Dr. V.J.K.Kishor Sonti

Dr. V.J.K.Kishor Sonti
  • Ph.D
  • Professor (Full) at Sathyabama Institute of Science and Technology

looking for enthusiastic researchers who can work as a team on multidisciplinary research on AI, IoT , micro electronics

About

53
Publications
7,529
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
95
Citations
Introduction
Passionate Professor with 20 years of teaching, administrative and research experience. An outstanding performer awardee, Teaching excellence awardee and received twice the best faculty award. Recipient of Erasmus plus grant. Active researcher with 48 publications , 3 patents published ,produced 2 doctorates, authored 11 book chapters, a book and a monograph. A motivational speaker, innovation ambassador, institution innovation council convener and Mentor of Change.
Current institution
Sathyabama Institute of Science and Technology
Current position
  • Professor (Full)
Additional affiliations
June 2017 - October 2017
Sathyabama Institute of Science and Technology
Position
  • Professor
June 2007 - present
Sathyabama Institute of Science and Technology
Position
  • Professor (Assistant)

Publications

Publications (53)
Chapter
The prominence of technological progress is evident only when its fruits reaching the society. Any disruptive technology has such a profound effect; artificial intelligence is not an exception. This chapter highlights one such technological impact for the benefit of mankind. Alzheimer's is a known neurological illness, sometimes leading to terminal...
Article
Full-text available
p>In this paper a novel methodology is proposed to identify and to compare the frequency range of different Vedic chantings from Rig Veda, Yajur Veda, Atharva Veda and Sama Veda. Nowadays in spite of busy schedule and hectic work, the human beings are mostly stressed. To get rid from this stressed state, one of the best solutions is listening Vedic...
Article
Full-text available
The exponential growth of the internet and contemporary communications users have established safety as a fundamental design feature for encrypted transmission. The Enhanced Cryptography Standard is perhaps the most widely used cryptography information security algorithm standard that has been authorized by NIST. This paper proposes a high-throughp...
Article
Full-text available
Over the past few decades, advances in IC technology have steadily shrunk feature sizes, necessitating the placement of more operational circuits on every chip. In designing digital circuits, a novel GDI based circuit is indeed the center of consideration, since it requires less power and achieves greater efficiency. GDI-based circuits mimic CMOS t...
Article
Full-text available
Agriculture is the key to the development of human civilization. In developing and underdeveloped countries most of the populations depend on agriculture. There are many challenges faced by the farmers in agriculture like getting expert advice, monitoring of crops and manual methods of doing the necessary activities required for farming like irriga...
Chapter
Full-text available
Internet of things is seen in many fields like civil engineering, consumer goods, oil and gas fields, smart cities, agriculture, etc. Apart from these, it is applicable to the medical field to detect and treat many kinds of diseases and can find the different health parameters quickly. It became important in the health sector to mitigate the challe...
Article
Full-text available
Field Programmable Gate Arrays (FPGAs) are special type processor which allows the end user to configure directly. This paper investigates to design a low power reconfigurable Asynchronous FPGA cells. The proposed design combines four-phase dual-rail encoding and LEDR (Level-Encoded Dual-Rail) encoding with sleep controller. Four-phase dual-rail en...
Article
Full-text available
This study presents sinkhole attack detection and prevention using agent-based algorithm. In this algorithm, agents are used to provide information to all node from its reliable neighbors by negotiation in three steps, thus nodes may not be able to pay the attention to the traffic made by sinkhole attacker. In this work, network scale of 500×500 m2...
Article
Full-text available
Abstract:Digital Signal Processing (DSP) devices are becoming increasingly important with the introduction of multiple signal processing techniques. Vedic Multiplier is one of the most common applications for high-speed DSP deployment. This paper constitutes a significant development in the design of the FIR filter architecture based on the modifie...
Chapter
In this brief, Single’s architectures are presented ending 6T SRAM and Single ending 8T SRAM with virtual ground, which are used to prevent SRAM cells’ reliability and stability problems. The virtual ground technique is used in the 8T SRAM model to weaken the positive feedback system thus enhancing SRAM cell write ability. The SRAM circuits also do...
Chapter
Psychology always poses Nature–Nurture dichotomy but Nature has always been driving the evolution nurturing collective human thinking and collective intelligence empowering the scientific and technological developments. In simple terms, “Nature driven Nurture” has been the focal point of new generation intelligence. Artificial Swarm Intelligence ap...
Chapter
Now a days, Multiplier plays a vital role in the implementation of various digital and signal processing applications. As the technology is advancing at a good pace, most of the designers opted for a multiplier with various design objectives like low power dissipation, high speed, less area or a combination of them. In this work, architectures of v...
Article
Full-text available
Intrusion Detection System is competent to detect the intrusions and alerting the administrator of system about the signs of possible intrusions. This paper presents a detailed review of the intrusion detection techniques used in WSNs. More specifically, the existing methods for blackhole and sinkhole attacks detection are reviewed. However, it is...
Article
Full-text available
Intrusion Detection System is competent to detect the intrusions and alerting the administrator of system about the signs of possible intrusions. This paper presents a detailed review of the intrusion detection techniques used in WSNs. More specifically, the existing methods for blackhole and sinkhole attacks detection are reviewed. However, it is...
Chapter
Full-text available
The emergence of a novel technology always has had a greater influence on the environmental and social conditions of an individual or society. Technology has taken social living to leaps and bounds in the past few decades. Any advancement in the technology has certainly has healthy and adverse implications on the growth engine of the society. The s...
Article
Full-text available
