Sensing, November, 2015 (Dr Ramaprasad R. Kalidindi)
A Framework for Finding Ontology Based Semantic Similarity Measures, April, 2015 (Dr S Raja)
A frame work for adaptive design methodology for evaluation of complex embedded systems, January 2015 ( Dr P H Gopala Mani)
Improving Informativeness while Preserving Data Privacy, January 2011, (Dr S Srinivasa Rao)
Improving the accuracy of software effort estimation through soft computing techniques, July 2010, (Dr C Satyananda Reddy)
The RATG System: An Optimal Automated Test Case Generator using Combinatorial Design Method, August 2008, awarded by the JNTU, Hyderabad (Dr D Gopala Raju).
An analysis, design and performance of dynamic certificate validation trees for PKI, December, 2005 ( Dr Valli Kumari). (Adjudged as the best thesis of AU of the year)
Pattern based methodology for object oriented systems, July, 2005, (Dr G P Saradhi Varama)
Planning and selection of cutting tools in flexible manufacturing systems, 2000, (Dr D R Prasada Raju)
Intelligent legal assistant for adjudication, 1994 ( Dr M Shashi). (Adjudged as the best thesis of AU of the year)
Research Areas:
Data Engineering
Security Engineering
Software Engineering.
Web Engineering
Ph.Ds On role: 5 (working on the following areas)
· Data Privacy preserving,
· Cloud Computing
· Software Cost Estimation,
· Reputation-based P2P Trust Schemes,
· Semantic Web
Professional Activities:
Member of National Advisory Committee, International Advance Computing Conference (IACC) - 2015 June 12-13, 2015, Bangalore, India, Organized by B. M. S. College of Engineering, Bangalore-560019
Reviewer: ACM Transactions on Database Systems
Reviewer: IEEE Transactions on Knowledge and Data Engineering.
Reviewer for KDBI - Knowledge Discovery and Business Intelligence track in EPIA'2009.
Member of the Programming Committee and reviewer of the 4th and 5th International Conference on Data Mining, of The 2008 and 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, USA;
Reviewer: RS Pressman's Software Engineering: A Practitioner's Approach, both 6th and 7th Editions.
Member of the Editorial Board, Journal of Computer Science and Engineering (JCSE). JCSE is an International Scientific Electronic Journal which publishes papers form all areas related to Computer Science and Engineering.
DENSE Research Group:
Member:
Projects:
Structural Testing Of PBaem Modules, December, 2007, Sponsored by the Naval Science and Technological Laboratory, Visakhapatnam
Software Porting for Project VARUNASTRA, June 2007 - August 2007, Sponsored by the Naval Science and Technological Laboratory, Visakhapatnam
Integration of Homing System Simulation Modules, August 2006 to July 2008, Sponsored by the Naval Science and Technological Laboratory, Visakhapatnam
Modelling & Simulation of Sonar, October 2003 to September 2005, Sponsored by the Naval Science and Technological Laboratory, Visakhapatnam
Academic Activities
Member, Board of Studies, Dept of CSE, ANITS (2017- 2022)
Director(R&D), Anil Neerukonda Institute of Technology & Sciences, (2011-2017)
Member of the Academic Senate of AU, (2010-11)
Chairman, Faculty of Engineering, (2010-11), College of Engineering, Andhra University
Chairman, Board of studies (UG & PG) in CS (2009-2011; 2001-2004)
Member, Department Research Committee
Invited Talks:
A lecture on “Fuzzy sets, Logic and Systems”, Electronics & ICT Academy, National Institute of Technology Warangal organizes a Faculty Development Program on Machine Learning, (12- 17June, 2017), Venue: Dept. of CSE, Anil Neerukonda Institute of Technology & Science, Visakhapatnam, Andhra Pradesh.
Administrative Activities:
Member, Department Committee
Coordinator, University Networking Committee (2010-11)
In charge, Computer work of ICET- 2009 and 2010
Head of the Department (1997-2000)
Convener, BCAT-98 & '99
In charge, Computer work of EMCET-1992 & '93 In-charge, Information Management Center, AU (1990-93)
Examination Superindent, DOEACC Examinations. DOEACC is an autonomous body of the Department of Electronic & Information Technology (India)
Ministry of Communications & Information Technology, Government of India.
