Placements @ SRIT

2023-24 Placements: TCS – 14 (Prime 1 (9 LPA), Digital 3 (7 LPA), Ninja 10 (3.36 LPA)), Enzen – 1 (9 LPA), ZOHO 1 (7.2 LPA), Qatar Airways 1 ( 8.8 LPA), Accenture 37 (4.5 LPA), Deloitte 4 (4.5 LPA), GoDigit 5 (4.5 LPA), Regami Solutions 4 (3 to 5 LPA), The India Cements 3 (3.6 LPA), INDO-MIM 6 (3.3 LPA), Movate 1 (3.2 LPA), Savantis 72 (3 LPA), PiLog 27 (2.16 LPA), Syntec Systems 4 (2.5 LPA), Cape Electric 3 (2.5 LPA)

2023-24 Placements: TCS – 14 (Prime 1 (9 LPA), Digital 3 (7 LPA), Ninja 10 (3.36 LPA)), Enzen – 1 (9 LPA), ZOHO 1 (7.2 LPA), Qatar Airways 1 ( 8.8 LPA), Accenture 37 (4.5 LPA), Deloitte 4 (4.5 LPA), GoDigit 5 (4.5 LPA), Regami Solutions 4 (3 to 5 LPA), The India Cements 3 (3.6 LPA), INDO-MIM 6 (3.3 LPA), Movate 1 (3.2 LPA), Savantis 72 (3 LPA), PiLog 27 (2.16 LPA), Syntec Systems 4 (2.5 LPA), Cape Electric 3 (2.5 LPA)

(CSE) Publications

Faculty Publications
2020 – 2021
S.No Faculty Id Faculty Name Title of Publication Type Level Publisher
1 497 Mr. Sreedhar Boya Improved Ids To Prevent Online Cyber Pirates Attacks On Web-Based Applications. Journal International IJAST
2 757 Dr. C. Sasikala The Challenges, Technologies and Role of Fog Computing in the Context of Industrial Internet of Things. Book Chapter International IGI Global
3 729 Mrs. K. Sudha Kumari DNA encrypting rules with chaotic maps for medical image encryption. Conference International ICICCS
2019 – 2020
S.No Faculty Id Faculty Name Title of Publication Type Level Publisher
1 176 Dr. G. K. V. Narasimha Reddy An Efficient Cryptographic Mechanism to Defend Collaborative Attack Against DSR Protocol in Mobile Ad hoc Networks. Journal International Springer
2 484 Mrs. M. Soumya Protecting Big Data Mining Association Rules using Fuzzy System. Telekomnika
3 176 Dr. G. K. V. Narasimha Reddy Integrating Wireless Sensor Networks with Cloud Computing. Journal International IJITEE
4 547 Dr. B. Lakshmi Narayana Reddy Integrating Wireless Sensor Networks with Cloud Computing. Journal International IJITEE
5 34 Mr. P. Veera Prakash Integrating Wireless Sensor Networks with Cloud Computing. Journal International IJITEE
8 5 Dr. M. Ranjith Reddy A Secured Framework to Protect Associate Rules in the Big Data Environment using Fuzzy Logic. Journal International IIETA
9 176 Dr. G. K. V. Narasimha Reddy Powering the Next Billion Devices with Iot Security. Journal International IJITEE
10 547 Dr. B. Lakshmi Narayana Reddy A Novel Implementation of information Security Policy Modeling for enterprise Networks. Journal International IJAST
11 5 Dr. M. Ranjith Reddy Recognition of Different Voice Pathologies with Data Augmentation Strategies. Journal International IJAST
12 582 Mr. T. Venkata Naga Jayudu Design & Development of Efficient IOT based Machine Learning Model to monitor Shrimp Aquaculture. Journal International IJAST
13 43 Mr. G. Chinna Pullaiah Character recognition on old copper transcripts using complex deep learning strategies. Journal International IJAST
14 29 Mr. L Suman Character recognition on old copper transcripts using complex deep learning strategies. Journal International IJAST
15 258 Mr. C. Sudheer Kumar Character recognition on old copper transcripts using complex deep learning strategies. Journal International IJAST
16 582 Mr. T. Venkata Naga Jayudu Wireless sensor systems (As a Reviewer). Journal International IET
17 761 Mr. T. Murali Krishna Machine Learning Approach for E-Mail spam filtering.
