REDDI KIRAN KUMAR

@kru.ac.in

Associate Professor, Department of Computer Science
Krishna University



              

https://researchid.co/kirankreddi

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Science, Computer Engineering, Computer Science Applications, Artificial Intelligence

54

Scopus Publications

987

Scholar Citations

17

Scholar h-index

30

Scholar i10-index

Scopus Publications

  • Deep residual convolutional neural Network: An efficient technique for intrusion detection system
    Gunupudi Sai Chaitanya Kumar, Reddi Kiran Kumar, Kuricheti Parish Venkata Kumar, Nallagatla Raghavendra Sai, and Madamachi Brahmaiah

    Elsevier BV

  • Malicious Social Bots Detection in the Twitter Network Using Learning Automata with URL Features
    R. Kiran Kumar, G. Ramesh Babu, G. Sai Chaitanya Kumar, and N. Raghavendra Sai

    Springer Nature Singapore

  • Hiding information in an image using DNA cryptography
    P. Bharathi Devi, P. Ravindra, and R. Kiran Kumar

    Elsevier

  • Mutual clustered redundancy assisted feature selection for an intrusion detection system
    T. Veeranna and Kiran Kumar Reddi

    IOS Press
    Intrusion Detection is very important in computer networks because the widespread of internet makes the computers more prone to several cyber-attacks. With this inspiration, a new paradigm called Intrusion Detection System (IDS) has emerged and attained a huge research interest. However, the major challenge in IDS is the presence of redundant and duplicate information that causes a serious computational problem in network traffic classifications. To solve this problem, in this paper, we propose a novel IDS model based on statistical processing techniques and machine learning algorithms. The machine learning algorithms incudes Fuzzy C-means and Support Vector Machine while the statistical processing techniques includes correlation and Joint Entropy. The main purpose of FCM is to cluster the train data and SVM is to classify the traffic connections. Next, the main purpose of correlation is to discover and remove the duplicate connections from every cluster while the Joint entropy is applied for the discovery and removal of duplicate features from every connection. For experimental validation, totally three standard datasets namely KDD Cup 99, NSL-KDD and Kyoto2006+ are considered and the performance is measured through Detection Rate, Precision, F-Score, and accuracy. A five-fold cross validation is done on every dataset by changing the traffic and the obtained average performance is compared with existing methods.

  • APPLICATIONS OF MACHINE LEARNING TECHNIQUES TO GENERATE CROP PREDICTIONS WITH BETTER PRECISION
    R.Kiran Kumar R and K Anji Reddy

    The Electrochemical Society
    In most parts of India, agriculture has become a risky business and farmers suffer a lot due to unpredictable yield. The risk is mainly due to availability of water resources for cultivation and getting profitable prices in market. Prices alter between very high and very low, so crop planning has become very important for farmers to minimize the losses. Machine learning techniques can help to understand the under laying patterns from mass data and this patterns can be used to help farmers for crop planning, also it would reduce the risk of crop failure and guarantee a maximum profit for farmers to sustain their livelihood. But human knowledge cultivation is not sufficient to cater for the demanding need due to the rapid growth in the world's human population. In order to address this problem, this paper has studied the use of machine learning tools. It experimented with more than 0,3 million data. This dataset identifies key parameters of cultivation collected from the Bangladesh Agriculture Department. This study compared the number of machine learning algorithms to neural networks.

  • Sliding window assisted mutual redundancy-based feature selection for intrusion detection system
    Thotakura Veeranna and Kiran Kumar Reddy

    Inderscience Publishers

  • Robust Blood Vessels Segmentation Based on Memory-Augmented Neural Network
    K. Arunabhaskar and R. Kiran Kumar

    Springer Singapore

  • DNA Playfair Cryptosystem Based on 16 × 16 Key Matrix Using DNA ASCII Table
    P. Bharathi Devi, R. Kiran Kumar, and P. Ravindra

    Springer Singapore

  • An NLP hybrid recommendation system in crop selection for farmers


  • An Implementation on Agriculture Recommendation System Using Text Feature Extraction
    K. Anji Reddy and R. Kiran Kumar

    Springer International Publishing


  • Swarm-Inspired Task Scheduling Strategy in Cloud Computing
    Ramakrishna Goddu and Kiran Kumar Reddi

    Springer Singapore


  • Accurate liver disease prediction with extreme gradient boosting
    Sivala Vishnu Murty, , Dr. R Kiran Kumar, and

