Academic Positions

  • Present 2010

    Assistant Professor

    Gudlavalleru Engineering College, Computer Science & Engineering.

  • 2008 2007

    Lecturer

    AANM & VVRSR Polytechnic, Computer Engineering

Education & Training

  • M.Tech 2010

    Information Technology

    Institute of Technology, GITAM University

  • B.Tech.2007

    Bachelor of Technology

    Pondicherry University

  • DCME2003

    Diploma in Computer Engineering

    SBTET - Andhra Pradesh

Honors, Awards and Grants

  • CECNet 2016
    Distinguished Reviewer
    image
    Reviewer for 6th International Conference on Electronics, Communications and Networks (CECNet 2016). http://paper.academicconf.com/Reviewers.aspx?confname=CECNET2016.
  • CECNet 2015
    Distinguished Reviewer
    image
    Reviewer for 5th International Conference on Electronics, Communications and Networks (CECNet 2015). http://paper.academicconf.com/Reviewers.aspx?confname=CECNET2015.
  • CECNet 2014
    Distinguished Reviewer
    image
    Reviewer for 4th International Conference on Electronics, Communications and Networks (CECNet 2014). http://paper.academicconf.com/Reviewers.aspx?confname=CECNET2014.
  • IJCSIT
    Distinguished Reviewer
    image
    Reviewer for AIRCC's International Journal of Computer Science and Information Technology (IJCSIT).
  • JES&A
    Distinguished Reviewer
    image
    Reviewer for "Journal of Embedded System & Applications” (JES&A) from August 2013.
  • IRDIndia
    Mentor
    image
    Mentor for Institute for Research and Development India. “http://ird-india.com/our-mentors”.

Professional Certifications

  • Google for Education
    Basics Exam
    image
    Basics Exam has successfully completed and conducted by Google in AUG-2014.
  • Google Adsense
    Optimizing Adsense
    image
    Optimizing Adsense has successfully completed and conducted by Google in MAY-2014.
  • Microsoft Certified Professional
    Microsoft Recognized as Professional
    image
    Microsoft recognized as Professional in JULY-2013.
  • Microsoft Technical Associate
    Microsoft Security Fundamentals
    image
    Microsoft Security Fundamentals Conducted by Microsoft in AUG-2013.
  • IBM Certified Database Associate
    DB2 9 Fundamentals
    image
    DB2 9 Fundamentals conducted by IBM in APR-2010.

Laboratory Personel

Deepika Rayapalli

Postgraduate fellow

+ Follow

Venky Chilamakurthi

Postgraduate fellow

+ Follow

Mannem Sailaja

Postgraduate fellow

+ Follow

Chaitanya Vemali

Postgraduate fellow

+ Follow

Surapaneni Sri Lakshmi

Postgraduate fellow

+ Follow

Potluri Avinash

Postgraduate fellow

+ Follow

V V R Manoj

Postgraduate fellow

+ Follow

Sunitha

Postgraduate fellow

+ Follow

Anantharamaiah

Postgraduate fellow

+ Follow

Aravind Mandala

Postgraduate fellow

+ Follow

Great lab Personel!

I have seen many phases of life; I have moved in imperial circles, I have been a teacher; but if I had to live my life again, I would always remain in my laboratory, for the greatest joy of my life has been to accomplish original scientific work, and, next to that, to lecture to a set of intelligent students.

Research Projects

  • image

    Monitoring the power consumption of street lights using smart lighting

    Very short description of the project.

    This project aims at designing and executing the advanced development in automation of street lights. Now a days, human has become too busy and is unable to find time to switch the lights wherever not necessary. The present system is like, the street lights will be switched on in the evening before the sun sets and they are switched off the next day morning after there is sufficient light on the roads by human effort. This project gives the best solution for the electrical power wastage and also the manual operation of the lighting system is completely eliminated. In this project a sensor is used which is Light Dependent Resistor LDR sensor to indicate a day/night time, relay[able to switch a much larger amount of power] and the arduino is used as brain to control the street lights system. This project also maintains the ON & OFF time and LDR sensor values on cloud (thingspeak.com) where we can monitor the energy consumption of street lights based on the recorded values on cloud.

