Vijayawada, India

K L University, officially the Koneru Lakshmaiah Education Foundation, is a deemed university located in the Vaddeswaram Guntur District of Andhra Pradesh, India. K L University consists of 11 academic departments and six schools, with a strong emphasis on scientific and technological research.Established in 1980, the college is located on a 100-acre site adjacent to Buckingham Canal, and is about 8 kilometres from Vijayawada in Krishna District and 20 km from Guntur City. The institution is recognized by the All India Council for Technical Education, New Delhi, has been accredited by the National Board of Accreditation, and is certified by ISO 9001 - 2000. It has been accredited by National Assessment and Accreditation Council with an A grade. Wikipedia.

Time filter

Source Type

Polu A.R.,Koneru Lakshmaiah College of Engineering | Kumar R.,Dr Hari Singh Gour University
Advanced Materials Letters | Year: 2013

Composite polymer electrolyte films consisting of polyethylene glycol (PEG), Mg(CH3COO)2 and Al2O3 particles have been prepared by solution casting technique. The X-ray diffraction patterns of PEG-Mg(CH3COO)2 with Al2O3 ceramic filler, indicates the decrease in the degree of crystallinity with increasing concentration of the filler. The role of ceramic phase is to reduce the melting temperature which is ascertained from the DSC. The effect of ceramic filler on the conductivity of the polymer electrolyte was studied. The maximum ionic conductivity has been observed for 10 wt% of Al2O3 at room temperature (303 K). The transference number data indicated the dominance of ion-type charge transport in these composite polymer electrolytes. Using this (PEG-Mg(CH3COO)2-Al2O3) (85-15-10) electrolyte, solid-state electrochemical cell was fabricated and their discharge profiles were studied under a constant load of 100 kO. Several cell profiles associated with this cell were evaluated and are reported.©2013 VBRI press.

Parappagoudar M.B.,Chhatrapati Shivaji Institute of Technology | Kodali S.P.,Koneru Lakshmaiah College of Engineering
Knowledge-Based Systems | Year: 2012

The development of an expert system for abrasive water jet machining (AWJM) process is considered in the present work. The expert system has been developed by using fuzzy logic (FL). It is to be noted that the performance of AWJM in terms of depth of cut depends on various process parameters, such as diameter of focusing nozzle, water pressure, abrasive mass flow rate and jet traverse speed. Three approaches have been developed to predict the depth of cut in AWJM using FL system. The first Approach deals with the construction of Mamdani-based fuzzy logic system. It is important to note that the performance of the FL depends on its knowledge base. In Approach 2, the data base and rule base of the FL-system are optimized, whereas in the third Approach, the total FL-system is evolved automatically. A binary-coded genetic algorithm has been used for the said purpose. The developed expert system eliminates the need of extensive experimental work, to select the most influential AWJM parameters on the depth of cut. The performances of the developed FL-systems have been tested to predict the depth of cut in AWJM process with the help of test cases. The prediction accuracy of the automatic FL-system (i.e. Approach 3) is found to be better than the other two approaches. © 2011 Elsevier B.V. All rights reserved.

Patel D.,Koneru Lakshmaiah College of Engineering
International Journal of Pharma and Bio Sciences | Year: 2011

Despite their enormous utility and diffusion, atmospheric pressure ionization mass spectrometry techniques are subjected to relevant drawbacks called matrix effects (ME). These effects could be summarized in matrix-dependent signal suppression or enhancement that could lead to erroneous quantitative results. The most important method parameters as well as linearity, precision, and accuracy could be modified due to interfering compounds present in the matrix. No validation methods could be accepted without a thorough evaluation of ME and possible strategies to minimize or to correct their influence should be addressed. Matrix effects result from co-eluting residual matrix components affecting the ionization efficiency of target analytes and can lead to erroneous results. Matrix effects, i.e. ion suppression or ion enhancement, are well known phenomena in liquid chromatography-mass spectrometry (LC-MS). They can be caused by compounds of various origins. Since matrix effects may exert a negative effect on important method performance parameters, they have to be tested for and evaluated during method development/validation. This can either be done by the method of postcolumn infusion or by comparison of signals from neat standards and blank sample extracts spiked with analyte. Wherever possible, matrix effects should be reduced or eliminated by the optimization of chromatographic conditions, improving sample clean-up and/or by changing the type of ionization employed. In the present article, we have concentrated on detailed description of matrix effects in a view of LC-MS/MS.

