@pallaviengineeringcollege.ac.in
Principal, CSE
PALLAVI ENGINEERING COLLEGE
Name
Years of Experience DOJ: February, 2018
Teaching: 28 years
Research: 10 years
Principal: 10 years
Email Id &Ph drrajucse@ & 9247755185
Doctoral Degree : Ph.D. CSE, JNTU Hyderabad
PG Degree : M.Tech. CSE, , JNTU Hyderabad
UG Degree : B.E . ECE- MVSREC (OU), Hyderabad
Computer Science, Computer Engineering
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Gotti Rajeswari, Naidu Charani, Perumalla Sreya, Maddasani Bala Raju, Kothapalli Glory, and Padinjare Kolathe Sai Madhav
IEEE
In the intricate tapestry of urban mobility, our research project, "Finding Riders Without Helmets and Retrieving Number Plates," emerges as a beacon of technological vigilance. Through the fusion of convolutional neural networks(CNN) and the prowess of YOLOv3, we embark on a digital quest to identify motorcycles in video streams. Within this virtual realm, our model discerns the absence of helmets with a keen eye, unraveling a narrative of safety and compliance. It then delves deeper, extracting the clandestine codes etched on number plates through the artistry of optical character recognition(OCR). In this symphony of algorithms and pixels, our work stands as a testament to the potential to reshape the landscape of road safety.As the pixels unfold in the narrative of our project, a dynamic dance of technology ensues, choreographed by convolutional neural networks and orchestrated by YOLOv3. Our mission: is to decipher the language of safety within the bustling streets. Picture a virtual canvas where motorcycles are spotlighted, their riders scrutinized for the presence of helmets, and their number plates laid bare. It's a ballet of algorithms, where the absence of helmets becomes a pivotal note and number plates transform into visual poetry. In the grand theater of road safety, our work takes center stage, a digital overture heralding a safer, more compliant tomorrow.
Joshi Padma N, Dr.Ravishankar N., Dr. Raju M. B., Ravi N.Ch., and N.Ch. Sai Vyuha
ENGG Journals Publications
Now a days security of user credentials and confidential data of the user in database plays important role in web applications. Blockchain technology performs the hashing during the block generation process. MD5, SHA128, SHA256, and SHA512 are only few of numerous hashing algorithms. The use of SHA256 in Blockchain has been discovered. There are several aspects to consider while picking an appropriate hashing algorithm, including collision ratio, storage space, and time complexity. There are fewer collisions with SHA256 and it takes up less space. Modified MD5 is the hashing algorithm used in the suggested research. On the other hand, SHA256 takes more storage capacity, but traditional MD5 has a lower collision resistance. study's objective is to develop a faster and more collision-resistant version of the standard MD5 algorithm. Because of this, a system that is both secure and efficient is essential. This study tested the improved MD5 for storage capacity and collision probability, as well as a CPU clock cycle simulation. In terms of collision resistance, the improved MD5 results clearly exceed SHA256, MD5, and SHA1 while consuming less storage space and time. Moreover paper is also considering role of block chain to enhance security by preventing Sql Injection and XSS.
Joshi Padma N, Dr. Ravishankar N., Dr. Raju M. B., and Ravi N.Ch.
ENGG Journals Publications
Lingam Sunitha and M Bal Raju
IOP Publishing
Abstract Most important part of Support Vector Machines(SVM) are the kernels. Although there are several widely used kernel functions, a carefully designed kernel will help improve the accuracy of SVM. The proposed work aims to develop a new kernel function for a multi-class support vector machine, perform experiments on various data sets, and compare them with other classification methods. Directly it is not possible multiclass classification with SVM. In this proposed work first designed a model for binary class then extended with the one-verses-all approach. Experimental results have proved the efficiency of the new kernel function. The proposed kernel reduces misclassification and time. Other classification methods observed better results for some data sets collected from the UCI repository.
Joshi Padma N, N. Ravishankar, M.B. Raju, and N. Ch. Sai Vyuha
IEEE
In our proposed work the web security has been enhanced using additional security code and an enhanced frame work. Administrator of site is required to specify the security code for particular date and time. On user end user would be capable to login and view authentic code allotted to them during particular time slot. This work would be better in comparison of tradition researches in order to prevent sql injection attack and cross script because proposed work is not just considering the security, it is also focusing on the performance of security system. This system is considering the lot of security dimensions. But in previous system there was focus either on sql injection or cross script. Proposed research is providing versatile security and is available with low time consumption with less probability of unauthentic access.