  • image

    A Solar Based Electronic Pest Controller Using GSM

    Very short description of the project.

    The purpose of the project is to design a solar based electronic pest controller. Such a device can be very useful to counter the various problems caused by ants, insects, pests, rodents and etc. The device is compact, cheap, and it does not cause any pollution unlike the other chemical repellents. We have used arduino controller and ultrasonic generator to generate sound frequencies, and an assembly consisting of solar panel, audio power amplifier, speaker and GSM module for this purpose. The technical details of this project follow later. The circuit has been experimentally tested on ants, bugs, and small insects, and it has been successful in repelling them through the generation of ultrasonic frequency sound.

  • image

    An Android APP for Detection of Missing Objects and Home Appliance Automation

    Very short description of the project.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

  • image

    Monitoring of Mango Tree Cultivation and Ailment Identification - Immune Direction

    Very short description of the project.

    In their life time, Trees are affected by various diseases which cause damage to them and thus reduce the production of fruits and flowers. The objective of our project is to detect diseases and monitor the mango tree cultivation. Mango tree suffers from several diseases at all stages of its life. Currently, mango trees are dying suddenly, depending upon severity of disease and management by the owners of mango orchards. However, Mango is an evergreen tree grown under tropical and subtropical environments around the world but all the parts of the tree namely; trunk, branch, twig, leaf, petiole, flowers and fruits are attacked by a number of pathogens including fungi, bacteria and algae which cause heavy losses in mango production. So, regular monitoring of mango trees is necessary which is one of the basic components of pest management. We propose a method which takes the samples of part of the tree that is affected and helps to detect the type of the disease by which it is affected and we also suggest the remedies and methods which helps in preventing the disease and thus the tree management would facilitate enhancing the tree productivity.

Filter by type:

Sort by year:

A Novel Software Cost Estimation Techniques using Fuzzy Methods.

N V R SWARUP KUMAR JAVVADI
Book LAMBERT Academic Publishing , NOV-DEC 2013 and ISBN 978-3-659-46224-5

Abstract

Momentarily software cost estimation has protrusive role in software engineering practice. The most desired capabilities of any software development organization are its cost estimation for software projects. It helps the customers to make successful investments and also assist software project manager in making sustainable decisions during project execution. In order to fulfill the requirements of cost estimation, time effective software is required. By keeping in view of all these requirements, my book introduces a novel models of interval type-1 and type-2 fuzzy logic estimation effort in software in software development. This book touches upon MATLAB which is tuning parameter for various cost estimation model. published software projects data model performance is used along with comparison of my novel model and existing ubiquitous models.

A 2N Approach for Lossless Image Compression.

N V R SWARUP KUMAR JAVVADI
Book LAMBERT Academic Publishing, NOV-DEC 2011 | ISBN-:978-3-8465-5488-3.
image

Image compression techniques play a vital role in image processing. There are several lossy and lossless coding techniques developed all through the last two decades. Although very high compression can be achieved with lossy compression techniques, they are deficient in obtaining the original image. While transmitting an image we have to reduce the size of the image in order to decrease the time needed to transmit the image. There are so many compression methods have been introduced to compress the image but exact image can recover by lossless compression technique. Here introduced a new lossless compression technique which even better reduces the entropy there by reducing the average number of bits with the utility of Non Binary Huffman coding through the use of 2N approach. The 2N approach proposed through our new approach can be largely utilized for all other encoding schemes for images.

