Papers by sudeepthi govathoti

Perfect Secrecy Designs for Contracted Rule Mining
Deleted Journal, 2015
Activates in allocated processing developments impelled the idea of providing details exploration... more Activates in allocated processing developments impelled the idea of providing details exploration as a management from thought to truth. Continuous performance of machines like Stat crunch, Data wrangler and so on appears verification to above case. A company (information holder) that needs aptitudes or computational resources can delegate its exploration requirements to an outsider reasoning management provider (daas). Business security defending framework is of most excessive important in these sort of freelancing workouts. It contains the details owners transforming their details and distribution them to server and after that launchs exploration questions to the server, and recuperates the example outcomes from the queries sent to the server. Previously works considered the 1-1 replacement determine content just attack design, where the adversary despite the fact that gets access to the scrambled factors, is not in a position to utilize the outcomes. Be that as it may this technique drops smooth in the attack designs where the aggressor knows a few places of factors and their determine principles. So rather than 1-1 replacement determine, we recommend to realize outstanding secret shows that require the area of a key for each details, enciphered details couple. It is implemented on the details candidate set totally to prohibit these rumours attacks. Our plan assures that whole factor places are uncertain, w.r.t. the aggressor's experience details of factor places. Test repercussions of our technique on a wide and true deal data source are at standard with former strategies featuring the expertise of our framework regarding flexibility, and security.
Detection of COVID-19 Using SIS-CODE Algorithm
Smart innovation, systems and technologies, 2023
Detection and Identification of Lung Cancer Using an Improvised CNN Model: A Novel Approach to Assist Doctors in Diagnosing Lung Cancer
Smart innovation, systems and technologies, 2023
Leveraging ARMA and ARMAX Time-Series Forecasting Models for Rainfall Prediction
2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS)

IEEE Transactions on Knowledge and Data Engineering, 2012
Clustering methods have to assume some cluster relationship among the data objects that they are ... more Clustering methods have to assume some cluster relationship among the data objects that they are applied on. Similarity between a pair of objects can be defined either explicitly or implicitly. The major difference between a traditional dissimilarity/similarity measure and ours is that the former uses only a only a single viewpoint, which is the origin, while the latter utilizes many different viewpoints, which are objects assumed to not be in the same cluster with the two objects being measured. Using multiple viewpoints, more informative assessment of similarity could be achieved. Theoretical analysis and empirical study are conducted to support this claim. Two criterion functions for document clustering are proposed based on this new measure. we compare them with several well-known clustering algorithms that use other popular similarity measures on various document collections to verify the advantages of our proposal.
A Hybrid Machine Learning Model to Recognize and Detect Plant Diseases in Early Stages
International Journal on Recent and Innovation Trends in Computing and Communication, Aug 30, 2023

SSRG international journal of electronics and communication engineering, May 31, 2023
This paper provides a comprehensive study of omnidirectional vision technology. Omnidirectional t... more This paper provides a comprehensive study of omnidirectional vision technology. Omnidirectional technology refers to devices or systems that can detect, transmit, or receive signals in all directions. This technology is widely used in various fields, such as telecommunications, robotics, and multimedia. Omnidirectional technology can enhance wireless communication, navigation, and sensing efficiency and accuracy. Omnidirectional vision and cameras are critical components of omnidirectional technology, enabling devices to operate and interact with their environment more comprehensively and efficiently. This paper presents a complete study on omnidirectional vision, omnidirectional images and a comparative investigation of omnidirectional camera systems and other camera systems by highlighting omnidirectional vision's unique benefits. Based on the investigations, this paper provides solutions to the privacy issues in omnidirectional cameras using the proposed privacy-preserved omnidirectional Camera (PPOMDC) algorithm. Overall, the paper offers a comprehensive analysis of omnidirectional vision technology, its components, and potential applications in various fields and addresses the privacy concerns in omnidirectional technology.
Exploring the Generations: A Comparative Study of Mobile Technology from 1G to 5G
International Journal of Electronics and Communication Engineering
Efficient diabetic retinopathy detection using convolutional neural network and data augmentation
Soft Computing

Deleted Journal, May 30, 2024
In order to achieve reliable, rapid, and affordable charging solutions, this study examines the s... more In order to achieve reliable, rapid, and affordable charging solutions, this study examines the several approaches and strategies used in electric vehicle wireless charging systems. Wireless charging offers an eco-friendly and user-friendly alternative to standard cable systems by doing away with the need for physical connections. In the first section of the review, presented below are the numerous modes of wireless power transfer, with an emphasis on the inductive & capacitive methods. Next, the essay delves into the several kinds of electric vehicle wireless charging systems, including mobile and static alternatives, and how they are categorised. Noteworthy to this research is its examination of dynamic charging systems' standard model and design characteristics, which enable wireless charging in moving vehicles. It also shows how important control system features are for effective power transmission and communication between charging receiver and transmitter parts. In addition to reviewing various battery models and comparing various types of batteries, the article acknowledges the crucial function that batteries play in electric vehicles and highlights how they affect the parameters of the charging system. Finally, the paper delves into a discussion of its findings and makes suggestions for further research in this area.