Awards:
Selected for Emeritus Fellowship-2011 for two years by the University Grants Commission, India
Dr Sarvepalli Radhakrishnan Award for Best Academician of the year 2010
Received IBM Faculty Award - 2008
According to IBM’s web site, the IBM Faculty Award is a competitive, worldwide program intended to:
1) Foster collaboration between researchers at leading universities worldwide and those in IBM research, development and services organizations; and
2) Promote courseware and curriculum innovation to stimulate growth in disciplines and geographies that are strategic to IBM. The candidates must have an outstanding reputation for contributions in their field or, in the case of junior faculty, show unusual promise.
Papers:
Cited by 1172
https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=KVSVN+Raju&btnG=
Journal Papers: (39)
Model for High Dynamic Range Imaging System Using Hybrid Feature Based Exposure Fusion, Co-authors: Bagadi Ravi Kiran, Vatsavayi Valli Kumari, Journal of Intelligent Systems, Volume 30: Issue 1, pp 346-360, https://doi.org/10.1515/jisys-2018-0412
Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust, Co-authors: Vegi Srinivas, Vatsavayi Valli Kumari, International Journal of Network Security, Vol.20, No.5, PP.951-959, Sept. 2018 (DOI: 10.6633/IJNS.201809 20(5).17
Personalized Privacy Preserving Incremental Data Dissemination Through Optimal Generalization, Co-authors: S. Ram Prasad Reddy, and V. Valli Kumari, Journal of Engineering and Applied Sciences 13 (11): 4205-4216, 2018 ISSN: 1816-949X.
A Novel Approach for Personalized Privacy Preserving Data Publishing with Multiple Sensitive Attributes, Co-authors: S. Ram Prasad Reddy1 and V. Valli Kumari, International Journal of Engineering & Technology, 7 (2.20) (2018) 197-206
Personalized Anonymization For Patient Privacy In A Mobile Health World, Co-authors: S. Ram Prasad Reddy and V. Valli Kumari, Journal of Advanced Research in Dynamical and Control Systems Vol. 9, Issue 1, 2017
Infrastructure Management Made Easy with Salt Stack, S Ratankumar, Open Source for You, October 2016
Application of Clustering to Analyze Academic Social Networks, Sobha Rani and Valli Kumari;International Journal of Web & Semantic Technology (IJWesT); Volume:4, Number:2, April 2013; pp9-20
Ontology Based Binary Classification of Words Using Semantic Similarity; Volume 2 Issue 1 January 2013; Special Issue on Speech Processing; International Journal of Computational Linguistics and Natural Language Processing, IJCLNLP; Co-authors:S.Raja, P.Gowri, V.Valli Kumari
Application of Association Rule Mining to Find Frequent Patterns in Weighted Social Graphs, Sobha Rani, and Valli Kumari; IFRSA International Journal of Data Warehousing & Mining, Volume:2; issue:3,August 2012 pp168-174
Personalized Privacy Preserving Publication of Transactional Datasets Using Concept Learning;S. Ram Prasad Reddy, Kvsvn Raju, and V. Valli Kumari International Journal of Machine Learning and Computing (IJMLC); 2012 Vol.2(6): 733-737 ISSN: 2010-3700; 10.7763/IJMLC.2012.V2.225
An Adaptive Design Verification Methodology for Embedded Systems, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.3, p35-55, September 2011. Cite as: arXiv:1112.4049v1 [cs.SE], Co-authors: Hara Gopal Mani Pakala, Dr. Plh Varaprasad, Dr.Ibrahim Khan
Evaluating Peer Behaviour in Distributed Participatory Sensing, The World Scientific and Engineering Academy and Society's, WSEAS Transactions on Computers, Vol.10, No.9, September 2011, pp.275-286. Co-authors: K.R.P Raju, V.Valli Kumari, Ch.S.N Reddy
Unified System Level Fault Modeling and Fault Propagation, International Journal of Computer Applications (IJCA), June 2011, Co-authors: Hara Gopal Mani Pakala, Dr. Ibrahim Khan
Sensors and Actuators Integration in Embedded Systems, ACEEE International Journal on Network Security (IJNS), Volume 2, Issue 2, 2011, Co-authors: Pakala, H.G.M. Khan,I.
