BVC Engineering College
Computer Engineering is a derivative of Electrical Engineering that deals with design of digital hardware and software systems including communications systems, computers and devices that contain computers devices such as cell phones, digital audio players, digital video recorders alarm systems, x-ray machines, and laser surgical tools all require integration of hardware and embedded software, and are all the result of computer engineering. The primary objective of the Computer Engineering Technology program is to prepare graduates to pursue careers related to manufacturing, integration and support of computer systems. Emphasis is placed on specific job skills required of entry level professionals in computer industry, including systems analysis and design, data administration, oral and written communication and management principles.
An individual with an interest in Science and Maths thinks logically and has an analytical bent of mind with inquisitive nature to solve problems.
Computer Engineers have career opportunities with small and big companies in the areas such as Project management in software and hardware production, team development, resources and market relations, knowledge management and transfer in digital formats, public and private sector R&D, computer programming and analysis, integration of computer systems, administration of computer systems, administration of complex networks.
The Department of Computer Science and Engineering was established in 1998 with an intake of 40 and subsequently, the intake was enhanced to 120 from the academic year 2007-2008.The department is headed by Dr. G. Jena with Teaching experience of 24 years. There are 38 faculty members and the composition is 03 Professors, 08 Associate Professors and 27 Assistant Professors, 31 members have M.Tech qualification. Four of our faculty members are pursing Ph.D in reputed universities.
The department has an MOU with Oracle Workforce Development Program. Industry oriented training is offered all the students on latest technologies like Android, PHP, JQuery, java script and HTML.
The department has started two new PG Programs viz. M.Tech in CSE and M.Tech in Software Engineering. A good number of students have brought laurels and appreciations by winning in various national level competitions. The departmental faculties are actively involving in research activities. As a result of that there are 60 publications in various national and international conferences and journals. The department has good placement record. The department has conducted workshops on MATLAB, LaTex and National conference SCTA-2011(Soft Computing Techniques and Applications). Department organizes every year Technical symposium called RESONANCE and youth festival called YUVAGALA.
B.Tech Computer Science Engineering
M.Tech Computer Science Engineering
Object Oriented Programming
Data Base Management System
Computer networks and Network Programming
Mobile Application Development
UML and DP Lab
Free Open Source Software
Advanced Data Structures
Data Base Management System
Object oriented programming through C++
Data Warehousing & Data Mining
To achieve 90%-100% results.
To have linkages with industry for training & placement, projects and curriculum management.
To inculcate professional behavior in students through seminars, mock interviews etc.
Improve placement opportunities for students.
To develop research oriented work culture among faculty and students.
To conduct national and international workshops, seminars and paper contests.
Develop an exclusive R & D Centre in the Department.
To achieve 90 % on campus recruitment of students in reputed multinational companies.
To develop projects for leading software companies for the prospective placements of the students.
Expansion of educational services in association with leading National and International institutions and leading industries.
Developing the projects into real time products, so that the technology reaches the common man.
P1: BVC Graduates shall have strong foundation in basic sciences, mathematics, Engineering fundamental and in computer science engineering subjects in addition to proficiency to computer programming and use of modern tools and technologies.
P2: BVC Graduates will be successfully engaged in careers in software and hardware and allied fields as eminent engineers and managers.
P3: BVC Graduates will be prepared for continued professional development through postgraduate studies in engineering and allied fields and through life-long learning.
P4: BVC Graduates will have demonstrated practices and skills in professional attitude, teamwork, leadership, values, ethics and communication.