Video communication is a rapidly growing field for many applications, which includes conversational video like video telephony, video conferencing through a wired or wireless medium and streaming video that includes video-on-demand, high-definition television applications. In general H.264 intra prediction offers nine prediction modes for 4x4, 8x8...
Conference Paper
Full-text available
Video communication is a rapidly growing field for many applications, which includes conversational video like video telephony, video conferencing through a wired or wireless medium and streaming video that includes video-on-demand, high-definition television applications. In general H.264 in-tra prediction offers nine prediction modes for 4x4, 8x8...
Article
Full-text available
In this paper, an exportable application-particular direction set elliptic bend cryptography processor in view of repetitive marked digit portrayal is proposed. The processor utilizes broad pipelining strategies for Karatsuba– Of man strategy to accomplish high throughput augmentation. Moreover, an effective particular viper without correlation and...
Conference Paper
Full-text available
The quality of communications and signal processing circuits will increase per annum. this can be created attainable by the CMOS technology scaling that permits the mixing of a lot of and a lot of transistors on one device. This increased quality makes the circuits a lot of prone to errors. At identical time, the scaling implies that transistors op...
Conference Paper
Medical imaging methods are very useful to monitor different diseases. In general, there are different scanning equipments are available like PET, MRI, and FMRI, US etc. These are useful to visualize different abnormalities of patients. But, most of the people and radiologists are interested to go for ultrasound (US) scanning to monitor the ultraso...
Article
Full-text available
In this work, the pressurized water reactor power model has been simulated using Lab view Data Acquisition module. Energy is the focal point of any investigation at present in the research domain and this work contributes to understand the mechanism and challenges of clean energy generation. The development of GUI for Pressurized Water Reactor is c...
Article
Full-text available
Man is a societal animal, so it is natural for him to interact and communicate. Communication is a process of exchange of information, thinking, feeling, and thoughts with others in form of verbal or non-verbal message. The people with dual sensory impaired causes difficulties with communication, access to information and mobility. Dual sensory imp...
Article
Full-text available
The Enhanced Adaptive Logic Module for High Performance Field Programmable Gate Array Architecture has been designed to increase the speed and reduces the device utilization of FPGA Architecture. The existing altera based adaptive logic module has eight input critical path look up tables. That means six inputs are given directly to the one Lookup t...
Article
Cognitive radio is widely expected to be the next Big Bang in field of wireless communications. The objective of cognitive radio is to enhance the spectrum utilisation efficiency. Spectrum sensing, a challenging task of cognitive radio helps in opportunistic spectrum access. Cooperative spectrum sensing mitigates these effects of fading, shadowing...
Article
In this paper, performance analysis of RF subsystems like, band pass filter (BPF), low noise amplifiers (LNA) are performed. The center frequency is 2.4 GHz and the substrate used is FR4. The software used is Advance Designing Software (ADS). Noise Figure of LNA is 1.95 and the return loss of the BPF is -20.2dB.Achieved results are in agreement wit...
Article
In recent years, Field Programmable Gate Arrays are used as reconfigurable architecture in various platforms as a special type processor which allows the end user to configure directly. The Logic Blocks and switch matrix provides an extensive use in the reconfigurable computing, that can be configured according to required application which also co...
Article
The Enhanced Adaptive Logic element for High Performance Field Programmable Gate Array Architecture has been designed to increase the speed and reduces the device utilization of FPGA Architecture. The existing altera based adaptive logic element has eight input critical path look up tables. That means six inputs are given directly to the one Lookup...
Article
The ever increasing demand in enhancing the speed of processors to handle the challenging problems has resulted in the need of an efficient ALU. The speed of ALU greatly depends on multiplier and Vedic mathematics helps in the design of an efficient multiplier using Anurupyena and Urdhva Tiryakbhyam. Using Ekadhikena Purvena and Dwandwayoga a squar...
Article
Full-text available
The systolic array may be used as a coprocessor in combination with a host computer. The simple processing element in a systolic array consists of multiplier. In algorithmic and structural levels, numerous multiplication techniques have been developed to enhance the efficiency of the multiplier which concentrates in reducing the partial products an...
Article
Full-text available
In this paper, the performance of MODFET amplifier designed using RT duroid substrate is analyzed and the noise immunity of the design is also discussed. The design was carried out using r value as 2.2. The noise bandwidth was 6 GHz and the frequency range of operation was 1 GHz to 10 GHz. The maximum gain value obtained was 10 dB and the minimum n...
Article
Cognitive radio is widely expected to be the next Big Bang in field of wireless communications. The objective of cognitive radio is to enhance the spectrum utilization efficiency. Spectrum sensing, a challenging task of cognitive radio helps in opportunistic spectrum access. Co-operative spectrum sensing mitigates these effects of fading, shadowing...
Article
In this paper, a comparative analysis of MODFET and MESFET amplifiers was carried out. The equivalent circuit model is used for the MESFET amplifier, whereas device simulation model is used for the MODFET amplifier and the gain of the amplifiers was analyzed. In this device simulation 50 ohm resistance is used at the terminations and W = 200um, L=0...
Conference Paper
Full-text available
The study of nanomaterials provides an opportunity to observe the evolution of material properties with crystal structure, size and shape. Altering the size of the particles changes the degree of confinement of electrons, which affects the electronic structure of the solid especially the band gap edges. As the dimensions of the particle become comp...
Article
In this paper, an analysis on the effect of noise on the performance of the MODFET was carried out. Here the MODFET model considered is of 0.25 × 200 um2 technology. The equivalent noise model is used and the transconductance with respect to frequency is analyzed and also the variation of the drain current with frequency is also analyzed under the...

Network

Cited By