
Avadhani P S
Visiting Professor, Computer Science and Engineering
Research Interest:
1. Computer Algorithms
2. Cryptographic Algorithms
3. Data and Network Security
Connect
0891-2856044
Prof. P.S.Avadhani
Plot No.17, Nauka Nagar, Peda Waltair, Visakhapatnam-530003,
Andhra Pradesh
Mobile: 098851-87815
E-mail: psavadhani@yahoo.com, perisavadhani@gmail.com
Education
1. PhD from I.I.T. Kanpur, India.
2. M. Tech (Computer Science), I.I.T. Kanpur, India
3. F.I.E., The Institute of Engineers (India)
4. Fellow, AP Academy of Sciences
5. Fellow, Computer Society of India
Member of Professional Bodies
1) Life Member, Computer Society of India (CSI)
2) Life Member, Association of Mathematics Teachers of India (AMTI)
3) Life Member, International Society of Industrial & Applied Mathematics (ISIAM)
4) Life Member, Indian Society for Technical Education (ISTE)
5) Life member, Youth Hostels Association of India (YHAI)
6) Life Member, International Society on Education Technology.
7) Fellow, The Institution of Engineers (India)
8) Life Member, Indian Science Congress Association of India,
9) Life Member, Cryptology Research Society of India (CRSI)
Journal Publications
a) International Journals:
1) M.Shashi, KVSVN Raju, P. S. Avadhani,“ Reasoning with Fuzzy sensors”, IEEE. Transactions on systems, Man and Cybernetics, vol-24,No.3, May, 1994.
2) P. P. Roja, P. S. Avadhani, E. V. Prasad, “An Efficient method of Shared Key Generation Based on Truncated Polynomials”, International Journal of Computer Science and Network Security, Aug, 2006
3) K. Venkata Rao, P. S. Avadhani, “Authentication Based on Wavelet Transformations”, Journal of Discrete Mathematical Sciences & Cryptography”, vol. 9, No. 3, pp.513-521, 2006.
4) K. Venkata Rao, P. S. Avadhani, “Key Distribution Using data Embedding”, International Journal of Computing and Applications, Mar, 2007.
5) Ch. Rupa, P. S. Avadhani , “An Improved Method to reduce the occurrence of collision attack”, International Journal of Computer Science and Mathematical Applications, Vol. 2, No. 1-2, pp. 139-149, 2008.
6) Ch. Rupa, P. S. Avadhani, “A Methodology for Advanced User authentication”, International Engineering & Technology publications,Vol.2, No.1,2008, pp .001-005
7) D. Lalitha Bhaskari, P. S. Avadhani, A. Damodaram, “A Combinatorial Approach for Information Hiding Using Steganography And GÖdelization Techniques”, International Journal of Systemic, Cybernetics and Informatics, pp. 21-24, 2008.
8) D. Lalitha Bhaskari, P. S. Avadhani, A. Damodaram, “ A blind audio watermarking scheme for embedding text using Godelization technique”, Vol. 2 , Number 4, IETECH Journal of Advanced Computations, pp. 209-213, 2009.
9) Ch. Rupa, P. S. Avadhani, “An Improved Method to Reduce the Occurrence of Collision Attack on Hash Function ”, International Journal of Computing and Mathematical Applications, Vol.2, No. 1-2, January-Dec 2008, pp. 121-131.
10) S. Suresh Babu, S. Venkateswarao, S. Varaprasad, P. S. Avadhani, “A Comparative Study of DES and AES w.r.t Level of Security”, IETECH Journal of Advanced Computation,Vol.2, No.3,2008, pp .142-148.
11) D. Lalitha Bhaskari, P. S. Avadhani, A. Damodaram, “A new image partitioning methodology for data hiding based on 2x2 visual cryptographic scheme”, Journal Of Digital Information management, 2008.
12) D.Lalitha Bhaskari, P. S. Avadhani, M.Viswanath, "A Layered Approach for Watermarking In Images Based On Huffman Coding", (IJCSE) International Journal on Computer Science and Engineering, Vol. 02, No. 02, 2010, 149-154.
