H. ATEEQ AHMED

img

H.Ateeq Ahmed
Assistant Professor

H. ATEEQ AHMED has completed B.Tech from Safa College of Engineering & Technology, JNTUA, Anantapur, M.Tech from Samskruti College of Engineering & Technology, JNTUH, Hyderabad. Currently he is working as an Asst. Professor in the Department of CSE at Dr. KVSR Institute of Technology, Kurnool, A.P. He has more than 10 years of teaching experience.

H Ateeq Ahmed

Qualification


Qualification
Institution
Year
B.Tech
(CSE)
Safa College of Engg. & Tech.
2009
M.Tech
(CSE)
Samskruti College of Engg. & Tech.
2012



Experience


Designation
Institution
From
To
Asst. Professor Dr. K. V. Subba Reddy Institute of Technology 2010 Till Date

Awards / Achievement

1. Selected for SATYAM Computers Services Ltd during 3rd year of B.Tech.

2. Participated as a Coordinator in an “Ethical Hacking” Workshop.

3. Got “Best Paper Award” in National Conference i.e NCIRET-2015 for the paper entitled “Advanced Security for Manets using Threshold Cryptography.”

4. A JNTUA RATIFIED faculty.

Responsibilities

1. Acts as an Organizer for various Events & functions.

2. Acts as a Resource person for various Workshops & Seminars.

3. Presently, a M.Tech/PG Coordinator for CSE branch.

4. Presently, Andhra Pradesh State Skill Development Corporation (APSSDC) SPOC for Dr.KVSRIT.

Expertise / list of subjects handled

1. Data Warehousing & Data Mining (R07 & R09)

2. Information Security (R07)

3. Programming in C & Data Structures (R09)

4. Object Oriented Programming (R09)

5. Software Testing Methodologies (R07,R13 & R15)

6. Software Testing (R09 & R15)

7. Distributed Systems (R09)

8. Linux Programming (R09)

9. Software Engineering (R09)

10. Problem Solving & Computer Programming (R13)

11. Computer Organization & Architecture (R13)

12. Computer Organization (R09)

13. Computer Organization (R15)

14. Operating Systems (R13 & R15)

15. Computer Programming (R15)

16. Data Structures (R15)

17. Problem Solving & Programming (R19)

Research Interest

1.  Computer Networks

2.  Network Security

3.  Cyber Forensics

Books

1. Problem Solving and Programming for B.Tech I Year I Sem - R19 http://engineeringdrive.blogspot.com/2019/09/problem-solving-and-programming-for.html

2. Computer Organization for B.Tech CSE II Year II Sem - R15 http://engineeringdrive.blogspot.com/2017/01/blog-post.html

3. High Performance Computing for B.Tech CSE IV Year II Sem - R13 http://engineeringdrive.blogspot.com/2017/01/high-performance-computing-for-btech.html

4. Software Engineering for B.Tech CSE III Year I Sem - R09 http://engineeringdrive.blogspot.com/2016/05/software-engineering-for-btech-cse-iii.html

5. Distributed Systems for B.Tech CSE III Year II Sem - R09 http://engineeringdrive.blogspot.com/2016/05/distributed-systems-for-btech-cse-iii.html

6. Problem Solving & Computer Programming for B.Tech CSE I Year - R13 http://engineeringdrive.blogspot.com/2016/05/blog-post_26.html

7. Software Testing Methodologies for B.Tech CSE III Year II Sem - R13 http://engineeringdrive.blogspot.com/2016/05/software-testing-methodologies-for.html

8. Computer Organization & Architecture for CSE & ECE - R13 http://engineeringdrive.blogspot.com/2016/05/computer-organization-architecture-for_25.html

9. Java Material for CSE Students http://engineeringdrive.blogspot.com/2015/06/object-oriented-programming-r09.html

10. Computer Programming for B.Tech I Year I Sem - R15 http://engineeringdrive.blogspot.com/2015/06/i-btech-cse-r13-regulation.html

11. Operating Systems for B.Tech CSE III Year I Sem - R13 http://engineeringdrive.blogspot.com/2015/06/hello-to-every-body.html

 

Conferences

1. Presented a paper in an International Conference i.e IRNET on “An Approach to Block Malicious Users in Anonymizing Networks” dated 12th August-2012.

2. Presented a paper in National Conference i.e NCIRET-2015 on “Advanced Security for Manets using Threshold Cryptography” dated 25th March-2015.

Journals

1. Implementation of Event Processing Systems Access Policy Consolidation, H. Ateeq Ahmed, M. Supriya, IJSETR, Nov-2014, Vol.03, Issue.34, 6714-6718, 2319-8885.

2. Improve the Framework and Security Issues in Multicloud Computing Environments Based on Collaborative Network, H. Ateeq Ahmed, A. Naga Bhulakshmi, IJATIR, Dec-2014, Vol.06, Issue.12, 1461-1467, 2348–2370.

3. Advanced Security For Manets Using Threshold Cryptography, H. Ateeq Ahmed, C.Md Gulzar, S. Imran Pasha, IJRET, Apr-2015, Vol.04, Special Issue.02, 2321-7308, 2321-7308.

4. Safe Data Recovery for Decentralized Disruption Tolerant Military Networks, H. Ateeq Ahmed, MD. Abdul Rahiman, IJSETR, Apr-2015, Vol.04, Issue.09, 1645-1650, 2319-8885.

5. Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Databases, H. Ateeq Ahmed, M. Niranjan Reddy, IJATIR, Aug-2015, Vol.04, Issue.11, 2119-2124, 2348–2370.

