Kgs Venkatesan

Kgs Venkatesan
MEGHA Institute of Engineering and Technology for Women · Computer Science & Engineering

B.Tech (cse-JNTU Hyderabad-INDIA Ratified Staff), M.Tech-cse, Ph.D - Cse, Professor in Dept. Of CSE, MEGHA Inst. Of Engg. & Tech. for Women, , TELANGANA state, INDIA, +91

About

91
Publications
49,984
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
376
Citations
Citations since 2017
51 Research Items
158 Citations
201720182019202020212022202301020304050
201720182019202020212022202301020304050
201720182019202020212022202301020304050
201720182019202020212022202301020304050
Introduction
I am working as a Prof. CSE at MEGHA Institute of Engg & Tech for Women, Affil JNTUH, , TELANGANA handling class M.Tech, B.Tech. He has Published 71 articles, Elsevier, IEEE XPLORE & Springer Journals, Indian PATENTS- 12 Nos. & Australian PATENTS- 4 Nos. INDIAN & CANADA Copyright, EDITORIAL Board Member of IJIRCCE & IJIRSET of Inter. Journal, International BOOKS Published-4 Nos.
Additional affiliations
December 2018 - present
Professor, Dept of CSE, Megha Institute of Engg. & Tech. for women
Position
  • Research Associate
Description
  • Mission 10X Learning Approach ( MXLA ) - Teacher's Training Program conducted by WIPRO LTD., to enhancing the capability of the Faculty by honing their Teaching Skills & Exposing them to the New Teaching Paradigms.

