• Home
  • Jegadeesan Ramalingam
Jegadeesan Ramalingam

Jegadeesan Ramalingam
Jyothishmathi Institute of Technology and Science Karimnagar · CSE

Doctor of Engineering
Research and Development

About

158
Publications
42,093
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
798
Citations
Introduction
Jegadeesan Ramalingam currently works at the Department of Computer Science and Engineering, Jyothishmathi Institute of Technology and Science. Jegadeesan does research in Distributed Computing and Computer Communications (Networks). Their most recent publication is 'Discovery of novel inhibitors targeting movement protein for controlling the transmission of banana bunchy top virus infection in plantain by structure-based virtual screening'.
Additional affiliations
December 2018 - present
Jyothishmathi Institute of Technology & Science, Nustulapur, Karimnagar, Telangana
Position
  • Professor
Description
  • Professor and Head Department of Computer Science and Engineering
July 2014 - December 2018
RMK engineering College, Chennai, Tamil Nadu
Position
  • Professor (Assistant)
Description
  • Assistant Professor and Placement Coordinator
May 2011 - April 2014
T.J.S Engineering College, chennai, Tamil Nadu
Position
  • Professor (Assistant)
Description
  • Assistant Professor, NAAC coordinator
Education
July 2013 - February 2017
Anna University, Chennai
Field of study
  • Computer Science and Engineering
May 2005 - March 2007
P.S.N.A College of Engineering and Technology, Dindigul, Anna University – Chennai
Field of study
  • Computer Science and Engineering
September 2001 - March 2005
CSI Institute of Technology. Thovalai, Anna University – Chennai
Field of study
  • Computer Science and Engineering

Publications

Publications (158)
Article
Maize, a one of the cereal crops, serves as the staple food for numerous people across the world. Maize breeding programmes primarily aim to enhance the yield potential of newly developed cultivars. This objective can be accomplished either by direct selection for increased grain yield or by indirect selection for traits closely associated with yie...
Article
The risk is labeled as an undesirable event that is found in every project, regardless of the industry. The majority of the software project did not meet the objectives, that is, scope, time, cost and quality. Software projects faced a wide range of risks and all risks can not be treated with the same priority. The risk can be prioritized by the pr...
Article
Full-text available
Utilizing intrusion detection systems is necessary to safeguard information systems from attacker attacks. Many publicly accessible open-source assault datasets have been released in recent years so that academics and also researchers can evaluate the performance of different detection classifiers. These datasets contain a full collection of exempl...
Article
Full-text available
Virtual assistants are programmes that run on digital devices and listen for and respond to spoken commands. A user can ask the voice assistant, "Who the Dhoni?" and the voice assistant will respond. They could say, "Tell me a story," and the assistant would immediately begin telling one. The user could even say, "Play my favourite songs," and the...
Article
Full-text available
Autism Spectrum Disorder (ASD) is a neurodevelopment syndrome that has a great impact on the person's behavior, mental health and also the learning skills. It limits the ability of the affected personality to use verbal, social, and cognitive skills, among other abilities, and its symptoms are differed from person to person. Diagnosing ASD is very...
Article
Full-text available
Medical services is a lot of significant in each individual's life. In any case, counseling a specialist for every single medical problem is an extremely challenging errand. Before speaking with a doctor, we want to develop an AI-powered healthcare chatbot system that can identify a disease and provide basic information about it. We use Natural Lan...
Article
On social media, cyberbullying (CB) is getting more and more attention. As a result of the fame and broad utilization of online entertainment by individuals, everything being equal, it is important that web-based entertainment stages be made more secure from cyberbullying. It presents a DEA-RNN cross breed profound learning model for distinguishing...
Conference Paper
Full-text available
Abstract—Intelligent Transportation System (ITS) is one of the revolutionary technologies in smart cities that aids in minimizing traffic congestion and improving traffic quality. ITS provides real-time analysis and very effective traffic management by utilizing big data and communication technology. Traffic Flow Prediction (TFP) becomes a dynamic...
Article
Full-text available
The people around the globe work hard to keep up with this racing world. However, due to this each individual is dealing with different health issues, one of the most known issue is depression or stress which may eventually lead to death or other brutal activities. These abnormalities can be termed as the bipolar disorder which can be treated by un...