A Comprehensive Investigation of Some Popular Cryptographic Approaches - Implementation of Secured Semantic Meta Search Stack Using Proposed “Semantic Trust Crypto” Algorithm
The World Wide Web termed as a global information repository has a tremendous increase in informa... more The World Wide Web termed as a global information repository has a tremendous increase in information at faster rate. When valuable information across the web is transmitted from sender to receiver it has to be secured. An efficient cryptographic approach has to be employed to secure the database repository. The security provision for the semantic web stack is still a challenging task and numerous experiments are being carried out. This paper aims at securing semantic Meta search stack using proposed 'Semantic Trust Crypto' algorithm. The pruned semantic rich data security is achieved through encryption and decryption process. The encrypted content can be viewed through decryption only after proper authentication. In this paper a comprehensive investigation of some of the popular cryptographic approaches namely: Advance Encryption Standard (AES), Blow Fish (BF) and Triple Data Encryption (TDES) is studied. The stepwise implementation details and experimental results are illustrated. A relative performance evaluation of AES, TDES and Blowfish against proposed semantic trust crypto algorithm is also presented
A Survey On Meta Search Engine in Semantic Web
Abstract The Search engines plays an important role in the success of the Web, Search engines hel... more Abstract The Search engines plays an important role in the success of the Web, Search engines helps any Internet user to rapidly find relevant information. But the unsolved problems of current search engines have led to the development of the Semantic Web. In ...

International Journal of Advanced Computer Science and Applications
Designing an automation system for the agriculture sector is difficult using machine learning app... more Designing an automation system for the agriculture sector is difficult using machine learning approach. So many researchers proposed deep learning system which requires huge amount of data for training the system. The proposed system suggests that geometric transformations on the original dataset help the system to generate more images that can replicate the physical circumstances. This process is known as "Image Augmentation". This enhancement of data helps the system to produce more accurate systems in terms of all metrics. In olden days when researchers work with machine learning techniques they used to implement traditional approaches which are a time consuming and expensive process. In deep learning, most of the operations are automatically taken care by the system. So, the proposed system applies neural style and to classify the images it uses the concept of transfer learning. The system utilizes the images available in the open source repository known as "Kaggle", this majorly consists of images related to chilly, tomato and potato. But this system majorly focuses on chilly plants because it is most productive plant in the South Indian regions. Image augmentation creates new images in different scenarios using the existing images and by applying popular deep learning techniques. The model has chosen ResNet-50, which is a pretrained model for transfer learning. The advantage of using pretrained model lies in not to develop the model from scratch. This pre-trained model gives more accuracy with less number of epochs. The model has achieved an accuracy of "100%".

A Semantic model for building integrated Ontology databases
2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS), 2016
Ontology database is a most comprehensive data base application that collects the related informa... more Ontology database is a most comprehensive data base application that collects the related information from multiple data sources about any topic. Allowing multiple data sources into the database involves collection of irrelevant and redundant data. It leads to high memory utilization and more processing time. The user may be able to access the relevant data using appropriate software tools. In this paper a new Semantic model ontology Database Architectural framework is proposed to implement the Ontology databases efficiently. The proposed work actually concentrates on RDF-ization for converting the XML Records to RDF Records, so that the entire data can be stored into a triple store database. For efficient storage, triple store uses vertical partitioning algorithm for storing data in searchable format. It converts the entire data into indexes and keywords. Meta Search Engine Algorithm is used to retrieve the required result. It separates the fake data and original data and enables the user to access the data effectively.

The World Wide Web termed as a global information repository has a tremendous increase in informa... more The World Wide Web termed as a global information repository has a tremendous increase in information at faster rate. When valuable information across the web is transmitted from sender to receiver it has to be secured. An efficient cryptographic approach has to be employed to secure the database repository. The security provision for the semantic web stack is still a challenging task and numerous experiments are being carried out. This paper aims at securing semantic Meta search stack using proposed 'Semantic Trust Crypto' algorithm. The pruned semantic rich data security is achieved through encryption and decryption process. The encrypted content can be viewed through decryption only after proper authentication. In this paper a comprehensive investigation of some of the popular cryptographic approaches namely: Advance Encryption Standard (AES), Blow Fish (BF) and Triple Data Encryption (TDES) is studied. The stepwise implementation details and experimental results are illustrated. A relative performance evaluation of AES, TDES and Blowfish against proposed semantic trust crypto algorithm is also presented

In recent years World Wide Web has tremendous growth in the volume of information that makes very... more In recent years World Wide Web has tremendous growth in the volume of information that makes very difficult to locate information that is relevant to user’s interest. The search engine is the most important tool used to discover information in World Wide Web, but they are not appropriate nowadays as they do not crawl the deeper web [1]. Hence the concept of Meta search engine that is built on top of traditional search engines is adapted. This paper is aimed at the design and development of Meta search engine framework using horizontal partitioning relevancy criteria and result integration factor algorithm for efficient data retrieval. The input query given by the user gets forwarded to selected member search engines namely Google, Yahoo, and Bing. The data retrieved from member search engines are fused/merged and stored in the database. The proposed Meta Search engine framework has two core operations namely pruning and result integration. The data stored in fusion database is prune...

