@vcetputtur.ac.in
Professor Department of computer Science and Engineering
vivekananda college of enigneering and technology puttur
Computer Engineering, Artificial Intelligence, Information Systems, Computer Networks and Communications
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
A.S. Mohamed Sahan, S. Kathiravan, M. Lokesh, and R. Raffik
IEEE
Cobots, commonly referred to as collaborative robots, are a new type of robots that securely collaborate with human workers. Cobots are intended to be flexible, simple to program, and less expensive to buy than conventional industrial robots. Cobots are now being utilized more often in a variety of industries, particularly in small and medium-sized businesses where they are used for activities including assembly, pick and place, and packing. In industrial automation, cobots play a complimentary role to industrial robots. Cobots have the capability to work cooperatively with human employees in more complicated and dynamic environments, whereas industrial robots are best suited for repetitive and labor-intensive activities. Cobots are also a more affordable and widely available substitute for conventional industrial robots, which require specific maintenance and operation expertise. Cobots are thus turning into a crucial part of the modern manufacturing floor, allowing businesses to become more effective and competitive while protecting the safety and well-being of their employees. Even so, as more businesses become aware of the advantages cobots provide, their role in industrial automation is expected to expand. Cobots have the potential to revolutionize the industrial sector and make it possible to build more effective and environmentally friendly factories due to their adaptability, safety, and usability. This review paper analyses the advantages of cobots over traditional industrial robots, including increased safety, flexibility, and cost-effectiveness. The paper also examines the current state of cobot technologies and explores potential future developments in the sector.
Dankan Gowda V, Lokesh M, H P Viraj, Rinkesh V Mailapur, and Mahendra K
IEEE
Smart Ambulance and Patient Health Monitoring is a system designed to enhance the quality of medical care during patient transport. it is a cutting-edge technology that integrates healthcare with transportation It aims to improve the efficiency of emergency medical services. This work is an effort to address a critical issue in modern healthcare delivery. It consists of three major sections. First, sensors would be used to detect the patient's vitals; second, data would be sent to a cloud storage service; and third, the discovered data would be made available for remote viewing via a Java GUI. The ambulance is equipped with a real-time communication system that connects it with the database, enabling healthcare professionals to remotely monitor and advise on patient care in Java GUI. The patient's vital signs (heart rate, respiration rate, and temperature) are tracked in real time by sensors and wireless communication devices in the patient health surveillance system. This information is transmitted to the Java GUI including ambulance safety parameters like Fire sensor, IR sensor, GPS tracking and Gas sensor, enabling healthcare professionals to make informed decisions regarding patient care, and to enhance the ambulance's ability to reach the hospital safely. The system aims to improve patient outcomes by providing timely and accurate medical interventions during transport and may reduce the time between diagnosis and treatment.
M Lokesh, A.Keerthi Devi, U Dinesh Chowdary, P V N S Divya Lakshmi, and G.Rama Koteswara Rao
IEEE
Data today is extremely complex and massive in size. By taking these factors into account, machine learning and ETL techniques will find it much easier to separate useful data from unusable raw data. In web technology, OLTP and OLAP are used to manipulate data on a daily basis. During the transaction, a massive amount of data is maintained in the database or data warehouse. There was no Cloud storage to back up data in the past. Because of the significant increase in internet usage, people are sharing more of their personal information online. Cybercriminals can now access a vast amount of personal data and financial activities. Phishing is one instance of a very efficient type of cybercrime that allows offenders to trick users and obtain crucial data. Phishing has advanced into a more complex attack vector since the first known instance was published in 1990. One of the most common online fraud types now is phishing. Phishing attacks can cause serious losses for their victims, including the theft of confidential information, identities, businesses, and state secrets. This article evaluates these attacks by addressing existing phishing techniques and discussing the current state of phishing. Phishing attacks have been classified in studies based on common phishing methodologies and defences, ignoring the importance of the entire phishing lifecycle. This article provides a new, in-depth model of the anatomy of phishing attacks, including attack phases, attacker types, threats, targets, attack media, and attacking strategies. The suggested physiology would also help readers understand the lifecycle of a phishing attack, which would aid in the development of a comprehensive anti-phishing system. This will improve public awareness of phishing attacks and the methods used. New approaches are also proposed, and certain preventive measures are investigated.