An ability to apply knowledge of mathematics, science, and engineering
An ability to design and conduct experiments, as well as to analyze and interpret data
An ability to design a system, component, or process to meet desired needs within realistic constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and sustainability
An ability to function on multi-disciplinary teams
An ability to identify, formulate, and solve engineering problems
An understanding of professional and ethical responsibility
An ability to communicate effectively
The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context
A recognition of the need for, and an ability to engage in life-long learning
A knowledge of contemporary issues
An ability to use the techniques, skills, and modern engineering tools necessary for engineering practice
An ability to design and develop innovative software and hardware products
|Sl.No||Faculty Name||Title of the publication||Journal /Conferences Place||Volume & Issue& Month||International/National|
|1||N.Krishnaiah||A novel approach for enhancing direct hashing and
punning for assosiation trule mining
|1||A.Satya Mallesh||Computing on frequent items||IJCA||2/2,APRIL||INT|
|3||K.Srinivas||GDS-A Dynamic model for realtime Alert Management||GIET,RAJAHMUNDRY||MAR,2012||INT-C|
|4||B.Ganga Bhavani||Paper on Reliability Channel Allocation using Genetic Algorithm in Mobile Computing||ROYAL INSTITUTE OF TECHNOLOGY & SCIENCE||FEB,2012||INT-C|
|5||Gunamani Jena||Fast substraction algorithm and implementation||GBFC, NAGAPUR||FEB,2012||INT-C|
|6||P.B.V.Raja Rao||Paper on Image In painting using Texture Synthesys||CMR COLLEGE OF ENGG & TECHNOLOGY||Jan 2012||NAT -C|
|7||N.Krishnaiah||Clustering categorical data using node importance method||JoCTA||1/2_3, Dec 11||INT|
|8||R.V.Satyanarayana||Secured routing and QOS using DSR in MANET||IJCAES||1/4, DEC2011||INT|
|9||P B V Rajarao||Secured routing and QOS using DSR in MANET||IJCAES||1/4,2011||INT|
|10||B S N. Murthy||Secured routing and QOS using DSR in MANET||IJCAES||1/4 ,DEC,2011||INT|
|11||N.Krishnaiah||Secured routing and QOS using DSR in MANET||IJCAES||1/4 ,DEC,2011||INT|
|12||V.S. Ramakrishna||Color Histogram features based Content based retrieval||IJCAES||1/4,DEC||INT|
|13||Dr. Gunamani Jena||Improved Graphical Password Authentication using MultiImage Pass Point||ADCONS||DEC 2011||INT-C|
|14||R.V.Satyanarayana||New RR and SRTN algorithm with variable original time slice and intelligence time slice for soft real time system||CSCTA-11,BVCEC||8/9,OCT||NAT-C|
|15||P B V Rajarao||New RR and SRTN algorithm with variable original time slice and intelligence time slice for soft real time system||CSCTA-11,BVCEC||8/9,OCT||NAT-C|
|16||Y.M S D Sastry||New RR and SRTN algorithm with variable original time slice and intelligence time slice for soft real time system||CSCTA-11,BVCEC||8/9,OCT||NAT-C|
|17||K.Srinivas||Clustering caterical data using node importance method||CSCTA-11,BVCEC||8-9,OCT,2011||NAT-C|
|18||P.Mareswaramma||DSR The dynamic source routing protocol for multi-hop wireless ad hoc networks||CSCTA-11,BVCEC||8-9,OCT,2012||NAT-C|
|19||Dr. Gunamani Jena||Elliptic curve Cryptography and Emerging Solution||CSCTA-11,BVCEC||8-9,OCT,2011||NAT-C|
|20||N.Krishnaiah||Modeling massive RFID data sets a gateway based movement graph approach||NC4T11||11&12AUG 2011||NAT-C|
|21||Dr. Gunamani Jena||Host to Host Congestion control for TCP with Intermediate stations||ICNEAC-2011||JULY,2011||INT-C|
|22||Dr. Gunamani Jena||Denoising of Ultrasound Images using peak-vallay||ICNEAC-2011||JULY,2011||INT-C|
|23||G.SasiBhushanRao||fuzzy cluster Quality Index Based on Decision Theory||ICNEAC-2011||JULY,2011||INT-C|
|24||N.Krishnaiah||Business Intelligence system for Actionable Knowledge Discovery||ICNEAC-2011||8/10july||INT-C|
|25||K.Srinivas||Preemptive Secure Threshold Multi Signature Scheme for Distributed Enivironment||ICNEAC-2011||8/10july||INT-C|
|26||K.Srinivas||Building Data Warehousees with Semantic Data||NCICS-2011||28&29,JULY 2011||NAT-C|
