Course Overview
The M.Tech in Computer Networks and Information Security at GNITS offers an advanced exploration of core computer science principles, focusing on areas like artificial intelligence, data science, software engineering, and distributed computing. The program is designed to equip students with the skills required to innovate and solve complex technological challenges, making them adept in both theoretical foundations and practical applications.
Graduates are well-prepared for high-impact roles in software development, data analytics, and IT management, as well as for pursuing research and academic careers in computer science.

Vision
To build a prime transformative learning community that responds swiftly to the challenges of Information Technology.
Mission
To foster an intellectual environment that delivers virtuous Information Technocrats with commitment to industry and society by strengthening the logical, analytical and applicative skills to excel academically and professionally. To inculcate good communication skills in students and introduce them to various codes of professional practices for carrying out effective team collaborations and project management in the field of IT.
Discover the pivotal moments that have shaped the institution’s growth, from its foundational years to its emergence as a leading engineering college.
Department Achievements
GNITS excels in academics, top placements, and pioneering research, with students and faculty earning national and international recognition. Vibrant extracurriculars further enrich campus life.
Research Labs
Our Incubation Center nurtures innovation, supporting students and faculty in transforming ideas into viable startups, fostering entrepreneurship.
Department Archives
Outcome Based Education
- PO1:An ability to independently carry out research /investigation and development work to solve practical problems.
- PO2:An ability to write and present a substantial technical report/document.
- PO3:Students should be able to demonstrate a degree of mastery in the areas of Computer Networks & Information Security as per the specialization of the program. The mastery should be at a level higher than the requirements in the appropriate Bachelor program.
- PO4:Empower students with Sustainable and Inclusive Technologies for improving their knowledge and competence.
- PO5:An Ability to develop necessary skills and Professional ethics for their career advancement and engage in Life Long learning.
- PEO1:To provide expertise in Computer Networks & Information Security, empowering individuals to conduct independent research and effectively address real-world challenges.
- PEO2:To acquire advanced knowledge in Computer Networks & Information Security and effectively document and present their findings through substantial technical reports and publications.
- PEO3:To apply ethical principles and sustainable practices in designing and developing securing computing solutions for societal benefit and continuously enhance their knowledge of evolving technologies.
