About
65
Publications
6,418
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
23
Citations
Introduction
Active researcher in Cloud Computing, Internet of Things, Realtime Applications, Cybersecurity, AI and Data Science
Current institution
Additional affiliations
April 2011 - August 2022
PSCMR College of Engineering and Technology
Position
- Professor (Associate)
Description
- IEEE SB Counselor Website In-Charge Alumni Coordinator
May 2003 - March 2006
SIR CRR Engineering College, Eluru, AP, India.
Position
- Assistant Professor
Description
- Project Coordinator Teaching to B.Tech CSE&IT
April 2008 - February 2011
Pinnacle Arborpro, Toowoomba, QLD, Australia
Position
- GIS Data Administrator
Description
- Worked on ArcGIS software
Editor roles

International Journal of Computer Science and Mechatronics-IJCSM(ISSN: 2455-1910)
Position
- Managing Editor
Education
August 2017 - December 2024
Andhra University College of Engineering (Autonomous)
Field of study
- Cloud Computing Services
September 2006 - March 2009
August 2001 - April 2003
Publications
Publications (65)
The integration of Internet of Things (IoT) and machine learning technologies in healthcare has the potential to revolutionize the early detection and management of chronic diseases. This paper presents a comprehensive architecture for real-time health data analytics, leveraging IoT devices and advanced machine learning algorithms to monitor, analy...
By allowing constant, real-time monitoring and predictive analysis of patient health data, the integration of wearable devices enabled by Internet of Things (IoT) with Machine Learning (ML) algorithms is transforming healthcare. This work explores how early diagnosis, timely interventions, and tailored care plans combined with the synergy of wearab...
The paper presents how can we predict multiple disease prediction by utilizing machine learning(ML) and deep learning(DL) techniques by analyzing different datasets consisting of various medical parameters our approach integrates ML algorithms such as Logistic regression,KNN,Random forest,support vector machine for initial classification and then s...
Aims and background
Network security detection has become increasingly complex due to the proliferation of Internet nodes and the ever-changing nature of network architecture. To address this, a multi-layer feedforward neural-network has been employed to construct a model for security threat detection, which has enhanced network security protection...
Information and education play pivotal roles in promoting social equality by
empowering individuals and communities in various ways. Information and education help people
understand social issues, inequalities, and injustices prevalent in society. When individuals are aware
of these issues, they are more likely to advocate for change and take actio...
A peer reviewed international journal | Article available at http://ijcsm.in | ICI-JIF 8.441 ©smsamspublications.com | Vol Abstract: The fake news on social media and various other media is wide spreading and is a matter of serious concern due to its ability to cause a lot of social and national damage with destructive impacts. A lot of research is...
This research article delves into the application of the Constrained Application Protocol (CoAP) in waste management systems, exploring how this lightweight and efficient communication protocol contributes to optimizing waste collection, improving resource utilization, and enhancing overall operational efficiency. The study encompasses a thorough r...
Water Level Prediction using Random Forest Algorithm
Information Technology Workshop book is a practical approach to the budding engineers who are studying first year of B.Tech. The syllabus framed by JNTU Kakinada is in good shape to enable the students technology domain and accelerates the learning gear towards the latest technologies such as AI Tools, Existing tools with embedded AI and also Analy...
Rural roads are low-trafficked routes that connect settlements, and the majority of rural roads are owned by local governments. Because the development of country roads affects the village's economy, a suitable rural road network is essential for the village's economic and social growth. It can be difficult to get to where they are needed, logistic...
Good data are the foundation of successful marketing. You will never be as productive as you
could be if your database contains the wrong contacts or incorrect information about them.
Contact Data Services ingest streams from a network of partners, including traditional data
companies, publishers, and social media sources, and serve as a contact...
Core & Advanced Java Programming
Date of Publication: 03/07/2023
Design and evaluation of an IOT system’s machine learning security framework
SOLAR POWERED CAMERA BASED KIT FOR LEAD IONS DETECTION IN WATER EMPLOYING H2S GAS
The rapid development of modern technology provides us with all the necessary and desired answers to every question or need. In recent years, there have been numerous reports of women going missing. Among the missing are girls between the ages of 14 and 17. Parents frequently harbour misgivings over their daughters. Children and women confront seve...
Low-traffic roadways connecting communities are known as rural roads, and most of them are owned by local governments. A good rural road network is necessary for the village's economic and social development because the growth of country roads has an impact on the economy of the community. Logistics may be challenging, transportation may be challen...
Deeplearning(DL),abranchofmachinelearning(ML)andartificial intelligence (AI), is recognized as a core technology of today's Fourth Industrial Revolution (4IR or Industry4.0).Originating fromartificial neural networks (ANNs), DL technology has become a hot topic incomputing due to its abilityto learn from data, and is widely applied in various appli...
To organize and make sense of huge amount of data is one of the most essential problems in corporate company and our day - today life. “Data Science,” an emerging field of study, aims to address it. The basis of the field of data science is found in the principles of data management and machine learning. Researchers from both of these subfields eng...