6. Identity-Based Integrity Verification Using PDP in  Multi Cloud Storage, H. Ateeq Ahmed, P. Venkata Amarnath, IJMETMR, June-2015, Vol.02, Issue.06, 597-601, 2348-4845.

7. Privacy Protection through Public Auditing for Cloud Data Regeneration, H. Ateeq Ahmed, Syed Mohammed Shafi, IJITECH, May-2016, Vol.04, Issue.05, 0806-0811, 2321-8665.

8. An Enhanced Efficient User Revocation Mechanism with Anonymous Attribute Based Encryption, H. Ateeq Ahmed, P. Fakruddin, IJR, May-2016, Vol.03, Issue.09, 260-264, 2348-6848.

9. Replication for Efficient File Allocation in MANET’s to Maximize Availability of P2P File Access, H. Ateeq Ahmed, A. Alekya, IJITECH, May-2016, Vol.04, Issue.05, 0808-0805, 2321-8665.

10. Ranking Fraud Detection Scheme for Mobile Applications, H. Ateeq Ahmed, K. Shiva Shankar, IJR, July-2016, Vol.03, Issue.11, 2348-6848, 2348-6848.

11. Achieving Efficiency in Cloud Data Analysis for Global Social Networks, H. Ateeq Ahmed, M. Vijay, IJR, June-2016, Vol.03, Issue.10, 2348-6848, 2348-6848.

12. An Approach to Preserve Privacy of Client Uploaded Pictures on Content Dispensable Sites, H. Ateeq Ahmed, P. Ramesh, IJATIR, July-2016, Vol.08, Issue.08, 1673-1678, 2348-2370.

13. Estimation of Traffic with Accuracy through Twitter Stream Analysis, H. Ateeq Ahmed, K. Eswar Kumar, IJITECH, July-2016, Vol.04, Issue.08, 1317-1324, 2321-8665.

14. Open Auditing for Effective Sharing of Cloud Data with Multi User Revocation, H. Ateeq Ahmed, N. Lokesh, IJSETR, Nov-2016, Vol.04, Issue.40, 8349-8353, 2319-8885.

15. A Secured CDA Generation Health Information Exchange in Cloud with Proxy Re encryptionH. Ateeq Ahmed,M. Madhusudhan, IJCRT, Oct-2017, Vol.05,Issue.4, 2320-2882

16. A Scalable RDF Data Management with De-Duplication and Data Dynamics in CloudH. Ateeq Ahmed,S. Haji Basha, IJCRT,Oct-2017,Vol.05,Issue.4, 216-224, 2320-2882

 17. Attribute Authority and Timings Enabled Proxy Re-encryption Function on E-Health CloudH. Ateeq Ahmed, M. Madhusudhan, IJCRT, Nov-2017, Vol.05, Issue.4, 936-943, 2320-2882

18. Secure Authorized De Duplication for Primary Storage System in CloudH. Ateeq Ahmed, Y. Swathi, IJCRT,Oct-2017,Vol.05,Issue.4,232-238,2320-2882.

 19. A Semantic Image Search Method for Large Scale Storage Systems in Cloud,H. Ateeq Ahmed, B. Mounica,IJCRT,Sept-2017,Vol.05,Issue.3,367-373,2320-2882,

20. Mining Large Unstructured Datasets to Find Top-K Competitors,H. Ateeq Ahmed, Md. Irfan,JETIR,July-2018,Vol.05,Issue.7,662-664,2349-5162.

 21. Malware And Fake Applications Identify in Google Play,H. Ateeq Ahmed,S. Abdul Jabbar, A.E. Raju,JETIR,Jan-2019,Vol.06,Issue.1,77-84,2349-5162.

22. Large Unstructured Datasets from Mining Competitors,H. Ateeq Ahmed,S. Abdul Jabbar, A.E. Raju,JETIR,Jan-2019,Vol.06,Issue.1,85-91,2349-5162.

23. Recognize And Categorize Prevalent News Topics Using Social Media Factors,H. Ateeq Ahmed,S. Abdul Jabbar,A.E. Raju,JETIR,Feb-2019,Vol.06,Issue.2,129-134,2349-5162.

24. Vertualize Machine Cloud For Improving Performance Of Energy Resource Allocation For Hybrid Workloads,H. Ateeq Ahmed,G. Prathiba Priyadarshini,S. Somasekhar,JES,Sept-2019,Vol.10,Issue.9,22-26, 0377-9254.

25. An Efficient Virtual Machine Management And Scheduling In Cloud Computing,H. Ateeq Ahmed,G. Prathiba Priyadarshini,S. Somasekhar,JES,Sept-2019,Vol.10,Issue.9,54-56,0377-9254.

26. Capturing User Intention for Personalized Website’s for Improving Retrieval Effectiveness,H. Ateeq Ahmed,G. Prathiba Priyadarshini,S. Somasekhar,JES,Sept-2019,Vol.10,Issue.9,217-224,0377-9254.

 27. A Framework for HDM Applications to Develop Big Data Programs,H. Ateeq Ahmed,M. Harsha Nagavardhan,JES,Nov-2019, Vol.10,Issue.11,0377-9254.

28. Exploration of HDM with Directed Acyclic Graph(DAG) in Big Data Framework,H. Ateeq Ahmed,M. Harsha Nagavardhan,IJR,May-2019,Vol.08,Issue.05,2236-6124.

News Letter

To get more updates subscribe our News Letter
Visit Us On FacebookVisit Us On TwitterVisit Us On YoutubeVisit Us On LinkedinVisit Us On Instagram