Room ECED-1 : 202
Email deepthi@nitc.ac.in
Office Phone 0495-2286725
Areas Of Interest Channel Coding, Cryptography, Multimedia Security and Secure Signal Processing

M.E (IISc)
Ph.D (NIT Calicut)

International Journals

1. A.S. Unde, P.P. Deepthi, “Block Compressive Sensing: Individual and Joint Reconstruction of Correlated Images”, Journal of Visual Communication and Image Representation, Elsevier,  vol. 44, pp. 187 – 197, Apr. 2017.doi: http://dx.doi.org/10.1016/j.jvcir.2017.01.028.

2. Celine Mary Stuart, Spandana K., Dhanaraj K.J., Deepthi P. P., “Design and implementation of hardware-efficient modified Rao–Nam scheme with high security for wireless sensor networks”, Journal of Information Security and Applications, Elsevier vol. 29, pp. 65 – 79, Aug. 2016.

3. Celine Mary Stuart and P.P. Deepthi, "FPGA implementation of highly secure, hardware-efficient QC-LDPC code based nonlinear cryptosystem for wireless sensor networks", International Journal of Communication Systems, Wiley, pp. 1 – 16, Dec 2016.

4. Jilna P., Deepthi P.P., Jayaraj U.K., “Hardware Implementation of an Efficient Key Management Scheme for Wireless Sensor Networks”, International Journal of Intelligent Computing Research (IJICR), Vol. 7, no. 1, pp. 663 - 671, 2016.

5. Celine Mary Stuart, Deepthi P.P., “A novel low-complexity scheme for improving security of NLFG-based symmetric key cryptosystem using secure concatenated RS–QCLDPC code”, Security and Communication Networks, Wiley, pp. 2888 – 2900, 2015. DOI: 10.1002/ sec.1215.

6. Jilna P. and Deepthi P.P., “A key management technique based on elliptic curves for static wireless sensor networks”, Security and Communication Networks, Wiley, vol. 8, no. 18, pp. 3726-3738, 2015.  

 7. Jilna P. and Deepthi P. P., “Pseudorandom Bit Sequence Generator for Stream Cipher Based on Elliptic Curves”, Mathematical Problems in Engineering, Hindawi, vol. 2015, Article ID 257904, 16 pages, 2015.

8. Sudhish N George, Nishanth Augustine, Deepthi P P , Audio security through compressive sensing and cellular automata Multimedia Tools and Applications, Springer , Vol. 74, Issue 23, pp 10393–10417, December 2015. DOI:10.1007/s11042-014-2172-2

9. Nishanth Augustine, Sudhish N George, Deepthi P P, “An audio encryption technique through compressive sensing and Arnold transform”, International Journal of Trust Management in Computing and Communications, Inderscience, Vol. 3, No. 1, 2015.

10. Sudhish N George and Deepthi P Pattathil, “Multiple chaotic maps based secure measurement matrix generation for multimedia compressive sensing”, International Journal of Signal and Imaging Systems Engineering (Inderscience), vol. 9,no. 1, 2015.

11. Sudhish N George and Deepthi P Pattathil, “A novel approach for secure compressive sensing of images using multiple chaotic map”, Journal of Optics (Springer), Vol. 43, No. 1, pp. 1-17, 2014.

12. Sudhish N George and Deepthi P P, “A secure LFSR based random measurement matrix for compressive sensing”, Sensing and Imaging: An International Journal (Springer), Vol. 15, No. 1, pp. 1-29, 2014.

13. Sudhish N George, Arun Raj R and Deepthi P P, “A new framework for encryption and authentication multimedia data”, International Journal of Multimedia and Ubiquitous Engineering, Vol. 8, No. 5, pp. 105-118, 2013.

14. K S Lalmohan, Deepthi P P, and Sathidevi P S, “Design and Implementation of Secure Stream Cipher based on Elliptic Curves on Time Shared Basis”, Int. Journal of Computer Applications, vol. 68, no. 21, pp. 14-21, Apr. 2013.

15. Sudhish N G and Deepthi P P, “Key Based Huffman Table for Multimedia Content Protection”, Int. Journal of Multimedia and User design and User Experience, vol.25, no.1, pp. 1103-1108, Mar 2013.

16. Sudhish N G, Arun Raj R,  and Deepthi P P, “An Efficient Multimedia DRM Technique using Secure Arithmetic Coding”, Int. Journal of Computer Applications , vol. 61, no. 17, pp 1-8., Jan. 2013.