- PEO4:To exhibit professionalism and leadership qualities, adapting to emerging technologies to make individuals lead successful career growth in industry and academia.
Student Achievements
Summary of Placements/Higher studies/Entrepreneurs
S.No | Academic year | No.of Students | No.of Students Placed/Higher studies/Entrepreneurs |
1 | 2023-24 | 12 | 6 |
2 | 2022-23 | 9 | 6 |
3 | 2021-22 | 10 | 7 |
S. No | Name of the student placed | Enrolment no. | Name of the Employer | Package | |
Batch: 2023 – 2025 | |||||
1 | ZAREEN FATHIMA | 23251D7803 | ALSTOM | 8.55 LPA | |
2 | AMTUL BASEER IFRA | 23251D7810 | ALSTOM | 8.55 LPA | |
3 | SHAHANA SARWATH | 23251D7812 | ALSTOM | 8.55 LPA | |
4 | MAHA NAYEEM | 23251D7804 | LTIMINDTREE | 3 L | |
5 | KASIMALLA SONY | 23251D7802 | WINC IT SERVICES PRIVATE LIMITED | 4.2 L | |
6. | PUCHALA MANJU REDDY | 23251D7811 | WINC IT SERVICES PRIVATE LIMITED | 4.2 L | |
Batch: 2022 – 2024 | |||||
1 | NEDA FATIMA | 22251D7801 | WinC IT Services Private Limited | 4.2L | |
2 | NIMRA MOHAMMED ABDUL QUDDUS | 22251D7802 | Amazon | 5.4L | |
3 | DUDDYALA NEERAJA | 22251D7803 | WinC IT Services Private Limited | 4.2L | |
4 | RIDA FATIMA KHAN | 22251D7804 | Thomson Reuters | 5L | |
5 | SYEDA AAMNA KHADRI | 22251D7805 | Brain O Vision | 3L | |
6 | NAHEED FATIMA | 22251D7809 | Brain O Vision | 3L | |
Batch: 2021 – 2023 | |||||
1 | MACHERLA SWETHA | 21251D7801 | CDAC | 4.8L | |
2 | MUKKU BHAVANA | 21251D7802 | MLRIT | 3.1L | |
3 | SYEDA LABEEBA HASAN | 21251D7803 | Supraja Technologies | 3.2L | |
4 | ANUMULAPURI PRIYANKA | 21251D7804 | ALSTOM | 7.5L | |
5 | M ROSHINI RACHEL | 21251D7805 | GREYTIP SOFTWARE PVT LTD | 10.5L | |
6 | M JAHNAVI | 21251D7806 | Cognizant | 3.8L | |
7 | BUCHERLA MATAM VAISHNAVI | 21251D7808 | ALSTOM | 7.5L |
S.No | Roll.No | Name of the Student | Paper Title | Journal/ Conference | ISSN No | Volume | Date |
Batch – 2022-2024 | |||||||
1 | 22251D7801 | Neda Fatima | Enhancing Malware Detection in Android Devices using Deep Learning Models: A Comparative Analysis | Journal (JETIR) | ISSN-2349-5162 | Volume-11 | 08-08-2024 |
2 | 22251D7802 | Nimra Mohammed Abdul Quddus | Using Deep Learning and Machine Learning to recognize Malicious Software via Distinctive Artifact Analysis | Journal (IJARESM) | ISSN:2455-6211 | Volume-12 | 07-07-2024 |
3 | 22251D7803 | D.Neeraja | Developing an Identification-Driven Phishing Site Classifier | Journal (JETIR) | ISSN-2349-5162 | Volume-11 | 31-07-2024 |
4 | 22251D7804 | Rida Fatima Khan | Pediction of Lung Cancer Using VGG19 training Learning | Journal (IRJAEM) | ISSN:2584-2854 | Voume-2 | 07-07-2024 |
5 | 22251D7805 | Syeda Aamina Khadri | Night Time Vehicle Detection Using Machine Learning | Journal (IJSR) | ISSN:2319-7064 | Voume-13 | Aug-24 |
6 | 22251D7806 | A. Nirmala | Fingerprint Forensics in the Digital Age: Utilizing CNN for Enhanced Crime Detection | Journal (IJARESM) | ISSN: 2455-6211 | Volume 12, Issue 8, | Aug-24 |
7 | 22251D7808 | Zoya Firdouse | An Algorithm based on Deep Learning for Intrusion Detection in IoT | Journal (IJSR) | ISSN:2319-7064 | Voume-13 | Aug-24 |
