Sudhakar Kattupalli

Sudhakar Kattupalli
Verified
Sudhakar verified their affiliation via an institutional email.
Verified
Sudhakar verified their affiliation via an institutional email.
  • B.Tech.,M.Tech.,MS(Australia).,(PhD).,
  • Senior Assistant Professor at Lakireddy Bali Reddy College of Engineering

About

65
Publications
6,418
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
23
Citations
Introduction
Active researcher in Cloud Computing, Internet of Things, Realtime Applications, Cybersecurity, AI and Data Science
Current institution
Lakireddy Bali Reddy College of Engineering
Current position
  • Senior Assistant Professor
Additional affiliations
April 2011 - August 2022
PSCMR College of Engineering and Technology
Position
  • Professor (Associate)
Description
  • IEEE SB Counselor Website In-Charge Alumni Coordinator
May 2003 - March 2006
SIR CRR Engineering College, Eluru, AP, India.
Position
  • Assistant Professor
Description
  • Project Coordinator Teaching to B.Tech CSE&IT
April 2008 - February 2011
Pinnacle Arborpro, Toowoomba, QLD, Australia
Position
  • GIS Data Administrator
Description
  • Worked on ArcGIS software
Editor roles
Education
August 2017 - December 2024
Andhra University College of Engineering (Autonomous)
Field of study
  • Cloud Computing Services
September 2006 - March 2009
University of Southern Queensland
Field of study
  • IT & Systems
August 2001 - April 2003
Andhra University
Field of study
  • Computer Science & Technology

