Lokesh M R

@vcetputtur.ac.in

Professor Department of computer Science and Engineering
vivekananda college of enigneering and technology puttur



                 

https://researchid.co/lokeshmr.cse

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Engineering, Artificial Intelligence, Information Systems, Computer Networks and Communications

14

Scopus Publications

46

Scholar Citations

4

Scholar h-index

1

Scholar i10-index

Scopus Publications

  • ESTIMATION OF MINIMAL INITIAL SAMPLE SIZE IN PROGRESSIVE SAMPLING FOR BIG DATA ANALYTICS


  • Role of Cobots over Industrial Robots in Industry 5.0: A Review
    A.S. Mohamed Sahan, S. Kathiravan, M. Lokesh, and R. Raffik

    IEEE
    Cobots, commonly referred to as collaborative robots, are a new type of robots that securely collaborate with human workers. Cobots are intended to be flexible, simple to program, and less expensive to buy than conventional industrial robots. Cobots are now being utilized more often in a variety of industries, particularly in small and medium-sized businesses where they are used for activities including assembly, pick and place, and packing. In industrial automation, cobots play a complimentary role to industrial robots. Cobots have the capability to work cooperatively with human employees in more complicated and dynamic environments, whereas industrial robots are best suited for repetitive and labor-intensive activities. Cobots are also a more affordable and widely available substitute for conventional industrial robots, which require specific maintenance and operation expertise. Cobots are thus turning into a crucial part of the modern manufacturing floor, allowing businesses to become more effective and competitive while protecting the safety and well-being of their employees. Even so, as more businesses become aware of the advantages cobots provide, their role in industrial automation is expected to expand. Cobots have the potential to revolutionize the industrial sector and make it possible to build more effective and environmentally friendly factories due to their adaptability, safety, and usability. This review paper analyses the advantages of cobots over traditional industrial robots, including increased safety, flexibility, and cost-effectiveness. The paper also examines the current state of cobot technologies and explores potential future developments in the sector.

  • Implementation of GUI based Vital Track Ambulance for Patient Health Monitoring
    Dankan Gowda V, Lokesh M, H P Viraj, Rinkesh V Mailapur, and Mahendra K

    IEEE
    Smart Ambulance and Patient Health Monitoring is a system designed to enhance the quality of medical care during patient transport. it is a cutting-edge technology that integrates healthcare with transportation It aims to improve the efficiency of emergency medical services. This work is an effort to address a critical issue in modern healthcare delivery. It consists of three major sections. First, sensors would be used to detect the patient's vitals; second, data would be sent to a cloud storage service; and third, the discovered data would be made available for remote viewing via a Java GUI. The ambulance is equipped with a real-time communication system that connects it with the database, enabling healthcare professionals to remotely monitor and advise on patient care in Java GUI. The patient's vital signs (heart rate, respiration rate, and temperature) are tracked in real time by sensors and wireless communication devices in the patient health surveillance system. This information is transmitted to the Java GUI including ambulance safety parameters like Fire sensor, IR sensor, GPS tracking and Gas sensor, enabling healthcare professionals to make informed decisions regarding patient care, and to enhance the ambulance's ability to reach the hospital safely. The system aims to improve patient outcomes by providing timely and accurate medical interventions during transport and may reduce the time between diagnosis and treatment.

  • Data Redundancy, Data Phishing, and Data Cloud Backup
    M Lokesh, A.Keerthi Devi, U Dinesh Chowdary, P V N S Divya Lakshmi, and G.Rama Koteswara Rao

    IEEE
    Data today is extremely complex and massive in size. By taking these factors into account, machine learning and ETL techniques will find it much easier to separate useful data from unusable raw data. In web technology, OLTP and OLAP are used to manipulate data on a daily basis. During the transaction, a massive amount of data is maintained in the database or data warehouse. There was no Cloud storage to back up data in the past. Because of the significant increase in internet usage, people are sharing more of their personal information online. Cybercriminals can now access a vast amount of personal data and financial activities. Phishing is one instance of a very efficient type of cybercrime that allows offenders to trick users and obtain crucial data. Phishing has advanced into a more complex attack vector since the first known instance was published in 1990. One of the most common online fraud types now is phishing. Phishing attacks can cause serious losses for their victims, including the theft of confidential information, identities, businesses, and state secrets. This article evaluates these attacks by addressing existing phishing techniques and discussing the current state of phishing. Phishing attacks have been classified in studies based on common phishing methodologies and defences, ignoring the importance of the entire phishing lifecycle. This article provides a new, in-depth model of the anatomy of phishing attacks, including attack phases, attacker types, threats, targets, attack media, and attacking strategies. The suggested physiology would also help readers understand the lifecycle of a phishing attack, which would aid in the development of a comprehensive anti-phishing system. This will improve public awareness of phishing attacks and the methods used. New approaches are also proposed, and certain preventive measures are investigated.