Publications

Publications (91)
Article
Full-text available
A wireless touch network is a distributed, self-organizing network of multiple sensors and actuators in combination with multiple sensors and a radio channel. Also, the security area of such a network can be several meters to several meters. The main difference between wireless sensor networks from traditional computer and telephone networks is the...
Article
Full-text available
In Vehicle ad-hoc networks, the progression of wireless communication technology to 6G, overcomes storages, processing, privacy and power limits to create an efficient and intelligent next generation transportion system. Vehicular ad-hoc network may now offer remarkable availability, reliabilty and throughput using 6G technology. However, the VANET...
Chapter
In this Book Chapter, the design & development of the necessity for an efficient pipeline for the building of Machine Learning models has never been more vital, given the rise in the usage of machine learning in numerous areas. However, the work of developing and training models remains mainly traditional, with a reliance on domain specialists and...
Book
Full-text available
In this paper, without learning the underlying plaintexts, searchable encryption allows a cloud server to run keyword searches over encrypted data o behalf of data users. Most existing searchable encryption systems, on the other hand, only offer single or conjunctive keyword searches, and the few schemes that can perform expressive keyword searches...
Article
Full-text available
In this paper, We design a service mechanism for profit optimizations of each a cloud supplier and its multiple users. We consider, matter from a game meta physical perspective and characterize the link between the cloud supplier and its multiple users as a Stackelberg game, within which the ways of all users are subject to the cloud supplier. The...
Article
Full-text available
To overcome the difficulties of prevailing patterns in dealing with the non-stationary and non-linear properties of high-frequency critical time-domain records, in particular the weak generalization potential, this article proposes a clustering method that relies primarily on statistical noise reduction methods using Wavelet transform (WT) and eval...
Poster
Full-text available
Journals indexed in Scopus and Web of Science may be considered for all academic purposes, SCOPUS Indexed, UGC CARE Listed & WOS Indexed Journals
Poster
Full-text available
Encouraging and support the academician, researchers, and scholars to work on innovative research and technology to deliver outstanding quality research that would result in our country to be a leader due to the development and success in education
Patent
Full-text available
ABSTRACT - SECURE DATA SHARING IN CLOUD AND COMPUTING USING REVOCABLE STORAGE IDENTITY- BASED ENCRYPTION Cloud computing gives an adaptable and advantageous way for information sharing, which brings different advantages for both the general public furthermore, people. Yet, there exists a characteristic opposition for clients to straightforwardly re...
Patent
ABSTRACT DEEP LEARNING BASED FAULT DETECTION ELECTRICAL DISTRIBUTION NETWORK The electrical power framework includes a few complex interrelated and dynamic components that are generally defenseless to electrical flaws. A few examinations have attempted to decide suitable strategies for electrical force frameworks deficiencies recognition and charac...
Poster
Full-text available
List of Science Citation Index - Journal List, ACM TRANSACTIONS ON ALGORITHMS 24. ACM TRANSACTIONS ON APPLIED PERCEPTION 25. ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION 26. ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS 27. ACM TRANSACTIONS ON COMPUTATIONAL LOGIC 28. ACM TRANSACTIONS ON COMPUTER SYSTEMS 29. ACM TRANSACTIONS ON COMPU...
Patent
Full-text available
The present invention discloses a multifunction heat transmission simulator with AI and Machine Learning based modules and method thereof. The simulator includes, but not limited to, a housing of a simulator is provided with a base having an impact surface, which is mounted to a heat exchanger; a spring-loaded supporting unit mounted to the base, p...
Conference Paper
Full-text available
The necessity for an efficient pipeline for the building of machine learning models has never been more vital, given the rise in the usage of machine learning in numerous areas. However, the work of developing and training models remains mainly traditional., with a reliance on domain specialists and time-consuming data manipulation operations, whic...
Patent
Full-text available
The present invention discloses a system for cloud monitoring and repair method in an IoT network and method thereof. The system includes, but not limited to, a cloud monitoring system connected with a cloud user provided for multiple predefined operations on a cloud resource and having a log of each of the performed predefined operation based on t...
Patent
Full-text available
The present invention discloses a system for centrally managed cloud service broker and their performance analyses and method thereof. The method and system includes, but not limited to, a processing unit for real scientific computing workloads of many-task computing (MTC) users, that is, of users who employ loosely coupled applications comprising...
Article
Full-text available
Sentiment analysis and opinion mining are research areas that investigate people's opinions, sentiments, evaluations, and emotions from written language. It is one of the most active research areas in natural language processing (NLP) and is also extensively studied in data mining, text mining, web mining. Sentiment analysis methods are being utili...
Article
Full-text available