Trust Based Participant Driven Privacy Control in Participatory Sensing,International Journal of Ad hoc, Sensor & Ubiquitous Computing,(IJASUC), March 2011, Volume 2, Number 1, pp71-84, Co-authors: K.R.P Raju, V. Valli Kumari, Ch.S.N Reddy
Integration Testing of Multiple Embedded Processing Components, Springer Lecture Notes in Computer Science - Advanced Computing Communications in Computer and Information Science, 2011, Volume 133, pp200-209,Co-authors: Pakala, H.G.M., Khan,I
Rotation Visual Cryptography Using Basic (2, 2) Scheme, International Journal of Computing Science & Communication Technologies (TECHNA),Vol 3, Issue 2, January 2011, Co-authors: B. Dinesh Reddy, V. Valli Kumari
Scalable rekeying limited to subgroup using Hybrid key trees, International Journal of Computer Applications, Number 17 - Article 1 , 2010 . http://www.ijcaonline.org/archives/volume1/number17/371-558, Co-authors: V. Valli Kumari, D.V. Nagaraju
Formal Verification of IEEE802.16m PKMv3 Protocol Using Casper FDR, Information and Communication Technologies;Volume 101 of the series Communications in Computer and Information Science pp 590-595. K. V. Krishnam Raju , V. Valli Kumari, N. Sandeep Varma
A Plausible Comprehensive Web Intelligent System for investigation of web user behavior adaptable to Incremental mining” published In International Journal of Database Management Systems (IJDMS), Vol.2, No.3, August 2010, Co-authors: V.V.R. Maheswara Rao, Dr. V. Valli Kumari
Understanding User Behavior Using Web Usage Mining” Published in International Journal on Futuristic Computer Applications - IJCA, Duke University, NC, US, Co-authors: V.V.R Maheswara Rao, V.Valli kumari
Improving the accuracy of effort estimation through fuzzy set combination of size and cost drivers, WSEAS Transactions on Computers, Issue 6, Volume 8, June 2009, pp 926-936, ISSN 1109-2750, Co-authors:CH. Satyananda Reddy
Improving the accuracy of effort estimation through fuzzy set representation of size, Journal of Computer Science, 5(6), 451-455, 2009, Science Publications, New York, U S A., Co-authors:CH. Satyananda Reddy
A Concise Neural Network Model for Estimating Software Effort, International Journal of Recent Trends in Engineering, Issue. 1, Vol. 1, May 2009 pp 188-193, co-authors:CH. Satyananda Reddy
An Effective Calculation of Reputation in P2P Networks, , Journal Of Networks, Vol. 4, No. 5, Pp332-342, JULY 2009, Academy Publisher, Finland. Co-authors: RVVSV Prasad , Vegi Srinivas, V.Valli Kumari
A Concise Neural Network Model for Estimating Software Effort, International Journal of Recent Trends in Engineering, Issue.1, Vol.1, May 2009, Academy Publisher, Finland, Co-authors:CH. Satyananda Reddy
A New Approach for Estimating Software Effort Using RBFN Network, the IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, pp 237-241, July 2008, Co-authors: Ch. Satyananda Reddy, P.Sankara Rao, V. Valli Kumari
Credibility Based Corrective Mechanism for Reputation Computation in Peer-to-Peer Communities, the IJCSNS, International Journal of Computer Science and Network Security, VOL.8 No.5, pp 95-102, May 2008,Co-authors: V. Valli Kumari, B. Dinesh Reddy, T. Sri Devi, Ramaprasad R. Kalidindi
Fuzzy based approach for privacy preserving publication of data, IJCSNS International Journal of Computer Science and Network Security, VOL.8, No.1, pp. 115-121,January 2008, Co-authors: V. Valli Kumari, S.Srinivasa Rao, KV Ramana and BVS Avadhani
Reasoning with Fuzzy Sensors, IEEE Transactions on System, Man, Cybernetics, Vol. 24, No. 17, July 1994, p.p. 1061-1064, U S A.