Secured Data Transmission for Distributed Ground Telemetry Station

N V R SWARUP KUMAR JAVVADI, POTLURI AVINASH, Dr.GVSNRV PRASAD
Conference Paper ICCS - WILKES100 - Second International Conference on Computing Sciences 2013 , 15th-16th Nov-2013, ISBN: 9789351071723, indexed in ELSEVIER

Abstract

A NOVEL CLOUD SERVICE: FUTURE CLOUD PRINT

N V R SWARUP KUMAR JAVVADI, Chaitanya Jampani, Jagadeesh K, M Roopesh Guptha
Conference Paper National Conference on Emerging Trends in Information Technology 2013 29th-30th MAR-2013 | ISBN-: 978-93-5107-054-2
image

A Novel Method for Software Effort Estimation Using Inverse Regression as firing Interval in fuzzy logic

N V R SWARUP KUMAR JAVVADI et.al
Conference Paper International Conference on Electronics and Computer Technology 2011, 8-10th APR-2011, page(s): 177 - 182| ISBN-: 978-1-4244-8678-6

Abstract

Software effort estimation is the most essential in-order to develop a software system and it can analyze the project decisions like resource allocation and bidding which can be used to complete the project with respect to time/within the scope of the time. It gives estimation about the cost and time required for software development. It can be implemented through various estimation techniques and estimation models. In this paper, we proposed a new model using fuzzy logic in-order to estimate the most important factors of software effort estimation such as cost and time. We use MATLAB to determine the parameters of various cost estimation models. The performance of model is evaluated on published software projects data. Comparison of results from our model with existing ubiquitous models is shown.

A Novel Method for Software Effort Estimation Using Exponential Regression as firing Interval in fuzzy logic

N V R SWARUP KUMAR JAVVADI et.al
Conference Papers ACEEE 2011 , Volume 142, Part 1, Page(s)118-127 indexed in SPRINGER LCNS Digital LibraryDOI: 10.1007/978-3-642-19542-6-19.

Abstract

Software effort estimation is the process of estimating the cost and time required to develop a software system. It plays a prominent role in software project decisions like resource allocation and bidding which are major parts of planning where as the substratal goals of planning are to scout for the future, to diagnose the attributes that are essentially done for the consummation of the project successfully. So, the effective Software cost estimation is one of the most challenging and important activities in Software development. This paper articulates the new model using fuzzy logic to estimate effort required in software development. We use MATLAB for tuning the parameters of famous various cost estimation models. The performance of model is evaluated on published software projects data. Comparison of results from our model with existing ubiquitous models is done.

An Optimized Block Estimation Based Image Compression and Decompression Algorithm

N V R SWARUP KUMAR JAVVADI et.al
Journal International Journal of Computer Engineering & Technology (IJCET), ISSN Print: 0976-6367 and ISSN Online: 0976–6375 Vol-7, Isuue-1., Journal Impact Factor (2016): 9.3590 (Calculated by GISI) www.jifactor.com, pp. 09-17, Jan-Feb 2016, © IAEME Publication.
image

In this paper, we implemented a new model of image compression and decompression method to search the aimed image based on the robust image block variance estimation. Many methods of image compression have been proposed in the literature to minimize the error rate and compression ratio. For encoding the medium type of images, traditional models use hierarchical scheme that enables the use of upper, left, and lower pixels for the pixel prediction, whereas the conventional raster scan prediction methods use upper and left pixels. In this proposed work, we have implemented block estimation and image distortion rate to optimize the compression ration and to minimize the error rate. Experimental results show that proposed model gives a high compression rate and less rate compared to traditional models.

Design and Implementation of Secured Data Embedding Method using Quick-Response Code and COLOR LSB

N V R SWARUP KUMAR JAVVADI et.al
Journal International Journal on Advanced Computer Theory and Engineering (IJACTE), ISSN (Print): 2319-2526 Vol-4, Isuue-3, Impact Factor:1.64 (http://isi-thomsonreuters.com/), Mar-Apr 2015 and it was indexed in SPRINGER.
image

Steganography is the study of concealing the reality in the data which we are sending. The objective of steganography is to implant a mystery message inside a bit of unsusceptible data. The consequence of steganography relies on upon the mystery of the cover carrier. After the steganographic bearer is uncovered, the security relies on upon the strength of the algorithm and the cryptographic routines utilized. In place, to accomplish secrecy, either the transporter must be made more strong against steganalysis or new and better transporters must be found. The primary aim behind this paper is to examine another steganography procedure for images. Before implanting the secret message, it ought to be encoded utilizing Quick - Response code. The bits from the resultant scrambled message will be covered up inside of the image using COLOR LSB.

