Keshav Memorial Institute of Technology

Narayanguda, India

Keshav Memorial Institute of Technology

Narayanguda, India
Time filter
Source Type

Rallapalli H.,Osmania University | Bandari S.,Keshav Memorial Institute of Technology | Anudeep V.,Aurotech GMBH
2016 IEEE Annual India Conference, INDICON 2016 | Year: 2016

Today, we find many children with difficulties in dealing with physical and mental tasks. Technology promotes welfare of the differently abled children along with bringing social justice to them on humanitarian grounds. Assistive devices with sensor technology are the humanitarian technologies which are essentially required for the differently abled children. They can have a better life if they are provided with assistive devices with sensor technology i.e., assistive technology. Technology has a great impact on the differently abled child's life as the child becomes independent in performing his day to day activities. The parents of differently abled children expect that there should not be any socio-psychological restrictions to their child. Disability of the child can have less impact on the development of the child and even their family if the child can perform the activities independently which can be achieved with the help of assistive technologies. Assistive technology not only helps the differently abled children to lead a normal life but also helps the children to overcome their disability and get educated. In India, statistics reveal that differently abled children are more in rural areas than in urban areas. The main reason for this situation is unavailability of good pediatrician and gynecologist. Differently abled children in rural areas are discriminated. Some of these children are even abandoned during childhood. The reason being, such parents are not educated, they have low socio economic background and lack of knowledge in latest technologies. Technology has opened plethora of opportunities for assisting differently abled children. This paper mainly focuses on providing the information of the assistive devices with low cost sensor technology which are helpful for the (i) Autistic children (ii) Children with visual impairment and Dyslexia and (iii) Physically challenged children. © 2016 IEEE.

Kiranmai B.,Keshav Memorial Institute of Technology | Damodaram A.,Sri Venkateswara University
Proceedings of the 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology, iCATccT 2016 | Year: 2017

The leading of Computing Paradigm is Cloud. One Sword two edges. One side is growing in terms of technology and user can use any where any time, and the other edge is security probing to data loss, data theft, data hijacking and acting as someone else. The user or data should be given protection to enjoy the benefits of the cloud. There are various kinds of attacks taking place in Cloud which are undetected for years. One kind of attack is DDos and its variants are causing damage in cloud. In our paper we addressed DDoS attacks using Ensemble Cluster Plus technique which helps in identifying genuinely of the user. © 2016 IEEE.

Kudikyala U.K.,Keshav Memorial Institute of Technology
Proceedings of the 2015 IEEE 3rd International Conference on MOOCs, Innovation and Technology in Education, MITE 2015 | Year: 2015

Computer Science and Engineering (CSE) and Information Technology (IT) students are not adequately exposed to implementing a software development methodology or a project management framework to develop software as per the current curriculum. The students' final year Project Work was selected to apply an industry-oriented Agile software development methodology. Specifically, we employed the most popular Agile project management and development framework called Scrum. Wiki pages were used to convey our expectations to students regarding project work. They were used as a collaborative tool by the team members during project implementation. In this paper, we present our experiences and lessons learned from applying the Scrum framework and using a collaborative Web 2.0 tool called Wikispaces in managing students' major projects. © 2015 IEEE.

Mohanty R.,Keshav Memorial Institute of Technology | Ravi V.,Banking Technology | Patra M.R.,Berhampur University
Applied Soft Computing Journal | Year: 2013

In this paper, we propose novel recurrent architectures for Genetic Programming (GP) and Group Method of Data Handling (GMDH) to predict software reliability. The effectiveness of the models is compared with that of well-known machine learning techniques viz. Multiple Linear Regression (MLR), Multivariate Adaptive Regression Splines (MARS), Backpropagation Neural Network (BPNN), Counter Propagation Neural Network (CPNN), Dynamic Evolving Neuro-Fuzzy Inference System (DENFIS), TreeNet, GMDH and GP on three datasets taken from literature. Further, we extended our research by developing GP and GMDH based ensemble models to predict software reliability. In the ensemble models, we considered GP and GMDH as constituent models and chose GP, GMDH, BPNN and Average as arbitrators. The results obtained from our experiments indicate that the new recurrent architecture for GP and the ensemble based on GP outperformed all other techniques. © 2012 Elsevier B.V.

Chandan K.,Keshav Memorial Institute of Technology | van Iersel M.P.,Maastricht University | Aladjem M.I.,U.S. National Institutes of Health | Kohn K.W.,U.S. National Institutes of Health | And 2 more authors.
Bioinformatics | Year: 2012

Purpose: The PathVisio-Validator plugin aims to simplify the task of producing biological pathway diagrams that follow graphical standardized notations, such as Molecular Interaction Maps or the Systems Biology Graphical Notation. This plugin assists in the creation of pathway diagrams by ensuring correct usage of a notation, and thereby reducing ambiguity when diagrams are shared among biologists. Rulesets, needed in the validation process, can be generated for any graphical notation that a developer desires, using either Schematron or Groovy. The plugin also provides support for filtering validation results, validating on a subset of rules, and distinguishing errors and warnings. © Published by Oxford University Press 2011.