Publications

Publications (65)
Article
Full-text available
The integration of Internet of Things (IoT) and machine learning technologies in healthcare has the potential to revolutionize the early detection and management of chronic diseases. This paper presents a comprehensive architecture for real-time health data analytics, leveraging IoT devices and advanced machine learning algorithms to monitor, analy...
Article
Full-text available
By allowing constant, real-time monitoring and predictive analysis of patient health data, the integration of wearable devices enabled by Internet of Things (IoT) with Machine Learning (ML) algorithms is transforming healthcare. This work explores how early diagnosis, timely interventions, and tailored care plans combined with the synergy of wearab...
Article
Full-text available
The paper presents how can we predict multiple disease prediction by utilizing machine learning(ML) and deep learning(DL) techniques by analyzing different datasets consisting of various medical parameters our approach integrates ML algorithms such as Logistic regression,KNN,Random forest,support vector machine for initial classification and then s...
Article
Aims and background Network security detection has become increasingly complex due to the proliferation of Internet nodes and the ever-changing nature of network architecture. To address this, a multi-layer feedforward neural-network has been employed to construct a model for security threat detection, which has enhanced network security protection...
Article
Full-text available
Information and education play pivotal roles in promoting social equality by empowering individuals and communities in various ways. Information and education help people understand social issues, inequalities, and injustices prevalent in society. When individuals are aware of these issues, they are more likely to advocate for change and take actio...
Article
Full-text available
A peer reviewed international journal | Article available at http://ijcsm.in | ICI-JIF 8.441 ©smsamspublications.com | Vol Abstract: The fake news on social media and various other media is wide spreading and is a matter of serious concern due to its ability to cause a lot of social and national damage with destructive impacts. A lot of research is...
Article
Full-text available
This research article delves into the application of the Constrained Application Protocol (CoAP) in waste management systems, exploring how this lightweight and efficient communication protocol contributes to optimizing waste collection, improving resource utilization, and enhancing overall operational efficiency. The study encompasses a thorough r...
Book
Information Technology Workshop book is a practical approach to the budding engineers who are studying first year of B.Tech. The syllabus framed by JNTU Kakinada is in good shape to enable the students technology domain and accelerates the learning gear towards the latest technologies such as AI Tools, Existing tools with embedded AI and also Analy...
Chapter
Rural roads are low-trafficked routes that connect settlements, and the majority of rural roads are owned by local governments. Because the development of country roads affects the village's economy, a suitable rural road network is essential for the village's economic and social growth. It can be difficult to get to where they are needed, logistic...
Article
Full-text available
Good data are the foundation of successful marketing. You will never be as productive as you could be if your database contains the wrong contacts or incorrect information about them. Contact Data Services ingest streams from a network of partners, including traditional data companies, publishers, and social media sources, and serve as a contact...
Book
Core & Advanced Java Programming Date of Publication: 03/07/2023
Patent
Full-text available
Design and evaluation of an IOT system’s machine learning security framework
Patent
SOLAR POWERED CAMERA BASED KIT FOR LEAD IONS DETECTION IN WATER EMPLOYING H2S GAS
Patent
Full-text available
The rapid development of modern technology provides us with all the necessary and desired answers to every question or need. In recent years, there have been numerous reports of women going missing. Among the missing are girls between the ages of 14 and 17. Parents frequently harbour misgivings over their daughters. Children and women confront seve...
Conference Paper
Full-text available
Low-traffic roadways connecting communities are known as rural roads, and most of them are owned by local governments. A good rural road network is necessary for the village's economic and social development because the growth of country roads has an impact on the economy of the community. Logistics may be challenging, transportation may be challen...
Article
Full-text available
Deeplearning(DL),abranchofmachinelearning(ML)andartificial intelligence (AI), is recognized as a core technology of today's Fourth Industrial Revolution (4IR or Industry4.0).Originating fromartificial neural networks (ANNs), DL technology has become a hot topic incomputing due to its abilityto learn from data, and is widely applied in various appli...
Article
To organize and make sense of huge amount of data is one of the most essential problems in corporate company and our day - today life. “Data Science,” an emerging field of study, aims to address it. The basis of the field of data science is found in the principles of data management and machine learning. Researchers from both of these subfields eng...
Article
Full-text available
In this paper, propose designing a sentiment analysis by extracting a vast number of tweets. Prototyping is used in this development. Results classify customers' perspective via tweets into positive, negative and neutral, which is represented in an html web page. However, the program has planned to develop on a web application system, using Natural...
Article
Full-text available
In India, Agriculture is the central issue for survi val. For farming, precipitation is generally significant. Nowadays precipitation forecast has become a significant issue. Pre word usage of precipitation offers attention to individuals and know ahead of time about precipitation to avoid potential risk to shield their harvest from precipitation....
Article
Full-text available
Hackers worldwide agree that cacheable configurations are an interesting new topic in the field of cryptanalysis, and stegnography concur. In fact, few systems engineers would disagree with the refinement of cache coherence. Hipe, our new system for omniscient symmetries, is the solution to all of these issues.
Article
Full-text available
