The National Institute of Engineering, Mysore FACULTY PROFILE

Size: px
Start display at page:

Download "The National Institute of Engineering, Mysore FACULTY PROFILE"

Transcription

1 The National Institute of Engineering, Mysore FACULTY PROFILE 0. Name of the Faculty [in Block Letters] 0. Date of Birth 04. Designation 05. Department 06. Date of Joining NIE 07. Phone Dr. H.D. PHANEENDRA DD MM YYYY 0. Sex Male Female Professor Computer Science & Engineering 5-SEPTEMBER-999 Office Residence Mobile ID hdphanee@yahoo.com 08. Educational Qualifications a) At the time of joining NIE Degree Subjects/Specialization Class/Gra Obtained M.Tech Systems Analysis & Computer Applications FCD Year of Passing 994 University Mangalore, NITK,Surathkal B.E Computer Science & Engineering FCD 989 Mysore University, PESCE, Mandya b) Additional Qualifications acquired during your service in NIE Degree Subjects/Specialization Class/Gra Obtained Year of Passing University Ph.D Computer Science & Engineering Awarded 008 VTU, Belgaum 9. Positions held after joining NIE (Academic/Administrative/Others) Name of the Position Professor & Head Professor of Years From To Institution/University 06 0 Till Date Professor & Head NIE Assistant Professor NIE 06 NIE NIE

2 TEQIP Coordinator 0 Till Date NIE 4 Academic Council Member Till Date NIE 5 Member of BOE Till Date NIE 6 Member of BOS Till Date NIE 7 BOE, Chairman Mysore University 8 Secretary CSI, Mysore Chapter 9 BOS, Member Kuvempu University 0 Co ordinator, IBM CoE, NIE, Mysore Member of BOS PESCE, Mandya Member of BOS, MCA Board 00 0 VTU, Belgaum Member of BoS, ISE Board PESCE, Mandya 4 Member of BoS MCA Board VTU, Belagaum 5 TEQIP II Coordinator NIE, Mysore

3 0. Number of Candidates Awarded M.Sc., (By Research) & Ph.D. Degrees under your Guidance Name of the Candidate Title of the Thesis Degree Awarded S.G.Srikanta Swamy Performance Analysis and Evaluation of Classical and Quantum Cryptographic algorithms Date of Award University Ph.D 05 VTU, Belgaum. Number of Candidates Presently Working for M.Sc., (By Research) &Ph.D. Degree under your Guidance Name of the Candidate Degree for which Registered Girish Ph.D P. Prasanna Title of the Thesis Analysis and Implementation of Digital Signature and Identity Based Encryption schemes for security. Design and Analysis of Quantum Algorithms Commenc ement Year 00 Probable Date of Submission 05 Ph.D Sanjay kumar C.K. Ranganath S. Sumana K.R. Ph.D Ph.D Ph.D An analysis of Brain Images Perfromance Analysis of Data Mining Techniques Anaylsis of driver related images

4 . Research Publications [Enclose Abstract and Full Paper] a) National Journals Title of the Paper Name of the Journal Volume An analysis of the Design factors affecting the performance of cryptosystems, Indian Journal of Computer Science and Engineering, Volume, October Issue Page Nos. Year 5, November 0 4

5 b) International Journals Title of the Paper Name of the Journal Volume Issue Page Nos. Year Quantum Search International Journal of Vol. 7 No Reduces the Time and Quantum Information Cost for Searching for Objects in Peer-to-Peer Networks, A Cipher design using the combined effect of arithmetic and logic operations with substitution and transposition techniques, International Journal of Computer Applications (IJCA), Volume 9, 8 0 Enhanced one time pad cipher with more arithmetic and logical operations with flexible key generation algorithms, International Journal of Network security and its applications (IJNSA), Volume 9, 6 November A light weight mutual authentication and key exchange protocol, Improved Caesar cipher with random number generation technique and multistage encryption,. A Novel Symmetric Key distribution Protocol for Data Encryption, International Journal of Data and Network security, International Journal on Cryptography and Information Security(IJCIS), International Journal of Computer science and Information Security(IJCSIS),, A New approach for designing cryptographic 7 system based on Feistel structure, International Journal on Hash function design 8 using matrix multiplication, Ex-or, checksum generation and compression technique approach, Volume,, October 0 Volume, No 4 December 0 Vol.0, Computer science and Vol 5 No engineering International Journal of Computer Science and Information Technology & Vol No December 0 January 0 Feb 0 5