  • Six sigma DMAIC approach based mobile application for statistical analysis of COVID-19 data
    Kavyashree Nagarajaiah, Supriya Maganahalli Chandramouli, and Lokesh Malavalli Ramakrishna

    Emerald
    Purpose Coronavirus disease 2019 is one of the novel diseases formed by a dreadful virus called Severe Acute Respiratory Syndrome Coronavirus 2. Various countries are affected by this viral disease, and many countries declare a lockdown with several rules and conditions. To prevent this rapid viral transmission, various researchers have introduced different mobile applications. This paper aims to study issues like viral transmission, mortality rates, vaccination rates, etc. and also provides suitable solutions based on the statistical analysis with the assistance of the Six-Sigma Define-Measure-Analyse-Improve-Control (DMAIC) concept. Design/methodology/approach Statistical analysis is done for different countries, and the required solutions are provided by using the DMAIC procedure. This application has the ability to represent the current risk status of the user and notify them to secure themselves. Findings The proposed work suggests the Aarogya Setu application to prevent large viral transmission by affording many preventive measures. This application also issues the current risk status of each individual user. Hence, it gives improved results in avoiding high viral transmission. Originality/value The proposed six-sigma DMAIC concept also affords the control measures to prevent viral transmission. Hence, the suggested application has the highest chance of avoiding the rapid viral transmission.


  • Implementation of live data analytics using machine learning techniques and FPGA


  • Healing process towards resiliency in cyber-physical system: A modified danger theory based artifical immune recogization2 algorithm approach
    M R Lokesh and Y.S Kumaraswamy

    IEEE
    Healing Process is a major role in developing resiliency in cyber-physical system where the environment is diverse in nature. Cyber-physical system is modelled with Multi Agent Paradigm and biological inspired Danger Theory based-Artificial Immune Recognization2 Algorithm Methodology towards developing healing process. The Proposed methodology is implemented in a simulation environment and percentage of Convergence rates shown in achieving accuracy in the healing process to resiliency in cyber-physical system environment is shown.

  • State awareness towards resiliency in cyber-physical system: A modified Danger Theory based deterministic Dendritic Cell Algorithm approach
    M R Lokesh and Y. S. Kumaraswamy

    IEEE
    State awareness plays major role in developing resiliency in cyber-physical system where the environment is diverse in nature. Cyber-physical system is modeled with Multi Agent Paradigm and biological inspired Danger Theory based-Dendritic Cell Algorithm Methodology is applied towards developing state awareness. The proposed methodology uses, Threshold-based agent population concentration to define each state toward indicates different state awareness on resiliency in cyber-physical system. This achieves new proposal of state awareness algorithm. The Algorithm is validated with simulation results as well numerical analyses.

  • Next State Prediction algorithm for the avionic systems using the hidden Markov models
    Lokesh M R and Y.S Kumaraswamy

    IEEE
    This paper covers increasing need for next state prediction in the field of the avionics system that will predict and overcome the faults caused by the avionics systems. “Next State Prediction” is used for the predication of the possible states that the system can exist. This paper explains about how Markov models and hidden Markov models can be used for the prediction of the state in which the system exist based on which it could be stated if it is in a safe state. In the current scenario, it is not possible to have 100% test coverage for all the test cases. There will be instances where some of the portions that will not be covered by the test coverage and may lead to catastrophic faults. A very good process of verification and validation is carried out before the software is operational. However, all these are carried out before the software is commissioned on the target for its stipulated use. Further, the V&V is carried out in a simulated environment. It is very difficult to simulate the environment into. There could be some environmental conditions which have not been simulated and which could trigger the software state to an unsafe condition. Hence we use this methodology so as to predict if the current state or any further states in which an aircraft could exist would be safer one, if not, necessary steps could be carried out so as to make it safer.