8 | 22251D7809 | Naheed Fathima | Signlink: Linking Audio,text,and hand Gestures using machine Learning Algorithms | Journal (IRJAEM) | ISSN:2584-2854 | Voume-2 | 07-07-2024 |
Batch – (2021-2023) | |||||||
1 | 21251D7801 | M.Swetha | Proof of Concept Development for Identification and Exploitation of OWASP 2021 Vulnerabilities | Journal(ZKG International) | ISSN No :2366-1313 | Volume 8 | Dec-2023 |
2 | 21251D7802 | M.Bhavana | Home Automation and Surveillance System Using Raspberry Pi | Journal(IJAEMA) | ISSN No: 0886-9367 | Volume 15 | Dec-2023 |
3 | 21251D7803 | Syeda Labeeba Hasan | Malicious Domain Detection | Journal(IJARESM) | ISSN NO:2455-6211 | Volume 11 | Dec-2023 |
4 | 21251D7804 | A Priyanka | Privacy-Preserving Multi-Keyword Serach in cloud | Journal(IJAEMA) | ISSN No: 0886-9367 | Volume 15 | Dec-2023 |
5 | 21251D7806 | M.Jahnavi | Controllable False Data Injection Attack | International Conference(ICDSMLA) | ISBN NO:978-981-97-8043-3 | Volume 2 | 20-10-2024 |
6 | 21251D7808 | B M Vaishnavi | Detecting and resolving Covert DDOS Attacks with Speed and Efficiency | Journal(ZKG International) | ISSN No :2366-1313 | Volume 8 | Oct-23 |
7 | 21251D7810 | Munazza Khan | A Deep Learning method for Home Health Monitoring | International Conference(ICDSMLA) | ISBN NO:978-981-97-8042-6 | Volume 2 | 20-10-2024 |
Batch – (2020-2022) | |||||||
1 | 20251D7801 | A.Shailaja | Detection of Malicious Social Bots Using Machine Learning With URL Features in Twitter Network | International Conference ICCIDE-2023 | ISSN 2456 – 5083 | Volume 12, Issue 01 | 11th Jan 2023. |
2 | 20251D7804 | Pranava Kumari | Method for Continuous Integration and Deployment for Corporate Tax Compliance Using Jenkins | International Conference ICASEM-2022 | ISBN : 978-93-92105- 31-9 | – | 18 & 19 Nov-2022 |
3 | 20251D7805 | Thaufiqa Banu | Detecting, Analysing and Evaluation of Vulnerabilities using Metasploitable | International Conference ICCIC-2022 | 978-981-99-2741-8 | Volume 1 | 27&28 Dec-2022 |
4 | 20251D7807 | L.Vaishnavi | Industrial Engineering Journal | Journal IEJ | ISSN NO:0970-2555 | Volume 15 | Oct-22 |
5 | 20251D7809 | R Usha Rani | A Secure Approach for safe maintenance of Legal Data in multi cloud Architecture | International Conference ICASEM-2022 | ISBN : 978-93-92105-31-9 | – | 18 & 19 Nov-2022 |
6 | 20251D7810 | Ramsha Farheen | Possession Of Remote DataProtocol Check for Evaluating Cloud Storage Efficiency | International Conference ICASEM-2022 | ISBN : 978-93-92105-31-9 | – | 18 & 19 Nov-2022 |
7 | 20251D7811 | Sana Hafeez | PAM: Privileged Access Management | International Conference ICASEM-2022 | ISBN : 978-93-92105-31-9 | – | 18 & 19 Nov-2022 |
8 | 20251D7812 | T Tejasri | A Framework for E-Auction Scheme Using Hyperledger Fabric | International Conference ICAISC-2022 | Grenze ID: 01.GIJET.9.1.764 | 2023-June | Jan-2023 |
9 | 20251D7813 | Umme Ayeah Samreen | Intelligent Monitoring and Analyzer for Plant Systems | International Conference ICCIC-2022 | 978-981-99-2741-8 | Volume 1 | 27&28 Dec-2022 |
Academic Year: 2024-25
S. No | Proj ID | Title of project | Research Domain |