13) Ch. Rupa, P. S. Avadhani, “Performance Evaluation of Message Encryption Scheme using Cheating Text”, Global Journal of Computer Science and Technology, Vol 1. 2, No 13, pp. 77-80, 2009.
14) Ch. Rupa, P. S. Avadhani, “Major Pitfalls in An Advanced Methodology of user Authentication”, IETECH Journal of Information Systems, Vol 2, No 1, pp. 001- 005, 2007.
15) Ch. Rupa, P. Avadhani, “Fast Comparison Encryption Scheme using cheating text Technique”, International Journal of Engineering Science and Technology, Vol. 2(6), pp. 1725-1728, 2010.
16) B. V. Ramadevi, D. Lalitha Bhaskari, P. S. Avadhani, “A New Steganography Algorithm for Image Hiding using Gödelization Under Frequency Domain”, International Journal of Advanced Research in Computer Science(IJARCS), 2010.
17) B. V. Ramadevi, D. Lalitha Bhaskari, P. S. Avadhani, “A New Encryption Method for Secure Transmission of Images”, International Journal on Computer Science and Engineering, (IJCSE) Vol. 02, No. 09, 2801-28042010.
18) Ch. Rupa, P.S. Avadhani, “Schnorr’s identification protocol using modified message digest algorithm”, IJACE International Journal of Advanced Computer Engineering, Vol. 3(2), July-Dec, 2010.
19) Dr Ch. Rupa, B. Saijyothi, P. S. Avadhani, “A Novel Approach Text Steganography using cheating text by genetic operator crossover”, International Journal of Advanced Research in Computer Science, Vol 2, No. 4, 2011. ISSN 0976 – 5697
20) K V S S R S SSarma , P. S. Avadhani, “Public Key Cryptosystem Based on Pell’s Equation Using the GNU MP Library” International Journal on Computer Science and Engineering ( IJCSE ), Vol.3, No.1, pp643-648, Jan 2011.
21) A. S. N. Chakravarthy, P.S. Avadhani, “A probabilistic approach for authenticating text or graphical passwords using back propagation, IJCNS International Journal of Computer Science and Network Security, Vol. 11, No. 5, May 2011.
22) A. S. N. Chakravarthy, P. S. Avadhani,” A Novel Approach For Authenticating Textual Or Graphical Passwords Using Hopfield Neural Network”, Advanced Computing: An International Journal, Vol.2, No.4, July 2011.
23) A. S. N. Chakravarthy, P. S. Avadhani,” A Cryptosystem Based On Hilbert Matrix Using Cipher Block Chaining Mode”, International Journal of Mathematics Trends and Technology (IJMTT), pp. 17-22, July-Aug 2011.
24) I. S. Pallavi, P. S. Avadhani, “Permutation based image encryption technique”, International Journal of Computer Applications, Vol. 28, No. 8. Aug.2011.
25) I. S. Pallavi, P. S. Avadhani, “A novel multiple visual secret data hiding scheme”, International Journal of Computer Science and Information technologies, Vol. 2(4), pp.1423-1426, July-Aug, 2011.
26) A. S. N. Chakravarthy, P. S. Avadhani,” Hilbert Matrix Based Cryptosystem Using A Session Key”, International Journal of Engineering Research and Applications (IJERA) Vol. 1, Issue 3, pp.711-715 Sep-Oct 2011.
27) A. S. N. Chakravarthy, P. S. Avadhani,” Handwritten Text Image Authentication Using Back Propagation”, International Journal of Network Security & Its Applications (IJNSA), pp.121-130, Vol.3, No.5, Sep 2011.
28) A. S. N. Chakravarthy, P. S. Avadhani,” A Novel Approach for Pass Word Authentication using Brain -State -In -a Box (BSB) Model”, International Journal of Computer Science and Information Technologies (IJCSIT), pp. 2127-2131, Vol 2 Issue 5 Sept-Oct 2011.