Conference Paper
Full-text available
The field of data analysis, which is experiencing rapid growth, plays an important role in the field of health care. The health industry has become an enormous enterprise. The healthcare industry generates massive volumes of data on a day-to-day basis. This data makes it possible to extract hidden information, which is helpful for anticipating the...
Chapter
Prediction of road traffic from multiple sources using Gaussian approach is most import in intelligent transport systems. Existing works are only focused on non-intrusive sensors that are very expensive. Sensors are detecting traffic conditions and image recognition, etc. The maintenance of these sensors is very difficult, and to address the issue,...
Article
Full-text available
In mobile nodes in the network, they are unstable, so single-path communication does not provide sufficient results. In the alternative single path, communication is very difficult to handle the heavy load. The poor connectivity among the mobile node makes the uncertainty of packet loss; the path link is not measured in this network. The communicat...
Patent
Full-text available
Vehicle adhoc networks to avoid road accidents is the proposed invention. The proposed invention focuses on implementing the concepts of vehicular adhoc networks for controlling the speed of the vehicles. The invention implements a centralized system to continuously monitor the speeding vehicle, etc., for reducing the number of road accidents
Patent
Full-text available
ABSTRACT OF THE INVENTION Drip irrigation is the most familiar and effective water management scheme in agricultural sector and helps the farmer in huge yield. Supplying high amount and low amount of water to the farm based on the two extreme weather conditions like summer and winter is the major concern for the farmers. Another critical situation...
Patent
Full-text available
In the modern world, the mobile phone subscriptions are exceeding the actual population. This boom in mobile cellular connections negatively impact the poo quality of services in some cases. Call drops, poor internet connectivity (low data speed), call interruptions, poor clarity of audio are found to be the major issues in the network service prov...
Patent
Full-text available
In this work, we presented GridNet, a new architecture designed specifically for semantic segmentation. The model generalizes several known state-of-the-art networks such as conv-deconv, U-Net and FRRN. Our GridNet network shows promising results even without pre-training. In the rest of the work, it would be interesting to study the use of a singl...
Article
With the rapid development of cloud computing, more and more people and businesses in the public cloud share data. A data owner usually encrypts his data in such way as to safeguard the privacy of data stored in the cloud that select designated data users can decrypt the data. This poses a severe difficulty when the encrypted data is shared with mo...
Article
Mastercard Fraud occasions occur oftentimes and afterward bring about tremendous monetary misfortune. Monetary Fraud is a consistently developing threat with far outcomes in the monetary business. Albeit a few crimes are happening in business, false e-card exercises are among the premier overarching and upset in regards to by online clients. The Vi...
Article
The new Corona virus disease (COVID-19) has seriously affected the world by the end of Nov 2020.To limit the spread of the disease, mandatory face mask rules are now becoming common in public settings around the world. We implemented a robust single-stage face detector, named Retina-Face with Backbone Models using this it will detect unmasked maske...
Article
Highlight level rating framework utilizing client surveys and audit votes concentrates how we can get include level evaluations of the versatile items from the client audits and survey votes to impact dynamic, both for new clients and makers. Such a rating framework gives a more extensive image of the item than what an item level rating framework o...
Article
Cross-cloud information relocation is one of the common difficulties looked by portable clients, which is a fundamental cycle when clients change their cell phones to an alternate supplier. Be that as it may, because of the deficient neighborhood stockpiling and computational abilities of the PDAs, it is normal hard for clients to reinforcement all...
Article
Data sharing is an important functionality in cloud storage. By using this project to securely, efficiently, and flexibly share data with others in cloud storage. The new public-key cryptosystems which produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. The novelty is that...
Patent
Full-text available
AN INTELLIGENT PHARMACEUTICAL ASSISTANCE SYSTEM ABSTRACT OF THE INVENTION In prolonged times the life expectancy has been increased for humans, despite this being an achievement in the medical field, its noticeable that people are prone to multi morbid diseases till the whole span of living. Also, not all the senior citizens are accompanied with th...
Article
Infections are the main source of ethical quality on the planet. The exactness of information has been created in biomedical and medical care networks, patient consideration, and clinical benefits. However, the investigation precision is decreased when the nature of clinical information is inadequate. Besides, various locales show one-of-a-kind att...
