
| Sl.No. | Title | Name of Journal / Vol. No. / Issue No. / Page Nos | ISSN No. | Date Published |
| 1 | A node deployment mechanism for energy efficient routing in heterogeneous wireless sensor networks. | Journal of Theoretical and applied Information technology / 93 / No.1 / 17 - 23 | 1992-8645 | 15-Nov-2016 |
| 2 | A Novel Approach with Matrix based Public Key crypto systems | Journal of Discrete Mathematical Sciences and Cryptography / 20 / 2 / 407 - 412 | 0972-0529 | 09-Mar-2017 |
| 3 | Fully Homomorphic Encryption with Matrix based Digital Signature Standard | Journal of Discrete Mathematical Sciences and Cryptography / 20 / 2 / 439 - 444 | 0972-0529 | 09-Mar-2017 |
| 4 | Cubic Spline Curve Public Key Cryptography | Journal of Discrete Mathematical Sciences and Cryptography / 20 / 2 / 453 - 461 | 0972-0529 | 09-Mar-2017 |
| 5 | Provably Secure Quantum Key distribution by applying Quantum gate | International journal of Network Security / 20 / 1 / 88 - 94 | 1816-353X | 03-Jan-2018 |
| 6 | Significance of Key Distribution Using Quantum Cryptography | International Journal of Innovative Computing, Information and Control / 13 / 5 / 1 - 7 | 1349-4198 | 07-Jul-2017 |
| 7 | Performance Evaluation of Diesel Engine using Genetic Algorithm | International Journal of Engineering and Advanced Technology (IJEAT) / 8 / 2 / 155 - 158 | 2249-8958 | 31-Dec-2018 |
| 8 | Predictive analysis using resilient and traditional backpropaga-tion algorithm | International Journal of Engineering & Technology / 7 / 4 / 4411 - 4414 | 2227-524X | 20-Jan-2019 |
| 9 | A Novel Congestion-Aware Approach for ECC based Secured WSN Multicasting | Journal of Adv Research in Dynamical & Control Systems / 10 / 10 / 83 - 91 | 1943-023X | 19-Dec-2018 |
| 10 | A Machine Learning Model for Population Analysis among Different States in India which Influences the Socio, Demographic and Economic Needs of Society | International Journal of Engineering and Advanced Technology (IJEAT) / 9 / 1 / 123 - 126 | 2249-8958 | 30-Oct-2019 |
| 11 | A Secured and Scalable Battle-Field Surveillance using WSN Multicasting | International Journal of Engineering and Advanced Technology / 9 / 2 / 2445 - 2449 | 2249-8958 | 31-Dec-2019 |
| 12 | Statistical Tests For Key Strength Identification In Cryptography | International Journal Of Scientific & Technology Research / 9 / 2 / 4243 - 4245 | 2277-8616 | 15-Feb-2020 |
| 13 | A New Algorithm With Its Randomness And Effectiveness Against Statistical Tests In Data Encryption | International Journal of Scientific & Technology Research / 9 / 2 / 6185 - 6187 | 2277-8616 | 15-Feb-2020 |
| 14 | A Study On Prediction Of Health Care Data Using Machine Learning | International Journal of Scientific & Technology Research / 9 / 04 / 616 - 620 | 2277-8616 | 01-Apr-2020 |
| 15 | Analyzing the Total Household data of different states in India based on Census and evaluating their relative performance using Machine Learning | Solid State Technology / 63 / I4 / 1469 - 1474 | 0038-111X | 25-Sep-2020 |
| 16 | A Study on the effect of canny edge detection on Downscaled images | Pattern Recognition and Image Analysis / 30 / 3 / 372 - 381 | 1054-6618 | 16-Sep-2020 |
| 17 | Portrait Segmentation Using Ensemble of Heterogeneous Deep-Learning Models | Entropy / 23 / 197 / 1 - 20 | 1099-4300 | 05-Feb-2021 |
| 18 | An Energy Efficient Node Scheduling based Congestion Control Scheme for WSN Multicasting | EAI Endorsed Transactions on Energy Web / 7 / 30 / 1 - 6 | 2032-944X | 29-Apr-2020 |
