Dr. D.B.K. Kamesh
Designation Professor
Years of Experience 23
Department CSE
Email Id kamesh.dk@mlrit.ac.in
JNTUH Unique Id 2784-161027-112616
Areas of Specialization • Software Engineers • Machine Learning • Data Science • Cloud Computing
UG Degree MCA
PG Degree M.Tech - CSE
Ph.D Ph.D
Joining Date 27-05-2024
Nature of Association Regular

Dr. D.B.K. Kamesh

Papers Published

Publications at a Glance

Journal Publications Conference Publications  

Total Publications

Number of National Journal Publications Number of International Journal Publications Total Indexed Journal Publications National Conference Publications International Conference Publications Total Conference Publications
0 75 75

(2-IEEE, 6-SCI

29- SCOPUS

6-Springer Chapters

32-Google Scholar Indexed,

 

8 21

(11-Springer Conferences)

10 – Google Indexed conferences

29 104

 

IEEE Explorer Indexed Papers

Serial Number Title of the Article Name of the Conference Volume Number Issue Number Page Number Year
1. Automated Generation of Test Cases from Output Domain of an Embedded System uses Genetic Algorithms The proceedings of IEEE sponsored International Conference on Network and Computer Science (ICNCS 2011) 216-220 2011
2. Automated Generation of Test Cases from Output Domain and critical regions of the embedded Systems using Genetic Algorithms In the proceedings of IEEE sponsored 2nd National Conference on Emerging Trends and Applications in Computer Science (NCETACS 2010 1-6 2011
3. An AI Based Chat Bot for Banking Applications using Intelligent Chat Bots 2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE)       2023
4. Hermes – Smart College Application using Android 2024 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)       2024
5.  

Statistical Approach of Big Data Analytics in Health care

2024 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)       2024
6. Greenhouse Environments Yield Prediction for Plant Growth Using Deep Learning 2024 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)       2024
  Machine Learning: Image Authentication Based using 3-Level Security System 2024 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)       2024

 

SCI Indexed Papers

Serial Number Title of the Article Name of the Journal Volume Number Issue Number Page Number Year
1.       Development of a Data Recovery System for the Data Transmitted over Rayleigh Faded Channel ScienceDirect Procedia Computer Science 00 (2015) 000–000     1-5 2015
2.       Testing Distributed Embedded Systems through Instruction Set Simulators in PONTE International Journal of Science and Research (SCI) 73 7 353-382 2017
3.       An Efficient Method for Testing Distributed Embedded Systems Using In-circuit Emulators International Journal of Sciences and Research. (SCI) 73 7 390- 422 2017
4.       An Effective Model for Testing Distributed Embedded Systems Using Scaffolding Method International Journal of Sciences and Research. (SCI) 73 8 1- 22 2017
5.       Enhancing the Fault Tolerance of a Multi-Layered IoT Network through
Rectangular and Interstitial Mesh in the Gateway Layer
Journal of Sensor and Actuator
Networks” [MPDI] SCI
Vol 1   1-17 2023
6.       Building an Expert System through machine learning for Predicting the Quality of a WEB site based on its completion Journal of Computers – MDPI Vol 1   1-16 2023

 

SPRINGER – Chapters

Serial Number Title of the Article Name of the Journal Volume Number Issue Number Page Number Year
1.       Snort Rule Detection for Countering in Network Attack FICTA-2016 SPRINGER Publication, 2016, International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA’16)     16th -17th September 2016
2.       Identification of effective parameters for designing a data channel 1st International Conference on Artificial Intelligence & Cognitive Computing (AICC-2018)     02 – 03 February 2018
3.       Automating web interface in relation to user behavior 1st International Conference on Artificial Intelligence & Cognitive Computing (AICC-2018)     02 – 03 February 2018
4.       Machine Learning-Based Software effort estimation of suggestive Agile and Scrumban Methodologies Proceedings of the 14th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2022)     16th-17th December 2022
5.       Automatic Facial Expression Recognition based on Spatial and

Temporal Sequencing

2nd International Conference on Cognitive and Intelligent Computing (ICCIC)     27th -28th December 2022
6.       Machine Learning-Based Software Effort Estimation of Suggestive Agile and Scrumban Methodologies Proceedings of the 14th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2022)   pp. 508–519 https://doi.org/10.1007/978-3-031-27524-1_4 2022