ICPS: Intelli Cloud Print Service

N V R SWARUP KUMAR JAVVADI et.al
Journal on International Journal on Advanced Computer Theory and Engineering (IJACTE), ISSN (Print): 2319-2526 Vol-2, Isuue-6., Impact Factor:1.64 (http://isi-thomsonreuters.com/), Nov-Dec 2014 and it was indexed in SPRINGER.

Abstract

When we observe the growing era of technical trends, there is a great push towards the cloud based applications and proliferation of web connected mobile devices. As there is a tremendous growth of smart phones/tablets, people are expecting the same capabilities of their PC’s in their smart devices and printing is at the peak of the list. No one in the printing ecosystem users, developers and administrators want to extend the driver mess. In this paper we presenting Intelli Cloud Print (ICP), it eliminates the need for printer drivers and brings fullfeatured printing to a new generation of smart devices. This application supports all types of printing formats by using all types of protocols. ICP can track the nearby ICP featured printers and it is responsible for sending the print job to the user selected printer based on users’ privileges and priorities. The ICP provides the estimated time of print job and its summary to the users.

A Novel Secure Image Hiding on Indexed Images Using Pixel-Matching Technique

N V R SWARUP KUMAR JAVVADI et.al
Journal Oriental Journal of Computer Science and Technology, ISSN: 0974-6471, December 2014, Vol. 7, No. (3): Pgs. 358-362.
image

Steganography is the science of hiding the fact in the information which we are sending. The goal of steganography is to embed a secret message inside a piece of unsusceptible information. The result of steganography depends on the secrecy of the cover carrier. After the steganographic carrier is disclosed, the security depends on the robustness of the algorithm and the cryptographic methods used. In order, to achieve secrecy, either the carrier must be made more robust against steganalysis or new and better carriers must be discovered. The main intention behind this paper is to discuss a new steganography technique for indexed images.

A Novel Secured Mechanism for Authentication Cookie

N V R SWARUP KUMAR JAVVADI et.al
Journal International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR); ISSN (Print):2249-6831; Impact Factor (JCC): 3.8716, JAN-MAR 2013.

Abstract

Steganography is the technique of concealing the very existence of information being sent. It is the art of hiding secret messages enveloped in an obscure way. Its results depend on the secrecy of the cover carrier. After the steganographic carrier is disclosed then the security depends on the robustness and complex logic of the algorithm and the cryptographic methods used. So, secrecy is achieved only when the algorithm is more robust against steganalysis. This paper discusses a novel secured mechanism for authentication cookie. The cookie message is first encrypted and then embedded. The resulting bits of the message after encryption will be hidden inside the selected segment of cover image. We introduce a new technique of incorporating bits in the colour image by using proposed COLOR LSB method. This improves security to our information which is embedded inside the image. This is the web technology which is also used in session management.

A Novel Interval Type-2 Fuzzy Software Effort Estimation Using Takagi-Sugeno Fuzzy Controller”

N V R SWARUP KUMAR JAVVADI et.al
Journal Int. J. Modern Engineering Research. (IJMER), Vol 2 (5),3245-3247, ISSN:2249-6645, SEP-OCT 2012.

Abstract

Software effort estimation is the process of estimating the cost and time required for the development of software system. Resource allocation and bidding are major parts of planning in software projects. The main objective of the plan is to scout for the future and diagnose the attributes the consummation of successful projects. So, to meet the challenges of cost estimation time in the software development, effective software is required. This paper introduces a novel model of fuzzy logic estimation effort in software development. My paper touches up on MATLAB for tuning parameters of famous various cost estimation models. It also uses published software projects data, performance of the model and the comparison between my novel model and existing ubiquitous models.

Agent based Detecting Abnormal and Dynamic Coupled Behavior in Customer Relationship System use of Combined Interestingness based Architecture.

N V R SWARUP KUMAR JAVVADI et.al
Journal International Journal of Engineering Science and Technology, Vol. 2(9), 2010, 4869-4875.