| 19 | A Study On Prediction Of Health Care Data Using Machine Learning | International Journal Of Scientific & Technology Research / 9 / 4 / 616 - 620 | 2277-8616 | 10-Apr-2020 |
| 20 | Crime Analysis and Forecasting on Spatio Temporal News Feed Data?An Indian Context | Studies in Bigdata / 90 / / 307 - 327 | 2197-6503 | 01-May-2021 |
| 21 | An efficient Non linear Access Policy Based on Quadratic Residue for Ciphertext Policy Attribute Based Encryption | Journal of Theoretical and Applied Information Technology / 99 / 21 / 5050 - 5057 | 1992-8645 | 15-Nov-2021 |
| 22 | Selfi segmentation in Video using N frame ensemble | IEEE Access / 9 / 1 / 163348 - 163362 | 2169-3536 | 06-Dec-2021 |
| 23 | An Efficient Access Policy with Multi linear Secret haring scheme in Cipher text policy Attribute based encryption | Journal of Theoretical and Applied Information Technology / 100 / 5 / 1404 - 1411 | 1817-3195 | 15-Mar-2022 |
| 24 | Impulse noise recuperation from grayscale and medical images using supervised curve fitting linear regression and mean filter? | Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) / 28 / 2 / 777 - 786 | 2502-4752 | 01-Nov-2022 |
| 25 | Securing Grayscale Image Using Improved Arnold Transform and ElGamal Encryption | Journal of Electronic Imaging / 31 / 6 / - | 1017-9909 | 01-Nov-2022 |
| 26 | Revocable and Secure Multi-Authority Attribute-Encryption Scheme | International Journal ofINTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING / 11 / 6 / 52 - 58 | 2147-67992 | 17-May-2023 |
| 27 | An Efficient Nonlinear Access Policy Based On Quadratic Residue For Ciphertext Policy Attribute Based Encryption | Journal of Theoretical and Applied Information Technology / 99 / 21 / 5050 - 5057 | 1992-8645 | 15-Nov-2021 |
| 28 | An Efficient Access Policy With Multi-Linear Secret-Sharing Scheme In Ciphertext-Policy Attribute-Based Encryption | Journal of Theoretical and Applied Information Technology / 100 / 5 / 1404 - 1411 | 1992-8645 | 15-Mar-2022 |
| 29 | Probabilistic (multiple cipher) based ECC mechanism | Journal of Discrete Mathematical Sciences and CryptographyVolume 15, Issue 6, Pages 323 - 3382012 / 15 / 6 / 323 - 338 | 0972-0529 | 08-Feb-2012 |
| 30 | An Improvised ECC Mechanism with Probabilistic Approach | Information Security JournalVolume 21, Issue 1, Pages 28 - 35January 2012 / 21 / 1 / 28 - 35 | 1939-3547 | 10-Jan-2012 |
| 31 | A new non linear model based encryption mechanism with time stand and acknowledgement support | International Journal of Network Securit / 14 / 1 / 27 - 32 | 1816-3548 | 10-Jan-2012 |
| 32 | A new model based encryption mechanism with time stamp and acknowledgement support | International Journal of Network Security / 11 / 3 / 172 - 176 | 1816-3548 | 10-Mar-2010 |
| 33 | A generalized scheme for data encryption technique using a randomized matrix key | Journal of Discrete Mathematical Sciences and Cryptography / 10 / 1 / 73 - 81 | 0972-0529 | 09-Jan-2007 |
| 34 | A new algorithm for network security in e-learning environment | Journal of Scientific and Industrial Research / 64 / 10 / 791 - 793 | 0022-4456 | 12-Oct-2005 |
| 35 | A novel image compression method using wavelet coefficients and Huffman coding | Journal of Engineering research / 11 / 3 / 1 - 10 | 2307-1877 | 23-Aug-2023 |
| 36 | Security Analysis for a Revocable Multi-Authority ABE- Attribute-Based Mechanism | SSRG International Journal of Electronics and Communication Engineering (IJECE) / 11 / 3 / 24 - 30 | 2348-8549 | 02-Apr-2024 |
| 37 | Security Analysis for a Revocable Multi-Authority ABE- Attribute-Based Mechanism | SSRG International Journal of Electronics and Communication Engineering / 11 / 3 / - 2430 | 2348-8549 | 02-Apr-2024 |