International Journal of Wireless and Mobile Communication for Industrial Systems, Dec 30, 2019
The polyhouse cultivation method provides high growth and improved productivity. To achieve prope... more The polyhouse cultivation method provides high growth and improved productivity. To achieve proper crop management it is necessary to collect the correct information to make decisions. In the current work we considered and proposed a framework which could able to collect the information related to polyhouse atmosphere and harvest status and manage the polyhouse. The polyhouse information is collected from different resources by using sampling method. Sampling method contains different strategies that are Simple random, stratified random, Stratified-systematic, Judgmental. Each method identifies the data in different location and collects the data. The collected data to be stored in the mongo database. The database utilize data cleansing, data scraping, data integration and data wrangling process to arrange the data for relevant user. It helps to fix the data in specific manner in the database. Finally, the user can retrieve the data using the Latent Indexing Algorithm to retrieve the data in specific manner. It helps the system to forecast and take steps on situations intended for completely guarded climatic circumstances. So that farmers can access the relevant information using IoT. After the cultivation process the farmers can also marketing their product directly through IoT.

International Journal of u- and e- Service, Science and Technology, Oct 31, 2017
Polyhouse is a structure which is constructed to provide secured and controlled environment for t... more Polyhouse is a structure which is constructed to provide secured and controlled environment for the proper growth of the plant. The polyhouse cultivation method provides high growth and improved productivity. To achieve proper crop management it is necessary to collect the correct information to make decisions. In the current work we considered and proposed a framework which could able to collect the information related to polyhouse atmosphere and harvest status and manage the polyhouse automatically based on the collected information. The polyhouse information is collected from different resources by using sampling method. Sampling method contains different strategies that are Simple random, stratified random, Stratified-systematic, Judgmental. Each method identifies the data in different location and collects the data. The collected data to be stored in the mongo database. The data base utilize data cleansing, data scarping, data integration and data wrangling process to arrange the data for relevant user. It helps to fix the data in specific manner in the database. Finally, the user can retrieve the data using the Latent Indexing Algorithm to retrieve the data in specific manner. It helps the system to forecast and take steps on situations intended for completely guarded climatic circumstances. So that farmers can access the relevant information using IoT. After the cultivation process the farmers can also marketing their product directly through IoT.

International Journal of Database Theory and Application
Recent years have observed the tremendous growth of information through the large number of domai... more Recent years have observed the tremendous growth of information through the large number of domains available in the web. Social media (LinkedIn, Twitter etc.) concentrate on handling massive data obtaining from various sources. It is a fact that information retrieval and data extraction are difficult tasks in handling the large collection of web documents. Semantic web is a new technology used to handle the massive raw data to transform it into knowledgeable representation. Traditional search engines use page ranking algorithms to find data from a large data sources. The proposed work is aimed at designing a user interface for data extraction from multiple repositories using Uniform Resource Identifiers (URIs) and applying inverted indexing techniques for generation of Ontologies. These methods may be used to develop efficient semantic web knowledge based systems for retrieving relevant information from the web.

The Semantic Web is an extension of the current web in which information is given well-defined me... more The Semantic Web is an extension of the current web in which information is given well-defined meaning.The perspective of Semantic Web is to promote the quality and intelligence of the current web by changing its contents into machine understandable form. Therefore, semantic level information is one of the cornerstones of the Semantic Web. The World Wide Web (WWW) allows the people to share the information (data) from the large database repositories globally. The amount of information grows billions of databases. We need to search the information will specialized tools known as generically available search engines. There are many of search engines available today, retrieving meaningfull information is difficult. However to overcome this problem in search engines to retrieve meaningful information intelligently based upon the user requirements semantic web technologies are playing a crucial role. semantic web is working to create machine readable data. Semantic search has the power to enhance traditional web search, but it will not replace it. Semantic web information is described using RDF(S), OWL, XML In this paper we present survey on the search engine generations and the role of search engines in intelligent web and semantic search engine technologies and paper we present the role of semantic web search engines and describes different technologies in semantic search engines and also deals with analysis and comparison of various semantic web search engines based on various parameter to find out their advantages and limitations. Based on the analysis of different search engines, a comparative study is done to identify relative strengths in semantic web search engines.
Uploads
Papers by sudeepthi govathoti