Article
The development of healthcare big data and wearable technology , as well as cloud computing and communication technologies , cloud-assisted healthcare big data computing becomes critical to meet users' ever growing demands on health consultation. However, it is challenging issue to personalize specific healthcare data for various users in a conveni...
Article
Full-text available
ABSRACT With the rapid development of cloud storage, an increasing number of data owners prefer to outsource their data to the cloud server, which can greatly reduce the local storage overhead. Because different cloud service providers offer distinct quality of data storage service, e.g., security, reliability, access speed and prices, cloud data t...
Article
Illegal tax avoidance makes genuine dangers to both monetary establishments and country states. Many billions of dollars of criminal cash have been washed through monetary establishments every year. To forestall illegal tax avoidance exercises, fostering an compelling procedure to distinguish dubious exchanges is critical for monetary establishment...
Article
Full-text available
Machine Learning based forecasting mechanisms have proved their significance to anticipate in perioperative outcomes to improve the decision making on the future course of actions. The Machine Learning models have long been used in many application domains which needed the identification and prioritization of adverse factors for a threat. Several p...
Article
Search advertising is a common way of Internet marketing. Businesses purchase specific keywords according to the characteristics of the goods. When users enter these keywords, the corresponding advertising goods will be displayed in the pages that the user sees. The conversion rate of search advertisements is used as an index to measure the effect...
Article
AI (ML) based determining components have demonstrated their importance to expect in perioperative results to improve the dynamic on the future course of activities. The ML models have for quite some time been utilized in numerous application areas which required the recognizable proof and prioritization of antagonistic variables for a danger. A fe...
Article
During the ongoing outbreak of corona virus disease (COVID-19), people use social media to acquire and exchange various types of information at a historic and unprecedented scale. Only the situational information is valuable for the public and authorities to response to the epidemic. Therefore, it is important to identify such situational informati...
Article
Virtual Desktop Assistant is a PC framework that reacts to voice orders, as opposed to include from a keystroke or mouse. Individuals who are outwardly or actually hindered are prime possibility for this framework. Since they can't see or in any case access a console or mouse, they have no real way to get to a PC without virtual work area right han...
Article
Advances in Information and technology (ICT) have increased the expansion of Massive open online courses (MOOCs) applied in distance learning environments. Various tools have been utilized to deliver interactive content including pictures, figures, and videos which will motivate the learners to build new cognitive skills. High ranking universities...
Article
Agriculture is the field that assumes a significant part in improving our nation's economy. Farming is the one that brought forth human advancement. India is an agrarian country and its economy generally dependent on crop productivity. Agriculture is the spine of all business in our country. Choosing a crop is vital in Agriculture arranging. The de...
Article
Full-text available
Machine Learning methods are widely used nowadays in numerous areas, including networking domain. The data-driven nature facilitates automatic learn of the complexity of the communications and networking environment and to dynamically adjust protocols and actions without human interactions.ML techniques offer additional support to network/services...
Article
Traffic signs bear the cost of critical course to traffic management, varying between exhortations, road condition information and objective data. Traffic sign grouping has a huge occupation in the automated self-ruling driving. Particular techniques were considered in the earlier years to deal with this issue, still the presentation of these metho...
Patent
Recently from a survey by the experts it is reported that the incidence of accidental deaths has shown a growing trend of approximately about 60% during the one last decade. These unnatural causes are due to manual imprecise operations at most times. Despite there are enormous reasons for this rate of accidents, we have observed that the automobile...
Article
Deduplication, which can save storage cost by enabling us to store only one copy of identical data, becomes unprecedentedly significant with the dramatic increase in data stored in the cloud. For the purpose of ensuring data confidentiality, they are usually encrypted before outsourced. Traditional encryption will inevitably result in multiple diff...
Article
Cross-cloud data migration is a major difficulty for mobile customers and is a necessary step when users turn their mobile phones into another provider. However, because smartphone's locally limited storage and computing capabilities, it is sometimes quite complicated to back all data on your mobile phone from the original cloud servers in order to...