Kutmon M.,Maastricht University | Riutta A.,Gladstone | Nunes N.,Maastricht University | Hanspers K.,Gladstone | And 11 more authors.
Nucleic Acids Research | Year: 2016

WikiPathways ( is an open, collaborative platform for capturing and disseminating models of biological pathways for data visualization and analysis. Since our last NAR update, 4 years ago, WikiPathways has experienced massive growth in content, which continues to be contributed by hundreds of individuals each year. New aspects of the diversity and depth of the collected pathways are described from the perspective of researchers interested in using pathway information in their studies. We provide updates on extensions and services to support pathway analysis and visualization via popular standalone tools, i.e. PathVisio and Cytoscape, web applications and common programming environments. We introduce the Quick Edit feature for pathway authors and curators, in addition to new means of publishing pathways and maintaining custom pathway collections to serve specific research topics and communities. In addition to the latest milestones in our pathway collection and curation effort, we also highlight the latest means to access the content as publishable figures, as standard data files, and as linked data, including bulk and programmatic access. © The Author(s) 2015.

Sastry V.U.K.,Sreenidhi Institute of Science and Technology | Shankar N.R.,Keshav Memorial Institute of Technology | Bhavani S.D.,Jawaharlal Nehru Technological University
Cybernetics and Information Technologies | Year: 2013

In this paper we have developed a block cipher, wherein the size of the key matrix is 384 bits and the size of the plain text is as large as we choose. The permutation, the interlacing and the iteration introduced in this analysis are found to cause diffusion and confusion efficiently. Hence, the strength of the cipher proves to be remarkable.

Vasantha S.V.,Keshav Memorial Institute of Technology | Damodaram A.,Sri Venkateswara University
2015 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2015 | Year: 2015

As the technology gets advanced so as the security issues come into the picture. Here we will discuss about one such advancement in the modern world for communication purpose which is ruled by wireless networking. Precisely MANET (Mobile Adhoc Network) plays a huge role in transmission of data without any wired structure. Its distinct nature of maintaining the nodes and links to transmit the data at faster rate has proven its importance in communication media. The major issue with mobile adhoc network is security, there are two major such type of security issues which affects the MANET while transmitting data are Black hole and Gray hole attacks. This paper proposes Bulwark-AODV which prevents single or cooperative Black hole attacks by identifying malicious route replies at source and intermediate nodes and finds a shortest valid path. It also works in case of single adjacent node to the source and when there are multiple Black holes in the network. It detects Gray holes by snooping the ACKs of data packets. Forgery of ACK if any is identified by the source through checking the return time of ACK. Simulation results indicates better performance even though special cases are considered. © 2015 IEEE.

Mohanty R.,Keshav Memorial Institute of Technology | Rani K.J.,Keshav Memorial Institute of Technology
Proceedings - 2015 International Conference on Computational Intelligence and Communication Networks, CICN 2015 | Year: 2015

In the modern society, mobile communication became the leading medium of communication. Now the public policies and standardization of mobile communication allows customers to switch from one service provider to another service provider easily. One of the most critical challenges in data and voice telecommunication service industry is retaining customers. The cost of retaining an existing customer is lesser than the cost of getting a new customer. So service providers now shifted their focus from customer acquisition to customer retention. As a result, churn prediction has emerged as the most essential Business Intelligence (BI) application that aims to identify the customers who are about to transfer their service to a competitor i.e. To churn. In this paper, we proposed Counter Propagation Neural Networks (CPNN), Classification and Regression Trees (CART), J48 and fuzzy ARTMAP to predict customer churn and non-churn in telecommunication sector. The dataset analyzed is taken from Indian Telecommunication Service Industry. © 2015 IEEE.

Seshagiri Rao N.V.S.S.,Birla Institute of Technology and Science | Satya Narayana Murthy V.,Birla Institute of Technology and Science | Ramakrishna Sharma Y.J.V.S.,Keshav Memorial Institute of Technology
Bulletin of Materials Science | Year: 2016

We studied the magnetization reversal mechanism of single-layered Co50Fe50 nanomagnets by measuring the magnetization reversal and using the micromagnetic simulations. The magnetization reversal strongly depends on the thickness of the nanomagnets. In the remanent state, the magnetic force microscopy studies and the simulation data showed the formation of single and vortex states depending on the thickness of nanomagnets. © Indian Academy of Sciences.

Loading Keshav Memorial Institute of Technology collaborators
Loading Keshav Memorial Institute of Technology collaborators