Kavyashree Nagarajaiah, Supriya Maganahalli Chandramouli, and Lokesh Malavalli Ramakrishna
Emerald
Purpose Coronavirus disease 2019 is one of the novel diseases formed by a dreadful virus called Severe Acute Respiratory Syndrome Coronavirus 2. Various countries are affected by this viral disease, and many countries declare a lockdown with several rules and conditions. To prevent this rapid viral transmission, various researchers have introduced different mobile applications. This paper aims to study issues like viral transmission, mortality rates, vaccination rates, etc. and also provides suitable solutions based on the statistical analysis with the assistance of the Six-Sigma Define-Measure-Analyse-Improve-Control (DMAIC) concept. Design/methodology/approach Statistical analysis is done for different countries, and the required solutions are provided by using the DMAIC procedure. This application has the ability to represent the current risk status of the user and notify them to secure themselves. Findings The proposed work suggests the Aarogya Setu application to prevent large viral transmission by affording many preventive measures. This application also issues the current risk status of each individual user. Hence, it gives improved results in avoiding high viral transmission. Originality/value The proposed six-sigma DMAIC concept also affords the control measures to prevent viral transmission. Hence, the suggested application has the highest chance of avoiding the rapid viral transmission.
M R Lokesh and Y.S Kumaraswamy
IEEE
Healing Process is a major role in developing resiliency in cyber-physical system where the environment is diverse in nature. Cyber-physical system is modelled with Multi Agent Paradigm and biological inspired Danger Theory based-Artificial Immune Recognization2 Algorithm Methodology towards developing healing process. The Proposed methodology is implemented in a simulation environment and percentage of Convergence rates shown in achieving accuracy in the healing process to resiliency in cyber-physical system environment is shown.
M R Lokesh and Y. S. Kumaraswamy
IEEE
State awareness plays major role in developing resiliency in cyber-physical system where the environment is diverse in nature. Cyber-physical system is modeled with Multi Agent Paradigm and biological inspired Danger Theory based-Dendritic Cell Algorithm Methodology is applied towards developing state awareness. The proposed methodology uses, Threshold-based agent population concentration to define each state toward indicates different state awareness on resiliency in cyber-physical system. This achieves new proposal of state awareness algorithm. The Algorithm is validated with simulation results as well numerical analyses.
Lokesh M R and Y.S Kumaraswamy
IEEE
This paper covers increasing need for next state prediction in the field of the avionics system that will predict and overcome the faults caused by the avionics systems. “Next State Prediction” is used for the predication of the possible states that the system can exist. This paper explains about how Markov models and hidden Markov models can be used for the prediction of the state in which the system exist based on which it could be stated if it is in a safe state. In the current scenario, it is not possible to have 100% test coverage for all the test cases. There will be instances where some of the portions that will not be covered by the test coverage and may lead to catastrophic faults. A very good process of verification and validation is carried out before the software is operational. However, all these are carried out before the software is commissioned on the target for its stipulated use. Further, the V&V is carried out in a simulated environment. It is very difficult to simulate the environment into. There could be some environmental conditions which have not been simulated and which could trigger the software state to an unsafe condition. Hence we use this methodology so as to predict if the current state or any further states in which an aircraft could exist would be safer one, if not, necessary steps could be carried out so as to make it safer.
Lokesh M R and Y.S Kumaraswamy
IEEE
Resiliency plays major role in developing reliable and robustness in cyber-physical system where the environment is diverse in nature. The cyber-physical system is model with Multi Agent Paradigm and biological inspired Danger Theory based-modified Artificial Immune Network Algorithm demonstrates on resiliency development. The propose algorithm defines resiliency as state awareness and healing process, with dendritic cells as Threshold-based agent population concentration and Artificial Recognization Ball as memory agent correspondingly. This algorithm is validated with simulation results as well numerical analyses.
Lokesh M. R and Y. S. Kumaraswamy
Global Vision Press
Disturbances to a system are inevitable. Resilience is thus utmost necessary to the system as it has to respond to the stresses and disturbances to keep the system stable. Cyber physical systems are physical engineered systems whose operations are monitored, coordinated, controlled and integrated by a computing communication core which is expected to transform the physical world around us. This paper proposes an autonomic self healing architecture for improving resiliency in cyber physical system using autonomic computing self management properties. This is a layered architecture in which each stage has a mechanism to collect state information of the system and monitor the system behavior, if the performance of the system is degraded in comparison to the normal level, self healing module is activated to facilitate recovery from damaged state and restoring to normal state, thereby achieving resilience in the system.