Article
Lazy driving is one of the significant reasons for street mishaps and passing.So it is vital to identify the sleepiness of the driver to save life and property. In spite of the fact that there are a few techniques for estimating the sleepiness however this methodology is totally non-meddlesome which doesn't influence the driver in any capacity, con...
Article
A Breach can result to a cyberattack. An effective cyberattack detection system can help determine and close those breaches. Machine learning techniques are frequently utilized to build an intrusion detection system (IDS) that can identify and classify cyberattacks at the network and host levels in a timely and autonomous manner, but the models pro...
Article
Online commercial centers regularly witness assessment spam as surveys. Individuals are normally advancing or hindering them by composing profoundly certain or negative surveys. This regularly is done aggregately in gatherings. Albeit some past investigations endeavored to recognize and dissect such assessment spam gatherings, little has been inves...
Article
Digital currency, for example, Bitcoin influences individuals' lives from multiple points of view. It is significant for one to comprehend this new and enormous cash of the 21" century particularly when settling on monetary choices. It is led using Simple Linear Regression Model as its information investigation technique to discover files that impa...
Article
Standards for social networks have grown tremendously in recent years. Existing online social networks, such as Facebook and Twitter, are designed for lectures that are suitable for a wider audience and improve privacy and security issues. Although OSNs allow the user to restrict access to their knowledge, they currently do not provide a data prote...
Article
To make sure the integrity of the info stored within the cloud, many data integrity auditing schemes are proposed. In most, if not all, of the prevailing schemes, a user must employ his private key to get the info authenticators for realizing the info integrity auditing. Thus, the user has got to possess a hardware token to store his private key an...
Article
A Novel Approach To Organize Structured Data In Mobile Devices propounds an ISAMD (Improved Synchronization Algorithm based on Secured Message Digest) in order to facilitate data synchronization between a server-side database and a mobile database. The ISAMD algorithm generates a Message Digest Table (MDT) at the server database and the mobile data...
Research
Full-text available
To make sure the integrity of the info stored within the cloud, many data integrity auditing schemes are proposed. In most, if not all, of the prevailing schemes, a user must employ his private key to get the info authenticators for realizing the info integrity auditing. Thus, the user has got to possess a hardware token to store his private key an...
Article
Popular information that the community believes is important is spread across the web on Twitter. Studying the content characteristics of news is important for many things, such as finding the latest news, personalizing a message, recommending friends, analyzing moods, and more. Although many researchers want to use standard text mining tools to un...
Article
Full-text available
The growth of the Internet and data traffic has created many security management problems. Since the Internet was not made securely, it is essential to integrate access controls, which increases the number of users worldwide. The switches have developed their ways to infiltrate or disrupt network traffic. They use established prevention mechanisms...
Conference Paper
Full-text available
Wireless mobile nodes in military environments such as a battle field or a hostile region are possible to attack from intermittent network property and frequent partitions. Disruption-tolerant network technologies are turning into self-made solutions that permit wireless devices carried by troopers to communicate with one another and access the dir...
Article
Full-text available
Drought is a serious threat to the farming community, biasing the crop productivity in arid and semi-arid regions of the world. Drought adversely affects seed germination, plant growth, and development via non-normal physiological processes. Plants generally acclimatize to drought stress through various tolerance mechanisms, but the changes in glob...
Article
Full-text available
Two popular stable restorer lines, CB 87 R and CB 174 R, were improved for blast resistance through marker-assisted back-cross breeding (MABB). The hybrid rice development program in South India extensively depends on these two restorer lines. However, these restorer lines are highly susceptible to blast disease. To improve the restorer lines for r...
Chapter
In the industries of farming, the estimation of grain quality is immense challenge. The management of quality is the most significant in the industry of food since post harvesting, on the quality basis constraints food manufactured goods are categorized & ranked into distinct ranks. The evaluation of grain superiority is finished manually yet it is...
Article
In the education system providing campus placement is an important activity. Because the engineering students before joining the colleges they can select the colleges which is provide the campus placement. The student's everyone is willing to get the job before leaving college. So that this placement chance prediction system can be useful for them....
Article
Bacterial blight caused by Xanthomonas oryzae pv. oryzae (Xoo), is one of the devastating diseases of rice worldwide. The pathogen reported to cause 70% crop loss in some of the susceptible genotypes under disease favoring environments, viz., temperature ranging between 25 to 34°C and relative humidity more than 70%. In Xoo, about 245 genes govern...