Considering the cost and many-sided quality of keeping up a customary server farm, it's no big surprise that organizations are swinging to distribute computing as an approach to diminish costs, increment efficiencies, and fabricate their business. With distributed computing, organizations approach a versatile stage; minimal effort stockpiling; data...
Article
Full-text available
The advancement of embedded controllers in minimally invasive robotic surgery (MIRS) provides an innovative and safe alternative to traditional open surgery. This paper illustrates the Accelerometer-based Embedded prototype of 4 link novel parallel manipulator design and endoscope end position control scheme. The parallel manipulator proposed is of...
Book
In today's fast-paced digital landscape, mastering Salesforce DevOps has become essential for organizations seeking to deliver Salesforce solutions quickly, reliably, and at scale. The textbook "Mastering Salesforce DevOps" provides a comprehensive guide to understanding and implementing DevOps practices tailored specifically to the Salesforce ecos...
Article
Full-text available
Synthetic media Deepfake Attacks turn out to be one of the biggest issues in society these days. Everything that appears on social media is a sensation in this generation. Never trust your eyes blindly; they may appear to be realistic, but they are not. It is the time to flip the coin to the other side and understand. There might be a simple video...
Article
Full-text available
Big data has become a phenomenon in recent years, coinciding with the technological revolution. Big data is having a greater impact on nearly every field, from mathematics to medicine. To properly explore this data, we need a tool that can handle large amounts of data. Apache Spark is a tool that provides a real-time model for big data analysis. Sp...
Book
"Cyber Security: A Penetration Tester's Guide" delves into the intricate world of ethical hacking and penetration testing, equipping aspiring security professionals with the knowledge and skills necessary to identify and exploit vulnerabilities in computer systems and networks. This comprehensive guide explores the methodologies, tools, and techniq...
Book
"Industry 4.0 and its Future" offers a comprehensive exploration of the Fourth Industrial Revolution, delving into its core technologies, impact on manufacturing, and the potential it holds for the future. This book provides a deep understanding of cyber-physical systems, the Industrial Internet of Things (IIoT), cloud computing, big data analytics...
Article
Full-text available
Service oriented composite utilization is an aggressive concept in distributed computing. Service level agreement (SLA) violations are a complex task to explore different composite service progression from distributed environment. Reduction and prevention of SLA violations is necessary to describe efficient service utilization in service oriented a...
Article
Full-text available
Service-oriented architecture (SOA)[1] is an incessant term to deal with various administrations dependent on solicitations of various clients in various ongoing applications. Still, now, a few people don't have total information about what SOA really has done, they get confounded how SOA identifies with distributed computing. On account of cloud a...
Article
Full-text available
A blockchain is simply a shared database of information or public ledger of all completed and shared transactions or digital activities between cooperating occurrences. Each transaction in the public ledger is confirmed by a majority of the participants within the device. Data cannot be removed once it has been input. The blockchain is a secure and...
Article
Full-text available
Todays deal is to deal with data, the data evolved from binary digit(bit) to Yottabyte and beyond in all aspects of science, arts, engineering, research especially life with so much of competition and concrete proof of knowledge to deal with it. In the point of database aces, the knowledge of the data took another leap of escalation which is Metada...
Article
Full-text available
It is winding up clear, not minimum from the pages of this distribution, that lithe advancement strategies are being embraced or possibly considered by a developing number of programming improvement groups and associations. Regardless of whether you are as of now a functioning specialist coordinated advancement, or thinking about its appropriation...
Cover Page
Full-text available
SMSAMSPUBLICATIONS is a FREE, PEER-REVIEWED, OPEN ACCESS International Agency to contribute the better research to the community across the globe in various domains of knowledge for the humanity. This wide scope publications contains various journals covering all domains of knowledge consists of various diverse aspects of Arts, Science Application,...
Article
Full-text available
Now a day's large volume of data is growing day by day because the organizations are continuously capturing the collective amount of data. This large amount of data is processed by MapReduce programming model for getting the desired output. As a result, it is attractive for an organization to store its processed data in a cloud. But storing the dat...
Article
Full-text available
In basic terms, Big Data1 – when joined with Data Science2 – permit chiefs to gauge and survey fundamentally more data about the nuances of their organizations, and to utilize the data in settling on progressively keen choices. In early 2010, during the period when the development of Big Data was truly increasing noteworthy notification all through...
Article
Full-text available
: With the developing utilization of data innovation in all life areas, hacking has turned out to be more contrarily powerful than any other time in recent memory. Additionally, with creating advances, assaults numbers are developing exponentially like clockwork and become progressively refined so conventional I.D.S ends up wasteful recognizing the...
Article
Full-text available
Applications in chance basic areas, for example, crisis administration and mechanical control frameworks require close ongoing stream information preparing in huge scale detecting systems. The key issue is how to guarantee online end-to-end security (e.g., secrecy, respectability, and realness) of information streams for such applications. We allud...
Article
Full-text available
With the rapid development of opportunities in the 1 IoT marketplace, organizations are challenged in developing business-specific solutions while ensuring maximum reusability across their organization and business units. Fragmentation in the IoT industry, rooted in disparate devices and applications built on proprietary protocols can stifle innova...