 

Scopus indexed Journal papers

S. No Title of the Article Name of the Journal/

Conference

Volume Number Issue Number Page Number Year
1. A Study on Big Data and its Importance International Journal of Applied Engineering Research 9 20 7469-7479 2014
2. Surfing Large Websites Based on User Behavior International Journal of Applied Engineering Research 9 20 7717-7726 2014
3. Searching Large Application-Specific WEB Sites through Concept-based Categorization International Journal of Applied Engineering Research 9 21 10005-10021 2014
4. Building Fault Tolerance within Clouds for Providing Uninterrupted Software as a Service Journal Theoretical and Applied Information & Technology 8 1 321-336 2016
5. Camera-based text-to-speech conversion, obstacle and currency detection for blind persons Indian Journal of Science and Technology 9 30 355-375 2016
6. Authenticating Clients without using their Login I.D.s using Mind Metrics Indian Journal of Science and Technology 9 30 1-6 2016
7. Building fault tolerance within the cloud at network levels International Journal of Electrical and Computer Engineering 6 4 1560-1569 2016
8. Text to Speech Conversion Indian Journal of Science and Technology 9 30 1-3 2016
9. Characterization of number plates through digital images ARPN Journals 11 24 14147-14155 2016
10. Vision-based security system Journal of Applied Engineering and Sciences, Medwell Journals 11 7   2016
11. Embedded Technology for Vehicle Cabin Safety Monitoring and Alerting System Jour of Adv Research in Dynamical & Control Systems 11   563-571 2017
12. ARM-based Vehicle Tracking and Alerting System Jour of Adv Research in Dynamical & Control Systems 11   563-571 2017
13. Architectural Models for Fault Tolerance within Clouds at Infrastructure Level ARPN Journal of Engineering and Applied Sciences 12 11 1525-1535 2017
14. On Selection of User Interface Dynamically for Displaying Data Mined Results ARPN Journal of Engineering and Applied Sciences 12 11 1-12 2017
15. An Efficient Architectural model for Building Cognitive expert systems related to Traffic Management System in Smart cities Journal of Engineering and Applied Sciences (Medwell Journals) 12 9 2437- 2445 2017
16. A Systematic Review on Integrity and Security in Adoption of Cloud Computing Technologies International Journal of Engineering & Technology 2 7 1017-1019 2018
17. On selection of user interface dynamically for displaying data mined results RPN Journal of Engineering and Applied Sciences

 

12 11 3561-3572

 

2018
18. Measuring Electricity Consumption of Appliances and Monitoring Them Using IoT and Machine Learning International Research Journal of Engineering and Technology (IRJET) 5 4 386-390 2018
19. An advanced framework to identify cybercrime using data analytics International Journal of Pure and Applied Mathematics  120 6 3363-3375 2018
20. An efficient technique for energy proficient clustering-based routing protocol for packet split and merge in wireless sensor networks International Journal of Pure and Applied Mathematics  120 6 3719-3734 2018
21. Home automation using GSM International Journal of Pure and Applied Mathematics 120 6 3735-3744 2018
22. Social Network inference for optimized ECommerce using Emotion A.I. Jour of Adv Research in Dynamical & Control Systems 10 7 1790-1799 2018
23. Advanced Method for Diabetes Monitoring of Elderly and Disabled Persons Using Internet of Things (IoT) Jour of Adv Research in Dynamical & Control Systems 10 7 1597-1600 2018
24.
Assessing completeness of a WEB site from Quality Perspective

 

International Journal of Electrical and Computer Engineering, 9 6 5596-5603 2019
25.
Identification of effective parameters for designing a data channel
Advances in Intelligent Systems and Computing   815 103-115 2019
26.
Automating WEB interface in relation to user behavior

 