29) N. Sridhar, D. Lalitha Bhaskari, P. S. Avadhani, "Plethora of cyber forensics", International Journal of Advance Computer Science and Applications, Vol. 02, No. 11, pp. 111-114, Nov, 2011.
30) R. Siva Ranjani, D. Lalitha Bhaskari, P. S. Avadhani, "Current trends in group key management", International Journal of Advance Computer Science and Applications, Vol. 02, No. 11, pp. 83-86, Nov, 2011.
31) P. S. V. Vachaspati, P. S. Avadhani, " Quantum Attack Resistant Cloud", in World of Computer Science and Information Technology Journal, ISSN:2221-0741 Vol. 1 2011.
32) T.M.G.S Prakash, P. S. Avadhani, “Security and Sociability Issues in Online Social Networks”, International Journal of Knowledge Engineering and Technology, Vol. 1, No. 1(Jan-2012).
33) I. S. Pallavi, P. S. Avadhani, “Segment Based Visual Cryptography for Key Distribution,” International Journal of Computer Science & Engineering Survey, IJCSES, vol.3, no.1, pp. 105-111, Feb.2012.
34) V. Narasimham, K. Venkatasubbaiah, P. S. Avadhani, “Identification of Critical SSCM Activities Through Confirmatory Factor Analysis” International Journal for Quality research, Vol. x No. x, 2012.
35) Sai Sumanth, P. Jiwan, Ch. Rupa, “Keyless JS algorithm“, International Journal of engineering science and Advanced Technology, Vol. 5, pp. 1397-1401, 2012. ISSN: 2250–3676.
36) I. S. Pallavi, P. S. Avadhani, “Privacy Preserving Through Segment-Based Visual Cryptography,” Advanced Computing: An International Journal , ACIJ, vol.3, no.4, pp. 95-103, July 2012.
37) I. S. Pallavi, P. S. Avadhani, “A Protocol for Secret Sharing Using Segment Based Visual Cryptography,” International Journal of Computer Science and Technology, IJCST, vol. 3 Issue 3, ver. 5, pp. 1053-1056. July –Sept 2012.
38) R. SivaRanjani, D. LalithaBhaskari, P. S. Avadhani, "Secure message transmission using Lagrange polynomial interpolation and Huffman Coding", International Journal of Computer Applications, Vol. 55, No. 1, pp. 33-35, Oct, 2012.
39) P. Srinivasu, P. S. Avadhani, "Genetic Algorithm Based Weight Extraction Algorithm for Artificial Neural Network Classifier in Intrusion Detection”, Procedia engineering, Elsevier, Vol. 38, pp. 144-153, 2012.
40) K. V. S. S. R. S. S. Sarma, M K Rao, P. S. Avadhani, “A Model on Dynamic Threshold Proxy Digital Signature Scheme by Using Pell’s Equation with Jacobi Symbol For Multimedia Authentication”, International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726, Vol 2 Issue 1 Jan. 2013, PP.18-22.
41) M. Kondala Rao, P. S. Avadhani, D. Lalitha Bhaskari, “An Identity Based Encryption Scheme based on Pell’s Equation with Jacobi Symbol”, International Journal of Research in Engineering and Science(IJRES), Vol.1, Issue.1, pp17-20, May 2012.
42) R. China Appala Naidu, P. S. Avadhani, “A Comparison of Two Intrusion Detection Systems”, International Journal of Computer Science and Technology (IJCST) ISSN: 0976-8491 (Online) | ISSN: 2229-4333 (Print), IJCST Vol. 4, and Issue 1, Jan - Mar 2013.
43) P. S.V. Vachaspathi, A. S. N. Chakravarthy, P. S. Avadhani,” A Novel Soft Computing Authentication Scheme for Textual and Graphical Passwords”, International Journal of Computer Applications (0975 – 8887), Vol 71– No.10, May 2013, pp. 42-54.