Article
Online social networks can be broadly classified as explicit and implicit social networks. Explicit social networks (e.g., Facebook, LinkedIn, Twitter, and MySpace) are where the users define the network by explicitly connecting with other users, possibly, but not necessarily, based on shared interests. Implicit social networks (e.g., Last.FM, Outb...
Article
Ever Since its birth in the late 60's, Internet has been widely and mainly used for interaction purpose only; but over the period of time, its application has changed significantly. Now a days' Internet is no longer use only for communication purpose. Its use is spread over wide variety of applications' and E-Commerce is one of them. The most impor...
Article
TA Tmobile Tad Thoc Tnetwork T(MANET) Tis Tan Tinfrastructure-less Tnetwork Twhere Tthe Tone Tmobile Tdevice Tlink Twith Tother Tdevice Twirelessly. The use of communication security protocols originally developed for wire line and Wi-Fi networks can even place an important burden on the restricted network resources of a MANET. The framework is mea...
Article
Full-text available
Barnyard millet (Echinochloa species) has become one of the most important minor millet crops in Asia, showing a firm upsurge in world production. The genus Echinochloa comprises of two major species, Echinochloa esculenta and Echinochloa frumentacea, which are predominantly cultivated for human consumption and livestock feed. They are less suscept...
Article
Blockchain technology that underpins the crypto currency bit coins has played a vital role in decentralized, transparency and data intensive applications. It is an emerging innovative technology with open ledger for secure transaction has becoming crucial factor around the world, as they are responsible for the development of decentralized approach...
Article
Cloud computing delivers any kind of information technology from computing quality to infrastructure, applications, business process and personal collaboration to end users. The cloud is the set of hardware, software, networks, services, storage and interfaces that combine to deliver aspects of computing with computers and other devices on demand....
Article
Cyber crime encompasses such criminal activities dealing with computers and networks (also known as hacking). Additionally, cyber crime also includes crimes conducted through the Internet such as online fraud, Identity theft and credit card account thefts. In both Online and Offline activities password cracking is one of the loophole of cyber crime...
Article
Content Mining has transformed into an imperative research zone. Content Mining is the disclosure by PC of new, effectively darken data, by means of therefore isolating data from different created resources. Content Mining is the path toward isolating charming data or taking in or cases from the unstructured substance that are from different source...
Article
Full-text available
Cloud computing is an active model for providing a reliable and flexible infrastructure that enables users (data owners) to store their data and enable data consumers (users) to access data from cloud servers. This model reduces the cost of storage and maintenance to the data owner. At the same time, the data owner loses actual control and possessi...
Article
Full-text available
Recent days, outsourcing database to cloud is getting popular as cloud provide services and applications which are in low cost and available even foe small scale industries. There are different schemes to provide appropriate functionality for the queries over the outsourced database. Though, presence of such schemes provide sufficient functionality...
Article
Full-text available
Any abnormal activity will be assumed to be anomalies intrusion. Intrusion could be a major issue that is to be addressed and should be detected. Intrusion detection could be a central a part of security tools, such as reconciling security appliances, intrusion detection systems, intrusion interference systems, and firewalls. Different techniques h...
Article
Full-text available
As the popularity of cloud computing increases on mobile devices, this can store or retrieve personal data from anywhere at any time. At the same time, the problem of data security also increases day by day and substantial studies have also been conducted to improve cloud security, but most of them are not applicable to the mobile cloud, since mobi...
Article
Full-text available
Cloud computing winds up all well known Technologies among clients. The clients are pulled in towards the cloud because of its offers like on-request organize get to, diminished space, pay-per-use administration, adaptability, versatility and so on. Clients transfer their record on the cloud that contains touchy information, so it ought to be shelt...
Article
Full-text available
The cloud service in the health care zone has evolved in cost effective and suitable exchange of personal health data. Storing the personal health information to cloud is capable to theft (or) report and calls for the evaluation of method that makes sure security to the personal data. Therefore we suggest method called Enhanced Security Services to...