| 38 | Cost Effective and Energy Efficient Drip Irrigation System for IoT Enabled Smart Agriculture | Lecture Notes in Networks and Systems / / / 199 - 210 | 2367-3370 | 18-Jun-2024 |
| 39 | Design of a new curve based cipher | Journal of Discrete Mathematical Sciences and Cryptography / 27 / 8 / 2425 - 2431 | 0972-0529 | 18-Jan-2023 |
| 40 | High-speed portrait video segmentation using the hybrid combination of deep-learning models and boundary movement adjustment | Engineering Applications of Artificial Intelligence / 155 / 1 / 1 - 8 | 1873-6769 | 01-Sep-2025 |
| Sl.No. | Title | Author Names(s) | ISBN No. | Month Year |
| 1 | Handbook of Research on Intelligent Data Processing and Information Security Systems | ADDAPALLI V N KRISHNA,RAGHAV SARDA, SHRIANSH PANDEY, STEPAN MYKOLAYOVYCH BILAN (STATE UNIVERSITY OF INF | 9781799812906 | / |
| 2 | 2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN) | CHINTHAKUNTA MANJUNATH,ADDAPALLI V N KRISHNA, BALAMURUGAN M,AYUSHI TOMAR, BIKRAMADITYA GHOSH, G TAROON | 978-1-7281-8819-5 | / |
| 3 | Smart Computing | CHINTHAKUNTA MANJUNATH,ADDAPALLI V N KRISHNA, BALAMURUGAN M,BIKRAMADITYA GHOSH, MOHAMMAD AYOUB KHAN, SANJAY GAIROLA, BHOLA JHA, PUSHKAR PRAVEEN | 9781003167488 | / |
| 4 | International Conference on Data Science and Communication, IconDSC 2019 | CHINTHAKUNTA MANJUNATH,ADDAPALLI V N KRISHNA, BALAMURUGAN M,CHRIST | 978-1-5386-9319-3 | / |
| 5 | Advances in Distributed Computing and Machine Learning | MANU ELAPPILA,ADDAPALLI V N KRISHNA, SHAMANTH N, VANDANA REDDY,ASIS KUMAR TRIPATHY, JYOTI PRAKASH SAHOO, KUAN-CHING LI, MAHASWETA SARKAR, MUHAMMED FUHAD, SACHIN MALAYATH JOSE, STENIN K. GEORGE, UMAKANTA NANDA | 978-981-97-1841-2 | / |
| 6 | 2024 IEEE International Conference on Contemporary Computing and Communications (InC4) | MANU ELAPPILA,ADDAPALLI V N KRISHNA, ATHULYA S, JYOTHI MANDALA, SANDEEP KUMAR, SUJATHA A K | 979-8-3503-8365-2 | / |
| 7 | 2024 IEEE International Conference on Contemporary Computing and Communications (InC4) | MANU ELAPPILA,ADDAPALLI V N KRISHNA, SANDEEP KUMAR | 979-8-3503-8365-2 | / |
| 8 | 2024 IEEE International Conference on Contemporary Computing and Communications (InC4) | MANU ELAPPILA,ADDAPALLI V N KRISHNA, DEEPA YOGISH, SANDEEP KUMAR,BHAVIKA RAJORA | 979-8-3503-8365-2 | / |
| 9 | 2024 IEEE International Conference on Contemporary Computing and Communications (InC4) | MANU ELAPPILA,ADDAPALLI V N KRISHNA, DEEPA YOGISH, SANDEEP KUMAR,SHALEEN MISHRA | 979-8-3503-8365-2 | / |
| 10 | Leveraging VANETs and Blockchain Technology for Urban Mobility | ADDAPALLI V N KRISHNA,KARAN S, SIVARAM PONNUSAMY, IGI GLOBAL | 9798337302652 | / |
| 11 | Attacks on Artificial Intelligence: The New Facets of Cyber Ecospace | ADDAPALLI V N KRISHNA,SATHISH P K,SATHISH PK | 9781774916223 | / |
| Sl.No. | Name of the Conference /Seminar /Symposium | Type of Program | Title of the Article | Role | Venue/Place | Date |
| 1 | SYMPOSIUM | Temporal Data Mining in estimation of Empirical formula for House Hold data analysis | PRESENTER) | IIIT,Hyderabad | 16/09/2016 | |
| 2 | International conference | International conference | PARTICIPANT) | SRM University | 16/09/2016 | |
| 3 | International Seminar on Computational Science: An Innovation Tool for R&D in Science & Technology | SEMINARS | A Study on Computational Models in Identification of Suitable Material in Rocket Nozle Throat | PRESENTER) | Christ University, Bangaluru | 06/09/2016 |