1 | 23D78-01 | Phishing Website Detection using Machine Learning and Deep Learning | AI-ML |
2 | 23D78-02 | Privacy-Preserving Preselection for Protected Biometric Identification Using Public-Key Encryption with Keyword Search | Cybersecurity |
3 | 23D78-03 | Password Vault: A Cryptographic Approach for Secure Credentials Storage | Cybersecurity |
4 | 23D78-04 | A Secure Auditing System for Integrity of Shared Data in Cloud for Dynamic Groups | Cloud Computing |
5 | 23D78-05 | Hybrid Cryptography for Secure File Storage | Cybersecurity |
6 | 23D78-06 | Image Steganography approach to Data Communication Security Using LSB and Password based Encryption | Cybersecurity |
7 | 23D78-07 | Detection of Real Time Malicious Intrusions and attacks in IoT empowered Cyber Security Infrastructures | IoT |
8 | 23D78-08 | Performance Optimization for Decentralized Cloud with Access Control and Data Sharing Mechanism using Blockchain Technology | Blockchain Technology |
9 | 23D78-09 | Credit Card Fraud Detection using State of the Art Machine Learning and Deep Learning | AI-ML |
10 | 23D78-10 | Enhanced Cloud based Client side Deduplication Using SHA-1 | Cloud Computing |
Academic Year: 2023-24
S. No | Proj ID | Title of project | Research Domain |
1 | 22D78-01 | Detection and Prevention of Cyberbullying on social media | Cybersecurity |
2 | 22D78-02 | Detection of Legitimate URL using ML. | AI-ML |
3 | 22D78-03 | Cyber Attack on Life Cycle Analysis | Cybersecurity |
4 | 22D78-04 | Trust Assessment Model in Online Social Networks | Cybersecurity |
5 | 22D78-05 | Malware Detection in Android using Machine Learning. | AI-ML |
6 | 22D78-06 | Strong Password Checker in Python | Cybersecurity |
7 | 22D78-08 | Network Traffic Visualization with Python using Wireshark | Network Security |
8 | 22D78-09 | Web Application Penetration Testing. | Web Development |
Academic Year: 2022-23
S. No | Proj ID | Title of project | Research Domain |
1. | 21D78-01 | RFID Based Petrol Pump Automation System. | IoT |
2. | 21D78-02 | Social Distance Monitoring Robot. | IoT |
3. | 21D78-03 | Securing System using Keylogger. | Information Security |
4. | 21D78-04 | Prevention and Detection Analysis of DDos attacks on Cloud Computing | Information Security |
5. | 21D78-05 | Property Management System in Salesforce using authorize.net | Web Development |
6. | 21D78-06 | Pneumonia and COVID 19 Detection using Machine Learning | AI-ML |
7. | 21D78-07 | Tracking Chaotic Sybil Attackers on Crowdsourced Mobile Mapping Services | Information Security |
8. | 21D78-08 | Smart Helmet using Bluetooth and Aurdino. | IoT |
9. | 21D78-09 | IoT Based Shopping cart using NODE MCU/WEMOS DI and RFID | IoT |
10. | 21D78-10 | Android Based Encrypted SMS System | Information Security |
Academic Year: 2021-22
S. No | Proj ID | Title of project | Research Domain |
1 | 20D78-01 | An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-time Substation Communications | Cyber Security |
2 | 20D78-02 | Protection of Computer Network Security and Analysis of Issues | AI-ML |