Abstract

Customer Relationship Management (CRM for short) System emerged in the last decade to reveal the central role of the customer for the strategic positioning of a company. One of the most significant changes in the practice of marketing during the last decade is the shift in emphasis from a transaction orientation customer to the CRM. Now a day’s it is an important edge but now a necessary utensil for endurance. CRM competence is very important source for enterprises to build and sustain competitive advantage. With the extensive applications in CRM enterprises have plenty of customer data. Main vision of CRM is customer understanding, which is accurately done will helps to value customers and thus increases customer life time value. Effectively build CRM will maintain good relationships with customers. Companies have invested or are planning to empower huge amounts to implement CRM strategies, tools and infrastructures in-order to magnetize and retain profitable customers in today’s increasingly competitive markets. This paper introduces the detecting abnormal and dynamic coupled behavior in the CRM system and general architecture of CRM based on Domain Driven Data Mining (D3M for short) and with advanced technologies for knowing winning strategies. It also discusses the important steps of designing the data warehouse and describes the meaning of D3M applied to the CRM and finally evolving of D3M to individual service are presented.

N-Square Method for the Erection of Redundancy Codes

N V R SWARUP KUMAR JAVVADI et.al
JournalInternational Journal of Engineering Science and Technology, Vol.2 (4), 2010, ISSN: 0975-5462.
image

This paper addresses the area of data compression which is an application of image processing. There are several lossy and lossless coding techniques developed all through the last two decades. Although very high compression can be achieved with lossy compression techniques, they are deficient in obtaining the original image. While lossless compression technique recovers the image exactly. In applications related to medical imaging lossless techniques are required, as the loss of information is deplorable. The objective of image compression is to symbolize an image with a handful number of bits as possible while preserving the quality required for the given application. In this paper we are introducing a new lossless compression technique which even better reduces the entropy there by reducing the average number of bits with the utility of Non Binary Huffman coding through the use of N-Square approach. Our extensive experimental results demonstrate that the proposed scheme is very competitive and this addresses the limitations of D value in the existing system by proposing a pattern called N-Square approach for it. The newly proposed algorithm provides a good means for lossless image compression.

Content Based Image Retrieval using Hierarchical and K-Means Algorithms

N V R SWARUP KUMAR JAVVADI et.al
Journal International Journal of Engineering Science and Technology, Vol.2 (3), 2010, ISSN: 0975-5462.

Abstract

In this paper we present an image retrieval system that takes an image as the input query and retrieves images based on image content. Content Based Image Retrieval is an approach for retrieving semantically-relevant images from an image database based on automatically-derived image features. The unique aspect of the system is the utilization of hierarchical and k-means clustering techniques. The proposed procedure consists of two stages. First, here we are going to filter most of the images in the hierarchical clustering and then apply the clustered images to K-Means, so that we can get better favored image results.

Intelligent Decision System Based on PA-AKD Approach of D3M

N V R SWARUP KUMAR JAVVADI et.al
Journal International Journal of Engineering Science and Technology, Vol. 2(3), 2010, 4869-4875.

Abstract

Due to the rapid advancement of electronic commerce and web technologies in recent years, the concepts and applications of decision support systems have been significantly extended. The demand placed on data that is loaded into the data warehouse and queried from the data warehouse has forced entrepreneurs and business users to manage the data. But the large commercial transactions have lots of useful knowledge for business decisions in the data warehouse. Through Intelligent Decisions, customers / entrepreneurs are able to make effective decisions concerning the management and direction of their organization. This paper introduces business intelligent decisions that take place from the data-warehouse through the Actionable-Knowledge Discovery (AKD) in Domain Driven Data Mining (D3M for short). The general architecture of D3M for enterprise decisions was proposed and the model storage was presented, and its characteristics would be analyzed. The deliverables of D3M were extracted from the result of data mining and knowledge base. The enterprise decisions and reports could be analyzed through D3M deliverables.

CRM System Using UI-AKD Approach of D3M

N V R SWARUP KUMAR JAVVADI et.al
Journal International Journal on Computer Science and Engineering Vol.1 (3), 2010, ISSN: 0975-3397, Pages 159–163.