6 Security, 9 Nia Semi-Automated Intent Based Enterprise Chatbot International Journal of Innovative Science and Research Technology Volume, Issue, No March 08 6

7 . Books Published Title of the Chapter/Book Name of the Publisher Year of Publication Multimedia Communications KSOU Study Material 004 Database Management Systems KSOU Study Material 4. Details of Research Activities [Funds received for Research projects] 005 a) Funded Research Projects completed Title of the Research Project Funding Agency Amount Duration Year b) On-going Funded Research Projects Title of the Research Project Funding Agency Amount Duration Commencement Year Conference/Seminars/Workshops Attended a) National Conferences/Seminars/Workshops Details of Conferences/Seminars/Workshops National Conference on Quantum Computing NQC-00, Dates October 5-7, 00, IIITB, Gwalior, India Sponsoring Agency NIE National Conference on Engineering Technology and Management September 8-9, 00, Hosur, Tamilnadu, 7

8 a) International Conferences/Seminars/Workshops Details of Conferences/Seminars/Workshops International Conference on Systemics, Cybernetics and Informatics, Dates ICSCI-004, Hyderabad, Sponsoring Agency International Conference on Systemics, Cybernetics and Informatics, ICSCI-005, Hyderabad, 4 International Conference on Quantum Computing Back action, 5 th IEEE International Conference on Cognitive Informatics 006, May 6-4, 006, Indian Institute of Technology, Kanpur, July 8-, 006, Beijing, China. 5 4 th International conference on Intelligent Information Processing September 0-, 006, Adelaide, Australia). 6 Cryptosystem design with Recursive key generation techniques, International Conference on Communication Technology & System Design (ICCTSD 0) December 0, Coimbatore, 8

9 6. Conference/Seminars/Workshops Papers Presented [Enclose Abstract & Full Paper] a) National Conferences/Seminars/Workshops Details of Conferences/ Seminars/Workshops National Conference on Quantum Computing NQC-00, National Conference on Quantum Computing, NQC-00 Presented Papers (Title of the Paper Presented) Possible Technologies for Quantum Computers: A Survey, Quantum Computing with Molecules- The Future, Dates October 5-7, 00, IIITB, Gwalior, India October 5-7, 00, IIITB, Gwalior, Sponsoring Agency National Conference on Engineering Technology and Management National Conference on Engineering Technology and Management, National Conference on Wireless control and communication technology (NCWCT 0) National Conference on Emerging trends in Information Technology and Mathematics, Quantum Computing: Issues, Prospects and Challenges Logic Gates for quantum computing, Data Encryption using the combined features of substitution and transposition techniques, Performance study of cryptosystems, September 8-9, 00- Hosur, Tamilnadu, September 8-9, 00, Hosur, Tamilnadu, April 0, Bangalore November 0, Bangalore. 9

10 b) International Conferences/Seminars/Workshops Details of Conferences/Seminars/ Workshops Presented Papers (Title of the Paper Presented) Dates Sponsoring Agency