In this paper, propose designing a sentiment analysis by extracting a vast number of tweets. Prototyping is used in this development. Results classify customers' perspective via tweets into positive, negative and neutral, which is represented in an html web page. However, the program has planned to develop on a web application system, using Natural...
In India, Agriculture is the central issue for survi val. For farming, precipitation is generally significant. Nowadays precipitation forecast has become a significant issue. Pre word usage of precipitation offers attention to individuals and know ahead of time about precipitation to avoid potential risk to shield their harvest from precipitation....
Hackers worldwide agree that cacheable configurations are an interesting new topic in the field of cryptanalysis, and stegnography concur. In fact, few systems engineers would disagree with the refinement of cache coherence. Hipe, our new system for omniscient symmetries, is the solution to all of these issues.
Considering the cost and many-sided quality of keeping up a customary server farm, it's no big surprise that organizations are swinging to distribute computing as an approach to diminish costs, increment efficiencies, and fabricate their business. With distributed computing, organizations approach a versatile stage; minimal effort stockpiling; data...
The advancement of embedded controllers in minimally invasive robotic surgery (MIRS) provides an innovative and safe alternative to traditional open surgery. This paper illustrates the Accelerometer-based Embedded prototype of 4 link novel parallel manipulator design and endoscope end position control scheme. The parallel manipulator proposed is of...
In today's fast-paced digital landscape, mastering Salesforce DevOps has become essential for organizations seeking to deliver Salesforce solutions quickly, reliably, and at scale. The textbook "Mastering Salesforce DevOps" provides a comprehensive guide to understanding and implementing DevOps practices tailored specifically to the Salesforce ecos...
Synthetic media Deepfake Attacks turn out to be one of the biggest issues in society these days. Everything that appears on social media is a sensation in this generation. Never trust your eyes blindly; they may appear to be realistic, but they are not. It is the time to flip the coin to the other side and understand. There might be a simple video...
Big data has become a phenomenon in recent years, coinciding with the technological revolution. Big data is having a greater impact on nearly every field, from mathematics to medicine. To properly explore this data, we need a tool that can handle large amounts of data. Apache Spark is a tool that provides a real-time model for big data analysis. Sp...
"Cyber Security: A Penetration Tester's Guide" delves into the intricate world of ethical hacking and penetration testing, equipping aspiring security professionals with the knowledge and skills necessary to identify and exploit vulnerabilities in computer systems and networks. This comprehensive guide explores the methodologies, tools, and techniq...
"Industry 4.0 and its Future" offers a comprehensive exploration of the Fourth Industrial Revolution, delving into its core technologies, impact on manufacturing, and the potential it holds for the future. This book provides a deep understanding of cyber-physical systems, the Industrial Internet of Things (IIoT), cloud computing, big data analytics...
Service oriented composite utilization is an aggressive concept in distributed computing. Service level agreement (SLA) violations are a complex task to explore different composite service progression from distributed environment. Reduction and prevention of SLA violations is necessary to describe efficient service utilization in service oriented a...
Service-oriented architecture (SOA)[1] is an incessant term to deal with various administrations dependent on solicitations of various clients in various ongoing applications. Still, now, a few people don't have total information about what SOA really has done, they get confounded how SOA identifies with distributed computing. On account of cloud a...
A blockchain is simply a shared database of information or public ledger of all completed and shared transactions or digital activities between cooperating occurrences. Each transaction in the public ledger is confirmed by a majority of the participants within the device. Data cannot be removed once it has been input. The blockchain is a secure and...
Todays deal is to deal with data, the data evolved from binary digit(bit) to Yottabyte and beyond in all aspects of science, arts, engineering, research especially life with so much of competition and concrete proof of knowledge to deal with it. In the point of database aces, the knowledge of the data took another leap of escalation which is Metada...
It is winding up clear, not minimum from the pages of this distribution, that lithe advancement strategies are being embraced or possibly considered by a developing number of programming improvement groups and associations. Regardless of whether you are as of now a functioning specialist coordinated advancement, or thinking about its appropriation...
SMSAMSPUBLICATIONS is a FREE, PEER-REVIEWED, OPEN ACCESS International Agency to contribute the better research to the community across the globe in various domains of knowledge for the humanity. This wide scope publications contains various journals covering all domains of knowledge consists of various diverse aspects of Arts, Science Application,...
Now a day's large volume of data is growing day by day because the organizations are continuously capturing the collective amount of data. This large amount of data is processed by MapReduce programming model for getting the desired output. As a result, it is attractive for an organization to store its processed data in a cloud. But storing the dat...
In basic terms, Big Data1 – when joined with Data Science2 – permit chiefs to gauge and survey fundamentally more data about the nuances of their organizations, and to utilize the data in settling on progressively keen choices. In early 2010, during the period when the development of Big Data was truly increasing noteworthy notification all through...
: With the developing utilization of data innovation in all life areas, hacking has turned out to be more contrarily powerful than any other time in recent memory. Additionally, with creating advances, assaults numbers are developing exponentially like clockwork and become progressively refined so conventional I.D.S ends up wasteful recognizing the...
