deepti

Qualification :
B.E(E&C), M. Tech(CNE)

Subjects Handled:
Logic Design, Microprocessor, Computer Organization, Analog and Digital Electronics

Class Teacher, Lab Incharge (Microprocessor Lab), Test Coordinator, Time Table Coordinator

  • 8.5 Years in Teaching
  • Postgraduate (M.Tech) Intern at Unisys Global Services Ltd, Bangalore-6 Months

Research Interests:
Wireless Sensor networks, Machine learning, Video Processing Computer Society of India Nominated Member, TOCE (2013-2014), Computer Society of India Life Member (Dec 2015 onwards)

  1. Deepti, C, Renuka Devi M N, and G Madhavi. 2016. “An Analysis of the Current Challenges in Efficient Video Processing.”, International Journal of Scientific & Engineering Research, Volume 7, Issue 3, pp10-17, March-2016.
  2. Deepti.C ,Renuka Devi M.N, "An Analysis of the Current Challenges in Efficient Video Processing", International Conference on Advances in Computing Logic, Sciences and Technology - 2016 ,Andhra Pradesh, March 11 2016.
  3. S. Rathod and Deepti.C, “An Integrated Fast Reroute Approach for Routing Protection in IP Networks,” Int. Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Vol 2, Issue 5, pp. 4015–4020, May 2014.
  4. R.Shivanagu and Deepti.C, “An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wireless Sensor Networks,” Int. Journal of Foundations in Computer Science and Technology(IJFCST), Vol. 3, No. 3, pp. 31–40, May 2013.
  5. M.Syama and Deepti.C,“ An Evaluation of Energy Efficient Source Authentication M Methods for False Data Filtering in WSN”, Int. Journal of Security, Privacy and Trust Management(IJSPTM),Vol. 2, No. 2, pp. 33–41, April 2013.
  6. M.Syama and Deepti.C,“ An Evaluation of enroute filtering methods for False Data Injection attacks in WSN”, Int. Journal of Engineering Research and Technology(IJERT),Vol. 2, Issue 4, pp 345-350, April 2013.
  7. R.Shivanagu and Deepti.C, “A Security Mechanism against Reactive Jammer Attack in Wireless Sensor Networks Using Trigger Identification Service,” Int. Journal of Security, Privacy and Trust Management(IJSPTM),Vol. 2, No. 2, pp. 43–54, April 2013.
  8. Deepti.C, “A Framework for Monitoring Interface for Local Area Networks via Personal Bluetooth Computing”, Int. Journal of Computer Applications (IJCA),Volume 63, No 17, pp 27-30, February 2013.