44) M. Kondala Rao, K. V. S. S. R. S. S. Sarma, P. S. Avadhani, “An Identity Based Encryption Scheme Based on Pell’s Equation With Jacobi Symbol”, International Journal of Research in Engineering and Science(IJRES) ISSN: 2320-9364 (Online) | ISSN: 2320-9356 (Print) Vol 1 Issue May 2013 PP. 17-20.
45) P. S. V. Vachaspathi, A. S. N. Chakravarthy, P. S. Avadhani, “An Enhanced Multilevel Authentication Scheme Using Graphical Passwords”, International Journal of Engineering Sciences & Emerging Technologies, Jun 2013, Vol 5, Issue 2, pp.104-118.
46) P. S. V. Vachaspathi, A. S. N. Chakravarthy, P. S. Avadhani, “An Enhanced Mutual Authentication Scheme Using One Time Passwords” , International Journal of Computer Networks and Security, ISSN: 2051-6878, Jun 2013 Vol.,23 Issue.1,pp. 1113-1122.
47) P. S. V. Vachaspathi, A. S. N. Chakravarthy, P. S. Avadhani, “A Novel Timer and Counter Synchronized Challenge-Response Based One-Time Password Authentication”, International Journal of Computer Networks and Security, ISSN: 2051-6878, Jun 2013, Vol.,23 Issue.1,pp.1123-1128
48) N. Sridhar, D. LalithaBhaskari, P. S. Avadhani, “Inverted pyramid approach for E-mail forensics using Heterogeneous Forensic tools”, CSI communications, July 2013, PP: 21-23.
49) M. Kondala Rao, P. S. Avadhani, D. LalithaBhaskari “An Identity Based Encryption Scheme based on Pell’s Equation with Jacobi Symbol”, International Journal of Research in Engineering and Science(IJRES), Vol.1, Issue.1, pp17-20, May 2012.
50) R. China Appala Naidu, P. S. Avadhani “An Effective Evolution of Packet Loss with SNORT”, International Journal of Computer Science and Technology (IJCST) ISSN: 0976-8491 (Online) | ISSN: 2229-4333 (Print), IJCST Vol. 4, Issue 3, July - Sept 2013.
51) R. Siva Ranjani, D. LalithaBhaskari and P. S. Avadhani, “A Novel Technique for Asymmetric Group Key Agreement for Dynamic Open Group Connection Networks”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013.
52) M Kondala Rao, P. S. Avadhani, D Lalitha Bhaskari, “A Model on Dynamic Threshold Proxy Digital Signature Scheme by using Pell’s equation with Jacobi Symbol” International Journal of Engineering Science Invention(IJESI), Vol.2, Issue 1, pp18-22, Jan 2013.
53) G. Viswam, A. Vengadarajan, B. Narasimhachari, R. Om Kumar, Narayan Panigrahi, P. S. Avadhani, “Pulse Compression Implementation using Multicore High Performance Computing Platform”, Advances in Computing, Control and Communication Technology, pp. 281–290 2016.
54) A. Sesha Rao, P. S. Avadhani, C. Nandita Bhanja, “A Content-Based Spam E-Mail Filtering Approach Using Multilayer Percepton Neural Networks”, Proc. of International Journal of Engineering Trends and Technology (IJETT) – Volume-41 Number-1 - Nov 2016.
55) A. Sesha Rao, P. S. Avadhani, D. Chandrika, “The Upshot of Malicious and Non-Malicious Mails Using Weka”, Proc. of International Journal of Innovative Research in Computer and Communication Engineering Vol. 4, Issue 8, Aug 2016.
56) Ch. Anusha, P. S. Avadhani, “Object Detection using Deep Learning”, Proc. of International Journal of Computer Applications(IJCA), Vol-182 No-32- Dec. 2018.
57) Ch. Anusha, P. S. Avadhani, “Fine-Tuning Convolutional Neural Network Models for improvement of Object Detection Accuracy”, Proc. Of International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249-8958, Vol-8 Issue-5, Jun 2019.