Design and Implementation of fuzzy relational database system, Journal of Information Science, Vol. 35, No. 1, 1989 U S A.
Fuzzy functional Dependency and Lossless Join Decomposition of Fuzzy Relational Database Systems, ACM Transactions on Database Systems, Vol. 13, No. 2, pp. 129-166,1988 USA
Study of Joins in Fuzzy Relational Databases, Fuzzy Sets and Systems Vol. 21 No. 1, pp. 19-34, 1987, West Germany.
Privacy against text data for privacy preserving in mined data, PCTE Journal of Computer Science, PP 51-59, Vol. 3., No. 2., July-Dec 2007.
Graphical Interpretation of the RATG System for Optimal Test Case Generation, IJSCI, the International Journal of Systemics, Cybernetics and Informatics, April 2007, pp52-59.
Network security current perspectives and future concerns, CSI Communications, Vol 4, Jan 2003.
Legal Counseling System, SADHANA, Academy Proceedings in Engineering Sciences, Vol. 19, Part-1, Feb 1994, pp. 75-92, Springer India .
Digital System Clocks, Students’ Journal of IETE, Vol. 24 No.1,1983
Conferences papers: (66)
Dynamic Scenarios in Embedded System Verification, First International Conference on Intelligent Computing & Applications 2014 (ICICA 2014), December 22 - 24, 2014 NIT Durgapur.
A new symmetric probabilistic encryption scheme based on random numbers, Networks & Soft Computing (ICNSC), 2014 First International Conference on 19-20 Aug. 2014, pp267 - 272, B Dinesh Reddy · V Valli Kumari
Randomized Symmetric Block Encryption, SECURIT2012, the First International Conference on Security of Internet of Things, August 17-19, 2012, Amrita Vishwa Vidyapeetham, Kerala, India (A)
SenSim: Sentence Similarity Based on the Concept of Relevance; 2012 International Conference on Advances in Computing, Communications and Informatics (ICACCI-2012, 3 - 5 August 2012, Chennai, paper was archived in the ACM digital library.
Minimum Spanning Tree based k-anonymity, International Conference on Soft Computing for Problem Solving, SocProS 2011, December 20-22 Roorkee, India and Springer: Advances in Intelligent and Soft Computing Volume 130, 2012, DOI: 10.1007/978-81-322-0487-9; pp405-413
HDR Scene Detection & Capturing Strategy, accepted to present 2011 Annual IEEE India Conference (INDICON-2011) , 16 Dec - 18 Dec 2011 ,Hyderabad, India
Optimal exposure sets for high dynamic range scenes, International Conference on Graphic and Image Processing (ICGIP 2011),1 October 2011 Cairo, Egypt, Proc. SPIE 8285, 828511 (2011); doi:10.1117/12.913385
Development Of Instrument For Test And Evaluation Of A Signal Processing System, National Symposium on Instrumentation (NSI-36), October 20-22, 2011, Bereilly, India
Modeling and analysis of IEEE 802.11i WPA-PSK authentication protocol; Raju, K.V.K.; Vallikumari, V. ; Raju, K.V.S.V.N.;Electronics Computer Technology (ICECT), 2011 3rd International Conference (Volume:5 ); 8-10 April 2011;pp 72 - 76, published by IEEE; Print ISBN:978-1-4244-8678-6
Checking Anonymity levels for Anonymized Data, 7th International Conference on Distributed Computing and Internet Technology, 9-12 Febrauary 2011, Bhubaneswar, India, The proceedings of ICDCIT 2011, published by Springer in the Lecture Notes on Computer Science series, Lecture Notes in Computer Science, Vol. 4317
Outliers Detection as Network Intrusion Detection System Using Multi Layered Framework, COSIT-2011, Bangalore. India. January 2 - 4, 2011
User Controlled Privacy in Participatory Sensing, In Proceedings Int. Conf. Advances in Computer Science 2010, 72-77. DOI: 02.ACS.2010.01.187.