|27||R.V.Satyanarayana||A novel secure routing protocol for wireless sensor Networks using binary authentication tree||VIGNAN Univercity,Guntur||25,26,MAR,2013||NAT-C|
|28||B.GangaBavani||A novel secure routing protocol for wireless sensor Networks using binary authentication tree||VIGNAN Univercity,Guntur||25,26,MAR,2013||NAT-C|
|29||P.B.V.Raja Rao||Paper on A Novel Secure Routing Protocol for Wireless Sensor Networks using Binary Authentication Tree||ROLAND INSTITUTE OF TECHNOLGOY , BHRHAMPUR||DEC 2012||NAT-C|
|30||P.Kiran Sree||Non linear cellular automata for achieving anonymity And traceability in wireless mesh network using ticket Based security architecture||IJERT||1/9,NOV||INT|
|31||N.Krishnaiah||Delay analysis of scheduling for multi hop wirelessnetwork||IJACMS||3/4,OCT||INT|
|32||K.Eswar||A QUERY ON PUBMED RESULTS USING HIERARCHIES||IJACMS||3/4,OCT,2012||INT|
|33||P.Mareswamma||Secret sharing image between end users by using Cryptography technique||IJARCET||1/7,SEP||INT|
|34||P.Mareswamma||A novel semantic relation extraction for medical data analysis||IJAIR||1/7SEP||INT|
|35||V.S.RamaKrishna||Enhanced way of Biometric signature verification||IJCST||3/3,SEPT,2012||INT|
|36||R. V Satyanarayana||A nodal relational approach to database Virtualization||IFRSA||2/3,AUG||INT|
|37||N.Krishnaiah||Paper on A Nodal Relational Approach to Database Virtualization||IFRSA BOARD||AUG ,2012||INT|
|38||K.Srinivas||Anonymous alarm to withstand dos attacks||IJERT||1/6,AUG||INT|
|39||G.Manikyalarao||A nodal relational approach to database Virtualization||IFRSA||2/3,AUG||INT|
|40||R. V Satyanarayana||En-rout Filtering Scheme for Dynamic Data Reporting in Wireless Sensor Networks||INT|
|41||Y M S D Sastry||Popi : Inferring router user-level tool for packet For wording priority||IJCA||2/4,AUG||INT|
|42||V.S.RamaKrishna||A Glow Sort Display with Optimal Properties for Dinless and Noisy Icon possession||IJCST||3/3,JULY||INT|
|43||G.Sasi Bhushanrao||Diminish additive arc in steganography using Clase- outline policy||IJCST||3/3,JULY||INT|
|44||V.S.RamaKrishna||Efficiently Identifying Human Activities||IJCST||3/3,JULY||INT||45||B.S.N.Murthy||Simulation for Explicit rate Schemes in MIMO Distributed Networks Systems||IJCA||JULY||INT|
|46||R.V.Satyanarayana||A novel secure routing protocol for wireless sensor Networks using binary authentication tree||IOSRJ||2012||NAT|
|47||R. V Satyanarayana||An Estimated Distance-based Routing protocol for Mobile Ad hoc Network||IJCA||2/3,JUN||INT|
|48||Y.M S D Sastry||Working of nymble &enymble in anonymizing Networks to prevent misbehaving users||IJCST||3/2,JUNE||INT|
|49||A.Satya Mallesh||A novel approach for continuous queries in Unstructured overlays and cluster Resilient arbitrary
|50||G.Manikyalarao||An Estimated Distance-based Routing protocol for Mobile Ad hoc Network||IJCA||2/3,JUN||INT|
|51||G.Sasi Bhushanrao||Tracking down and simulating camouflaging Worm behavior||IJCST||3/2,JUNE||INT|
|52||P.B V Rajarao||Performance up gradation of snap using Fixing method||IJCST||3/2,JUN||INT|
|53||K.Srinivas||An efficient Ranking Algorithm for Spatial databases||IJCA||2/3,JUN||INT|
|54||B.S.N.Murthy||Lossless visible water marking by using translucent &Opaque monochrome methods||IJCA||2/3,JUNE||INT|
|55||K.Eswar||Graph Regularized Non-nagative Matrix Factoriztin for dta Reprasentation||IJCA||2,3,JUN2012||INT|
|56||Dr. Gunamani Jena||Denoising of Ultrasound Images using peak-valley filter||ICNEAC-2011||APR,2011||INC-C|
|57||Dr. Gunamani Jena||Nonlinear channel equalizer using radial basis function (rbf) network||GMRIT||APR,2011||INC-C|
|58||Dr. Gunamani Jena||A Novel Approach to Image Enhancement using FUZZY Set||JCTA||1/2,MAR-11||INT|
|59||Dr. Gunamani Jena||Restoration of Still Images using Inpainting Techniques||IJCSC||1/2,DEC-10||INT|
|60||N.Krishnaiah||Improved Annotation of the Blogosphere via Auto tagging and Hierarchical Clustering||AISE NEW HORIZON COLLEGE OF ENGG,BENGALURU||29,OCT,2010||NAT|