H. Ateeq Ahmed

About

H.Ateeq Ahmed

Assistant Professor in Department of CSE

  • Qualification: M.Tech
  • Email: h_ateeqahmed@drkvsrit.in
  • Experience: 11 years

Educational Details

Qualification

Institution

Year

B.Tech
(CSE)

Safa College of Engg. & Tech.

2009

M.Tech
(CSE)

Samskruti College of Engg. & Tech.

2012

Professional Details

Designation

Institution

From

To

Asst. Professor

Dr. K. V. Subba Reddy Institute of Technology

2010

Till Date

Awards / Achievement

  1. Selected for SATYAM Computers Services Ltd during 3rd year of B.Tech.
  2. Participated as a Coordinator in an “Ethical Hacking” Workshop.
  3. Got “Best Paper Award” in National Conference i.e NCIRET-2015 for the paper entitled “Advanced Security for Manets using Threshold Cryptography.”
  4. A JNTUA RATIFIED faculty.


Responsibilities:

  1. Acts as an Organizer for various Events & functions.
  2. Acts as a Resource person for various Workshops & Seminars.
  3. Presently, a M.Tech/PG Coordinator for CSE branch.
  4. Presently, Andhra Pradesh State Skill Development Corporation (APSSDC) SPOC for Dr.KVSRIT.


Expertise / list of subjects handled:

  1. Data Warehousing & Data Mining (R07 & R09)
  2. Information Security (R07)
  3. Programming in C & Data Structures (R09)
  4. Object Oriented Programming (R09)
  5. Software Testing Methodologies (R07,R13 & R15)
  6. Software Testing (R09 & R15)
  7. Distributed Systems (R09)
  8. Linux Programming (R09)
  9. Software Engineering (R09)
  10. Problem Solving & Computer Programming (R13)
  11. Computer Organization & Architecture (R13)
  12. Computer Organization (R09)
  13. Computer Organization (R15)
  14. Operating Systems (R13 & R15)
  15. Computer Programming (R15)
  16. Data Structures (R15)


Research Interest

    •  Computer Networks
    •  Network Security
    •  Cyber Forensics

 

 


Research & Publications

Papers Published in International/National Journal/Conference/FDP's/Certification Courses

Books

1. Computer Organization for B.Tech CSE II Year II Sem - R15

http://engineeringdrive.blogspot.com/2017/01/blog-post.html

2. High Performance Computing for B.Tech CSE IV Year II Sem - R13

http://engineeringdrive.blogspot.com/2017/01/high-performance-computing-for-btech.html

3. Software Engineering for B.Tech CSE III Year I Sem - R09

http://engineeringdrive.blogspot.com/2016/05/software-engineering-for-btech-cse-iii.html

4. Distributed Systems for B.Tech CSE III Year II Sem - R09

http://engineeringdrive.blogspot.com/2016/05/distributed-systems-for-btech-cse-iii.html

5. Problem Solving & Computer Programming for B.Tech CSE I Year - R13

http://engineeringdrive.blogspot.com/2016/05/blog-post_26.html

6. Software Testing Methodologies for B.Tech CSE III Year II Sem - R13

http://engineeringdrive.blogspot.com/2016/05/software-testing-methodologies-for.html

7. Computer Organization & Architecture for CSE & ECE - R13

http://engineeringdrive.blogspot.com/2016/05/computer-organization-architecture-for_25.html

 

8. Java Material for CSE Students

http://engineeringdrive.blogspot.com/2015/06/object-oriented-programming-r09.html

9. Computer Programming for B.Tech I Year I Sem - R15

http://engineeringdrive.blogspot.com/2015/06/i-btech-cse-r13-regulation.html

 

10. Operating Systems for B.Tech CSE III Year I Sem - R13

http://engineeringdrive.blogspot.com/2015/06/hello-to-every-body.html

 

Conferences

    • Presented a paper in an International Conference i.e IRNET on “An Approach to Block Malicious Users in Anonymizing Networks” dated 12th August-2012.
    • Presented a paper in National Conference i.e NCIRET-2015 on “Advanced Security for Manets using Threshold Cryptography” dated 25th March-2015.
    Journals
    • Implementation of Event Processing Systems Access Policy Consolidation, H. Ateeq Ahmed, M. Supriya, IJSETR, Nov-2014, Vol.03, Issue.34, 6714-6718, 2319-8885.
    • Improve the Framework and Security Issues in Multicloud Computing Environments Based on Collaborative Network, H. Ateeq Ahmed, A. Naga Bhulakshmi, IJATIR, Dec-2014, Vol.06, Issue.12, 1461-1467, 2348–2370.

     

    • Advanced Security For Manets Using Threshold Cryptography, H. Ateeq Ahmed, C.Md Gulzar, S. Imran Pasha, IJRET, Apr-2015, Vol.04, Special Issue.02, 2321-7308, 2321-7308.
    • Safe Data Recovery for Decentralized Disruption Tolerant Military Networks, H. Ateeq Ahmed, MD. Abdul Rahiman, IJSETR, Apr-2015, Vol.04, Issue.09, 1645-1650, 2319-8885.