Article
Full-text available
Data Analysis in financial services is big challenge for banks that Information System and Multivariate analysis provides both descriptive and inferential procedures, patterns in the data or test hypotheses about patterns of a priori interest. With multivariate descriptive techniques, we can peer beneath the tangled web of variables on the surface...
Conference Paper
Full-text available
Enhanced branch expectation precision is basic to maintaining direction throughput with the present profound pipelines. Conventional branch indicators misuse relationships be tween's example history and branch result to foresee branches, yet there is a more grounded and more regular connection be tween's way history and branch result. We investigat...
Article
Full-text available
Enhanced branch expectation precision is basic to maintaining direction throughput with the present profound pipelines. Conventional branch indicators misuse relationships be tween's example history and branch result to foresee branches, yet there is a more grounded and more regular connection be tween's way history and branch result. We investigat...
Article
Full-text available
This project brings the android application for PSCMRCET WEBSITE. The current information regarding to the department including in website pscmr.ac.in. As the latest trends and technology is changing, it is better to have the information on hand as everyone is carrying mobiles with open source android operating system. In this view this application...
Article
Full-text available
:An Android Operating System has become more popular and it makes a platform and holds a maximum number of Users when compared to all other platform. Before the introduction of the Android Operating System the access to the Library documents was done only by the Admin or librarian. No institute can provide books for each and every user in their pre...
Article
Full-text available
Organizations are utilizing mechanical and innovative advances to continuously offer more computerization and convey noteworthy new focal points. Also, as the 1Internet of Things (IoT) creates, one of its essential goals will be the improvement of client engagement procedures to lift up levels. This raised level of robotization touches almost every...
Article
Full-text available
This anticipates is executing in view of the outwardly disabled individuals. On account of performing every day routine exercises without vision displays a major test for outwardly hindered individuals. A long white stick is the instrument that most outwardly impeded individuals pick as it is the most essential, adaptable and low support alternativ...
Article
Full-text available
The body is comprised of numerous sorts of cells. Every sort of cell has uncommon capacities. Most cells in the body develop and after that separation in a deliberate approach to shape new cells as they are expected to keep the body solid and working legitimately. At the point when cells lose the capacity to control their tumor, they isolate time a...
Article
Full-text available
Multi track recording of sound is the procedure in which sound and other electro-acoustic signs are caught on a recording medium, for example, attractive tape, which is partitioned into two or more sound tracks that run parallel with each other. Since they are carried on the same medium, the tracks stay in flawless synchronization, while permitting...
Article
Full-text available
Virtualization1 happens when virtual forms of PC assets are made. The heart of virtualization is the virtual machine, a firmly confined programming compartment with a working framework and applications inside. Since each virtual machine is totally separate and autonomous, a large number of them can run at the same time on a solitary PC. A dainty la...
Article
Full-text available
Couple of commercial enterprises depends as intensely on information as budgetary administrations. Banks and insurance agencies total, cost and circulate capital with the point of expanding their arrival on resources with a worthy level of danger. To stay focused, they require ongoing, noteworthy information to figure market development, comprehend...
Article
Full-text available
Digital assaults have become exponentially more successive and refined, requesting close ongoing, very accessible, and mechanized reactions to dangers. The worldwide expense of cybercrime has as of now developed to $100 billion annually, not including the elusive harm to big business and government security. Notwithstanding the information misfortu...
Article
Full-text available
The versatile applications business sector is one of the quickest developing regions in the data innovation. In burrowing their business sector offer, engineers must pay consideration on building vigorous and solid applications. Indeed, clients effortlessly get baffled by rehashed disappointments, accidents, and different bugs; henceforth, they for...
Article
Full-text available
Corporate Governance has been usually characterized as the standards and techniques set up for administering an association. Be that as it may, given the quick improvements inside of the field and the expanding conspicuousness of corporate administration in the cutting edge world, this definition may be considered excessively limit. Corporate admin...
Article
Full-text available
MercadoLibre's1 IT framework is conveyed inside of an OpenStack private cloud2, including advancement and creation situations. Its legacy stockpiling framework was not able to give the execution also, scale needed to address the issues of its growing application base. "Managers were requesting that we give them an alternate kind of capacity, one th...
Article
Full-text available
Classical information and 802.11 mesh networks have garnered great interest from both biologists and theorists in the last several years. After years of robust research into the Internet, we argue the synthesis of wide-area networks. In order to accomplish this aim, we prove that gigabit switches can be made semantic, pervasive, and large-scale.
Article
Full-text available
Systems engineers agree that random communications are an interesting new topic in the field of cryptography, and information theorists concur. In this work, we argue the evaluation of randomized algorithms, which embodies the typical principles of mutually exclusive operating systems. In this position paper, we prove that though scatter/gather I/O...

Questions

Question (1)
Question
Online Tutorials
Online Tech support Blog
Please throw some ideas...

Network

Cited By