Applications in chance basic areas, for example, crisis administration and mechanical control frameworks require close ongoing stream information preparing in huge scale detecting systems. The key issue is how to guarantee online end-to-end security (e.g., secrecy, respectability, and realness) of information streams for such applications. We allud...
With the rapid development of opportunities in the 1 IoT marketplace, organizations are challenged in developing business-specific solutions while ensuring maximum reusability across their organization and business units. Fragmentation in the IoT industry, rooted in disparate devices and applications built on proprietary protocols can stifle innova...
Data Analysis in financial services is big challenge for banks that Information System and Multivariate analysis provides both descriptive and inferential procedures, patterns in the data or test hypotheses about patterns of a priori interest. With multivariate descriptive techniques, we can peer beneath the tangled web of variables on the surface...
Enhanced branch expectation precision is basic to maintaining direction throughput with the present profound pipelines. Conventional branch indicators misuse relationships be tween's example history and branch result to foresee branches, yet there is a more grounded and more regular connection be tween's way history and branch result. We investigat...
Enhanced branch expectation precision is basic to maintaining direction throughput with the present profound pipelines. Conventional branch indicators misuse relationships be tween's example history and branch result to foresee branches, yet there is a more grounded and more regular connection be tween's way history and branch result. We investigat...
This project brings the android application for PSCMRCET WEBSITE. The current information regarding to the department including in website pscmr.ac.in. As the latest trends and technology is changing, it is better to have the information on hand as everyone is carrying mobiles with open source android operating system. In this view this application...
:An Android Operating System has become more popular and it makes a platform and holds a
maximum number of Users when compared to all other platform. Before the introduction of the Android
Operating System the access to the Library documents was done only by the Admin or librarian. No institute
can provide books for each and every user in their pre...
Organizations are utilizing mechanical and innovative advances to continuously offer more computerization and convey
noteworthy new focal points. Also, as the 1Internet of Things (IoT) creates, one of its essential goals will be the improvement of client
engagement procedures to lift up levels. This raised level of robotization touches almost every...
This anticipates is executing in view of the outwardly disabled individuals. On account of performing every day routine exercises without vision displays a major test for outwardly hindered individuals. A long white stick is the instrument that most outwardly impeded individuals pick as it is the most essential, adaptable and low support alternativ...
The body is comprised of numerous sorts of cells. Every sort of cell has uncommon capacities. Most cells in the body develop and after that separation in a deliberate approach to shape new cells as they are expected to keep the body solid and working legitimately. At the point when cells lose the capacity to control their tumor, they isolate time a...
Multi track recording of sound is the procedure in which sound and other electro-acoustic signs are caught on a recording medium, for example, attractive tape, which is partitioned into two or more sound tracks that run parallel with each other. Since they are carried on the same medium, the tracks stay in flawless synchronization, while permitting...
Virtualization1 happens when virtual forms of PC assets are made. The heart of virtualization is the virtual machine, a firmly confined programming compartment with a working framework and applications inside. Since each virtual machine is totally separate and autonomous, a large number of them can run at the same time on a solitary PC. A dainty la...
Couple of commercial enterprises depends as intensely on information as
budgetary administrations. Banks and insurance agencies total, cost and circulate
capital with the point of expanding their arrival on resources with a worthy level
of danger. To stay focused, they require ongoing, noteworthy information to
figure market development, comprehend...
Digital assaults have become exponentially more successive and refined, requesting close ongoing, very accessible, and mechanized reactions to dangers. The worldwide expense of cybercrime has as of now developed to $100 billion annually, not including the elusive harm to big business and government security. Notwithstanding the information misfortu...
The versatile applications business sector is one of the quickest developing regions in the data innovation. In burrowing their business sector offer, engineers must pay consideration on building vigorous and solid applications. Indeed, clients effortlessly get baffled by rehashed disappointments, accidents, and different bugs; henceforth, they for...
Corporate Governance has been usually characterized as the standards and techniques set up for administering an association. Be that as it may, given the quick improvements inside of the field and the expanding conspicuousness of corporate administration in the cutting edge world, this definition may be considered excessively limit. Corporate admin...
MercadoLibre's1 IT framework is conveyed inside of an OpenStack private cloud2,
including advancement and creation situations. Its legacy stockpiling framework
was not able to give the execution also, scale needed to address the issues of its
growing application base. "Managers were requesting that we give them an
alternate kind of capacity, one th...
Classical information and 802.11 mesh networks have garnered great interest from both biologists and theorists in the last several years. After years of robust research into the Internet, we argue the synthesis of wide-area networks. In order to accomplish this aim, we prove that gigabit switches can be made semantic, pervasive, and large-scale.
Systems engineers agree that random communications are an interesting new topic in the field of cryptography, and information theorists concur. In this work, we argue the evaluation of randomized algorithms, which embodies the typical principles of mutually exclusive operating systems. In this position paper, we prove that though scatter/gather I/O...
Questions
Question (1)
Online Tutorials
Online Tech support Blog
Please throw some ideas...