3 | 20D78-03 | Creating a Malware and analyzing it using various methods | Cyber Security |
4 | 20D78-04 | Developing the server side module for a EdTech website | Web Development |
5 | 20D78-05 | Hacking a Machine using Kali | Cyber Security |
6 | 20D78-06 | Taking Control of a Windows Machine by Planting a backdoor Application | Network Security |
7 | 20D78-07 | Developing a client-side module to build a user interface for a EdTech website | Web Development |
8 | 20D78-08 | Hiding Data inside Applications Using Steganography | Cyber Security |
9 | 20D78-09 | Building a Server side Module for an EdTech website | Web Development |
10 | 20D78-10 | A New Architecture for Network Intrusion Detection and Prevention | Network Security |
11 | 20D78-11 | Profit Maximization for Cloud Brokers in Cloud Computing | Cloud Computing |
12 | 20D78-12 | Building an client side user interface for a EdTech website | Information Retrieval System |
13 | 20D78-13 | Identification of malicious injection attacks in dense rating and co-visitation behaviors | Data Mining |
Activities Summary
S.No | Academic year | ISTE | IEEE | CSI | Engineering Events | Total | |
COE | Technoboom/other | ||||||
1 | 2023-2024 | 3 | 2 | 2 | 7 | ||
2 | 2022-2023 | 1 | 2 | 2 | 1 | 2 | 8 |
3 | 2021-2022 | 1 | 1 | 3 | 2 | 7 |
Academic Year 2024-2025
S.No | Event/Date | ISTE/IEEE/CSI/CoE/ others | List of Students | Venue | |
1 | Nexora’25 Paper Presentation (23/01/2025) | ISTE | 24251D7801 | M.Pranathi | GNITS |
24251D7808 | S.Navya Sri | ||||
2 | Web3 ecosystem & Aleph Zero in Blockchain Technologies (18/02/2025) | Blockchain Research center(IT Department) | 23251D7801 | Nuzzath Tahreen | GNITS |
23251D7803 | Zareen Fathima | ||||
23251D7805 | K Sathwika | ||||
23251D7806 | K Kavya Sri | ||||
3 | Guest Lecture On Ethical Hacking (13/11/2024) | Cyber Security Center of Excellence | 24251D7801 | M.Pranathi | GNITS |
24251D7803 | B.Tulasi | ||||
24251D7804 | M.Rajashewari | ||||
24251D7806 | T.Ravali | ||||
24251D7807 | V Ananya Sree | ||||
4 | Guest Lecture on Report Writing and Professional Ethics (20/12/2024) | CSI | 24251D7801 | M.Pranathi | GNITS |
24251D7802 | Rukhsana Wajahath | ||||
24251D7803 | B.Tulasi | ||||
24251D7804 | M.Rajashewari | ||||
24251D7805 | D.Navya | ||||
24251D7806 | T.Ravali | ||||
24251D7807 | V Ananya Sree | ||||
24251D7808 | S.Navya Sri | ||||
24251D7809 | U.Bhavana |
Academic Year 2023-2024
S.No | Event/Date | ISTE/IEEE/CSI/CoE/ others | List of Students | Venue | |
1 | IEEE Membership benefits and Resources (10/08/2023) | IEEE | 22251D7801 | Neda Fathima | GNITS |
22251D7804 | Rida Fatima Khan | ||||
22251D7806 | A Nirmala | ||||
22251D7808 | Zoya Firdouse | ||||
2 | Technical talk on AI and Human Intelligence (15/09/2023) | IEEE | 22251D7802 | Nimra Mohammed Abdul Quddus | GNITS |
22251D7805 | Syeda Aamina Khadri | ||||
22251D7808 | Zoya Firdouse | ||||
22251D7809 | Naheed Fatima | ||||
3 | 2-DAY Seasonal School: Smart Agricultural system using IOT Technology (22/03/2024 & 23/03/2024) | IEEE | 23251D7809 | Tasleem Fathima | GNITS |
23251D7804 | Maha Nayeem | ||||
23251D7812 | Shahana Sarwath | ||||