11 International Conference on Systemics, Cybernetics and Informatics, Performance analysis of Quantum algorithm for searching without sorting, ICSCI-004, Hyderabad, International Conference on Systemics, Cybernetics and Informatics, Proceedings of International Conference on Systemics, Cybernetics and Informatics, An insight into the applications of Quantum Fourier transforms, Quantum Factoring Algorithm as an Approach to Break RSA Crypto Systems, ICSCI-004, Hyderabad, ICSCI-005, Hyderabad, India 4 5 Central European Quantum Information Processing 006, Central European Quantum Information Processing 006, Possible use of Quantum Search for various applications of classical computer Applying Quantum Search algorithm to crack triple DES encryption, CEQIP 006, May 4-7, 006, Znojmo, Czech Republic. CEQIP 006, May 4-7, 006, Znojmo, Czech Republic. 6 International Conference on Quantum Computing Back action, Applying Quantum Search Algorithm to Crack DES and Double DES Encryption, May 6-4, 006, Indian Institute of Technology, Kanpur, 7 5 th IEEE International Conference on Cognitive Informatics 006, Quantum Algorithms and Hard Problems, July 8-, 006, Beijing, China. Asian Conference on Quantum Information Science (AQIS 006), Applying Quantum Search Algorithm to Attack Advanced Encryption Standard (AES), September - 4, 006, Beijing, China. 8

12 9 4 th International conference on Intelligent Information Processing, Applying Quantum Search to a Known-Plaintext Attack on Two-Key Triple Encryption September 0-, 006, Adelaide, Australia) 0 4 th International conference on Intelligent Information Processing, Quantum Search: Reduces the Time and Cost for Searching for Objects in Multiple-Server Peer-to-Peer Networks. September 0-, 006, Adelaide, Australia). 4 International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, CIS E 06, Proceedings of International Conference on Systemics, Cybernetics and Informatics, ICSCI-007, Proceedings of Workshop on Quantum Information Processing QIP 007 Proceedings of workshop on Quantum Information Processing QIP 007, Journal of IEEE Computer Society, International Conference ITNG 007, Quantum Search: Reduces the time for authentication using Ear Biometrics, Quantum Search: Reduces the Time for Compression of Text Data using LZW compression, Quantum Search: Reduces Time to Crack classical symmetric cryptographic algorithms Targeted Quantum Search: Reduces the Time and Cost for Searching for Files in peer-topeer Networks, Quantum Search: Reduces the Time for Searching for files in Peer-to-Peer Networks, December 4-4, 006, Journal of IEEE computer society, University of Bridgeport, Connecticut, USA. January -7, 007, Hyderabad, Jan 0 Feb, 007, Brisbane, Australia. Jan 0 Feb, 007, Brisbane, Australia. 5 April -6, 007, Las Vegas, Nevada, USA.

13 6 IEEE International Conference on Advanced computing & communication technologies, Block-cipher design with effective key generation technique involving the use of multiplication factor in addition to a key, November 0, Panipat 7. Conference/Seminars/Workshops Organized a) National Conferences/Seminars/Workshops Details of Conferences/ Seminars/Workshops No of Participants Dates Sponsoring Agency One Day Workshop on C# &.NET 50 April 009 VTU One Day FDP on NS- 48 Mar, 0 TEQIP II - One Day workshop on Selenium 60 Feb, Two Days Workshop on Computer Forensics Three days workshop on OBE Two days workshop of Vision NIE-00 b) International Conferences/Seminars/Workshops Details of Conferences/Seminars/ Workshops No of Participants March 0, 0 July -5, 06 Sept 9-0,07 Dates TEQIP II TEQIP-II TEQIP-II NIE, Mysore Sponsoring Agency Refresher Courses/Orientation Programs/Training Programs Attended Details of Refresher Courses/Orientation Programs/Training Programs Attended as Resource Person/Participant Duration Sponsoring Agency Three days workshop on OBE Participant July -5, 06 TEQIP-II 9. Refresher Courses/Orientation Programs/Training Programs Organized Details of Refresher Courses/Orientation Programs/Training Programs No of Participants Duration Sponsoring Agency

14 0. Assignments/Deputations to Outside Institutions/Universities Nature of Assignment Institution/University where Assignment taken Duration Sponsoring Agency

15 . Honours/Awards/Distinction Received Details of Honours/Awards/Distinction Received Conferring Agency Date of Award Membership in Professional Bodies/University Bodies/Organizations Type of Membership Professional Bodies/Organizations/ University Bodies/Others Period of Membership Member Member Indian Society for Technical Education Computer Society of India Life Member 5 Years. Patents Registered Name of the Invention Date of Application Application Number Date of Patent Awarded Patent Number