With the rapid improvement of cloud services, many statistics are shared through cloud computing. Although cryptographic techniques have been used to provide data privacy in cloud computing, the current methodology cannot enforce privacy concerns regarding ciphertext associated with multiple owners, allowing the participating owners to correctly un...
Article
Full-text available
The presence of many zero values -- is a pervasive property of modern deep neural networks, as it is inherently induced by state-of-art algorithmic optimizations. Recent efforts in hardware design for acceleration of neural networks have targeted the structure of computation of these workloads. However, when run on these value-agnostic acceleration...
Article
In the recent years solar photovoltaic become popular due to several advantages among the renewable energy. But the importance should be given to the maximum power point tracking technique to extract the maximum power from the solar PV. This paper deals with analysis of different MPPT techniques under different operating condition. It is analysed b...
Patent
Full-text available
An efficient methodology to manage the admissions in hospitals during the pandemics such as COVID 19 aims at simplifying the system of getting admissions to hospitals especially during the period of pandemics. It's difficult to get a bed or ventilators during a pandemic such as COVID 19. Which is highly contagious the number of patients will be inc...
Patent
Full-text available
The objective of this proposal is to create a system for tracking the conversion rate of e-waste by converting specific electronic products into finished products. Such system will reduce the overall wastages instead of keeping the materials as a permanent waste and cannot be converted into finished products. Every stage is monitored and tracked us...
Article
Full-text available
This paper looks at different facts of microgrid uncertainty. Various regulation and compensation models have been introduced in the microgrid device to ensure optimum system power flow. This method can cause small changes to the metrics of the electrical grid. The penalty and monitoring structures proposed in the system could never contribute to s...
Patent
Full-text available
Wireless Sensor Network contains randomly distributed Sensors which are tiny through which the data is transmitted or services are provided to the end users. The Quality of Service (QoS) depends on these sensors deployment to overcome the redundancy in the network. The present invention disclosed here is Enhancement of Quality of Service in Wireles...
Patent
Full-text available
The Cloud Computing uses Resource Management through which resources are shared. The on-demand services with better use of resources by the user are provided by the Cloud Computing. The critical issues with the Cloud Computing is Resources Scheduling, the optimal resources scheduling reduce the energy, cost and time. The Cloud Service is to be prov...
Article
Full-text available
Today, electronics are an indispensable part of modern vehicles. Cars of moderate class contain more than 70 electronic control units connected by different data buses and gateways. The communication protocols are characterized in event-triggered and time-triggered mechanism. Several event-triggered protocols LIN, CAN, J1850, etc. and TTP, SPIDER,...
Patent
Full-text available
The performance of the Wireless Communication system is improved due to the use of Multiple Input Multiple Output (MIMO) in which multiple antennas were used. An Orthogonal Frequency Division Multiplexing (OFDM) improves the spectrum efficiency by making the subcarriers orthogonal to each other and spacing subchannels close together. By combining t...
Patent
Full-text available
The Grid connected Photovoltaic (PV) system is invented and the control technique of solar system with Three Phase Grid Connection is done by Sliding mode controller. The present invention disclosed here in is Conversion of Sliding Mode Controller to Grid Connected PV System for Boosting the Power for Inverter comprising of: hotovoltaic System (201...
Patent
Full-text available
The Majority of the Power System failures occurring due to the faults in the transmission lines and the Transformers are the class of very expensive and vital components of the electric power system. The Present invention disclosed here is Conversion based Fault Identifier in Three Phase Transformer using Wavelet Transform Technique comprising of:...
Poster
Regarding the recent Trending software Tools for Business Analytics Application software does all the hard work. This type of software performs user-related tasks and can further be classified as general purpose, specialist or bespoke/customized. System software tools include OS and utility programs, while the software application is task-related....
Patent
Server centres are ceaselessly endeavouring to meet the challenge of conveying more data transfer capacity, and this would require larger limit optical switches and workers. One proposition for accomplishing this higher data transfer capacity thickness is to utilize installed optical handsets, which have varieties of VCSEL or silicon-photonic laser...
Patent
Full-text available
A distributed antenna based system to track the COVID patients and monitor them continuously is a need of an hour invention which efficiently monitors the patients who are tested positive as well as who are in quarantine since they are the most important carriers of the corona virus that is highly contagious. In the proposed invention each and ever...
Book
Trending Software Tools for Business Analytics : ( In a Nutshell ) Business analytics refers to the skills, technologies, and practices for continuous iterative exploration and investigation of past business performance to gain insight and drive business planning.
Patent
Full-text available