18 29 Mr. L. Suman Machine Learning Approach for E-Mail spam filtering.
19 670 Ms.Sujana Bacchu Machine Learning Approach for E-Mail spam filtering.
20 258 Mr. C. Sudheer Kumar Improved Ids To Prevent Online Cyber Pirates Attacks On Web-Based Applications. Journal International IJAST
21 757 Dr. C. Sasikala Performance of Different Hadoop Clusters with Map Reducing Techniques. Journal International IJAST
22 771 Mr. P. Chitralingappa Trending Software Tools for Business Analytics in a nutshell, Volume – I. Book International Buuks
23 771 Mr. P. Chitralingappa Trending Software Tools for Business Analytics in a nutshell, Volume – II. Book International Buuks
2018 – 2019
S.NoFaculty IdFaculty NameTitle of PublicationTypeLevelPublisher
174Dr.T. Hitendra SarmaDesign and Analysis of a Tweet Alert System for Identifying Real Time Traffic Using K-Means Clustering AlgorithmJournalInternationalIJITEE
274Dr.T. Hitendra SarmaA Tunable Particle Swarm Size Optimization Algorithm for Feature SelectionConferenceInternationalIEEE Congress on Evolutionary
2017 – 2018
S.NoFaculty IdFaculty NameTitle of PublicationTypeLevelPublisher
1547Dr. B.Lakshmi Narayana ReddyFibonacci Series Based CryptographyConferenceInternationalEECCMC
25Mr. M. Ranjit ReddyMissing Values Imputation Using Genetic Algorithm for the Analysis of Traffic DataConferenceInternationalSpringer
313Mr. P. Praneel KumarInter image element loss less image compression with delimiter and folding.ConferenceInternationalICPCSI
434Mr. P. Veera PrakashPermutation Dependent Symmetric Key CipherConferenceInternationalEECCMC
5547Dr. B.Lakshmi Narayana ReddyInter image element loss less image compression with delimiter and folding.ConferenceInternationalICPCSI
6592Mr. G. Hemanth Kumar YadavA Survey on SLA Based Resource Allocation Strategies in Cloud Computing EnvironmentConferenceInternationalEECCMC
774Dr.T. Hitendra SarmaImproved k-means for Big Data clusteringConferenceInternationalIEEE
874Dr.T. Hitendra SarmaConsistent and Composite Key Cryptosystem for Secure Data Storage and Access in CloudConferenceInternationalIEEE
9547Dr. B.Lakshmi Narayana ReddyPermutation Dependent Symmetric Key CipherConferenceInternationalEECCMC
105Mr. M. Ranjit ReddyCLUSTER DETECTION SCHEMES IN SPATIO TEMPORAL NETWORKS.JournalInternationalIJDKP
1134Mr. P. Veera PrakashFibonacci Series Based CryptographyConferenceInternationalEECCMC
125Mr. M. Ranjit ReddySmart Vehicular System based on the Internet of Things.JournalInternationalJOEUC
135Mr. M. Ranjit ReddyClustering trajectory-based objects in spatio networksJournalInternationalIJDKP
14176Dr. G. K. Venkata Narasimha ReddyPermutation Dependent Symmetric Key CipherConferenceInternationalEECCMC
15176Dr. G. K. Venkata Narasimha ReddyFibonacci Series Based CryptographyConferenceInternationalEECCMC
2016 – 2017
S.NoFaculty IdFaculty NameTitle of PublicationTypeLevelPublisher
113PRANEEL KUMAR PERURUConfrontation and Opportunities of Big Data – A SurveyConferenceInternationalIEEE Xplore
2176Dr. G K Venkata Narasimha ReddyA Data Allocation Stratagy for Dyanamic Groups in Cloud Based On Protected Anti CollisionJournalInternationalIJR
374T Hitendra SarmaSpeeding-up the prototype based kernel k-means clustering method for large data setsConferenceInternationalIJCNN
4375S L SailajaConfrontation and Oppurtunities of Big data-A SurveyConferenceInternationalIEEE Xplore