  • Modified Danger Theory based optimized artificial immune network on resiliency in cyber-physical system
    Lokesh M R and Y.S Kumaraswamy

    IEEE
    Resiliency plays major role in developing reliable and robustness in cyber-physical system where the environment is diverse in nature. The cyber-physical system is model with Multi Agent Paradigm and biological inspired Danger Theory based-modified Artificial Immune Network Algorithm demonstrates on resiliency development. The propose algorithm defines resiliency as state awareness and healing process, with dendritic cells as Threshold-based agent population concentration and Artificial Recognization Ball as memory agent correspondingly. This algorithm is validated with simulation results as well numerical analyses.

  • Line loss minimization in distant substations and multiple cycle distribution systems using UPFC


  • Demonstration of inner state awareness and outer self healing closed feedback loop for resiliency in traffic control cyber-physical system


  • On autonomic self healing architecture for resiliency in cyber physical system
    Lokesh M. R and Y. S. Kumaraswamy

    Global Vision Press
    Disturbances to a system are inevitable. Resilience is thus utmost necessary to the system as it has to respond to the stresses and disturbances to keep the system stable. Cyber physical systems are physical engineered systems whose operations are monitored, coordinated, controlled and integrated by a computing communication core which is expected to transform the physical world around us. This paper proposes an autonomic self healing architecture for improving resiliency in cyber physical system using autonomic computing self management properties. This is a layered architecture in which each stage has a mechanism to collect state information of the system and monitor the system behavior, if the performance of the system is degraded in comparison to the normal level, self healing module is activated to facilitate recovery from damaged state and restoring to normal state, thereby achieving resilience in the system.

RECENT SCHOLAR PUBLICATIONS

  • Automatic Headlight Dimmer and Curve Lane Detection for Intelligent Transportation Systems
    SRSKS Lokesh M R, Rakshitha B V
    International Journal Of Engineering Research And Development 19 (3), 14-21 2023

  • Multi Label Based Feature Classification Model In Bigdata Information Extraction
    C Manjunatha Swamy, SM Sundaram, MR Lokesh
    International Journal of Research in Engineering and Science 11 (3), 271-279 2023

  • ENHANCED BINARY BAT ALGORITHM BASED FEATURE SELECTION MODEL FOR BIG DATA INFORMATION EXTRACTION
    DLMR MANJUNATHA SWAMY C,Dr. S. MEENAKSHI SUNDARAM
    The Seybold Report Journal 18 (02), 1512-1524 2023

  • Performance analysis of feature selection and classification in Big Data Information extraction
    C Manjunatha Swamy, SM Sundaram, MR Lokesh
    Saudi J Eng Technol 8 (3), 62-70 2023

  • Mobile App Usage Behaviour based User Authentication using Fuzzy Random Forest
    LMR Kavyashree Nagarajaiah , Supriya Maganahalli Chandramouli
    Journal of System and Management Sciences 12 (2), 497-511 2022

  • Ambient Air Quality Monitoring In Dumping Ground Using Cyber Physical System
    SKS Lokesh M R, Swathi M, Sahana K S, Chandan Babu
    International Journal of Emerging Technologies and Innovative Research 9 (7 2022

  • Review on Iris Recognition Research Directions- A Brief Study
    HAD Dr. Lokesh M R, B K Amruth Gowda, Prajwal B L, Vaibhav M P
    International Journal for Research in Applied Science & Engineering 2022

  • Site reliability engineering for IOS mobile application in small-medium scale industries
    N Kavyashree, MC Supriya, MR Lokesh
    Global Transitions Proceedings 2 (2), 137-144 2021

  • Critical Success Factor Estimation for Software Security in Small and Medium Scale Industry Using AHP and TOPSIS Approach
    N Kavyashree, MC Supriya, MR Lokesh
    3rd International Conference on Integrated Intelligent Computing 2021

  • COUNTERFEIT DRUG DETECTION IN PHARMACEUTICAL INDUSTRY USING BLOCKCHAIN
    A Lokesh M R KARTHIK
    International Journal of Scientific Research in Computer Science 2021