Advances in Intelligent Systems and Computing   815 91-102 2019
27. An Implementation of Anomaly Detection in IoT DTA Using a Deep(OC-NN) with the Long Short-Term Memory Network(LSTM) International Journal of Innovative Technology and Exploring Engineering (IJITEE) 8 8 1835-1840 2019
28. An Implementation of Anomaly Detection in IoT Medical Data using Deep Anomaly Detection Models International Journal of Innovative Technology and Exploring Engineering (IJITEE) 8 8 578-582 2019
29. Assessing Completeness of a WEB site from Quality Perspective International Journal of Electrical and Computer Engineering (IJECE) 9 6 5596-5603 2019
30. Retrieving Songs by Lyrics Query Using Information Retrieval International Journal of Engineering and Advanced Technology (IJEAT) 8 6S 990-992 2019
31. Automatic Path Maker for Emergency Vehicles International Journal of Engineering and Advanced Technology (IJEAT) 9 1S6 168-174 December 2019
32. The Belief of World Records Fusion and its Software to Cyber Protection International Journal of Recent Technology and Engineering (IJRTE) 8 4S3 413-417 December 2019
33. Vision-Based Security System International Journal of Recent Technology and Engineering (IJRTE) 8 4S3 404-406 December 2019
34. Implement of Smart Health Care Monitoring System using Mobile IoT and Cloud Computing Technologies International Journal of Innovative Technology and Exploring Engineering (IJITEE) 9 2S5 67-72 December 2019
35. The belief of world records Fusion and its software to Cyber Protection

 

International Journal of Innovative Technology and Exploring Engineering (IJITEE) 8 4S3 413-417 December 2019
36. Web Page Information Extraction Using Deep Learning Solid State Technology 63 2S 6838-6847 September 2020

 

37. Detecting Faults within a Cloud Using Machine Learning Techniques IOP Conference Series: Materials Science and Engineering, 981(2),   022-029 2020
38. Anomaly Detections in smart Cities security using Image Recognition and Convolutional Neural Networks International Conference on Emerging Technology in Computing, Communication, and Electronics       2021
39. Real-Time Detection of Anomalies on Performance Data of Container Virtualization Platforms ECS Transactions 107(1)   20021–20031 2022
40. Detecting Fake Faces in Smart Cities Security Surveillance Using Image Recognition and Convolutional Neural Networks ECS Transactions 107(1)   19749–19758 2022
41. Predicting Suitable Careers Through Deep Belief Networks and Game Playing Journal of Positive School Psychology Vol. 6 No. 6 10136-10151 2022
42. An AI Based Chat Bot For Banking Applications using Intelligent Chat Bots IEEE International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering, RMKMATE 2023,       2023

 

Google Scholar indexed Journal papers

Serial Number Title of the Article Name of the Journal/

Conference

Volume Number Issue Number Page Number Year
1. On Verification of State-based Internal Behavioral Models of Embedded Systems  IJCEA- International Journal of Communication Engineering Applications 2 2 73-85 2011
2. Internal Behavioral Modeling of Embedded Systems through State Box Structures IJANA-International Journal Advanced Networking & Applications 2 6 887-889 2011
3. Code Generation for Hardware Modeling through Clear Box structure IJCEA- International Journal of Communication Engineering Applications 2 3 8-11 2011
4. A Novel Approach Towards the Performance Optimization of the Embedded System

 

RJCSE – An

International -Research Journal of Computer System Engineering

2 2 89-99 2011
5. Code Generation for Embedded Software for Modeling Clear Box Structures in IJANA- International Journal Advanced Networking & Applications 3 2 1080-1093 2011
6. Generating Code Related to Embedded Software for Modeling Clear Box Structures IJCEA- International Journal of Communication Engineering & Applications 2 4 313

329

2011
7. Testing Embedded Systems through Refined CRSE Methodology IJESR – International Journal of Scientific & Engineering Research 2 1 811

816

2011
8. The Relevance of Clean Room Software Engineering Methodology for the Development of Embedded Systems IJCIS – International Journal of Computer Information System 2 6 79

104

2011
9.  

An Efficient Elliptic Curve Cryptography Application in Constrained Mobile Environment

GJCAT – International Journal of Computer Information System 1 4 495

501

2011
10.  