5582T. Venkata Naga JayuduDetecting Truthfulness of Packet dropping Attacks using Public Auditing System in Wireless Ad hoc NetworksJournalInternationalIJR
6585K. Varun Kumar ReddyImproving URL Analysis Model for Focused CrawlerJournalInternationalIJARCSSE
7585K. Varun Kumar ReddyA Dual Encryption is providing a Better Security on the Public Cloud Security MechanismJournalInternationalIJIRCCE
8585K. Varun Kumar ReddyAn Analytical Study and Implementation of Multi-Path File Sharing On Distributed NetworkJournalInternationalIJIRSET
2015 – 2016
S.NoFaculty IdFaculty NameTitle of PublicationTypeLevelPublisher
113PRANEEL KUMAR PERURUConfrontation and Opportunities of Big Data – A SurveyConferenceInternationalIEEE Xplore
2176Dr. G K Venkata Narasimha ReddyA Data Allocation Stratagy for Dyanamic Groups in Cloud Based On Protected Anti CollisionJournalInternationalIJR
374T Hitendra SarmaSpeeding-up the prototype based kernel k-means clustering method for large data setsConferenceInternationalIJCNN
4375S L SailajaConfrontation and Oppurtunities of Big data-A SurveyConferenceInternationalIEEE Xplore
5582T. Venkata Naga JayuduDetecting Truthfulness of Packet dropping Attacks using Public Auditing System in Wireless Ad hoc NetworksJournalInternationalIJR
6585K. Varun Kumar ReddyImproving URL Analysis Model for Focused CrawlerJournalInternationalIJARCSSE
7585K. Varun Kumar ReddyA Dual Encryption is providing a Better Security on the Public Cloud Security MechanismJournalInternationalIJIRCCE
8585K. Varun Kumar ReddyAn Analytical Study and Implementation of Multi-Path File Sharing On Distributed NetworkJournalInternationalIJIRSET
2014 – 2015
S.NoFaculty IdFaculty NameTitle of PublicationTypeLevelPublisher
1497Sreedhar BAn Enhanced Multi layered Crypto System Based Secure and Authorized Deduplication Model in Cloud Storage SystemJournalInternationalIJIT
2547B Lakshmi Narayana ReddyMAC Authentication for Compressed Image using Diffie-Hellman Key Exchange AlgorithmJournalInternationalIJSETR
3547B Lakshmi Narayana ReddyLossy Image Compression Using Multi Dimensional Redundancy Replacement and Substitution with DelimiterJournalInternationalIJCTA
4547B Lakshmi Narayana ReddyExponential growth Equation Short Message SecurityJournalInternationalCYBERTIMES
5547Mr. B. Lakshmi Narayana ReddyLossless Grayscale Image Compression Using Intra Pixel RedundancyConferenceInternationalICCCPT
6176G K Venkata Narasimha ReddyFacilitate Buffer Minimized Time and Live Video From Cloud to Mobile NetworksJournalInternationalIJSETR
7176G K Venkata Narasimha ReddyRSASSOL Based Spatial Approximate String SearchJournalInternationalIJATIR
8176G K Venkata Narasimha ReddyFoCUS Forum Crawler under SupervisionJournalInternationalIJCSITR
9497Sreedhar BA Secure Load Balancing Technique Based on Cloud Partitioning for Public cloud InfrastructureJournalInternationalIJATIR
10592G Hemanth Kumar YadavFault Routing Node Detection Using DUAL in Wireless Sensor NetworksJournalInternationalIJCSIT
11592G Hemanth Kumar YadavVirtual Destination Based Void Handling Scheme for Position Based routing in Mobile Ad Hoc NetworksJournalInternationalR S Publications
12592G Hemanth Kumar YadavA Mobility Management Scheme for Handling Handoffs in Cognitive Radio NetworksJournalInternationalIJAIST