17. Celine M S, Nandan S and Deepthi P P, “Low Complex Crypto Based Channel Coding with Turbo Code”. Int. Journal of Computer Applications vol. 61, no. 16, pp. 39-44, Jan. 2013.

18. Anoop B N, Sudhish N G, and Deepthi P P, “Secure Image Transcoding Technique Using Chaotic Key Based Algorithm”, Int.l Journal of Advanced Computer Research, vol. 2, no.4, pp: 84-88, Dec 2012.

19. Deepthi P P and Sathidevi P S, “Design, Implementation and Analysis of Hardware Efficient Stream Ciphers Using LFSR Based Hash Functions”, Computers and Security (Elsevier Publishers), vol.28, no. 3-4, pp. 229-241, May-Jun. 2009.

20. Deepthi P P., Lakshmi V S, and Sathidevi P S, “A New Hardware Efficient Stream Cipher Based on Hash Functions”, Int. Journal of Communication Networks and Distributed Systems, (Inderscience Publishers), vol. 3, no.4, pp. 340 -361, 2009.

21. Deepthi P P and Sathidevi P S, “New Stream Ciphers Based on Elliptic Curve Point Multiplication”, Computer Communications (Elsevier Publishers), vol. 32, no. 1, pp. 25- 33, Jan. 2009.

22. Deepthi P P, Deepa S J, and Sathidevi P S, “Design and Analysis of a Highly Secure Stream Cipher Based on Linear Feedback Shift register”, Computers and Electrical Engineering, (Elsevier Publishers), vol. 35, no. 2,  pp. 235-243, Mar. 2009

23. Deepthi P P , Nithin V S , and Sathidevi P S “Implementation and Analysis of Stream Ciphers Based on the Elliptic Curves” Computers and Electrical Engineering, (Elsevier Publishers), vol. 35, no. 2,  pp. 300-314, Mar. 2009.

24. Deepthi P P and Sathidevi P S, “Hardware Stream Cipher Based on LFSR and Modular Division Circuit”, Int. Journal of Electronics, Circuits and Systems, vol. 2, no. 4, pp. 224-232, Fall 2008.

25. Dhanaraj K J, Deepthi P P, and Sathidevi P S, “FPGA Implementation of a Pseudo Random Bit Sequence Generator Based on Elliptic Curves”, ICGST- Programmable Devices, Circuits and Systems (PDCS) Journal, vol. 7, no. 1, pp. 23-31, May 2007.

International Conferences

1. Jilna P., Deepthi P.P. "Light weight key establishment scheme for wireless sensor networks", in Proc. Sixth International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2016), Hyderabad, India, pp. 124 – 137, Dec 2016.

2. Teena P. Jose and Deepthi P. P, “Secure Sensor Node Design for ECG in Body Area Network”, IEEE TENCON 2016, 22-25 Nov 2016, Singapore.

3. Amit Satish Unde, Ravikumar Malla and Deepthi P. P., “Low Complexity Secure Encoding and Joint Decoding for Distributed Compressive Sensing in WSNs”, 3rd IEEE International Conference on Recent Advances in Information Technology, 3-5 March 2016.

4. Jilna P., Deepthi P.P. and Jayaraj U. K., "Optimized Hardware Design and Implementation of EC based Key Management Scheme for WSN",in Proc. 10th International Conference on Internet Technology and Secured Transactions (ICITST 2015), London, UK, Dec.2015, pp. 164-169.

5. Priya Mathew, Jilna P., Deepthi P.P, "Efficient Implementation of EC based Key Management Scheme on FPGA for WSN", 9th International Conference on Telecommunication Systems Services and Applications (TSSA 2015), Bandung, Indonesia., DOI: 10. 1109/TSSA. 2015.

6. Jilna P., Deepthi P.P., Sameer Saheerudeen Mohammed, Sathidevi P.S.  and Vijitha A. P., “FPGA Implementation of an Elliptic Curve Based Integrated System for Encryption and Authentication”, IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (IEEE SPICES 2015), Feb 19-21, Kerala, India, February 2015.