| 4 | NCCOCE'17 | CONFERENCES | Survey on Vehicle Route Optimization Using Genetic Algorithm | PRESENTER) | Christ University, Bangaluru | 17/02/2017 |
| 5 | NCCOCE'17 | CONFERENCES | Secure Node Disjoint Multi Path Routing Protocol For Reliable Data Transmission in Wireless Sensor Networks | PRESENTER) | Christ University, Bengaluru | 17/02/2017 |
| 6 | NCCOCE'17 | CONFERENCES | MODERATOR) | Christ University, Bengaluru | 17/02/2017 | |
| 7 | IEEE WiSPNET 2017 conference | CONFERENCES | ) | Chennai | 22/03/2017 | |
| 8 | National Conference on Computational Sciences and Safe Computing | CONFERENCES | ) | Jawaharlal Nehru National College of EngineeringShivamogga | 14/12/2017 | |
| 9 | 3 International Conference on Computational Intelligence and Informatics, Springer | CONFERENCES | ) | JNTUH, College of Engineering, HyderabadJNTUH, Hyderabad | 28/12/2018 | |
| 10 | IconDSC 19 | CONFERENCES | MODERATOR) | Bengaluru | 01/03/2019 | |
| 11 | IconDSC 19 | CONFERENCES | ) | Bengaluru | 01/03/2019 | |
| 12 | International Conference on Advances and Applications in Mathematics, Statistics and Computer Science | CONFERENCES | Improvising the Performance of Rocket Nozzle Throat Using Genetic Algorithm | PRESENTER) | Andhra Loyola College, VijayawadaVijayawada, A.P | 01/11/2019 |
| 13 | International Conference on Adances in Computational Intelligence and Informatics | CONFERENCES | MODERATOR) | Anurag Group of InstitutionsHyderabad | 20/12/2019 | |
| 14 | 10th International Conference On ? Recent Engineering And Technology? 2020? | CONFERENCES | Predicting And Improvising The Performance Of Rocket Nozzle Throat Using Machine Learning Algorithms | PRESENTER) | Organization of Science and Innovative Engineering & TechnologyBengaluru | 21/06/2020 |
| 15 | 10th International Conference On ?Recent Engineering And Technology ? 2020? | CONFERENCES | Scalar Multiplication Based Matrix Public Key Cryptography | PRESENTER) | ORGANAIZATION OF SCIENCE AND INNOVATIVE ENGINEERING & TECHNOLOGY (OSIET)Bengaluru | 21/06/2020 |
| 16 | 2020 International semonar on Machine Intelligence | SEMINARS | MODERATOR) | Bengaluru | 05/12/2020 | |
| 17 | International conference on Advances in Mathematics and Computer science 2021 | CONFERENCES | Window method in ECC Model | PRESENTER) | IMRFVijayawada Andgra Pradesh | 16/04/2021 |
| 18 | International conference on Advances in Mathematics and computer science | CONFERENCES | A study on Advanced areas of cryptographic study | PRESENTER) | IMRFVijayawada | 16/04/2021 |
| 19 | 2 nd Congress on Intelligent systems | CONFERENCES | MODERATOR) | Bengaluru ( Online) | 04/09/2021 | |
| 20 | 2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS) | CONFERENCES | ?A two-pass hybrid mean and median framework for eliminating impulse noise from a grayscale image? ( | PRESENTER) | Adi Shankara Institute of Engineering and TechnologyIEEE Kerala Section | 02/09/2021 |
| 21 | International conference on Nonlinear Dynamics and Applications | CONFERENCES | Research directions in Advanced Cryptography | KEYNOTE_SPEAKER) | Sikkim Manipal UniversitySikkim | 09/03/2022 |
| 22 | CIS 2022 | CONFERENCES | MODERATOR) | online | 05/09/2022 | |
| 23 | Congress on Intelligent systems CIS 2022 | CONFERENCES | Machine learning techniques for resourse constrained devices with CP-ABE Scheme | PRESENTER) | Online | 05/09/2022 |
| 24 | IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies (TQCEBT-22) | CONFERENCES | A CNN model to predict and segment cancerous regions from brain images using UNet and morphological operations | PRESENTER) | Online ( Lavasa Campus) | 13/10/2022 |
