4
PERSONAL DETAILS: FULL NAME: M KRISHNA CHAITANYA FATHER’S NAME: M SHIVA RAM PRASAD DATE OF BIRTH : 16/06/1994 GENDER: M INSTITUTE: VIGNAN INSTITUTE OF TECHNOLOGY OF AERONAUTICAL AND ENGINEERING.DESHMUKHI,NALGOND. STUDDENT (Roll No) ID: 11UQ1A0552 BRANCH: CSE HOME/PERMANENT ADDRESS: CHANCHAL GUDA,NEW QUARTERS BLOCK1,HYDERABAD- 500024 TELEPHONE: 8686929086 E-MAIL: [email protected] CAREER OBJECTIVE: To work in a challenging environment and thereby acquire knowledge and experience that adds to the development of the organization and my career. ACADEMIC DETAILS: QUALIFICATION INSTITUTE YEAR OF PASSING PERCENTAGE - 1 -

KRISHNA FINAL RESUME(1) (1)

Embed Size (px)

Citation preview

Page 1: KRISHNA FINAL RESUME(1) (1)

PERSONAL DETAILS:FULL NAME: M KRISHNA CHAITANYA

FATHER’S NAME: M SHIVA RAM PRASAD

DATE OF BIRTH : 16/06/1994 GENDER: M

INSTITUTE: VIGNAN INSTITUTE OF TECHNOLOGY OF AERONAUTICAL AND ENGINEERING.DESHMUKHI,NALGOND.

STUDDENT (Roll No) ID: 11UQ1A0552 BRANCH: CSE

HOME/PERMANENT ADDRESS: CHANCHAL GUDA,NEW QUARTERS BLOCK1,HYDERABAD-500024

TELEPHONE: 8686929086 E-MAIL: [email protected]

CAREER OBJECTIVE:

To work in a challenging environment and thereby acquire knowledge and experience that adds to the development of the organization and my career.

ACADEMIC DETAILS:

QUALIFICATION INSTITUTE YEAR OF PASSING PERCENTAGE

B.TECH(JNTU)

INTERMEDIATE(STATE BOARD)

CLASS X(STATE BOARD)

VIGNAN INSTITUTE OF TECHNOLOGY OF

AERONAUTICAL AND ENGINEERING

NARAYANA JUNIOR COLLEGE

BHASHYAM PUBLIC SCHOOL

2015

2011

2009

65.68

84.64

71.34

- 1 -

Page 2: KRISHNA FINAL RESUME(1) (1)

OTHER SKILLS AND ACHIEVEMENTS:

I am well acquainted with basics of C, Core Java,html. I can work efficiently both as an individual and as a team. I try to be optimistic.

PROJECT WORK:

Project1 : Title : security through typing patternTechnology : java Description : The deficiencies of traditional password-based access systems have become more acute as these systems have grown in size and scope. Genarally a text password no matter how many you change it or how many logical symbol you incorporate into it , has some inherit weakness. To avoid this we use typing patterns, is an approach which seeks to identify an individual by their typing characters. At the time of registration it takes some references sample based on those samples authentication of user is done.Project2 : Title : Sepearable Reversible Data hiding in Encrypted Images Technology : java Description :

The use of computer networks for data transmissions has created the need of security. Many robust message encryption techniques have been developed to supply this demand. The amount of digital images has increased rapidly on the Internet. Image security becomes increasingly important for many applications. The first one is based on content protection through encryption. There are several methods to encrypt binary images or gray level images. In this group proper decryption of data requires a key. The second group bases the protection on digital watermarking or data hiding, aimed at secretly embedding a message into the data.

INTERESTS, ACTIVITIES AND RESPONSIBILITIES:INTERESTS:

Writing dialogues, scripts, and quotes. I am passionate about books. I like playing Football and Cricket, watching sports.

ACTIVITIES: . Won 2st prize in volleyball sports event conducted at VIGNAN TARANG 2K14 .Won 1st prize in volleyball on event of ZARA-2K11

DECLARATION: To the best of my knowledge the above statements are true and I understand that withholding or misstating any fact may result in the refusal for placement.

SIGNATURE KRISHNA CHAITANYA DATE

- 2 -