  • Block Chain Based Supply Chain Management for Counterfeit Drugs in Pharmaceutical Industry
    M Lokesh, S Ahmed, S Khan
    Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol 7 (1), 100-108 2021

  • Challenges and current solutions of cyber physical systems
    M Lokesh, Y Kumaraswamy, KN Tejaswini
    IOSR Journal of Computer Engineering 18 (2), 104-110 2016

  • A Survey on Li-Fi Technology
    R Bhavya, MR Lokesh
    An International Journal of Engineering & Technology 3 (1) 2016

  • State awareness towards resiliency in cyber-physical system: A modified danger theory based deterministic dendritic cell algorithm approach
    MR Lokesh, YS Kumaraswamy
    2015 IEEE international conference on computer graphics, vision and 2015

  • Healing process towards resiliency in cyber-physical system: A modified danger theory based artifical immune recogization2 algorithm approach
    MR Lokesh, YS Kumaraswamy
    2015 IEEE international conference on computer graphics, vision and 2015

  • Modified Danger Theory based optimized artificial immune network on resiliency in cyber-physical system
    MR Lokesh, YS Kumaraswamy
    2015 International Conference on Green Computing and Internet of Things 2015

  • Next State Prediction algorithm for the avionic systems using the hidden Markov models
    MR Lokesh, YS Kumaraswamy
    2015 International Conference on Green Computing and Internet of Things 2015

  • Dynamic Resource Scheduling In Cloud Computing Using Genetic Algorithm: A Survey
    C Manjunatha Swamy, SM Sundaram, MR Lokesh
    International Journal of Computer Science and Information Technologies 2015

  • On Resiliency in Cyber-Road Traffic Control System using Modified Danger Theory based Optimized Artificial Immune Network
    YSK Lokesh M R
    American Journal of Engineering Research 4 (10), 134-147 2015

  • On autonomic self healing architecture for resiliency in cyber physical system
    YS Kumaraswamy
    International Journal of Multimedia and Ubiquitous Engineering 9 (11), 75-84 2014

MOST CITED SCHOLAR PUBLICATIONS

  • A Survey on Li-Fi Technology
    R Bhavya, MR Lokesh
    An International Journal of Engineering & Technology 3 (1) 2016
    Citations: 13

  • Block Chain Based Supply Chain Management for Counterfeit Drugs in Pharmaceutical Industry
    M Lokesh, S Ahmed, S Khan
    Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol 7 (1), 100-108 2021
    Citations: 7

  • Challenges and current solutions of cyber physical systems
    M Lokesh, Y Kumaraswamy, KN Tejaswini
    IOSR Journal of Computer Engineering 18 (2), 104-110 2016
    Citations: 7

  • On autonomic self healing architecture for resiliency in cyber physical system
    YS Kumaraswamy
    International Journal of Multimedia and Ubiquitous Engineering 9 (11), 75-84 2014
    Citations: 7

  • State awareness towards resiliency in cyber-physical system: A modified danger theory based deterministic dendritic cell algorithm approach
    MR Lokesh, YS Kumaraswamy
    2015 IEEE international conference on computer graphics, vision and 2015
    Citations: 4

  • Modified Danger Theory based optimized artificial immune network on resiliency in cyber-physical system
    MR Lokesh, YS Kumaraswamy
    2015 International Conference on Green Computing and Internet of Things 2015
    Citations: 3

  • Site reliability engineering for IOS mobile application in small-medium scale industries
    N Kavyashree, MC Supriya, MR Lokesh
    Global Transitions Proceedings 2 (2), 137-144 2021
    Citations: 2

  • Healing process towards resiliency in cyber-physical system: A modified danger theory based artifical immune recogization2 algorithm approach
    MR Lokesh, YS Kumaraswamy
    2015 IEEE international conference on computer graphics, vision and 2015
    Citations: 1

  • Dynamic Resource Scheduling In Cloud Computing Using Genetic Algorithm: A Survey
    C Manjunatha Swamy, SM Sundaram, MR Lokesh
    International Journal of Computer Science and Information Technologies 2015
    Citations: 1

  • Demontration of Inner state awareness and outer self healing closed feedback loop for resiliency in Traffic control cyber-physical system
    MR Lokesh, YS Kumaraswamy
    vol 9, 21133-21150
    Citations: 1