Reddy G.V.R.,Koneru Lakshmaiah College of Engineering
International Journal of Applied Mechanics and Engineering | Year: 2016

An MHD fluid flow is examined over a vertical plate in the presence of Dufour and Soret effects. The resulting momentum, energy and concentration equations are then made similar by introducing the usual similarity transformations. These similar equations are then solved numerically using the Runge-Kutta fourth order method with shooting technique. The effects of various parameters on the dimensionless velocity, temperature and concentration profiles as well as the local values of the skin-friction coefficient, the Nusselt number and Sherwood number are displayed graphically and in a tabular form. A comparison with previously published work is obtained and an excellent agreement is found. © 2016 G.V.R. Reddy.

Bodiga V.L.,Krishna University | Eda S.R.,Koneru Lakshmaiah College of Engineering | Bodiga S.,Koneru Lakshmaiah College of Engineering
Heart Failure Reviews | Year: 2014

Increasing evidence demonstrates that advanced glycation end products (AGEs) play a pivotal role in the development and progression of diabetic heart failure, although there are numerous other factors that mediate the disease response. AGEs are generated intra- and extracellularly as a result of chronic hyperglycemia. Then, following the interaction with receptors for advanced glycation end products (RAGEs), a series of events leading to vascular and myocardial damage are elicited and sustained, which include oxidative stress, increased inflammation, and enhanced extracellular matrix accumulation resulting in diastolic and systolic dysfunction. Whereas targeting glycemic control and treating additional risk factors, such as obesity, dyslipidemia, and hypertension, are mandatory to reduce chronic complications and prolong life expectancy in diabetic patients, drug therapy tailored to reducing the deleterious effects of the AGE-RAGE interactions is being actively investigated and showing signs of promise in treating diabetic cardiomyopathy and associated heart failure. This review shall discuss the formation of AGEs in diabetic heart tissue, potential targets of glycation in the myocardium, and underlying mechanisms that lead to diabetic cardiomyopathy and heart failure along with the use of AGE inhibitors and breakers in mitigating myocardial injury. © Springer Science+Business Media 2013.

Mulaveesala R.,Indian Institute of Technology Ropar | Ghali V.S.,Koneru Lakshmaiah College of Engineering | Arora V.,Indian Institute of Technology Ropar
Electronics Letters | Year: 2013

The active thermal nondestructive testing and evaluation method is a rapidly growing testing procedure for a quick and remote inspection procedure for fibre-reinforced plastics. Conventional modulated lockin thermography significantly contributed to this field by allowing usage of low peak power controlled stimulations followed by phase based detail extraction procedures. But demand of repetitive experimentation required for depth scanning of the test object limits its applicability for realistic critical applications and demands multi-frequency low power stimulations for better resolution and sensitivity for subsurface defect detection. Frequency modulated thermal wave imaging and coded excitation thermal wave imaging methods permitting multi-frequency stimulations cater for these needs and facilitate depth scanning of the test object in a single experimentation cycle. Recently introduced three-dimensional pulse compression is an alternative to phase based analysis for these stimulations by providing enhanced defect detection even in noisy environmental and experimental conditions. Defect detection capability and sizing by these nonstationary thermal wave imaging methods are highlighted using the pulse compression approach. The present experimental study has been carried out on a carbon fibre reinforced plastic specimen with flat bottom holes. © The Institution of Engineering and Technology 2013.

