Admissions
Madanapalle Institute of Technology & Science is now MITS Deemed to be University.
Dr. Ravindranath C Cherukuri

Qualification : Ph.D. (University of Texas at San Antonio)

Designation : Professor & Dean-Research and Innovation

Email: [email protected]

Details of Educational Qualification:

Course Specialization Group College Name/University Year of Passing
Ph.D. Electrical and Computer Engineering Electrical and Computer Engineering University of Texas at San Antonio, San Antonio, USA 2009
M.S. Electrical and Computer Engineering Electrical and Computer Engineering University of Texas at San Antonio, San Antonio, USA 2005
B.Tech. Electrical and Electronic Engineering Electrical and Electronic Engineering Jawaharlal Nehru Technological University, Hyderabad, India 2002

 

List of Publications

S.No Title of the Paper Full Details of Journal Name / Conference Name, Volume number, page number, Date
1 Sentiment Analysis on Banking Feedback and News Data using Synonyms and Antonyms International Journal of Advanced Computer Science and Applications, Vol.14, No.12, 2023
2 Realization of Humanoid Doctor and Real-Time Diagnostics of Disease Using Internet of Things, Edge Impulse Platform, and ChatGPT. Annals of Biomedical Engineering, 1-3.
3 Study of Self-Resilient Cloud Server Using Machine Learning Techniques for Local Area Networks. In Engineering, Science, and Sustainability (pp. 59-63). CRC Press.
4 Machine Learning and Artificial Intelligence Techniques for Detecting Driver Drowsiness. Journal of Automation, Mobile Robotics and Intelligent Systems, 16(2), 64-73.
5 "Reflecto–A Smart Mirror Structure with a Contextual Association of Internet of Things." Information Technology in Industry 9, no. 2 (2021): 984-988.
6 "Symbiotic view of Provenance in Cyber Infrastructure and Information Security." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 3261-3267.
7 "Disaster recovery and risk management over private networks using data provenance: Cyber security perspective." Indian Journal of Science and Technology 14, no. 8 (2021): 725-737.
8 A Revisit to Speech Processing and analysis International Journal of Computer Applications (0975 – 8887), Volume 175 - No.30, 2020
9 A secure and light weight privacy preserving data aggregation algorithm for wireless sensor networks Journal of Green Engineering, 2020, 10(12), pp. 13329–13336
10 A Secure Biometrics-Based User Authenticated Key Agreement Protocol for Multi-Server Environments. International Journal of Advanced Science and Technology, 29(9s), 517-532.
11 Secure provenance-based communication using visual encryption. International Journal of Innovative Computing and Applications, 10(3-4), 194-206.
12 Cryptanalysis of Design and Analysis of a Provably Secure Multi-Server Authentication Scheme. IJ Network Security, 20(2), 217-224.
13 A Robust Authenticated Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks” Proceedings of the Computational Intelligence and Informatics (pp. 17-26). Springer Singapore.
14 The secured data provenance: Background and application oriented analysis. In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (pp. 1212-1216). IEEE.
15 Secure Data Aggregation in Wireless Sensor Networks: Filtering Out the Attacker’s Impact. International Journal of Innovative Research in Science and Engineering, Vol. No. 2, Issue 12, pp 215-222
16 “Analysis of Diffie Hellman Key Exchange Algorithm with Proposed Key Exchange Algorithm” International Journal of Emerging Trends and Technology in Computer Science. (2278 – 6856) Volume 4, Issue 1, January-February 2015.
17 “Image Encryption Technique incorporating wavelet Transform and Hash Integrity” International Journal of Research in Engineering and Technology. (2321 – 7308) Volume 4, Issue 2, January-March 2015.
18 “An Evolution of the Pixel Embedding Techniques in Image Based Adaptive Steganography” Journal of Web Engineering & Technology, Vol.1 No.1, pp:1-18, April 2014
19 A WCDMA System with High Power Amplifier. International Journal of Advanced Electronics and Communication Systems, 3(5).
20 High Power Amplifier designed with LDMOS: A Review. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), 3(7), pp-363.
21 “Evaluation of Network Security Policy Incorporating Genetic Network Feedback” International Journal of Emerging Trends and Technology in Computer Science, Vol. 2, Issue-3, pp: 302-305, June 2013
22 “A Novel Data Hiding Framework Using Switching Threshold Mechanism” International Journal of Engineering and Advanced Technology, Vol.2, Issue-5, pp:5-10, June 2013
23 “Adaptive Cryptosystem for Digital Images using Fibonacci Bit-Plane Decomposition” International Journal of Computer Applications 65(14):32-36, March 2013
24 “A Novel Weighted Median Switching Filter for Denoising Corrupted Images” International Journal of Computer Applications, vol.64, pp:5-10, February 2013
25 “Developing an Android Using Eclipse Juno” International Journal for Research in Science & Advanced Technologies, Issue-1, Volume-3, pp.90-95, December 2012
26 “Two New M-sequence Based Data Hiding Algorithms,” Pattern Recognition and Image Analysis, Vol.15, No.2, pp :479-482, June 2005
27 “Run Length Based Steganography for Binary Images,” Pattern Recognitions and Machine Intelligence, Lecture Notes in Computer Science, Publisher: Springer-Verlag GmbH, N 3776, ISBN: 3-540-30506-8, pp. 481 - 485, 2005.
28 Improving Speaker Gender Detection by Combining Pitch and SDC 4th International Conference on data Science and Application (ICDSA 2023), July 14-15, Jaipur India