7. Celine Mary Stuart and Deepthi P. P., “Hardware Efficient Scheme for Generating Error Vector to Enhance the Performance of Secure Channel Code”, IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (IEEE SPICES 2015), Feb 19-21, Kerala, India, February 2015

8. Stuart, C. M., Deepthi, P. P., “Low Complex System for Physical Layer Security Using NLFG and QCLDPC Code”, Second International Symposium on Security in Computing and Communications, (SSCC 2014), September 24 – 27, 2014, New Delhi, Springer Berlin Heidelberg Proceedings pp. 313-324.

9. Abhishek, Sudhish N George, Deepthi P P, “PWLCM based secure measurement matrix generation for secure video compressive sensing”, Springer, Second Int. Symposium Security in Computing and Communications (SSCC-14), New Delhi, India, September 2014

10. Nishant Augustine, Sudhish N George, Deepthi P P, “Compressive Sensing based Audio Watermarking using SVD and DM Quantization", Elsevier Int. Conf. Signal and Speech Processing (ICSSP-14), Kerala, India.

11. Jesy P, Deepthi.P.P, "Joint Source channel Network Coding Using QCLDPC codes", IEEE Int. Conf. Communication and Signal Processing (ICCSP-2014)

12. Anoop B N, Dr. Sudhish N George, Dr. Deepthi P P,” Secure video transcoder based on correlation preserving sorting algorithm”, IEEE Int. Conf. Control, Instrumentation, Communication and Computational Technologies (ICCICCT-2014), pp. 771 – 775, May 14, 2014, Tamilnadu, India.

13. Sarika T, Deepthi P P, “A channel coder design for a high speed and less complex communication system using QC-LDPC codes”, IEEE Int. Conf. Communication and Signal Processing (ICCSP-2014), pp. 326-330, April 3-4 2014, India

14. Nishant Augustine, Sudhish N George and Deepthi P P, “Compressive sensing based Audio Scrambling using Arnold Transform”, Springer, Int. Conf. Security in Computer Networks and Distributed Systems (SNDS-2014), pp. 172- 183, Mar 2014.

15. Jilna P and Deepthi P P, “Implementation of an Elliptic Curve Based Message Authentication Code for Constrained Environments”, Springer, Int. Conf. Security in Computer Networks and Distributed Systems (SNDS-2014), pp. 520-529, Mar 2014.

16. Nishant Augustine, Sudhish N George and Deepthi P P, “Compressive sensing based audio scrambling using cellular automata”, IEEE Int. Conf. Electronics, Computing and Communication Technologies (CONECCT-2014), pp. 1-5.

17. Shine P James, Sudhish N George and Deepthi P P, “An audio encryption technique based on LFSR based alternating step generator”, IEEE Int. Conf. Electronics, Computing and Communication Technologies (CONECCT-2014), pp. 1-6, Jan 2014.

18. Abhishek, Sudhish N George and Deepthi P. P, “PWLCM based image encryption through compressive sensing”, IEEE Int. Conf. Recent Advances in Intelligent Computational Systems (RAICS-2013), pp. 48-52, Dec 2013.

19. Sruthi K and Deepthi P P “FPGA Implementation of Regular Parallel LDPC Decoder Using Min Sum Algorithm” in Proc. 2nd International Conference on Recent Advances in Sciences and Engineering, ICRASE 2013, pp 201-204, Taj Deccan, Hyderabad, India, Apr. 2013

20. Sarika K T andDeepthi P P “A Novel High Speed Communication System Based on the Concatenation of RS and QC-LDPC Codes” in Proc. IEEE International Conference on Microelectronics, Communications and Renewable Energy (ICMiCR) 2013, pp 1-5, Kerala, India, Jun. 2013.

21. Shine P James, Sudhish N George, and Deepthi P P, “Secure Selective Encryption of Compressed Audio” in Proc. IEEE International Conference on Microelectronics, Communications and Renewable Energy (ICMiCR) 2013, pp 1-6, Kerala, India, Jun. 2013.

22. Athira A, Sudhish N G, and Deepthi P P,” A Novel Encryption Method Based on Compressive Sensing, in Proc. Int. Multi Conference on Automation, Computing, Control, Communication and Compressed Sensing- 2013, pp. 271 – 275, Kerala, India, Mar. 2013.

23. Anoop B N, Sudhish N G, and Deepthi P P, “Secure Image Transcoding Technique Using Chaotic Key Based Algorithm with Improved Security, in Proc. Int. Multi Conference on Automation, Computing, Control, Communication and Compressed Sensing- 2013, pp. 693 – 697, Kerala, India, Mar. 2013.