A methodology and an efficient algorithm to encrypt and decrypt the stored data and images on cloud will help secure the data which is the need of the hour. Data security is an important aspect as the users are dependent on data especially storing them over the cloud. The proposed invention aims at implementing a methodology to encrypt the data as...
Book
Full-text available
A Guide for Software Testing- A Comprehensive Description
Patent
Full-text available
A wireless system and methodology to measure the units of electricity consumed by electrical appliances individually using plurality of sensors and touch screen devices that are attached to the switch board of a household or any building. The proposed invention will calculate the electricity consumed by each and every electrical appliance along wit...
Book
Full-text available
"A Guide for Software Testing ; A Comprehensive Description" is about how the testing process can be conducted at various positions of a system, its importance and how the testers can approach to test the code. What kind of parameters they would take ad how many of testings will be conducted and what kind of tools they would take to scrutiny the co...
Article
Full-text available
This paper presents boundaries between e-commerce and social networking became progressively blurred. several e-commerce websites support the mechanism of social login wherever users will register the websites victimisation their social network identities like their Facebook or Twitter accounts. Users may also post their fresh purchased merchandise...
Article
In this paper presents, CDA document generation and integration Open API service supported cloud computing, through that hospitals area unit enabled to handily generate CDA documents while not having to get proprietary code. Our CDA document integration system integrates multiple CDA documents per patient into one CDA document and physicians and pa...
Article
In this paper presents, news reveal a strong offender that breaks information confidentiality by getting cryptological keys, by means that of coercion or backdoors in cryptological software system. Once the cryptography secret is exposed, the sole viable live to preserve information confidentiality is to limit the attacker's access to the cipher te...
Book
"Software Engineering Principles and Practices"Software engineering is the systematic application of engineering approaches to the development of software. A software engineer is a person who applies the principles of software engineering to design, develop, maintain, test, and evaluate computer software.
Article
Full-text available
This paper manages choice making utilizing the Decision making for (MCDM) and Analytical Hierarchy Process (AHP), presented Saaty 1980. This clarifies the qualities, shortcomings, reactions and disadvantages of AHP in choice making.
Article
Full-text available
This paper presents a multi-cloud technique by avoiding trader lock-in using unmistakable structure to address issues of customers. Cloud may perform better for more diminutive amounts of sales per unit time including generous data trades on the ordinary. For moving nearer the change in multi cloud, we propose a twofold encryption security framewor...
Article
In Electronic Health Record helps improve patient safety and quality of care, but it has the prerequisite of interoperability between Health Information Exchange at different hospitals. The Clinical Document Architecture (CDA) developed by Health Level Eight could be a core document normal to make sure such ability, and propagation of this document...
Article
Full-text available
This paper considers the matter of passing on K clear substance to D destinations from N sources in remote frameworks. Action in reverse direction quite a pair of remote hops can utilize the upside of framework cryptography memory the deciding objective to decrease the quantity of transmissions used. we've an inclination to call such coded bounced...
Article
A Cloud technique improve general strive execution by avoiding merchandiser lock-in victimization clear structure to handle problems with customers. Fogs might handle broad amounts of sales per unit time requiring very little information trades on the everyday however a substitute cloud might perform higher for additional diminutive amounts of sale...
Article
Full-text available
Computer technology has been experiencing a quite fast development within which it, in turn, has additionally caused a modification in human life vogue. one among technologies delivery an impression on such life vogue is within the use of technology embedded in mobile communication devices. Nowadays, a brand new trend in e-learning is thought as Mo...
Article
Full-text available
Many analysts would agree that,had it not been for e-business,the improvement of forward-error correction might never have occurred. In fact,few cyberneticists would disagree with the deployment of the transistor. In order to accomplish this ambition,we disprove that despite the fact that superblocks and red-black trees can interact to solve this g...
Article
Full-text available
Self-learning symmetries and Boolean rationale have accumulated significant enthusiasm from both specialists and experts in the most recent quite a long while. This is instrumental to the accomplishment of our work. Following quite a while of affirmed examination into e-trade,we disconfirm the investigation of recreated tempering [6]. Serene Lovage...
Article
Full-text available
The cryptography solution to IPv7 is defined not only by the evaluation of e-commerce, but also by the essential need for journaling file systems [15]. In fact, few analysts would disagree with the private unification of write-back caches and evolutionary programming [16]. We introduce an analysis of multicast frameworks, which we call VoidedCoache...
Article
Full-text available