Jetty P.,Koneru Lakshmaiah College of Engineering
International Journal of Applied Engineering Research | Year: 2014

The usage of internet and its applications has increased tremendously in our day to day lives. We are utilizing the internet for various purposes such as communication, gathering the information, educational purpose, financial transactions, real time updates etc… Sensitive data and information is being transmitted through the internet. Hence it is important to provide information security to the data that is being transmitted. Cryptography provides the information security by various mechanisms. Encryption algorithms are one such mechanism that provide the security services. The encryption algorithms scramble the plain text of the message using a key shared between the communicating parties into unreadable text which can be decoded only using the key. Data Encryption Standard (DES) is one such algorithm to provide data security. It is further modified as Triple DES (3DES) to provide added security due to the extra key length. In DES, 3DES the data is coded in binary system. Avalanche effect is the variation that is observed in the cipher text due to one bit variation in the plain text. In this paper we implement Triple DES algorithms in which the plain text is encoded using various binary coded decimal systems such as 8421, 7421, 5421, excess-3, gray code etc…before encrypting it and then observe the avalanche effect. Variations in the avalanche affect are observed in the results. Experimental results exhibit a higher avalanche effect when the plain text is encoded in some of the binary coded decimal systems. © Research India Publications.

Swain G.,Koneru Lakshmaiah College of Engineering
Procedia Computer Science | Year: 2016

In the recent past some steganography techniques by combining least significant bit (LSB) substitution and pixel value differencing (PVD) have been proposed to improve upon the hiding capacity and peak signal-to-noise ratio (PSNR). This paper proposes a steganographic technique by using both LSB substitution and PVD with in a block. The image is partitioned into 2×2 pixel blocks in a non-overlapping fashion. For every 2×2 pixel block the upper-left pixel is embedded with k-bits of data using LSB substitution. Then the new value of this pixel is used to calculate three pixel value differences with the upper-right, bottom-left, and bottom-right pixels of the block. Then data bits are hidden using these three difference values in three directions. Both horizontal and vertical edges are considered. There are two variants proposed by using two different range tables. In the first variant (Type 1) the PSNR is improved and in the second variant (Type 2) both PSNR and hiding capacity are improved. © 2016 The Authors. Published by Elsevier B.V.

Swain G.,Koneru Lakshmaiah College of Engineering
Procedia Computer Science | Year: 2016

This paper presents two new steganography methods in spatial domain. The basic idea is the substitution of a group of bits in a pixel by another group of bits of same length to hide one or two bits of secret data. The number of bits selected for substitution in a pixel depends upon some pre-defined conditions. The first method hides one bit per pixel and the second method hides two bits per pixel. Although a group of bits are substituted in a pixel, but the maximum change in a pixel value is not more than 2. The security has been improved by making the group length variable for different pixels. In most of the cases the pixel value remains same, but it hides one or two bits of secret data. The experimental results are compared with other methods and found to be satisfactory. The security has been evaluated and found to be improved. © 2016 The Authors. Published by Elsevier B.V.

Shafivulla M.,Koneru Lakshmaiah College of Engineering
Procedia Computer Science | Year: 2016

This paper present the use of hand gestures for human-computer interaction, this paper presents an approach to identify hand gestures using muscle activity separated from electromyogram (EMG) using ANN. To retain a constraint-free user's environment, EMG sensing is limited to three arm muscles. EMG signals are processed to attain parameters that are related to the muscles temporal activities. The attainment of these parameters through time constructs a unique signature for each particular gesture. Experimental investigation was carried out to examine the system's reliability in recognizing 6 arm gestures. The results show that the system can recognize the 6 gestures with a success rate of 97.5%. The advantage of such a system is that it is easy to train by a layer, and can easily be implemented in real time after the initial training. © 2016 The Authors. Published by Elsevier B.V.

Loading Koneru Lakshmaiah College of Engineering collaborators
Loading Koneru Lakshmaiah College of Engineering collaborators