About
H.Ateeq Ahmed
Assistant Professor in Department of CSE
- Qualification: M.Tech
- Email: h_ateeqahmed@drkvsrit.in
- Experience: 11 years
Educational Details
Qualification |
Institution |
Year |
B.Tech |
Safa College of Engg. & Tech. |
2009 |
M.Tech |
Samskruti College of Engg. & Tech. |
2012 |
Professional Details
Designation |
Institution |
From |
To |
Asst. Professor |
Dr. K. V. Subba Reddy Institute of Technology |
2010 |
Till Date |
Awards / Achievement
- Selected for SATYAM Computers Services Ltd during 3rd year of B.Tech.
- Participated as a Coordinator in an “Ethical Hacking” Workshop.
- Got “Best Paper Award” in National Conference i.e NCIRET-2015 for the paper entitled “Advanced Security for Manets using Threshold Cryptography.”
- A JNTUA RATIFIED faculty.
Responsibilities:
- Acts as an Organizer for various Events & functions.
- Acts as a Resource person for various Workshops & Seminars.
- Presently, a M.Tech/PG Coordinator for CSE branch.
- Presently, Andhra Pradesh State Skill Development Corporation (APSSDC) SPOC for Dr.KVSRIT.
Expertise / list of subjects handled:
- Data Warehousing & Data Mining (R07 & R09)
- Information Security (R07)
- Programming in C & Data Structures (R09)
- Object Oriented Programming (R09)
- Software Testing Methodologies (R07,R13 & R15)
- Software Testing (R09 & R15)
- Distributed Systems (R09)
- Linux Programming (R09)
- Software Engineering (R09)
- Problem Solving & Computer Programming (R13)
- Computer Organization & Architecture (R13)
- Computer Organization (R09)
- Computer Organization (R15)
- Operating Systems (R13 & R15)
- Computer Programming (R15)
- Data Structures (R15)
Research Interest
- Computer Networks
- Network Security
- Cyber Forensics
Research & Publications
Papers Published in International/National Journal/Conference/FDP's/Certification Courses
Books
1. Computer Organization for B.Tech CSE II Year II Sem - R15
http://engineeringdrive.blogspot.com/2017/01/blog-post.html
2. High Performance Computing for B.Tech CSE IV Year II Sem - R13
http://engineeringdrive.blogspot.com/2017/01/high-performance-computing-for-btech.html
3. Software Engineering for B.Tech CSE III Year I Sem - R09
http://engineeringdrive.blogspot.com/2016/05/software-engineering-for-btech-cse-iii.html
4. Distributed Systems for B.Tech CSE III Year II Sem - R09
http://engineeringdrive.blogspot.com/2016/05/distributed-systems-for-btech-cse-iii.html
5. Problem Solving & Computer Programming for B.Tech CSE I Year - R13
http://engineeringdrive.blogspot.com/2016/05/blog-post_26.html
6. Software Testing Methodologies for B.Tech CSE III Year II Sem - R13
http://engineeringdrive.blogspot.com/2016/05/software-testing-methodologies-for.html
7. Computer Organization & Architecture for CSE & ECE - R13
http://engineeringdrive.blogspot.com/2016/05/computer-organization-architecture-for_25.html
8. Java Material for CSE Students
http://engineeringdrive.blogspot.com/2015/06/object-oriented-programming-r09.html
9. Computer Programming for B.Tech I Year I Sem - R15
http://engineeringdrive.blogspot.com/2015/06/i-btech-cse-r13-regulation.html
10. Operating Systems for B.Tech CSE III Year I Sem - R13
http://engineeringdrive.blogspot.com/2015/06/hello-to-every-body.html
Conferences
- Presented a paper in an International Conference i.e IRNET on “An Approach to Block Malicious Users in Anonymizing Networks” dated 12th August-2012.
- Presented a paper in National Conference i.e NCIRET-2015 on “Advanced Security for Manets using Threshold Cryptography” dated 25th March-2015.
- Implementation of Event Processing Systems Access Policy Consolidation, H. Ateeq Ahmed, M. Supriya, IJSETR, Nov-2014, Vol.03, Issue.34, 6714-6718, 2319-8885.
- Improve the Framework and Security Issues in Multicloud Computing Environments Based on Collaborative Network, H. Ateeq Ahmed, A. Naga Bhulakshmi, IJATIR, Dec-2014, Vol.06, Issue.12, 1461-1467, 2348–2370.
- Advanced Security For Manets Using Threshold Cryptography, H. Ateeq Ahmed, C.Md Gulzar, S. Imran Pasha, IJRET, Apr-2015, Vol.04, Special Issue.02, 2321-7308, 2321-7308.
- Safe Data Recovery for Decentralized Disruption Tolerant Military Networks, H. Ateeq Ahmed, MD. Abdul Rahiman, IJSETR, Apr-2015, Vol.04, Issue.09, 1645-1650, 2319-8885.
- Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Databases, H. Ateeq Ahmed, M. Niranjan Reddy, IJATIR, Aug-2015, Vol.04, Issue.11, 2119-2124, 2348–2370.
- Identity-Based Integrity Verification Using PDP in Multi Cloud Storage, H. Ateeq Ahmed, P. Venkata Amarnath, IJMETMR, June-2015, Vol.02, Issue.06, 597-601, 2348-4845.
- Privacy Protection through Public Auditing for Cloud Data Regeneration, H. Ateeq Ahmed, Syed Mohammed Shafi, IJITECH, May-2016, Vol.04, Issue.05, 0806-0811, 2321-8665.
- An Enhanced Efficient User Revocation Mechanism with Anonymous Attribute Based Encryption, H. Ateeq Ahmed, P. Fakruddin, IJR, May-2016, Vol.03, Issue.09, 260-264, 2348-6848.
- Replication for Efficient File Allocation in MANET’s to Maximize Availability of P2P File Access, H. Ateeq Ahmed, A. Alekya, IJITECH, May-2016, Vol.04, Issue.05, 0808-0805, 2321-8665.
- Ranking Fraud Detection Scheme for Mobile Applications, H. Ateeq Ahmed, K. Shiva Shankar, IJR, July-2016, Vol.03, Issue.11, 2348-6848, 2348-6848.
- Achieving Efficiency in Cloud Data Analysis for Global Social Networks, H. Ateeq Ahmed, M. Vijay, IJR, June-2016, Vol.03, Issue.10, 2348-6848, 2348-6848.
- An Approach to Preserve Privacy of Client Uploaded Pictures on Content Dispensable Sites, H. Ateeq Ahmed, P. Ramesh, IJATIR, July-2016, Vol.08, Issue.08, 1673-1678, 2348-2370.
- Estimation of Traffic with Accuracy through Twitter Stream Analysis, H. Ateeq Ahmed, K. Eswar Kumar, IJITECH, July-2016, Vol.04, Issue.08, 1317-1324, 2321-8665.
- Open Auditing for Effective Sharing of Cloud Data with Multi User Revocation, H. Ateeq Ahmed, N. Lokesh, IJSETR, Nov-2016, Vol.04, Issue.40, 8349-8353, 2319-8885.
- A Secured CDA Generation Health Information Exchange in Cloud with Proxy Re encryptionH. Ateeq Ahmed,M. Madhusudhan, IJCRT, Oct-2017, Vol.05,Issue.4, 2320-2882
- A Scalable RDF Data Management with De-Duplication and Data Dynamics in CloudH. Ateeq Ahmed,S. Haji Basha, IJCRT,Oct-2017,Vol.05,Issue.4, 216-224, 2320-2882
- Attribute Authority and Timings Enabled Proxy Re-encryption Function on E-Health CloudH. Ateeq Ahmed, M. Madhusudhan, IJCRT, Nov-2017, Vol.05, Issue.4, 936-943, 2320-2882
- Secure Authorized De Duplication for Primary Storage System in CloudH. Ateeq Ahmed, Y. Swathi, IJCRT,Oct-2017,Vol.05,Issue.4,232-238,2320-2882.
- A Semantic Image Search Method for Large Scale Storage Systems in Cloud,H. Ateeq Ahmed, B. Mounica,IJCRT,Sept-2017,Vol.05,Issue.3,367-373,2320-2882,
- Mining Large Unstructured Datasets to Find Top-K Competitors,H. Ateeq Ahmed, Md. Irfan,JETIR,July-2018,Vol.05,Issue.7,662-664,2349-5162.
- Malware And Fake Applications Identify in Google Play,H. Ateeq Ahmed,S. Abdul Jabbar, A.E. Raju,JETIR,Jan-2019,Vol.06,Issue.1,77-84,2349-5162.
- Large Unstructured Datasets from Mining Competitors,H. Ateeq Ahmed,S. Abdul Jabbar, A.E. Raju,JETIR,Jan-2019,Vol.06,Issue.1,85-91,2349-5162.
- Recognize And Categorize Prevalent News Topics Using Social Media Factors,H. Ateeq Ahmed,S. Abdul Jabbar,A.E. Raju,JETIR,Feb-2019,Vol.06,Issue.2,129-134,2349-5162.
- Exploration of HDM with Directed Acyclic Graph(DAG) in Big Data Framework,H. Ateeq Ahmed,M. Harsha Nagavardhan,IJR,May-2019,Vol.08,Issue.05,2236-6124.
Others
Blog:http://engineeringdrive.blogspot.com/
Youtube: https://www.youtube.com/channel/UC_YZjVyPml6yLEbzjenwEQA
Contact
Location:
Dr.K.V.Subba Reddy Institute of Technology, Kurnool
Email:
h_ateeqahmedl@drkvsrit.in