Gaurav Bhandari, Prakash Hiremath M., Ashish Joglekar, Anupama Kulkarni, Devadatta Kulkarni, C. Mahadeva, Sampad B. Mohanty, D. Raghunath, M. B. Raju, Rajeev Shorey,et al.
IEEE
Industry 4.0 is the latest trend in the manufacturing sector that focuses on intelligent manufacturing and smart factories. This leads to opportunities in automation, optimization, asset management and predictive maintenance, which helps reduce downtime and increase revenue. In this paper, we propose the solution that was created for a particular SMT PCB manufacturing facility in Mysuru (Vinyas IT), the features it has to offer and the methodologies that were implemented in order to achieve our goals. We will also highlight the important aspects of the solution that will be showcased during the demonstration and the impact of our solution.
Padma N. Joshi, N. Ravishankar, M.B. Raju, and N.CH. Ravi
IEEE
In Existing security system there is authentication at user level the user id and password submitted by user is verified at login process end if the user id and password exist then the user would be able to access the system. But some smart user usually uses SQL injection in order to violate the security of database using wild character of SQL. They sometime use SQL statement too in order to get the login process confused. They pass the sub query of sql in password field instead of password in order to get the confirmation. Here we have to develop a secure system for authentication access and apply SQL INJECTION attack to check its security.
Padma N Joshi, N. Ravishankar, M. B. Raju, and N.CH. Ravi
IEEE
Web has seen an exponential increase in number of applications over past decade. Current day web applications provide a lot more services than simple content delivery. web-based model of computing has been subject several attacks such as cross-site scripting & SQL injection. SQL Injection Attacks are comparatively recent threat to privacy, integrity & accessibility of all online requests & their technical infrastructure, secretarial for practically fourth of internet vulnerabilities. This research paper has represented types of attacks & classification of SQL injection attack. Next survey based on research done represented in tabular form. After that discussed about pattern locked proposed model & conclusion then future scope, suggested way for researchers for preventing SQL injection attacks.
Kande Srinivas and M.B Raju
IEEE
This Orthogonal Frequency Division Multiple Access (OFDMA) and Single Carrier Frequency Division Multiple Access (SC-FDMA) are strong multiple access candidates for the uplink of the International Mobile Telecommunications-Advanced (IMT-Advanced). These multiple access techniques in combination with other promising technologies such as multi-hops transmission and Multiple-Input-Multiple-Output (MIMO) will be utilized to reach the targeted IMT-Advanced system performance. In this paper, OFDMA and SC-FDMA are adopted for the downlink and uplink transmission of Long Term Evolution (LTE). Two transmission scenarios are considered, namely the single hop transmission and the relay assisted transmission (two hops). In addition, a hybrid multiple access technique that combines the advantages of OFDMA and SC-FDMA in term of low Peak-to-Average Power Ratio (PAPR) and better link performance in terms of Symbol Error Rate (SER) has been proposed in relay assisted transmission scenario. Simulation results show that the obtained results from the relay-assisted transmission (two hops) are better than those obtained from the direct transmission (one hop) for all the studied scenarios.
N. Subhash Chandra, M. Bala Raju, M. Arya bahanu, B. Raja Vikram, A. Govardhan, and S. Mahaboob Basha
Science Publications
Problem statement: Image processing applications were drastically inc reasing over the years. In such a scenario, the fact that, the digit al images need huge amounts of disk space seems to be a crippling disadvantage during transmission and storage. So, there arises a need for data compression of images. Approach: This study proposed a novel technique called binar y merge coding for lossless compression of images. This met hod was based on spatial domain of the image and it worked under principle of Inter-pixel redund ancy reduction. This technique was taken advantage of repeated values in consecutive pixels positions. For a set of repeated consecutive values only one value was retained. Results: The proposed binary merge coding achieved the compression rate of the brain image was 1.6572479. Comparatively, it is 100% more than the compression rate achieved by standard JPEG. Conclusion/Recommendations: This technique was simple in implementation and required no additional memory area. The experimental results of binary merge coding were compared with standard JPEG and it showed that, the binary merge coding improved compression rate compared to JPEG. The same algorithm can be extending to color images. This algorithm can also used for lossy comp ression with few modifications.
B. S. Rao, Ramavtar Gupta, and M. B. Raju
Informa UK Limited
In this paper various failures that occur in solidstate television receivers have been briefly discussed. Reliability calculations like Failure Rate, Mean Time Before Failure, etc., have been presented and suggestions made for minimizing the down-time of the receiver particularly from technoeconomic considerations.