58) Ch. Anusha, P. S. Avadhani, “Optimal Accuracy Zone Identification in Object Detection Technique”, Proc. Of International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 – 8958, Volume-9 Issue-1, Oct. 2019
59) M. V. V. Siva Prasad, P. S. Avadhani, “Attack Tree Design and Analysis of Offshore Oil and Gas Process Complex SCADA System”, Proc. International Journal of Computer Applications (IJCA), Vol. 181 No. 41 No-32- Feb 2019.
60) M. V. V. Siva Prasad, P. S. Avadhani , “Remote Offshore Oil and Gas Platform SCADA System Fault Tree Design and Minimal Cut Sets Analysis”, Proc. of International Journal of Computer Sciences and Engineering(IJCSE), July 2019.
61) R. Sita Sireesha, P. S. Avadhani, “Application of Clustering Algorithms to Group Medical Documents”, Proc. of International Journal of Computer Applications (IJCA), Vol. 178 No. 42 No. 32 Aug 2019.
62) R. Sita Sireesha, P. S. Avadhani, “Utilization of Summarization Algorithms for a better understanding of Clustered Medical Documents”, Proc. Of International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 – 8958, Volume-9 Issue-1, Oct. 2019
63) Ravi Seeta Sireesha, D. Lalitha Bhaskari, P. S. Avadhani “ Novel Fuzzy Based Integrated Approaches For Summarization Of Clustered Medical Documents” Proc. of Gis Science Journal, Volume 8, Issue 5, 2021 Page Nos.1090-1105.
b) National Journals:
1) P. S. Avadhani, “Authentication Based on Zero Knowledge Protocols”, GITAM Journal of Science and Technology Jan-Jun, 2005.
2) P. V. S. L. Jagadamba, P. S. Avadhani, “Database Security”, Journal Of AP Academy of Sciences, vol. 10(2), Jun. 2006.
3) K. Venkata Rao, P. S. Avadhani, “A Study on Key management and S-Boxes”, NCISIC-Vol-1 pp. 67-72, Jan-2008.
4) Dr. Ch. Rupa, P. S. Avadhani, “Information Security using Chains Matrix Multiplication”, ,ICCSEA, SpringerLink-CSIA, 2012, Advances in Intelligent and Soft Computing, Vol. 167 pp: 703-712, 2012. Available in digital library of springer, Scopus. ISBN: 978-3-642-30111-7.
5) P. S. Avadhani “An Overview of Computer Forensics” Journal of Innovation in Computer Science & Engineering, Vol. 2(2), Jan-Jun 2013.
6) N. Sai Sumanth, Dr. Ch. Rupa, P. S. Avadhani, “A New Stegenographic Approach using PLSB and PGE”, India-12 Organized by CSI, Jan 12
7) Dr. Ch. Rupa, J. Madhu Babu, P. S. Avadhani, “An Efficient Authentication Method for Throttling DDoS Attacks”, SpringerLink CCIS, Vol. 269, Global Trends in Computing and Communication Systems, Pages 473-479. Available in digital library of springer. ISBN: 978-3-642-29219-4.
Patents
1) “A method of encoding and decoding for secure message transmission based on keyless rotational (carpet) shift approach” Ref. No:2934/CHE/2014
2) “Controlling of security Risks using cheating Text“ Ref. No:8822/2015-CO/L
Awards & Honors
1) Best Researcher Award for the year 2005 - 2006 from Andhra University, Visakhapatnam
2) Bharath Jyothi Award for the year 2008 from International Friendship Society, New Delhi.
3) Best Academician Award for the year 2009-2010 from Andhra University, Visakhapatnam.
4) Chapter Patron Award for the year 2010-2011 from Computer Society of India.
5) Distinguished Academician Award for the year 2011 from Pentagram Research Centre, Hyderabad.
6) State Best Teacher Award for the year 2015 from Government of Andhra Pradesh.
7) Distinguished Principal Award for the year 2017 from Tech Next India.
Computer Society of India Fellowship Award for the year 2017 from Computer society of India.