Among the developing scope of information mining strategies in fluctuated application ranges, exception discovery has picked up significance as of late. Police examination the articles amid a data set with phenomenal properties is imperative; inherently exception questions ordinarily contain supportive information on strange conduct of the framewor...
Article
Full-text available
Wireless Communication, Remote correspondence empowers data exchange among a system of separated, and regularly versatile, clients. Well known remote systems, for example, cell phone systems and remote LAN's are customarily foundation based, i.e. base stations, get to focuses and servers are sent before the system can be utilized. Interestingly, im...
Article
Full-text available
Wireless communication enables Remote correspondence empowers data exchange among a system of detached,and regularly portable,clients. Famous remote systems,for example,cellular telephone systems and remote LANs are generally base based,i.e. base stations,access focuses and servers are conveyed before the system can be utilized. Interestingly,impro...
Data
Full-text available
Article
Full-text available
Making an endeavor to thrashing those assaults while not understanding their specialized viewpoints is stunning. In this paper, we have a tendency to propose to utilize this PC diagram structure to relieve flooding assaults on a site, abuse new web referral outline for favored administration ("WRAPS"). WRAPS allows a real customer to get a benefit...
Article
Full-text available
Among the developing scope of information mining strategies in fluctuated application ranges, exception discovery has picked up significance as of late. Police examination the articles amid a data set with phenomenal properties is imperative; inherently exception questions ordinarily contain supportive information on strange conduct of the framewor...
Article
Full-text available
Wireless communication enables Remote correspondence empowers data exchange among a system of detached, and regularly portable, clients. Famous remote systems, for example, cellular telephone systems and remote LANs are generally base based, i.e. base stations, access focuses and servers are conveyed before the system can be utilized. Interestingly...
Article
Full-text available
Cluster and grid computing have become extremely popular, significantly for scientific and engineering applications. Higher data measure of tablet systems has any helped advancement of bunch processing. Local and topographically dispersed preparing of registering assets is that the most exceptional separating issue between a bunch and network proce...
Article
Full-text available
Information Technology is dynamical the face of latest World. The IT's not solely connected the globe at one single platform however it's additionally serving to within the integration of varied traditional societies into trendy community. Info systems raise new and often perplexing security and moral issues. This can be truer these days than ever...
Article
Full-text available
The technology e-Learning may be a terribly ancient in education system technology and e-learning may be a undertaking. A key advantage of Mobile Learning (m-learning) is it " s potential for increasing productivity by creating learning on the market anyplace, anytime. as a result of mobile devices have the facility to create learning even addition...
Article
Full-text available
Wireless Mesh Network (WMN) is one of emerging technology of the next generation networks, and it is going to address the internet provision to users at low cost anytime from anywhere. Being a broadband wireless network of the future, still it is facing a lot of technical and critical issues which are prohibiting it from the world wide deployment a...
Article
Full-text available
Rise of online romp networks and demeanour of skip gritty materials has led to the adventure of leakage of confidential information of individuals. This requires the safeguarding of sequestration ahead such raucous observations is published by service providers. Sequestration in online th networks observations has been of utmost concern in recent y...
Article
Full-text available
Over the last few years, " Cloud Computing " or " Elastic Computing " has emerged as a compelling and successful paradigm for net scale computing. One of the key causative factors to the current success is that the elasticity of resources. In spite of the snap provided by the infrastructure and therefore the scalable style of the applications, the...
Article
Full-text available
Fundamental part of any personalization application is user identification, the present user identification ways ar supported users interest (i.e. positive preferences).The main focus is on computer program personalization and to develop many concept-based user identification strategies. Concept-based user identification strategies deals with each...
Article
Full-text available
This paper Routing using Autonomous Network Reconfiguration System (ANRS) with bandwidth guarantees focuses on a wireless mesh network (WMN) consists of a large number of wireless nodes. WMN has to support diversified multimedia applications for its users. It is essential to provide efficient Quality-of-Service (QoS) support in this kind of network...
Article
Full-text available
The state of security on the net is dangerous and obtaining worse. One reaction to the present state of affairs is termed as Moral Hacking that makes an attempt to extend security protection by distinguishing and fix familiar security vulnerabilities on systems in hand by different parties. As public and personal organizations migrate a lot of of t...
Article
Full-text available