29 Security and Authentication of Vehicular Ad-hoc networks via Digital Signature Approach. In First International Conference on Technologies, Sustainable Development Goals and Academia 2022 (ICTSGA-1) (pp. 132-137).
30 Improvement of Speech Emotion Recognition by Deep Convolution Neural Networks and Speech Features 3rd Congress on Intelligent Systems (CIS 2022), September 05-06, Sept. India
31 Securing Provenance Data with Secret Sharing Mechanism: Model Perspective. In 2019 International Conference on Data Science and Communication (IconDSC) (pp. 1-6). IEEE.
32 Secured Electronic Transactions Using Visual Encryption: An E-Commerce Instance. In 2018 International Conference on Inventive Research in Computing Applications (ICIRCA) (pp. 1341-1345). IEEE.
33 “A Novel High-Capacity Data Hiding Algorithm based on Switching and Matrix Encoding Techniques” 2016 International Conference on Signal Processing (ICSP-SATI 2016), November, 2016
34 The secured data provenance: Background and application-oriented analysis. In Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE International Conference on (pp. 1212-1216). IEEE.
35 “Visual Cryptography and its Implications: Research Allied Literature Survey” 6th IEEE International Advance Computing Conference (IACC-2016), February 2016
36 “Semi-circular Microstrip Patch Antenna for Multi-frequency Application” 2014 Fourth International Conference on Communication Systems and Network Technologies, April 2014
37 “A Fast and Efficient Back Propagation Algorithm to Forecast Active and Reactive Power Drawn by Various Capacity Induction Motors” International Conference on Circuits, Power and Computing Technologies, ICCPCT-2013, March 2013
38 “Developing an Android Using Eclipse Juno” National Conference on Advances in Network & Information Security, Nov 2012, pp. 42- 48
39 “The Open Source Cross- Platform Application Development Frameworks for Smart phones” International Conference on Engineering Technology and Management, Sept 2012, pp. 56-62
40 “Secured Data Hiding for Binary Images based on Distance Measure Transform” National Conference on Recent Advances in Electronics and Electrical Engineering, March 2012, pp.51-55 (Awarded Best Paper)
41 “Logical Transform based encryption for multimedia systems” IEEE International Conference on Systems, Man and Cybernetics, Oct 2010, pp. 1953-1957
42 "New normalized expansions for redundant number systems: adaptive data hiding techniques" Proceedings of SPIE on Multimedia on Mobile Devices 2010, vol. 7542, San Jose, California, USA 2010
43 "Selective object encryption for privacy protection," Proceedings of SPIE Vol. 7351, 73510F (2009).
44 "Logical subband decomposition based secured multimedia system," Proceedings of SPIE Vol. 6982, 69820X (2008).
45 “Switching Theory Based Steganographic system for JPEG images” v Mobile Multimedia/Image Processing for Military and Security Applications 2007, Proceedings of the SPIE, Volume 6579, pp. 65790C, Orlando, Florida, 2007 USA
46 “Key Dependent Covert Communication System for Audio Signals” IEEE International Conference on Systems, Man and Cybernetics, 2007. ISIC, 7-10 Oct. 2007 Page(s):3356 - 3360, Montreal, Canada.
47 “Key Dependent Covert Communication System using Fibonacci P-codes” IEEE International Conference on System of Systems Engineering, SoSE 07, 16-18 April 2007 Page(s):1 - 5, San Antonio, Texas, USA.
48 “Adaptive Steganographic System for Binary Images using Variable Block Embedding Rate” IEEE International Conference on Systems, Man and Cybernetics, Volume:3, pp: 1879-1883, Oct. 2006, Taipei, Taiwan.
49 “Secure and Robust Steganographic Algorithm for Binary Images” Signal Processing, Sensor Fusion, and Target Recognition XV, Proceedings of the SPIE, Volume 6235, pp. 62351F, 2006 Orlando, Florida, USA.
50 “A New JPEG- Based Steganographic Algorithm for Mobile Devices” Mobile Multimedia/Image Processing for Military and Security Applications, Proceedings of the SPIE, Volume 6250, pp. 62500F, April17- 18 2006, Orlando, Florida, USA.
51 “Adaptive Steganography for Mobile Devices” Mobile Multimedia/Image Processing for Military and Security Applications, Proceedings of the SPIE, Volume 6250, pp. 62500E, April17- 18 2006, Orlando, Florida, USA.
52 “A New Secure Adaptive Steganographic Algorithm using Fibonacci Numbers” 2006 IEEE Region 5 Technology and Science conference, San Antonio, USA, April 7-8 2006.
53 “T-order statistics and secure adaptive steganography” Mathematical Methods in Pattern and Image Analysis, Proceedings of the SPIE, Volume 5916, pp. 91-100 San Diego, USA, 31July-4August 2005.
54 “Run Length Based Steganography for Binary Images” Pattern Recognitions and Machine Intelligence: First International Conference, PReMI'05 December 20-22, 2005 ISBN 3-540-30506-8 (LNCS) pp. 481-484.
55 “Two Algorithms for Compressing Noise Like Signals” SPIE Defense & Security Symposium, Signal Processing, Sensor Fusion and Target Recognitions XIV, March 28- April 1, 2005, Volume 5809, pp. 472-481 Florida, USA.
56 “Two New M-sequence Based Data Hiding Algorithms” 7th International Conference of Pattern Recognition and Image Analysis: New Information Technologies (PRIA-7-2004), December 2004.
57 “Key Dependent Multi-Band Scaling Based Data Hiding” Pacific Rim Workshop on Digital Steganography, November 2004, Japan, pp131-143.
58 “Watermarking Using Multi-Band Scaling Approach” SCISS April 2004, Rice University, Houston, TX, (abstract publication)