Article
Full-text available
Grouping of information with high measurement and variable densities represents a surprising test to the customary thickness based bunching strategies. As of late, entropy, a numerical proportion of the vulnerability of data, can be utilized to quantify the outskirt level of tests in information space and furthermore select huge highlights in list...
Article
Full-text available
In a harsh environment, wireless sensor points are spread where conditions vary greatly from abrupt changes in connection quality and node status. Due to the difference in connection quality and node status, the end-to-end delay for each sensitive node varies. The sensor contract, on the other hand, has limited capacity, and it is a major concern t...
Article
Full-text available
Cordless phone machines are used in our daily lives. However, these machines have drawbacks such as unreliable network connectivity, limited size memory, low computing power and a short battery life. These many solutions proposed to modify these drawbacks and extend the life of the battery using the discharge technique. In this document, a novel ar...
Article
Full-text available
The growing ability to track and acquire huge amounts of records with the use of current hardware technology now has lead to an activity in the improvement of facts mining algorithms which keep consumer privacy. A recently proposed method addresses the difficulty of privateness upkeep by means of perturbing the records and reconstructing distributi...
Article
In this new era, time becoming an essential factor for every individual and the main motto of our application is to satisfy the customer and increases the small scale business. The study tries to acknowledge that, however shopping for his or her buying. Specifically, It progresses an abstract model that addresses shopper worth perception for using...
Article
The advances in positioning techniques and location-based services, it is currently very common for roads networks to get textual content on the tops. The previous work identifies the optimal path that covers a series of query keywords have been studied in recent years. However, in many practical scenarios, the optimal path may not always be desira...
Article
Wireless Sensor Networks consist of tiny and low power devices called sensors that are usually scattered in geographically isolated areas. One of the fundamental challenges in their design is to maximize their lifetime because they have a limited power supply. Clustering algorithm is the main method used in this regard. In this paper, we present an...
Article
Currently, security is the most effective hand of Internet and network applications. In the current generation, Internet applications and networks are growing very fast, so the importance and value of data exchanged through the Internet or other types of media are increasing. Therefore, the search for the best solution to offer the necessary protec...
Article
Abstrac: Internet of things (IoT) is expected to have billions of heterogeneously connected devices, demanding higher spectral efficiency, enhanced capacity and lesser latency. Device-to-Device (D2D) ultra-dense networks (UDN) are one of the potential components of 5G. Due to smaller cell sizes, more frequent handovers should be executed by the sys...
Article
Mobile Adhoc Network (MANET) is a cluster of wireless movable nodes and are self-created and self-organized, in which all the nodes move and communicate with each other in the network through radio energy without any centralized control and base stations. In this network infrastructure, every node is independent. Thus, due to its original nature of...
Article
Implementation of data integration in the current days still has many issues to be solved. Heterogeneity of data with non-standardization data, data conflicts between various data sources, data with different representation and as well as semantic aspects problems are among challenging research areas. Semantic data integration using ontology approa...
Article
The expansion in accessibility and prominence of versatile remote devices has led analysts to develop a wide variety of ad-hoc mobile network (MANET) conventions to misuse the interesting mail openings introduced by these devices. The devices can directly impart the remote range in a distributed manner and the messages of the course through interme...
Article
Abstract: Data mining is a process to extort the knowledge and exciting patterns to expect useful information from massive databases for the user. Association Rule Mining is a vital research area and is helpful in marketing and other varied fields. It discovers the interesting associations among data items. Many techniques and measures are proposed...
Article
Bluetooth technology has evolved wireless communication between devices with its pervasive and basic features. With the advancement of technology, the classic Bluetooth transformed into Bluetooth Low Energy (BLE) in version 4.2 and 5. Initially, BLE 4.2 was featured to support star topology network provisioned with less network coverage. Subsequent...
Article
The wireless sensor networks have been experiencing exponential growth in the past decade. A wireless sensor network (WSN) provides low cost solutions and consists of several sensors distributed across a geographical area. In many commercial and industrial applications, it often needs to monitor and collect the information about the environment con...
Article
The goal of this research is to address questions that spin around optimizing techniques to enhance the visibility of a website in Search Engines. What can web content creators and webmasters do to make their content accessible using search engines? In order to understand the true potential of Search Engine Optimisation, we need to focus on the pri...

Network

Cited By