22251D7803 | D.Neeraja | ||||
4 | How to Plan, Prepare and Build Small Office Network” (08/11/2023) | Cyber Security Center of Excellence | 23251D7801 | Nuzzath Tahreen | GNITS |
23251D7803 | Zareen Fathima | ||||
23251D7805 | K Sathwika | ||||
23251D7806 | K.Kavya Sri | ||||
5 | FDP on Vulnerability Assessment and Penetration Testing on Web Applications using Tools (05/02/2024 to 10/02/2024) | Cyber Security Center of Excellence | 23251D7801 | Nuzzath Tahreen | GNITS |
23251D7802 | K Sony | ||||
23251D7803 | Zareen Fathima | ||||
23251D7804 | Maha Nayeem | ||||
23251D7805 | K Sathwika | ||||
23251D7806 | K.Kavya Sri | ||||
23251D7809 | Tasleem Fathima | ||||
23251D7810 | Amtul Baseer Ifra | ||||
23251D7811 | P.Manju Reddy | ||||
23251D7812 | Shahana Sarwath | ||||
6 | Guest Lecture on Future Proofing Tech Careers (13/12/2023) | CSI | 22251D7801 | Neda Fathima | GNITS |
22251D7802 | Nimra Mohammed Abdul Quddus | ||||
22251D7809 | Naheed Fatima | ||||
23251D7801 | Nuzzath Tahreen | ||||
23251D7805 | K Sathwika | ||||
22251D7808 | Zoya Firdouse | ||||
7 | Guest Lecture on Report Writing and Professional Ethics (24/01/2024) | CSI | 23251D7801 | Nuzzath Tahreen | GNITS |
23251D7802 | K Sony | ||||
23251D7803 | Zareen Fathima | ||||
23251D7804 | Maha Nayeem | ||||
23251D7805 | K Sathwika | ||||
23251D7806 | K.Kavya Sri | ||||
23251D7809 | Tasleem Fathima | ||||
23251D7810 | Amtul Baseer Ifra | ||||
23251D7811 | P.Manju Reddy | ||||
23251D7812 | Shahana Sarwath |
Academic Year 2022-2023
S.No | Event/Date | ISTE/IEEE/CSI/CoE/ others | List of Students | Venue | |
1 | IEEE Two Day Workshop on Web Application (20/06/2022 & 21/06/2022) | IEEE | 21251D7803 | Syeda Labeeba Hasan | GNITS |
21251D7804 | A Priyanka | ||||
21251D7805 | M.Roshini Rachel | ||||
21251D7806 | M.Jahnavi | ||||
2 | ISTE Students Chapter “IGNIUM 2K22Results” paper presentation (18/06/2022) | ISTE | 21251D7808 | B M Vaishnavi | GNITS |
21251D7801 | M.Swetha | ||||
21251D7804 | A.Priyanka | ||||
21251D7805 | M.Roshini Rachel | ||||
3 | Physhoot (11/12/2022) | IEEE | 21251D7807 | Monnazzah Zareen | GNITS |
21251D7804 | A Priyanka | ||||
21251D7805 | M.Roshini Rachel | ||||
21251D7808 | B M Vaishnavi | ||||
21251D7801 | M.Swetha | ||||
22251D7801 | Neda Fathima | ||||
22251D7804 | Rida Fatima Khan | ||||
22251D7806 | A Nirmala | ||||
4 | Cyber Security & Ethical hacking (02/03/2023 to 05/03/2023) | Cyber Security Center of Excellence | 22251D7803 | Duddyala Neeraja | GNITS |
22251D7805 | Syeda Aamina Khadri | ||||
2225ID7808 | Zoya Firdose | ||||
22251D7809 | Naheed Fatima | ||||
5 | Seminar on Industrial Applications of Internet of Things (07/09/2022) | Techno Boom Event | 21251D7805 | M.Roshini Rachel | GNITS |
21251D7806 | M.Jahnavi | ||||
21251D7807 | Munazzah Zareen | ||||
21251 D7808 | B.M.Vaishnavi | ||||
21251D7809 | M.Priyanka | ||||
21251D7810 | Munazza Khan | ||||
6 | Guest Lecture on Report Writing and Professional Ethics (22/12/2022) | CSI | 22251D7801 | Neda Fathima | GNITS |
22251D7802 | Nimra Mohammed Abdul Quddus | ||||
22251D7803 | Duddyala Neeraja | ||||