Sensors Integration in Embedded Systems, International Conference on Power, Control and Embedded Systems, ICPCES- 2010 , 29, 2010 - Dec 1, 2010 Allahabad, India
Integration Testing of Multiple Embedded Processing Components, accepted The First International Conference on Computer Science and Information Technology (COSIT-2011),January 2 - 4, 2011. Bangalore, India and will be included in the proceedings published by Springer (LNCS) in Communications in Computer and Information Science (CCIS) Series.
An Intelligent System for Web Usage Data Pre-processing, accepted The First International Conference on Computer Science and Information Technology (COSIT-2011),January 2 - 4, 2011. Bangalore, India and will be included in the proceedings published by Springer (LNCS) in Communications in Computer and Information Science (CCIS) Series.
An Advanced Optimal Web Intelligent Model for Mining Web User Usage Behavior using Genetic Algorithm, International Joint Journal Conference in Engineering, AET 2010, December 20-23, 2010 in Trivandrum, Kerala, India and proceedings will be published by EN Conference Publishing System and archived in the SEARCH Digital Library and will be published in the ACEEE International Journal on Information Technology- IJIT .
Semantic Similarity Computation using ontology, accepted for publication in IEEE proceedings of ICINC, 2010, November, Kuala Lumpur, Malaysia, Nov, 2010.
Rotation Visual Cryptography using basic (2, 2) scheme, IEEE 4th International Conference on Advanced Computing and Communication Technologies, October, 2010.
An Effective Intelligent Pre Processing System of Web Log data adaptable to Incremental Mining, International Conference on Advances in Communication, Network and Computing CNC 2010 Oct-04-05, 2010, Calicut, India
Formal Verification of IEEE802.16m PKMv3 Protocol Using Casper FDR, International Conference on Advances in formation and Communication Technologies-ICT 2010 Sep 07-09, 2010, Kochi, Kerala, India
s-Tuple Inclusion - A New Method for Privacy Preserving Publication of Datasets, Proceeding of the 2010 International conference on Data Mining, DMIN'10: July 12-15, 2010, pp206-212, Las Vegas Nevada, USA
TRING: A New Framework for Efficient Group key Distribution for Dynamic Groups, To be published in the proceedings of the Third International Conference on Network Security & Applications (CNSA-2010), July 23 ~ 25, 2010, Chennai, India. To appear in Springer LNCS
Efficient Group key Distribution Mechanism for Dynamic Groups Using Public key Broadcast Ring, Communications in Computer and Information Science, Volume 70, pp 194-201, Springer Berlin Heidelberg.
Study of Visitor Behavior by Web Usage Mining, the International Conference on Recent Trends in Business Administration and Information Processing (BAIP 2010), March 26-27, 2010 in Trivandrum, Kerala, India. Information Processing and Management, Communications in Computer and Information Science series, Springer
Secure Group key Distribution Using Hybrid Cryptosystem, accepted in the 2nd International Conference on Computer Engineering and Applications,ICCEA 2010, 19th-21st March, 2010, Bali Island, Indonesia.
Scalable rekeying limited to subgroup using Hybrid key trees, accepted in International Conference on Futuristic Computer Applications is to be held in Bangalore on 20-21 March, 2010.
Scalable Rekeying for Dynamic Groups Using Key Path Compression, published in the proceedings of The Second International Conference on Communication Systems and Networks (COMSNETS-2010), held in Bangalore, India , January 2010. Available in IEEE X-plore Digital library Print ISBN: 978-1-4244-5487-7.
Efficient conference key distribution using hybrid key trees, accepted in IEEE Workshop on Collaborative Security Technologies (CoSec '09) Bangalore - 9th Dec 2009.