24. Nisha P K N, Deepthi P P, and Lalmohan K S, “Design and Analysis of Stream Cipher of Low Hardware Complexity” Proc. 2012 International Conference on Communication Systems and Network Technologies (CSNT-2012), Rajkot, India, pp. 858 – 862, May 2012.

25. Nandan S, Deepthi, P P, and Celine M S, “Low Complex Crypto Based Channel Coding”, Proc. 2012 International Conference on Communication Systems and Network Technologies (CSNT-2012), Rajkot, India, pp. 863-868, May 2012.

26. Subeesh V, Sudhish N G, and Deepthi P P, “An Integrity Verification System for Images using Hashing and Watermarking”, Proc. 2012 International Conference on Communication Systems and Network Technologies (CSNT-2012), Rajkot, India, pp. 85-89 May 2012.

27. Raghu I and Deepthi P P, “Multimodal Biometric Encryption Using Ridge and Iris Feature Map”, in Proc. 2012 IEEE Students'  Conference on  Electrical, Electronics and Computer Science (SCEECS), pp 1-5, MANIT Madhya Pradesh, India, Mar. 2012

28. Arun Raj R, Sudhish N. G, and Deepthi P P “An Expeditious Chaos Based Digital Image Encryption”, in Proc. IEEE International Conference on Recent Advances in Information Technology (RAIT – 2012), Indian School of Mines, Dhanbad, India, pp 14-18, Mar. 2012.

29. Jithendra K B, Lalmohan K S, and Deepthi P P “FPGA Implementation of Secure Time Shared Hash Stream Cipher”, inProc. International Conference on Computational Intelligence and Communication Systems, Gwalior, India., pp 381-385, Oct. 2011.

30. Shanthini K S and Deepthi P. P. “Ridge Feature Map Based Biometric Encryption”, in Proc. IASTED International Conference on Signal and Image Processing and Applications (SIPA 2011), Crete, Greece, pp. 208- 214, Jun. 2011.

31. Resmi K R, Deepthi P P, and Sudhish N G “A New Scheme for Digital Fingerprinting of Images Based on Low Density Parity Check Codes”, in Proc. IASTED International Conference on Signal and Image Processing and Applications (SIPA 2011), Crete, Greece, pp. 215- 222, Jun. 2011

32. Jilna P, Lalmohan K S, and Deepthi P P “Hardware Efficient Implementation of Encryption and Key Exchange Based on Elliptic Curves”, in Proc. IASTED International Conference on Signal and Image Processing and Applications (SIPA 2011), Crete, Greece, pp. 230- 235, Jun. 2011

33. Ashok L, Deepthi P P, and Celine M S, Embedding Secrecy in Channel Coding with Low Density Parity Check Codes”, in Proc. IASTED International Conference on Signal and Image Processing and Applications (SIPA 2011), Crete, Greece, pp. 236- 241, Jun. 2011

34. Ancy S A, Deepthi PP, and P S Sathidevi, "Cryptanalysis and Security Comparison of Two Clock Controlled Generators", in Proc.  International Conference on Computer Networks and Security ICCNS 08, Pune, India, pp. 264 – 269, Sep. 2008.

35. Lakshmi V S, Deepthi P P, and Sathidevi P S, “Hardware Efficient Stream Cipher Based on Hash Function”, in Proc.  International Conference on Computer Networks and Security ICCNS 08, Pune, India, pp. 274 – 279, Sep. 2008.

36. Deepa S J, Deepthi P P, and Sathidevi P S “Linear Feedback Shift Register Based Stream Ciphers” in Proc. IASTED International Conference on Communication, Network and Information Security (CNIS 2007), Berkeley, USA, pp. 22-27, Sep. 2007.

37. Nithin V S, Deepthi P P , Dhanaraj K J, and P S Sathidevi “Stream Ciphers Based on the Elliptic Curves” in Proc. International Conference on Computational Intelligence & Multimedia Applications ICCIMA 07, Tamil Nadu, India, pp. 99-104, Dec. 2007.

38. Abida K, Deepthi P P and P S Sathidevi, “New Methods for Gray Level and Color Visual Cryptography”, in Proc. International conference on Advanced Computing and Communication ICACC, Tamilnadu, India, pp.716-719, Feb. 2007.

39. Deepthi.P P, Vidya S B and P S Sathidevi, “Generation of innocent shares for visual cryptography”, in Proc. IEEE International Conference on Signal & Image Processing, Karnataka, India, pp. 659-661, Dec. 2006.