22251D7804 | Rida Fathima Khan | ||||
22251D7805 | Syeda Aamina Khadri | ||||
22251D7806 | Anaparthi Nirmala | ||||
22251D7808 | Zoya Firdose | ||||
22251D7809 | Naheed Fatima | ||||
7 | Cloud Sim API for Cloud Simulations (04/08/2023 & 05/08/2023) | Research Center | 22251D7803 | Duddyala Neeraja | GNITS |
22251D7805 | Syeda Aamina Khadri | ||||
2225ID7808 | Zoya Firdose | ||||
22251D7809 | Naheed Fatima | ||||
8 | Types of Routing Protocols in NS3 (09/01/2023 & 10/01/2023) | Cyber Security Center of Excellence | 22251D7801 | Neda Fathima | GNITS |
22251D7802 | Nimra Mohammed Abdul Quddus | ||||
22251D7803 | Duddyala Neeraja | ||||
22251D7804 | Rida Fathima Khan | ||||
22251D7805 | Syeda Aamina Khadri |
Academic Year 2021-2022
S.No | Event/Date | ISTE/IEEE/CSI/CoE/ others | List of Students | Venue | |
1 | Digital Wellness (26/09/2021) | IEEE | 20251D7801 | Achi Shailaja | GNITS |
20251D7804 | Barkam Pranava Kumari | ||||
20251D7805 | Thaufiqa Banu | ||||
20251D7808 | Puchala Sushma Reddy | ||||
2 | Paper Presentation (31/12/2021) | Techno Bhoom IEEE | 20251D7807 | L.Vaishnavi | GNITS |
20251D7802 | A.Akhila Reddy | ||||
20251D7805 | K.Thaufiqa Banu | ||||
3 | Group Discussion (10/12/2021) | Techno Bhoom | 21251D7801 | M.Swetha | GNITS |
21251D7802 | M.Bhavana | ||||
21251D7804 | A.Priyanka | ||||
21251D7805 | M.Roshini Rachel | ||||
21251D7806 | M.Jahnavi | ||||
21251D7807 | Munazzah Zareen | ||||
4 | Workshop on e-Yantra Lab (23/08/2021) | e-Yantra&IoT CoE | 20251D7802 | A.Akhila Reddy | GNITS |
20251D7805 | Thaufiqa Banu | ||||
20251D7806 | K.Keerthana Reddy | ||||
20251D7807 | L.Vaishnavi | ||||
20251D7810 | Ramsha Farheen | ||||
20251D7811 | Sana Hafeez | ||||
20251D7813 | Umme Ayeah Samreen | ||||
5 | Workshop on e-Yantra Lab (IoT Concepts) (25/02/2022) | e-Yantra&IoT CoE | 21251D7803 | Syeda Labeeba Hasan | GNITS |
21251D7805 | M.Roshini Rachel | ||||
21251D7806 | M.Jahnavi | ||||
21251D7808 | B M Vaishnavi | ||||
21251D7809 | B.Pranava Kumari | ||||
20251D7802 | A.Akhila Reddy | ||||
20251D7805 | Thaufiqa Banu | ||||
20251D7806 | K.Keerthana Reddy | ||||
20251D7807 | L.Vaishnavi | ||||
20251D7810 | Ramsha Farheen | ||||
20251D7811 | Sana Hafeez | ||||
20251D7813 | Umme Ayeah Samreen | ||||
6 | Workshop on Tech Talk on Software Freedom (26/11/2021) | Department of IT | 20251D7801 | Achi Shailaja | GNITS |
20251D7802 | Annepally Akhila Reddy | ||||
20251D7803 | Karne Neelima | ||||
20251D7807 | L Vaishnavi | ||||
20251D7808 | Puchala Sushma Reddy | ||||
20251D7809 | Ramagiri Usha Rani | ||||
20251D7810 | Ramsha Farheen | ||||
20251D7811 | Sana Hafeez | ||||
20251D7812 | Thallapelli Tejasri | ||||
20251D7813 | Umme Ayesha Samreen | ||||
7 | Guest Lecture on Report Writing and Professional Ethics (04/01/2022) | CSI | 21251D7801 | M.Swetha | GNITS |
21251D7802 | M.Bhavana | ||||
21251D7803 | Syeda Labeeba Hasan | ||||
21251D7804 | A.Priyanka | ||||
21251D7805 | M.Roshini Rachel | ||||
21251D7806 | M.Jahnavi | ||||
21251D7807 | Munazzah Zareen | ||||
21251D7808 | B M Vaishnavi | ||||
21251D7809 | M.Priyanka | ||||
21251D7810 | Munnaza Khan |