A Generalized Method for Data Extraction from Web Pages

IJESAT – International Journal of Engineering Science & Advanced Technology 2 2 200

204

2012
11. An Efficient Mechanism for Intrusion Detection and Prevention System IJESAT – International Journal of Engineering Science & Advanced Technology 2 3 200

204

2012
12. Real-Time Multicast Data Transfer in Mobile Networks Golden Research Thoughts 1 10 1 – 4 2012
13. Automated generation of Test cases for testing critical regions of Embedded systems through Adjacent Pairwise Testing  

MCMST – International Journal of Mathematics and Computational Methods in Science & Technology

2 2 10

15

2012
14. An efficient mechanism for intrusion detection and prevention system International Journal of Engineering Science and advanced technology 2 1 23

31

2012
15. Estimating the Failure rates of Embedded Software through Program Slices International Journal of Systems and Technology 6 1 49-58 2013
16. Assessment of the risk associated with paths in the usage model using software-based Fault Trees International Journal of Computer Information Systems 7 4 47-63 2013
17. Developing Usage Models through Stimulus Response Sequences International Journal of Advances in Science and Technology 7 4 20

36

2013
18. Assessment of Failure rates of usage paths through Hardware Fault Tree Analysis International Journal of Mathematics and Computational Methods in Science & Technology 3 2 64-74 2013
19. Assessing the probability failure of arcs and distribution of test cases among the paths in the usage model International Journal of Advances in Science and Technology 7 4 108-121 2013
20. Generating Test cases through Markov Models for undertaking Comprehensive Testing of Embedded Systems International Journal of P2P Network Trends and Technology (IJPTT) 3 10 408-429 2013
21. Enriching the Test Cases for Testing the Critical Regions of Embedded Systems International Journal of Research and Reviews in Applicable Mathematics & Computer Science, 3 2 84-102 2013
22. Home Automation using GSM International Journal of Engineering Sciences Research-IJESR 6   1617-1620 2015
23. A Review of Data Mining using Bigdata in Health Informatics International Journal of Scientific and Research Publications 5 3 1-7 2015
24. A survey on Anomaly detection techniques for IoT based Healthcare.

systems in Smart Cities: Techniques, Issues, and opportunities.

International Journal of Research 3 1 1251-1258 2016
25. A Study of Different Biometric Authentication Techniques in Cloud Computing International Conference on Engineering Research & Technology (IJERT-2016)   12 612-619 2016
26. Embedded Technology for Vehicle Cabin Safety Monitoring and Alerting System Journal of Adv Research in Dynamical & Control Systems   11 563-571 2017
27. The Significance of Delayed and Disrupted Tolerant Networks for Challenged Internet Where the End Nodes are Inconsistent in International Journal of Advanced Scientific Technologies in Engineering and Management Sciences (IJASTEMS) 3 10 18-22 2017
28. Latency and Routing analysis in throw based DTN for challenged networks International Journal of Advanced Trends in Engineering, Science and Technology (IJATEST) 2 6 1-5 2017
29. A Survey on Mobile Computing International Conference of Engineering Research & Technology (ICERT)   11 1-9 NOV 2017
30. Clustering-based Forgy’s Algorithm using Java International Journal of Research (IJR) 5 1 1203-1207 2018
31. Cloud Remote Monitoring System International Journal of Creative Research Thoughts (IJCRT) 6 1 2134-2136 2018
32. A Content-based Analysis Refining and Feedback for Webpage International Journal of Creative Research Thoughts (IJCRT) 6 1 2201-2206 2018
33. Efficient Query Processing in Payment Application Module International Journal of Creative Research Thoughts (IJCRT) 6 1 2080-2083 2018
34. K-means Based Convex Hull Triangulation Clustering Algorithm International Journal of Research (IJR) 5 15 565- 567 2018
35. Loan Approval Prediction Using Machine Learning Journal of Applied Science and Computations       Feb 2022
36. Forecast Probabilistic Features Prediction Model and Its Exigency International Journal for Research (IJR)       Feb 2022
37. “Location For Malware Attacks “ International Journal for Research (IJR), XI II 277-281 Feb 2022
38. “Modeling and Comparative Analysis of SRAM Cell Structures to Achieve Low Power International Journal for Research (IJR) XI II 282-286. Feb 2022
39. “Covid-19 Detecting Through Machine Learning Techniques” Journal of Applied Science and Computations, XIV II 96-108 Feb 2022
40. “Comparative analysis of deep learning image detection algorithms” Journal of Applied Science and Computations XIV II 109-116 Feb 2022
41. “College Enquiry Chat bot” Journal of Applied Science and Computations XIV II 117-121 Feb 2022
42. “Analysis Of Women Safety In Indian Cities Using Machine Learning On Tweets” The International Journal Of Analytical & Experimental Modal Analysis XIV II 875-878 Feb 2022
43. “Suggested Crop for Agriculture Development” International Journal for Advanced Researches In Science & Technology 12 2 87-90 Feb 2022
44. Predicting Suitable Careers Through Deep Belief