Comparison Shopping Agents : the essential characteristics and challenges to be met, Accepted in International Conference on Intelligent Agent & Multi-Agent Systems 2009, Sponsored by: IEEE Computer Society, 22 to 24 July 2009, Chennai, India
Privacy Preserving Sharing of Data, proceedings of the 2009 International Conference on Data Mining, pp131-137, Las Vegas, Nevada, July 13-16, 2009, USA, it is part of WORLDCOMP'09 - The 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing.
Estimating COCOMO's Effort Based on Fuzzy Set Representation of Size, Accepted in The 2009 International Conference on Software Engineering Research and Practice, SERP'09: July 13-16, Las Vegas, Nevada, USA, it is part of WORLDCOMP'09 - The 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing.
A Methodology for Exploring the Quality of Mission Critical Software Systems, Conference on IEEE International Advance Computing Conference (IACC’09) on March 6-7, 2009, Thapar University, Patiala, India
Single Layer Artificial Neural Network Model for Software Effort Estimation, IEEE International Conference on Advance Computing Conference (IACC’09) on March 6-7, 2009, Thapar University, Patiala, India
Credibility Based Reputation Calculation in P2P Networks, 5th International Conference on Distributed Computing and Internet Technologies (ICDCIT) 2008, December 10 - 12, 2008. New Delhi, India and published in Lecture Notes in Computer Science, LNCS Volume # 5375, pp188-195, Spinger, Germany.
A Novel Approach for Privacy Preserving Publication of Data, Proceedings of WORLDCOMP'08, The 2008 International Conference on Data Mining, July 14-17,2008, Las Vegas, USA.
Policy Based Controlled Migration of Mobile Agents to Untrusted Hosts, Third International Conference on International Information Hiding and Multimedia Signal Processing - Vol.1 (IIH-MSP 2007), pp550-553, November26-28,2007, Taiwan.
Fault- prone module prediction of a web application using artificial neural networks, IASTED’s International Conference on Software Engineering and Applications (SEA 2007) in Cambridge, Massachusetts, USA, Nov 19- 21, 2007.
International Conference on Software Engineering and Applications (SEA 2007) in Cambridge,Massachusetts, USA, Nov 19- 21, 2007.
A Neural Network Approach for Web Cost Estimation, IASTED’s International Conference on Software Engineering and Applications (SEA 2007) in Cambridge, Massachusetts, USA, Nov 19- 21, 2007.
Privacy Preserving in Clustering by Categorizing Attributes Using Privacy and Non Privacy Disclosure Sets; Proceedings of WORLDCOMP'07, The 2007 International Conference on Data Mining, pp301-307, June 25-28, Las Vegas, USA.
Enhanced User Privacy on Trusted Processors; Proceedings of WORLDCOMP’07, The 2007 International Conference on Security and Management, pp205-211, June 25-28, Las Vegas, USA
Privacy Preserving in Clustering Using Fuzzy Sets, Proceedings of WORLDCOMP'08, The 2006 International Conference on Data Mining,. June 26-29, 2006, Las Vegas, Nevada, USA.
Fair and Secure M-cash, IEEE proceeding of International Conference on GRC-2006, pp778- 781 at Atlanta, USA, in May, 10-12 May 2006.
The RATG System - Reducing Time with an Approach of Testing Based on Combinatorial Design Method” The IASTED International Conference on SOFTWARE ENGINEERING SE 2006, 14-16 February, 2006.Innsbruck, Austria.
The Reliable Automatic Test Case Generation System Based on Combinatorial Design Method International Conference on Systemic Cybernetics and Informatics ICSCI 2006 under the aegis of Pentagram Research Centre Pvt. Ltd. held on 04-08 January, 2006.
Model-Based Testing based on Functional Requirements Using Combinatorial Design Method was selected & published in International Conference on Systemics Cybernetics and Informatics ICSCI 2006 under the aegis of Pentagram Research Centre Pvt .Ltd. held on 04-08 January, 2006.
Design level measures for pattern oriented software development: A case study, proceeding ofInternational conference on Information Technology, held on 23-26 May, 2003, Katmandu, Nepal
Fuzzy Functional Dependencies, Proceedings of 2nd International Conference on Data Engineering, Feb. 1986 Los Angeles, U S A.