     

    • Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Databases, H. Ateeq Ahmed, M. Niranjan Reddy, IJATIR, Aug-2015, Vol.04, Issue.11, 2119-2124, 2348–2370.
    • Identity-Based Integrity Verification Using PDP in  Multi Cloud Storage, H. Ateeq Ahmed, P. Venkata Amarnath, IJMETMR, June-2015, Vol.02, Issue.06, 597-601, 2348-4845.

     

    • Privacy Protection through Public Auditing for Cloud Data Regeneration, H. Ateeq Ahmed, Syed Mohammed Shafi, IJITECH, May-2016, Vol.04, Issue.05, 0806-0811, 2321-8665.
    • An Enhanced Efficient User Revocation Mechanism with Anonymous Attribute Based Encryption, H. Ateeq Ahmed, P. Fakruddin, IJR, May-2016, Vol.03, Issue.09, 260-264, 2348-6848.

     

    • Replication for Efficient File Allocation in MANET’s to Maximize Availability of P2P File Access, H. Ateeq Ahmed, A. Alekya, IJITECH, May-2016, Vol.04, Issue.05, 0808-0805, 2321-8665.
    • Ranking Fraud Detection Scheme for Mobile Applications, H. Ateeq Ahmed, K. Shiva Shankar, IJR, July-2016, Vol.03, Issue.11, 2348-6848, 2348-6848.

     

    • Achieving Efficiency in Cloud Data Analysis for Global Social Networks, H. Ateeq Ahmed, M. Vijay, IJR, June-2016, Vol.03, Issue.10, 2348-6848, 2348-6848.
    • An Approach to Preserve Privacy of Client Uploaded Pictures on Content Dispensable Sites, H. Ateeq Ahmed, P. Ramesh, IJATIR, July-2016, Vol.08, Issue.08, 1673-1678, 2348-2370.

     

    • Estimation of Traffic with Accuracy through Twitter Stream Analysis, H. Ateeq Ahmed, K. Eswar Kumar, IJITECH, July-2016, Vol.04, Issue.08, 1317-1324, 2321-8665.
    • Open Auditing for Effective Sharing of Cloud Data with Multi User Revocation, H. Ateeq Ahmed, N. Lokesh, IJSETR, Nov-2016, Vol.04, Issue.40, 8349-8353, 2319-8885.

     

    • A Secured CDA Generation Health Information Exchange in Cloud with Proxy Re encryptionH. Ateeq Ahmed,M. Madhusudhan, IJCRT, Oct-2017, Vol.05,Issue.4, 2320-2882
    • A Scalable RDF Data Management with De-Duplication and Data Dynamics in CloudH. Ateeq Ahmed,S. Haji Basha, IJCRT,Oct-2017,Vol.05,Issue.4, 216-224, 2320-2882

     

    • Attribute Authority and Timings Enabled Proxy Re-encryption Function on E-Health CloudH. Ateeq Ahmed, M. Madhusudhan, IJCRT, Nov-2017, Vol.05, Issue.4, 936-943, 2320-2882
    • Secure Authorized De Duplication for Primary Storage System in CloudH. Ateeq Ahmed, Y. Swathi, IJCRT,Oct-2017,Vol.05,Issue.4,232-238,2320-2882.

     

    • A Semantic Image Search Method for Large Scale Storage Systems in Cloud,H. Ateeq Ahmed, B. Mounica,IJCRT,Sept-2017,Vol.05,Issue.3,367-373,2320-2882,
    • Mining Large Unstructured Datasets to Find Top-K Competitors,H. Ateeq Ahmed, Md. Irfan,JETIR,July-2018,Vol.05,Issue.7,662-664,2349-5162.

     

    • Malware And Fake Applications Identify in Google Play,H. Ateeq Ahmed,S. Abdul Jabbar, A.E. Raju,JETIR,Jan-2019,Vol.06,Issue.1,77-84,2349-5162.
    • Large Unstructured Datasets from Mining Competitors,H. Ateeq Ahmed,S. Abdul Jabbar, A.E. Raju,JETIR,Jan-2019,Vol.06,Issue.1,85-91,2349-5162.

     

    • Recognize And Categorize Prevalent News Topics Using Social Media Factors,H. Ateeq Ahmed,S. Abdul Jabbar,A.E. Raju,JETIR,Feb-2019,Vol.06,Issue.2,129-134,2349-5162.
      • Exploration of HDM with Directed Acyclic Graph(DAG) in Big Data Framework,H. Ateeq Ahmed,M. Harsha Nagavardhan,IJR,May-2019,Vol.08,Issue.05,2236-6124.

       

 




Others

Blog:http://engineeringdrive.blogspot.com/

 


Youtube:
https://www.youtube.com/channel/UC_YZjVyPml6yLEbzjenwEQA


Contact

Location:

Dr.K.V.Subba Reddy Institute of Technology, Kurnool