40. Deepthi.P P, Celine M S, Sreelekha.G and P S Sathidevi, “Compression Tolerant DCT Based Perceptual Image Hash Incorporating Human Visual System Model”, in Proc. IEEE International Conference on Signal & Image Processing, Karnataka, pp. 662-665, Dec. 2006.

41. Rama Krishna J, P S Sathidevi and Deepthi P P, “Partial Encryption of Subband Coded Speech Using Psychoacoustic Analysis” in Proc. First International Conference on Emerging Applications of IT, EAIT 2006, Kolkata, India, pp.31-34, Feb. 2006.

1. Title : Wavelet Based Speech Enhancement for the hearing impaired 

    Funding Agency: MHRD 
    Duration: 2003-07
 
2.Title :Design and Implementation of a Secure Communication System for Reduced Complexity 
 
    Funding Agency: DIT
    Duration: 2013-15

Ph.D Scholars

  1. Celine Mary Stuart, Area: Design and Development of Hardware Efficient Schemes for Secure Channel Coding
  2. Jilna P., Area: Design and Implementation of Cryptographic System for Resource Constrained Applications
  3. Amit Unde, Area: Energy Efficient Secure Distributed Source Coding Schemes
  4. Nandakumar, Area: Design and Hardware Implementation of Cryptographic Systems for Low Complexity 
  5. Lakshmi V.S., Area: Secure Coding for Distributed Storage 
  6. Aneesh M. Koya, Area: Secure Implementations for Body Area Networks
  7. Sona Alex, Area: Coding and Cryptosystem Implementation to meet 5G Challenges

M.Tech Students

  1. Deepthi S., Area: Image Processing in Encrypted Domain for Distributed Storage in Cloud
  2. Lajitha Raj K., Area: Secure Querying of Outsourced Medical Images

Ph.D:

  1. Sudhish N. George: Design and development of low complexity schemes for multimedia information security

M.Tech:

 

  1. HMM Based Isolated Word Recognition (2002 -2003)
  2. Implementation of Wideband Adaptive Multirate Speech Codec on Blackfin Processors- ADSP BF535 (2003 - 2004)
  3. Implementation of Visual Cryptography (2005 - 2006)
  4. Perceptual Image Hashing (2005 - 2006)
  5. FPGA Implementation of Elliptic Curve Cryptosystem (2005 - 2006)
  6. Visual Cryptography for Gray Scale and Color Images (2006 - 2007)
  7. Implementation and Analysis of Linear Feedback Shift Register Based Stream Ciphers (2006 - 2007)
  8. Implementation and Analysis of a Cryptographically Strong Pseudorandom Number Generator based on the Elliptic Curve Discrete Logarithm Problem (2006 - 2007)
  9. Cryptanalysis of Linear Feedback Shift Register Based Stream Ciphers (2007 - 2008)
  10. Pseudorandom Number Generators Based on One-Way Functions (2007 - 2008)
  11. Design and Analysis of Stream Ciphers (2008 - 2009)
  12. Biometric Encryption (2008 - 2009)
  13. Combining Cryptographic Operations for complexity reduction (2009 - 2010)
  14. Belief Propagation Methods for Error Correction in Communication Systems (2009 - 2010)
  15. Joint Channel Coding and Cryptography (2010 - 2011)
  16. Joint Fingerprinting & Decryption (2010 - 2011)
  17. Design & Implementation of a Secure Communication System of Low Hardware Complexity (2010 - 2011)
  18. Estimation Problems of Fighter aircraft at high angles of attack (2010 - 2011)
  19. Low Complex Crypto Based Channel Coding (2011 - 2012)
  20. Multimedia Compression & Encryption (2011 - 2012)
  21. Image & Video Encryption (2011 - 2012)
  22. Design & Analysis of Cryptographic Tools of Low Hardware Complexity (2011 - 2012)
  23. Image and Video Hashing (2011 - 2012)
  24. Digital Fingerprinting (2011 - 2012)
  25. Joint Source Channel Coding (2011 - 2012)
  26. Multimodal Biometric Encryption (2011 - 2012)
  27. A Channel Coder Design for Low Error, Less Complex and High Speed Communication Systems (2012 - 2013)
  28. Digital Fingerprinting in Encrypted Domain (2012 - 2013)
  29. Visual Cryptography Based Image Authentication and Copyright Protection (2012 - 2013)
  30. FPGA Implementation of Regular Parallel LDPC Decoder (2012 - 2013)
  31. Signal Processing in Encrypted Domain (2013 - 2014)
  32. Audio Algorithm Development & Optimization on Set-Top Box Chip with Dual-Core SIMD Processor (2013 - 2014)
  33. Distributed Joint Source Channel Network Coding (2013 - 2014)
  34. Non-Binary Source Channel Network Coding (2014 - 2015)
  35. Joint Reconstruction of Correlated Signals in Sensor Networks Using Distributed Compressive Sensing (2014 - 2015)
  36. Unequal Error Protection for Multimedia Communication (2014 - 2015)
  37. Body Area Network: Sensor Node Design (2015 - 2016)
  38. Distributed Source Coding in Wireless Sensor Network (2015 - 2016)
  39. Storage and Bandwidth Efficient Codes for Distributed Storage (2015 - 2016)