    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    Abstract-Machine learning is used extensively in medical diagnosis to predict the existence of diseases. Existing classification algorithms are frequently used for automatic detection of diseases. But most of the times, they do not give 100% accurate results. Boosting techniques are often used in Machine learning to get maximum classification accuracy. Though several boosting techniques are in place but the XGBoost algorithm is doing extremely well for some selected data sets. Building an XGBoost model is simple but improving the model by tuning the parameters is a challenging task. There are many parameters to the XGBoost algorithm and deciding what set of parameters to tune and the ideal values of these parameters is a cumbersome and time taking task. We, in this paper, tuned the XGBoost model for the first time for Liver disease prediction and got 99% accuracy by tuning some of the hyper parameters. It is observed that the model proposed by us exhibited highest classification accuracy compared to all other models built till now by machine learning researchers and some regularly used algorithms like Support Vector Machines (SVM), Naive Bayes (NB), C4.5 Decision tree, Random Belief Networks, Alternating Decision Trees (ADT) experimented by us.

  • A research on similarity measure to identify effective similar users in recommender systems
    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    In recent years there is a drastic increase in information over the internet. Users get confused to find out best product on the internet of one’s interest. Here the recommender system helps to filter the information and gives relevant recommendations to users so that the user community can find the item(s) of their interest from huge collection of available data. But filtering information from the users reviews given for various items seems to be a challenging task for recommending the user interested things. In general similarities between the users are considered for recommendations in collaborative filtering techniques. This paper describes a new collaborative filtering technique called Adaptive Similarity Measure Model [ASMM] to identify similarity between users for the selection of unseen items. Out of all the available items most similarities would be sorted out by ASMM for recommendation which varies from user to user

  • Enhanced classifier accuracy in liver disease diagnosis using a novel multi layer feed forward deep neural network
    Sivala Vishnu Murty, , Dr. R Kiran Kumar, and

    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    Classification techniques are often used for predicting Liver diseases and assist doctors in early detection of liver diseases. As per studies in the past and our experiments, conventional classification algorithms are found to be less accurate in predicting liver diseases. Therefore, there is a need for sophisticated classifiers in this area. For many medical applications, including Liver Diseases, Deep Neural Networks (DNNs) are used but the accuracies are not satisfactory. Deep Neural Network training is a time taking procedure, particularly if the hidden layers and nodes are more. Most of the times it leads to over fitting and the classifier does not perform well on unseen data samples .We, in this paper, tuned a Multi Layer Feed Forward Deep Neural Network (MLFFDNN) by fitting appropriate number of hidden layer and nodes, dropout function after each hidden layer to avoid over fitting, loss functions, bias, learning rate and activation functions for more accurate liver disease predictions. We used a balanced data set containing 882 samples. The data is collected from north coastal districts of Andhra Pradesh hospitals, India. The training process is carried out for 400 epochs and finally It is .observed that our model exhibited 98% accuracy at epoch 363 which is more than the performance of Neural Network models tuned till now by machine learning researchers and also some regularly used classification algorithms like Support Vector Machines (SVM), Naive Bayes (NB), C4.5 Decision Tree, Random Belief Networks and Alternating Decision Trees (ADT) .


  • Privacy preserving redundant data removal in cloud storage: RDRC


  • A review analysis on recommendation system



  • Detection and classification of trendy topics for recommendation based on Twitter data on different genre
    D. N. V. S. L. S. Indira, R. Kiran Kumar, G. V. S. N. R. V. Prasad, and R. Usha Rani

    Springer Singapore


  • A Novel Level-Based DNA Security Algorithm Using DNA Codons
    Bharathi Devi Patnala and R. Kiran Kumar

    Springer Singapore

  • Heuristic Algorithm based Approach to Classify EEG Signals into Normal and Focal
    V. Sankara Narayanan, R. Elavarasan, C.N. Gnanaprakasam, N. Sri Madhava Raja, and R. Kiran Kumar

    IEEE
    Condition of brain can be examined using the brain-signals and brain-images. Signal based evaluation is simple and offers essential information compared with the image based methods. This paper proposes an approach to evaluate the benchmark EEG signals. The implemented approach initially implements an amplitude based assessment to compute the peak-to-peak voltage value of the EEG signal. Later, it implements time-frequency conversation procedure to transfer the signal into image based on the wavelet transform. Further, the S-transform approach is considered to extract the essential signal features for the classifier system. Firefly-Algorithm (FA) based approach is also considered to choose leading signal features considered to train and test the classifier unit. In this work, classifiers, such as Support-Vector-Machine (SVM), Random-Forest (RF) and K-Nearest Neighbor (KNN) are implemented and the result of this work offered an average accuracy of 80.39%. The works confirms that, proposed procedure offers better result on the chosen EEG signals.