In distributed transactional info systems deployed over cloud servers, entities work to make proofs of authorization that square measure even by collections of certified credentials. These proofs and credentials is also evaluated and picked up over extended time periods below the chance of getting the underlying authorization policies or the user c...
Article
Full-text available
This paper presents a model of the property of a Wireless detector Network (WSN) deployed over asq. space, that considers border effects. This model supports AN correct analysis of the dependability of the network with and while not node failures. exploitation the planned model we tend to analyse the trade-off between the amount of sensors and thei...
Article
Full-text available
Managing resources and smartly valuation them on computing systems may be a difficult task. Resource sharing demands careful load leveling and sometimes strives to attain a win-win state of affairs between resource suppliers and users. Toward this goal, we consider a joint treatment of load leveling and valuation. we have a tendency to don't assume...
Article
Full-text available
ABSRACT: Generally the secret sharing and erasure coding-based approaches is used in distributed environment systems to ensure the confidentiality. To achieve this performance in data grid we provide data fragmentation approaches and it is combined with dynamic replication. In this paper, we consider data partitioning (both secret sharing and erasu...
Article
Full-text available
Multi-hop wireless mesh networks typically expertise frequent link failure owing to sure reasons like channel interference, dynamic obstacles occurring in a very network and even owing to information measure demands of applications. A brand new Autonomous system for Wireless Mesh Networks. the most objective of Autonomous system for WMN is to scale...
Article
Full-text available
Privacy-preserving routing is crucial for some Ad Hoc networks that require stronger privacy protection. A number of schemes have been proposed to protect privacy in Ad Hoc networks. However, none of these schemes offer complete unlinkability or unobservability property since data packets and control packets are still linkable and distinguishable i...
Article
Full-text available
Digital Imaging has been a boon to mankind in recent years because of its valuable advances especially in the World Wide Web. Even though the advance helps in digital field, there are certain intruders who use these advances maliciously. Lots of digital imaging techniques have been proposed so far to triumph over the intruders. The vital purpose is...
Article
Topology control is the best solution to reduce power consumption and the number of collisions by minimizing the transmission range of each node by maintaining a certain level of network connectivity. The term "topology control" is consumed mostly by the wireless ad hoc and sensor networks research community. K-edge connected topology control algor...
Article
Vehicular Ad-hoc Networks (VANETs) are self organized networks built up from moving vehicles, and are part of the broader class of Mobile Ad-hoc Networks (MANETs). At present, vehicular networks are still not considered to be very efficient because of their rapid topology changes and their highly dynamic structure. However, there has been ongoing a...
Article
Edge detection and segmentation are widely used in image processing applications. Edges are significant local changes of intensity in an image. It is difficult to detect the coarse and superfluous edges in a fire and flame image. This paper proposes two edge the edge detected to be continuous and long enough. The detection algorithms called auto-ad...
Article
The basic problem in today’s online social networks (OSN) is that they are not providing information around the world such as the arising technologies and major information’s per minute. It provides the unwanted message to be filtered but not the information that is updated every second to the OSN links, to make a modification we propose a recommen...
Article
Full-text available
Email Spammer are constantly pioneering the techniques to bypass anti-spam filters forcing many organizations to invest in spam email prevention mechanisms and solution. Traditional email spam filters aim at analyzing the email content to characterize the best features that are commonly included in email spams. However, this is observed that a craf...
Article
Full-text available
Email Spammers are constantly pioneering the techniques to bypass anti-spam filters forcing many organizations to invest in spam email prevention mechanisms and solutions. Traditional email spam filters aims at analyzing the email content to charact erize the best features that are commonly included in email spams. However, this is observed that a...
Article
Full-text available
The ability to communicate with the people on move has expanded a lot by using Cell phones in the resent world especially for the Business Magnets and Professional job holders who needs to communicate during journey in cars. Initially there were only few distributors and People who really needed Mobile Communications capability installed radiotelep...
Preprint
The ability to communicate with the people on move has expanded a lot by using Cell phones in the resent world especially for the Business Magnets and Professional job holders who needs to communicate during journey in cars. Initially there were only few distributors and People who really needed Mobile Communications capability installed radiotelep...
Article
Full-text available
This paper presents an autonomous network reconfiguration system (ARS) that enables a multiradio WMN to autonomously recover from local link failures to preserve network performance. These failures cause severe performance deprivation in WMNs or require expensive manual network management for their real-time recovery. By using channel and radio div...

Questions

Questions (67)

Network

Cited By

Projects