Abstract

Customer Relationship Management has entered the mainstream. Despite the uncertainty of the economy, CRM is being thrust into corporate budgets and talked about as a critical initiative by numerous of companies. It has gone from being an important edge in the business world to a necessary tool for survival. Building an effective CRM system can get more effectively in acquiring new customers, increasing value of existing customers and retaining good customers. At the same time, the data of data warehouse will offer the best data resource for the application of Domain Driven Data Mining (D3M for short) on CRM. This paper introduces CRM and managing relationships with customers has become a critical organizational competency. Get winning strategies with the latent advanced technologies. Then introduces the architecture of CRM based on Domain Driven Data Mining, discusses the main steps of designing the Data warehouse and describes the meaning of Domain Driven Data Mining applied to CRM. At last, the promoting effects of Domain Driven Data Mining to individual service are presented.

Identifying the Importance of Software Reuse in COCOMO81, COCOMOII

N V R SWARUP KUMAR JAVVADI et.al
Journal International Journal on Computer Science and Engineering Vol.1 (3), 2009, 142-147, ISSN: 0975-3397.

Abstract

Software project management is an interpolation of project planning, project monitoring and project termination. The substratal goals of planning are to scout for the future, to diagnose the attributes that are essentially done for the consummation of the project successfully, animate the scheduling and allocate resources for the attributes. Software cost estimation is a vital role in preeminent software project decisions such as resource allocation and bidding. This paper articulates the conventional overview of software cost estimation modus operandi available. The cost, effort estimates of software projects done by the various companies are congregated, the results are segregated with the present cost models and the MRE (Mean Relative Error) is enumerated. We have administered the historical data to COCOMO 81, COCOMOII model and identified that the stellar predicament is that no cost model gives the exact estimate of a software project.

Software Reuse Ontological Approach to Feature Modeling

N V R SWARUP KUMAR JAVVADI et.al
Journal International Journal of Computer Science and Network Security”, Vol.9, No 8, 2009 ISSN 1738-7906.

Abstract

Domain Engineering is a software reuse approach in application domain mainly used to deliver high quality software under budget and time constraints. In domain engineering the feature models play a vital role by providing common and variant concepts. However, feature models hamper the development of domain due to lack of formal semantics and at the same time consistency checking of the feature configuration is ambiguous to the stakeholders. In this paper we captured the relationships in OWL using JENA and a pallet for consistency checking of the feature configuration

Currrent Teaching

  • 2015 2016

    Bachelor Technology, Master of Technology

    Cryptography and Network Security, Software Engineering

    Database Management Systems, UML&DP.

  • 2014 2015

    Bachelor Technology, Master of Technology

    Computer Networks, E-Commerce

    Cryptography and Network Security, Software Engineering

  • 2013 2014

    Bachelor Technology, Master of Technology

    Web Technologies, Software Engineering

    Computer Networks, Advanced Computer Networks

Teaching History

  • 2012 2013

    Bachelor Technology, Master of Technology

    DataBase Management Systems, Web Technologies

    Software Engineering

  • 2011 2012

    Bachelor Technology, Master Of Technology

    Computer Networks, Advanced Computer Networks

  • 2010 2011

    Bachelor Technology

    C Programming

  • 2010 2011

    Bachelor Technology

    Advanced Computer Architecture

  • 2006 2008

    Diploma in Computer Engineering

    Operating Systems, Computer Networks and System Administration.

At My Office

You can find me at my office located at Gudlavalleru Engineering College, Department of Computer Science and Engineering, Gudlavalleru.

I am at my office every day from 9:00 AM until 05:00 PM, but you may consider a call to fix an appointment.

At My Work

You can find me at my Work located at Gudlavalleru Engineering College, Department of Computer Science and Engineering, Gudlavalleru.

I am at my office every day from 9:00 AM until 05:00 PM, but you may consider a call to fix an appointment.

At My Lab

You can find me at my office located at Gudlavalleru Engineering College, Department of Computer Science and Engineering, Gudlavalleru.

I am at my office every day from 9:00 AM until 05:00 PM, but you may consider a call to fix an appointment.