13497B SreedharLTI shortest Path Algorithm for Virtual Network Construction of Online Shortest Path ComputationJournalInternationalIJSETR
14582T Venkata Naga JayuduMultiple Attribute Based Encryption for Secret Key Generations in Disruption Tolerant NetworksJournalInternationalIJARCSSE
15582T Venkata Naga JayuduSuper Node Localization for Time Synchronization in UWSNsJournalInternationalIJCSIT
16582T Venkata Naga JayuduRandomly Directed Exploration Protocol for Clone Detection in Wireless Sensor NetworksJournalInternationalIJIRCCE
2013 – 2014
S.NoFaculty IdFaculty NameTitle of PublicationTypeLevelPublisher
1547B Lakshmi Narayana ReddyFast and Secure Image Transmission Using Enhanced Polygram Sunstitution Cipher with Huffman Compression TechniqueJournalInternationalIJEST
2547B Lakshmi Narayana ReddyEnhanced Polygram Substitution Algorithm For Image SecurityJournalInternationalIJERT
3547B Lakshmi Narayana ReddyFast and Secure Permutation Dependant Symmetric Key cipherConferenceInternationalNCRTWS
4176G.K.VENKATA NARASIMHA REDDYIdentification of packet dropping and modification in Wireless Sensor NetworksJournalInternationalIJCER
5258C Sudheer KumarCloud Storage and Secure Data Forwarding Using Forward-Error Correction Codes.ConferenceInternationalIEECS IRN
643G Chinna PullaiahA Secure Data Forwarding Schema for Cloud Storage SystemJournalInternationalIJSSAN
729L SumanRapid Reround PatternConferenceInternationalIJETCSE
829L SumanIPTV- Streaming Through Virutalization From CloudConferenceInternationalIJETCSE
934P Veera PrakashMultiset Generalization for Data Anonymity for high dimensional DataspaceConferenceInternationalIJETCSE
2012 – 2013
S.NoFaculty IdFaculty NameTitle of PublicationTypeLevelPublisher
113PRANEEL KUMAR PERURUUseful Patterns for Mining in the Text DocumentsConferenceInternationalISN
213PRANEEL KUMAR PERURUSecure Framework and Sparcity Structure of Linear Programming in Cloud ComputingConferenceInternationalElsevier
374T Hitendra SarmaSpeeding-up the kernel k-means clustering method: A prototype based hybrid approachJournalInternationalPRL Elsevier
474T Hitendra SarmaSingle pass kernel k-means clustering methodJournalInternationalSadhana, Springer
574T Hitendra SarmaAutomatic Decision Supporting System for UniversitiesConferenceInternationalElsevier
643G Chinna PullaiahLinear Programming Computation for framework security and sparsity structure in cloud computationConferenceNationalNCCNIS
743G Chinna PullaiahA Threshold Proxy Re-Encryption Scheme on Code – Based Erasure Cloud Storage System with Secure Data ForwardingConferenceNationalNCRTICT
843G Chinna PullaiahA Secure Data Forwarding Schema for Cloud Storage SystemsConferenceInternationalICSIT
9582T Venkata Naga JayuduA Trivial and Consistent Routing with In-Network Aggregation in WSN’sJournalInternationalIJSR
10582T Venkata Naga JayuduPair Hand: A Pairing Based Cryptography to Secure Hand Over processJournalInternationalIJAEEE
11582T Venkata Naga JayuduA Pattern Mining Approach to Determine Correlated Parameters in Memory and Storage AllocationsConferenceInternationalICEECS
12582T Venkata Naga JayuduOPSE: A Ranked Keyword Search to Improve the Cloud System UtilizationConferenceInternationalIEECS
1377P ShabanaSecure Framework and Sparsity Structure in Cloud ComputingConferenceInternationalElsevier Science Direct