 B.Tech:

 

  1. Automatic Speech Recognition (2001 - 2002)
  2. Implementation of PC Based Logic Analyser using FPGA (2002 - 2003)
  3. Microcontroller Based GPIB Interface Card (2002 - 2003)
  4. Microcontroller Based Direct Digital Synthesis (2002 - 2003)
  5. Robust Image Hashing (2003 - 2004)
  6. Implementation of JPEG 2000 Standard (2003 - 2004)
  7. Selective Image Encryption (2004 - 2005)
  8. Implementation of Secure Communication System on TMS 320C6711 DSK (2004 - 2005)
  9. Hardware Implementation of Stream Cipher (2005 - 2006)
  10. Secure Multimedia Multicast with Dynamic Key Engine (2005 - 2006)
  11. Joint Source Channel Coding (2006 - 2007)
  12. Color Image Encryption (2007 - 2008)
  13. Image Hashing (2008 - 2009)
  14. Embedding Security in Channel Coding (2009 - 2010)
  15. Digital Fingerprinting (2010 - 2011)
  16. Audio & Image Steganography and Steganalysis (2010 - 2011)
  17. Joint Scheme for Physical Layer Error Correction and Security (2011 - 2012)
  18. Design & Analysis of a Conditional Access System for Secure Communication in Pay TV (2011 - 2012)
  19. Signal Processing in Encrypted Domain (2012 - 2013)
  20. Unequal Error Protection using LDPC Codes (2014 - 2015)
  21. Efficient Key Exchange Scheme for Wireless Sensor Networks (2014 - 2015)
  22. Joint Source Network Coding for Large Scale Sensor Networks (2014 - 2015)
  23. Secure Source Coding for Body Area Networks (2015 - 2016)
  24. Error and Erasure Correcting Codes for Distributed Storage Systems (2015 - 2016)
  25. Distributed Source Coding of Correlated Sources (2015 - 2016)

 

Memberships

  1. Member, IEEE
  2. Life member, ISTE

UG Courses

1. Electromagnetic Field Theory 

2. Industrial Electronics 

3. Linear Integrated Circuits 

4. Signals and Systems 

5. Digital Communication 

6. Cryptography: Theory & Practice 

7. Information Theory & Coding 

PG Courses

1. Information Theory

2. Coding Theory 

3. Digital Communication Techniques 

4. Theory of Error Control Coding 

5. Estimation & Detection Theory 

6. Adaptive Signal Processing

1. EC 6306: Theory of Error Control Coding

2. EC 6404: Adaptive Signal Processing

 

Department Responsibilities

Lab in Charge of UG lab (1/6/2001 onwards)

Time Table in-charge (1/6/2006 – 30/07/2015)

M.Tech Program Coordinator for Signal Processing stream (1/6/2010 – 30/07/2015)

Purchase Coordinator (1/8/2015 onwards)

Faculty Advisor and Class Chairperson of B Tech (2001 – 2005, 2006 – 2010, 1/8/2015 onwards)

Institute Responsibilities

Member of Institute Research and Consultancy Committee (17/10/2011 – 16/10/2012)

Member of Women Complaint Cell (04/10/2012 – 04/04/2014)

Associate Dean (Faculty Welfare) (4/3/2013 – 3/3/2015)

Convener of Screening Committee (10/7/2014 – 3/3/2015)

TEQIP nodal officer for Training & Development (26/12/2013 onwards)

Member of NBA Accreditation Committee (17/10/2014 onwards)

Login