  • SEE: Synchronized Efficient Energy Calculation for Topology Maintenance & Power Saving in Ad Hoc Networks
    T. Santhi Sri, J. Rajendra Prasad, and R. Kiran Kumar

    Springer Science and Business Media LLC

RECENT SCHOLAR PUBLICATIONS

  • Deep residual convolutional neural Network: An efficient technique for intrusion detection system
    GSC Kumar, RK Kumar, KPV Kumar, NR Sai, M Brahmaiah
    Expert Systems with Applications 238, 121912 2024

  • Tetraspanin CD82 Correlates with and May Regulate S100A7 Expression in Oral Cancer
    KK Reddi, W Zhang, S Shahrabi-Farahani, KM Anderson, M Liu, ...
    International Journal of Molecular Sciences 25 (5), 2659 2024

  • SOLVING THE TASK OF LOCAL OPTIMA TRAPS IN DATA MINING APPLICATIONS THROUGH INTELLIGENT MULT-AGENT SWARM AND ORTHOPAIR FUZZY SETS.
    RK Kumar, P Chengamma, AS Kumar, G Kumar
    ICTACT Journal on Soft Computing 14 (3) 2024

  • Design & deployment of a smart chatbot using emerging technologies
    S Rao, RK Kumar, MH Bindu, DS Sanjit, K Tarun, K Reddy
    AIP Conference Proceedings 2796 (1) 2023

  • Mutual Clustered Redundancy and Composite Learning for Intrusion Detection Systems.
    T Veeranna, RK Kumar
    International Journal of e-Collaboration 19 (3) 2023

  • Malicious Social Bots Detection in the Twitter Network Using Learning Automata with URL Features
    RK Kumar, GR Babu, GSC Kumar, NR Sai
    International Conference on Computer Vision, High-Performance Computing 2022

  • Design Validation of High Current Injector Facility at IUAC DELHI
    RV Hariwal, R Ahuja, P Barua, RK Gurjar, S Kedia, A Kothari, A Kumar, ...
    2022

  • Sliding window assisted mutual redundancy-based feature selection for intrusion detection system
    T Veeranna, KK Reddy
    International Journal of Ad Hoc and Ubiquitous Computing 40 (1-3), 176-186 2022

  • Mutual clustered redundancy assisted feature selection for an intrusion detection system
    T Veeranna, KK Reddi
    Journal of High Speed Networks 28 (4), 257-273 2022

  • Hiding Information in an Image using DNA Cryptography
    VRRKK P.Bharathi Devi
    Elsevier, 1-38 2022

  • Applications of Machine learning techniques to generate crop predictions with better precison
    KA Dr.R.Kiran Kumar
    ECS Transactions 107 (1), 19919-19930 2022

  • Ab-initio electronic structure simulations of transition metal doped Bi2Se3 topological insulator
    R Kumar, D Bhattacharyya
    Superlattices and Microstructures 159, 107033 2021

  • Transport properties of perovskite-based stannate thin films of La-doped SrSnO3
    Y Kumar, R Kumar, K Asokan, R Meena, RJ Choudhary, AP Singh
    Superlattices and Microstructures 158, 107028 2021

  • Design and Development of Non-Linearly Controlled Class-D Audio Amplifier. Electronics 2022, 11, 77
    S Joshi, R Tripathi, M Badoni, R Kumar, P Khetrapal
    s Note: MDPI stays neutral with regard to jurisdictional claims in published 2021

  • Screen Time for Children and Adolescents During the COVID 19: Is your kid investing more energy gazing at a screen than playing?
    R Ahuja, R Kumar, P Phogat
    Turkish Journal of Computer and Mathematics Education, 2862-2864 2021

  • Robust Blood Vessels Segmentation Based on Memory-Augmented Neural Network
    K Arunabhaskar, R Kiran Kumar
    Communication Software and Networks: Proceedings of INDIA 2019, 425-433 2021

  • DNA Playfair Cryptosystem Based on 16 16 Key Matrix Using DNA ASCII Table
    P Bharathi Devi, R Kiran Kumar, P Ravindra
    Communication Software and Networks: Proceedings of INDIA 2019, 529-538 2021

  • Runtime based recommendations on netflix data using sbe-xgboost model
    DGP Rajeswari Nakka, RK Kumar
    Solid State Technology 63 (4), 2304-2321 2020

  • Offering Recommendations on Netflix dataset by Associations among Users as Trust Metric
    DGP Rajeswari Nakka, RK Kumar
    2020

  • Swarm-inspired task scheduling strategy in cloud computing
    R Goddu, KK Reddi
    Innovative Product Design and Intelligent Manufacturing Systems: Select 2020

