Posts

Showing posts from April, 2022

DAA Course File

Text Book Prescribed: https://drive.google.com/file/d/1xiikU_uYfsj472j7Rdj9GlKmbcK1F1Sc/view?usp=sharing Syllabus: https://drive.google.com/file/d/18YJShHvNwqbWrMQoycgurKM_bE5Ce5vb/view?usp=sharing Lecture Notes and PPTs https://drive.google.com/drive/folders/1yP_Bso3Q8aGJwM_uaul6Q5SHzHPfF2RI?usp=sharing https://oufastupdates.com/design-and-analysis-of-algorithms-daa-ou-notes/   Osmania Previous Question Papers https://drive.google.com/file/d/1213ep6NFA3TgY2jIQotzTnbUthSrW8H8/view  

Invited Lectures / Paper presentations

  Year Invited Lectures / Paper presentations 2021 4th  Smart Cities Symposium(4SCS 2021), University of Bahrain, Bahrain. https://digital-library.theiet.org/content/conferences/10.1049/icp.2022.0358 Smart cities data analysis using fog computing 2021 4th  Smart Cities Symposium(4SCS 2021), University of Bahrain, Bahrain. https://digital-library.theiet.org/content/conferences/10.1049/icp.2022.0351 A model to predict malicious data in smart home applications using deep learning algorithms 2021 ICCIML 2021,Springer  Hyderabad  https://link.springer.com/chapter/10.1007/978-981-16-8484-5_24 A survey on DDOS attack from compromised devices to Enhance IoT security   2020 In 2020 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) https://ieeexplore.ieee.org/document/9104164   Dynamic Control s

Books & Book Chapters

    Year Text/Reference books/ book chapters published by International Publishers, with ISBN/ISSN number 2020 A TRUSTED SECURITY AND AUTHENTICATION MODEL FOR CLOUD COMPUTING, Lambert Publishers, ISBN-13: 978-620-2-52031-7 & ISBN-10: 6202520310 https://www.morebooks.de/store/gb/book/a-trusted-security-and-authentication-model-for-cloud-computing/isbn/978-620-2-52031-7   2022 Maintaining IoT Healthcare Records Using Cloud Storage. In: Nath Sur S., Balas V.E., Bhoi A.K., Nayyar A. (eds) IoT and IoE Driven Smart Cities. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-82715-1_10 https://link.springer.com/book/10.1007/978-3-030-82715-1   2021 An Authentication model with high Security for Cloud Database. Architectural Wireless Networks Solutions and Security Issues. Springer Singapore https://doi.org/10.1007/978-981-16-0386-

Research Papers Published

  Research papers published:   2022 Design of Resources Allocation in 6G Cybertwin Technology Using the Fuzzy Neuro Model in Healthcare Systems, Journal of Healthcare Engineering , vol. 2022, Article ID 5691203, 9 pages, 2022. https://doi.org/10.1155/2022/5691203 https://www.hindawi.com/journals/jhe/2022/5691203/   SCI-Hindawi Scopus WOS=25 2018 International Journal of Services Operations and Informatics, Vol. 9, No. 4, 2018. An efficient two stage encryption for securing personal health records in cloud computing. Print ISSN: 1741-539X Online ISSN: 1741-5403 https://www.inderscience.com/info/inarticle.php?artid=97487 Impact Factor(IF): 0.29 Scopus Inder Science 2021 Security and Authentication of Outsourcing Cloud Data, IEEE&IET, https://doi.org/10.1049/icp.2021.0954 https://ieeexplore.ieee.org/document/9545748/authors#authors https://digital-library.theiet.org/