| 25 | International Conference IMCISMRSS 2024 | CONFERENCES | A Modified Extended Euclid"s Algorithm | PRESENTER) | AJK college of Arts and Science | 13/03/2024 |
| 26 | International Conference INC4 | CONFERENCES | MODERATOR) | Bengaluru | 15/03/2024 | |
| 27 | 2024 IEEE International conference on Contemporary computing and communications INC4 | CONFERENCES | MODERATOR) | Bengaluru | 15/03/2024 | |
| 28 | International conference ICA5NT 2024 | CONFERENCES | Design of a New Access Policy Based Permissioned Blockchain Model | PRESENTER) | Velammal Institute of TechnologyChennai | 21/03/2024 |
| 29 | International Seminar on applications of Mathematics in Sc. and Tech. | SEMINARS | An efficient curvilinear access policy for Ciphertext Policy Attribute Based Encryption in Improving the Blockchain Security Protocol | PRESENTER) | Guru Ghasidas Viswavidhyalaya - Central UniversityBilaspur, Chattisgarh | 19/12/2024 |
| 30 | International conference on Business, IT & Enterprise Architecture ICBIT 2025 | CONFERENCES | End to End Encryption with RSA & Homomorphic Encryption | PRESENTER) | MDI, MurshidabadMURSHIDABAD-online | 30/01/2025 |
| 31 | ICTEST 2025 | CONFERENCES | A high capacity reversible data hiding on grey scale images using threshold based clustering | PRESENTER) | Govt model Engineering college, TrikkakaraTrikkakara, Kochi | 03/04/2025 |
| 32 | 1 st Multi Disciplinary International conference on Advances in Information Technology (ICAIT 2025) | CONFERENCES | Proxy Re – Encrypted Key For AES Encryption Model | PRESENTER) | Shri Vile Parle Kelavani Mandal’s INSTITUTE OF TECSVKM’s Institute of Technology Dhule | 01/08/2025 |
| 33 | 6th International Multidisciplinary Conference on Information Science, Management Research & Social Science (IMCISMRSS-2025) | CONFERENCES | Designing a self-learning and secured intrusion detection system (IDS) for a distributed IoT-based smart home environment using federated learning and sensor data analytics | PRESENTER) | AJK College of Arts and Science, Coimbatore, IndiCoimbatore, India, | 06/10/2025 |
| 34 | 23 OITS International Conference on Information Technology | CONFERENCES | A Reverse firewall & a Re-Encryption supported PEKS Model for security in Health based Applications | PRESENTER) | School of Computer Applications, KIIT UniversityIEEE Bhubaneswar Section | 18/12/2025 |
| 35 | INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT & MACHINE INTELLIGENCE ICIMMI 2025 | CONFERENCES | A Secure and Intelligent Healthcare Data Sharing Using Blockchain, AI & A new Conditional Re-Encryption Model | CO_PRESENTER) | Poornima Institute of Engineering and technology Sitapura Jaipur, Rajasthan | 15/12/2025 |
| Sl.No. | Titel of the Program | Name of the Program | Date | Name of the Institution |
| 1 | Network security concepts with emphasis on Probabilistic encryption and time stamp | Guest talk | 05/02/2013 | DIAT,Pune |
| 2 | Role of Security Mechanisms in Communication systems | Workshop on ?Information Security Technologies | 07/08/2010 | GuruNanak Institutions, Hyderabad |
| 3 | Modeling and simulation & Research directions in Network Security | Invited talk | 19/02/2018 | Defence Institute of Advanced TechnolOgy(DIAT) |
| Sl.No. | Title | Name of Student | Institution | Role | Status | Month Year |
| 1 | IMCC Security mechanism in heterogeneous wireless networks for high quality data transfer | K.Anil Kumar | SUPERVISOR | Awarded | July 2017 | |
| 2 | SIGNIFICANCE OF KEY DISTRIBUTION USING QUANTUM CRYPTOGRAPHY | V.Padmavathi | SUPERVISOR | Ongoing | September 2011 | |