1477P ShabanaSecure Data Forwarding code-based cloud storageConferenceInternationalICAET
15375S L SailajaA Presumable Data Retentive Framework for Multi CloudJournalInternationalIJCER
1678C RekhaSecure Data Forwarding code-based cloud storageConferenceInternationalICAET
2011 – 2012
S.NoFaculty IdFaculty NameTitle of PublicationTypeLevelPublisher
15Ranjit Reddy MAn Intelligent Approach to Improve the Query Performance using Disjoint Set TheoryConferenceInternationalIJCA
25M Ranjit ReddyA New Dimension to inprove the Query Performance Using Disjoint Set TheoryConferenceInternational 
313PRANEEL KUMAR PERURUAdvanced Performance analysis of Transmissoin Control Protocol Collission Control AlgorithmsJournalInternationalSV Publishers
413PRANEEL KUMAR PERURUOptimal routing in multihop wireless Networks using Floyd-Warshall AlgorithmJournalInternationalIJART
513PRANEEL KUMAR PERURUOptimal Routing in Multihop Wireless Networks using Floyd Warshall AlgorithmConferenceInternationalICACM
674T Hitendra SarmaA hybrid approach to speed-up the k-means clustering methodJournalInternationalIJMLC Springer
774T Hitendra SarmaAn improvement to k-Nearest Neighbor ClassifierConferenceInternationalRAICS
839M NarasimhuluAn Intelligent Approach to Improve the Query Performance using Disjoint Set TheoryConferenceInternationalIJCA
9582T Venkata Naga JayuduD-LAROD: A Density Based LAROD for Geographical Routing in Intermittently Connected MANETsJournalInternationalIJECT
10582T Venkata Naga JayuduImplementation of Competent & Scalable Multicasting Over Mobile Ad-hoc NetworksJournalInternationalRJET
11582T Venkata Naga JayuduDefending DOS Attacks Using A Puzzle-Based Approach and Tracing Bcck to the AttackerJournalInternationalRJET
12582T Venkata Naga JayuduRecycling the Rejected Bandwidth in IEEE 802.16 NetworksConferenceInternationalIEECS
13582T Venkata Naga JayuduD-LAROD: A Density Based LAROD for Geographical Routin in Intermittently Connected MANETsConferenceInternationalNCCNMC
1477P ShabanaSecure Framework and Organizational Structure of Linear Programming in Cloud Computing (ICSIE)ConferenceInternationalICSIE
1578C RekhaEvolving Groups Identification Multimode NetworksConferenceInternationalNCSCIT
2010 – 2011
S.NoFaculty IdFaculty NameTitle of PublicationTypeLevelPublisher
174T Hitendra SarmaA Fast Approximate Kernel k-means Clustering Method For Large Data setsConferenceInternationalRAICS-2011
2592G Hemanth Kumar YadavAn Optimization Method for Dynamic Channel Allocation with Queues in Cellular NetworksConferenceNationalNCECT 12
3592G Hemanth KUmar YadavAn Efficient Scheduling Algorithm for TCP/IP Over 3G Wireless NetworksConferenceInternationalICIRET
429L SumanAn Efficient Inter Domain Routing ProtocolConferenceInternationalICIRET
539M NarasimhuluA New Dimension to Improve the Query Performance using Disjoint Set TheoryConferenceInternationalIJCA
2009- 2010
S.NoFaculty IdFaculty NameTitle of PublicationTypeLevelPublisher
174T Hitendra SarmaAn improvement to k-Nearest Neighbor ClassifierConferenceInternationalIMT
274T Hitendra Sarmak-Nearest Neighbor Mean Classifier: An Improvement Over k-Nearest Neighbor ClassifierConferenceInternationalICETCSE
374T Hitendra SarmaSpeeding-up the k-means clustering method: A prototype based approachConferenceInternationalLNCS Springer

[learn_press_profile]