A New Class of Data Dependencies in Relational Databases, Information Processing Letters Vol. No 18, pp. 216 – 218, 19986 North Holland.
The RATG System, International Conference on current trends of information technology, MERG05, Bhimavaram, India.
An Efficient protocol for certificate path validation, Proc. of 8th International Conference on Information Technology, December, 2005, Bhubaneswar, India.
An authenticated dictionary for publishing certificate paths in delegated servers for multi-domain PKI, Proc. of International Conference on Number Theory and Secure Communications, Srinivasa Ramanujam Centre, Kumbakonam, December 2003, Tamil Nadu, India.
Estimating relative size when alternative design exist for a given object oriented design problem, Proc of 6th International Conference on Information Technology, Dec 22-25, 2003, Bhubaneswar, India.
A Delegated Server Model for certificate path discovery and validation in heterogeneous PKI structures, Proc. of 6th International Conference on Information Technology, December22-25, 2003, Bubhaneswar, India.
Pattern based Design Hand Book for Pattern Oriented Software Development: A Case Study: Sixth International Conference on Information Technology, Dec 22-25, 2003, Bhubaneswar, India.
Efficiency of RATG Test Cases as Measured By code coverage, National Conference, TEQIP – 2005, SNIST Factor-Covering Designs for Software Testing, National Conference, TEQIP – 2005, SNIST.
Applicability of Authenticated Dictionaries for certificate validation in large PKI systems, Proc. of National Workshop on Cryptology, Anna University, conducted by Cryptography Research Society of India, Chennai, India, October 2003.
Generating Kiviat Diagrams on PC for demonstrating Software Quality of Large Software TQM through IT, BIG-97, Computer Society of India, 8th- 10th August, 1997.
Proposed Emhanced ILAFA, 30th Annual Convention, Computer Society of India, pp. 268-278, 9-12 November 1995, Hydferabad India.
Quality and Performance Evaluation of Expert Systems, National Symposium on Modern Trends in Electronics and Communications Systems, Feb 23-25, 1995 Visakhapatnam.
Quality Assurance of Expert Systems, Ninth National Conference of Computer Engineers On Software Quality Assurance and Productivity, 26th and 27th Nov. 1994 Jabalpur.
An Intelligent Legal Assistant, Intelligent Computing Congress, Dec 15-18, 1993, Hyderabad
On Computerization of a Legal System, Proceeding on Computers in Public Systems, CSI Western Regional Convention, Nov 10 –11, 1993 Ahmedabad.
On Application of a Fast algorithm to Compute the Reliability of a System, Proceeding of SRC-93, Visakhapatnam, August, 1993.
An Optimized Test Data Generation to Test a Program, Proceeding of SRC-93, Visakhapatnam, August, 1993.
Digital Protection in Power System using Microprocessors, Proceedings of All India Symposium on Power Systems Operations and Control, June 1979 Dept. of Electrical Engineering, Osmania University, Hyderabad.
A Hierarchical Syntactic Pattern Recognition System for Circuit Analysis, Annual Convention Computer Society of India, 1978.
Internal Research Forum:
Information Security – Time to drag it from margins to centre of focus, Bulletin of Andhra University Research Forum, Vol 9, Nos.1&2, April &May, 2003.
Education:
Elemantry School, Saripalli-534198 1st - 5th class
Z. P High School, Ganapavaram-534198 6th -7th class
Z. P. Multipurpose High School, Tanuku-534211 7th - 8th class
Z.P. High School, Chintalapudi-534460 8th - 9th class
Municipal High School, Gandhinagar, Kakinada-533001 10th and SSLC
P R Govt College, Kakinada: PUC
Govt. College of Engineering, Kakinda: BE(EE) May, 1975
AU College of Engg, Visakhapatnam: ME(CS) July, 1978
IIT, Kharagapur: Ph.D(CS&T) March, 1989
Thanks for Visiting My Profile!