MOST CITED SCHOLAR PUBLICATIONS

  • A survey on conventional encryption algorithms of Cryptography
    R Yegireddi, RK Kumar
    2016 International Conference on ICT in Business Industry & Government 2016
    Citations: 51

  • Different Technique to Transfer Big Data: survey
    KK Reddi, D Indira
    IEEE Transactions on 52 (8), 2348-2355 2013
    Citations: 47

  • Clustering algorithm combined with hill climbing for classification of remote sensing image
    BS Chandana, K Srinivas, RK Kumar
    International Journal of Electrical and Computer Engineering 4 (6), 923 2014
    Citations: 43

  • Multiple feature fuzzy c-means clustering algorithm for segmentation of microarray images
    J Harikiran, PV Lakshmi, RK Kumar
    International Journal of Electrical and Computer Engineering 5 (5) 2015
    Citations: 35

  • Fuzzy c-means with bi-dimensional empirical mode Decomposition for segmentation of microarray image
    J Harikiran, D RamaKrishna, ML Phanendra, PV Lakshmi, RK Kumar
    International Journal of Computer Science Issues (IJCSI) 9 (5), 316 2012
    Citations: 33

  • Determination of Optimal Clusters for a Non-hierarchical Clustering Paradigm K-Means Algorithm
    TV Sai Krishna, A Yesu Babu, R Kiran Kumar
    Proceedings of International Conference on Computational Intelligence and 2018
    Citations: 32

  • Comparative analysis of google file system and hadoop distributed file system
    R Vijayakumari, R Kirankumar, KG Rao
    International Journal of Advanced Trends in Computer Science and Engineering 2014
    Citations: 30

  • An efficient data retrieval approach using blowfish encryption on cloud ciphertext retrieval in cloud computing
    S Mudepalli, VS Rao, RK Kumar
    2017 International conference on intelligent computing and control systems 2017
    Citations: 25

  • AUTOMATIC GRIDDING METHOD FOR MICROARRAY IMAGES.
    J Harikiran, B Avinash, PV LAKSHMI, R Kirankumar
    Journal of Theoretical & Applied Information Technology 65 (1) 2014
    Citations: 24

  • A novel algorithm for scaling up the accuracy of decision trees
    AM Mahmood, KM Rao, KK Reddi
    International Journal on Computer Science and Engineering 2 (2), 126-131 2010
    Citations: 24

  • Image fusion in hyperspectral image classification using genetic algorithm
    B Saichandana, K Srinivas, RK Kumar
    Indonesian Journal of Electrical Engineering and Computer Science 2 (3), 703-711 2016
    Citations: 23

  • Fast clustering algorithms for segmentation of microarray images
    J Harikiran, PV Lakshmi, DRK Kumar
    International Journal of Scientific & Engineering Research 5 (10), 569-574 2014
    Citations: 22

  • Noise removal in microarray images using variational mode decomposition technique
    GSC Kumar, RK Kumar, GA Naidu, J Harikiran
    TELKOMNIKA (Telecommunication Computing Electronics and Control) 15 (4 2017
    Citations: 20

  • Application of BEMD and hierarchical image fusion in hyperspectral image classification
    B Saichandana, K Srinivas, J Harikiran, RK Kumar
    International Journal of Computer Science and Information Security 14 (5), 437 2016
    Citations: 20

  • Improved cuckoo search with particle swarm optimization for classification of compressed images
    V Enireddy, RK Kumar
    Sadhana 40 (8), 2271-2285 2015
    Citations: 20

  • Huffbit compress—Algorithm to compress DNA sequences using extended binary trees
    PR Rajeswari, A Apparao, RK Kumar
    Journal of Theoretical and Applied Information Technology 13 (2), 101-106 2010
    Citations: 20

  • CO2 Flooding a Waterflooded Shallow Pennsylvanian Sand in Oklahoma: A Case History
    R Kumar, JN Eibeck
    SPE Improved Oil Recovery Conference?, SPE-12668-MS 1984
    Citations: 19

  • Spot edge detection in microarray images using bi-dimensional empirical mode decomposition
    J Harikiran, Y NarasimhaRao, B Saichandana, PV Lakshmi, RK Kumar
    Procedia Technology 4, 227-231 2012
    Citations: 17

  • Optimization of neural network for software effort estimation
    PS Rao, KK Reddi, RU Rani
    2017 International Conference on Algorithms, Methodology, Models and 2017
    Citations: 16

  • A new method of gridding for spot detection in microarray images
    J Harikiran, D Ramakrishna, B Avinash, PV Lakshmi, R KiranKumar
    Computer Engineering and Intelligent Systems 5 (3), 25-33 2014
    Citations: 16