| 3 | Vaiable Initial Energy and Unequal Clustering based Multicasting in WSN | G Raja Vikram | SUPERVISOR | Ongoing | October 2012 | |
| 4 | A new quantum cryptography based Key distribution and encryption algorithm | V Padmavathi | SUPERVISOR | Awarded | June 2020 | |
| 5 | Design and implementation of secured key distribution and congestion free protocol in multi cast communication | G Raja Vikram | SUPERVISOR | Awarded | April 2021 | |
| 6 | DESIGNING A NEW ENCRYPTION-THEN-COMPRESSION SYSTEM FOR GRAYSCALE IMAGES UTILIZING ENTROPY ENCRYPTION | SHIJU THOMAS M.Y | Christ University | SUPERVISOR | Awarded | September 2024 |
| 7 | A Study on High-Performance Portrait Segmentation Using the Ensemble of Deep-Learning Models and Hybrid Model: Accuracy and Speed Perspective | YONG WOON KIM | Christ University | SUPERVISOR | Awarded | May 2023 |
| 8 | A REVOCABLE MULTI-AUTHORITY ATTRIBUTE BASED ENCRYPTION SCHEME BASED ON NONLINEAR ACCESS POLICY | ANCY P R | Christ University | SUPERVISOR | Awarded | December 2024 |
| 9 | FUZZY RULE-BASED MULTIMODAL HEALTH MONITORING SYSTEM LEVERAGING MACHINE LEARNING TECHNIQUES USING EEG DATASETS FOR HUMAN EMOTION AND PSYCHOLOGICAL DISORDERS | SABA TAHSEEN | Christ University | SUPERVISOR | Awarded | November 2024 |
| 10 | RECONSTRUCTION OF 3D FACES USING GENERATIVE ADVERSARIAL NETWORK AND ENSEMBLE ARCHITECTURE FOR FORENSIC IMAGE ANALYSIS | SINCY JOHN | Christ University | SUPERVISOR | Awarded | July 2025 |
| Sl.No. | Title of Invention | Inventor(s) | Filing Date |
| 1 | A SECURE AUTHENTICATION PROCESS THROUGH QUANTUM DIGITAL CERTIFICATE BY APPLYING QUANTUM GATES | ADDAPALLI V N KRISHNA | 02-Aug-2017 |
| 2 | Reliable Transmission of Information through Quantum Encryption and Decryption Process by applying Quantum Gate | ADDAPALLI V N KRISHNA | 23-Nov-2017 |
| Sl.No. | Name of the Workshop/FDP/Training programme | Name of Organiser | Level | Role | Date |
| 1 | Faculty Dev program -1 2021 | CHRIST, | Institutional | Participant | 16/06/2021 |
| 2 | ECOSYSTEM RESTORATION | Department of Civil Engineering, School of Engineering and Technology, CHRIST, | Institutional | Participant | 05/06/2021 |
| 3 | Hybrid Teaching | Staff Development College, CHRIST, | Participant | 02/03/2021 | |
| 4 | Primer to Digital forensics | K-Tech & Govt of karnataka, | National | Participant | 10/02/2021 |
| 5 | National Level Five Day FDP | Sreenidhi Institute of Science & Engineering , Hyderabad, Sreenidhi Institute of Science & Engineering , Hyd | National | Presenter | 24/08/2020 |
| 6 | Cyber Privacy and Security Engineering | BMS-Govt. of Karnataka-KSCST, BMS Institute of Technology and Management | National | Participant | 12/10/2019 |
| 7 | Sustainable waste Management | CSE CHRIST, | Institutional | Participant | 30/08/2019 |
| 8 | BRIDGE 18, Fostering India for Industry 4.0 | ICT Academy, Industry Academic Conclave | National | Participant | 26/09/2018 |
| 9 | Author Workshop | Springer Nature & CHRIST, | Institutional | Participant | 12/06/2018 |
| 10 | Research Tools and Mega Trends | CU-Academic Staff College, | Participant | 21/05/2018 | |
| 11 | Packet Structures in Networking | AXONE Technology Sevices, AXONE Technology Services | National | Participant | 17/01/2018 |
| 12 | Teaching, Learning and Evaluation Process | CU-Academic Staff College, | Participant | 22/05/2017 | |
| 13 | Researc Tools, Trends & Process | CU-Academic Staff College, | Participant & Presenter | 24/09/2016 | |
| 14 | IOT & Research | CU-Academic Staff College, | Participant & Presenter | 24/05/2016 |