Networks And Game Playing

Journal of Positive School Psychology 6 6 10136-10151 Jun’22

 

Springer-based Conference papers

Serial Number Title of the Article Name of the Journal/

Conference

Date

of Conference

Year
1.       Snort Rule Detection for Countering in Network Attack FICTA-2016 SPRINGER Publication, 2016, International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA’16) 16th and 17th September 2016 2016
2.       Text-to-Speech Conversion 3rd International Conference on Advances in Computer Science, Engineering and Technology (ICACSET’16) 22nd Sept 2016 2016
3. Automating WEB interface in relation to user behavior Artificial Intelligence & Cognitive Computing  02 – 03 February 2018
4. Identification of effective parameters for designing a data channel Artificial Intelligence & Cognitive Computing  02 – 03 February 2018
5. An advanced framework to identify cybercrime using data analytics Artificial Intelligence & Cognitive Computing  02 – 03 February 2018
6. An efficient technique for energy-proficient clustering-based routing protocol for packet split and merge in wireless sensor networks Artificial Intelligence & Cognitive Computing  02 – 03 February 2018
7. Home automation using GSM Artificial Intelligence & Cognitive Computing  02 – 03 February 2018
8. Online speaker authentication using phonemic distance measurements Artificial Intelligence & Cognitive Computing  02 – 03 February 2018
9. A secured surveillance system for monitoring your home Artificial Intelligence & Cognitive Computing  02 – 03 February 2018
10. An architecture on drome agriculture IoT using Machine learning 2nd International Conference on

Cognitive & Intelligent Computing

(ICCIC-2022)

27-28 December 2022 2022
11. Machine Learning-Based Software effort estimation of suggestive Agile and Scrumban Methodologies Proceedings of the 14th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2022) 14-16 December 2022

 

 

Non-Scopus-indexed conference papers.

 

Serial Number Title of the Article Name of the Journal/

Conference

Page Number Year
1. Attacking Embedded Systems Using Power Analysis 4th National Conference on Recent Trends in Communications, Electronics and Information Technologies 2014
2. ARM-based Vehicle Tracking and Alerting System 5th ICCET 2017 Fifth International Conference on Contemporary Engineering and Technology 24th – 25th March 2017

 

Awards

  1. Outstanding Scientist Award 2021 On Engineering Science and Medicine 10 & 11-Sep-2021 Coimbatore, India
  2. National Lifetime Achievement Award 2021 from I2OR
  3. Life Achievement Award 2020 −2021 from Novel Research Academy
  4. Academic Excellence Award-2023 from INSC
  5. Excellence Award 2023 @ Prasad Labs under Dada saheb Palke anniversary.
  6. Ugadi Seva Puraskar 2024 @ Hyderabad.

 

Membership in Editorial Board/ Reviewer

IDNO Journal Name Status Date of Expiry
20140086 IJRET (International Journal of Research in Engineering and Technology) Reviewer http://ijret.org/
  International Journal of Latest Trends in Engineering, Science and Technology (IJLTEST) Reviewer ijltest.org
EB2106821030 International Journal of Advanced Computer Research (IJACR) Reviewer  
  Pertanika Journal of Science &

Technology (JST)[SCOPUS]

Reviewer www.pertanika.upm.edu.my
  INSC International Publishers   www.insc.in/membership

 

Patent Details

S. No. CBR No Application No Title
1. 12055 201821025141 1-Tala-Intelligent Tala
2. 20248 201941025201 Design, Development on Solar Adsorption Desalination & Cooling System
3. 19530 202041016336A System And Method for An Automatic Inspection of Rail Tracks
4.   329276-001No 329276-001 /D/GM /AG Super Multi Wireless Charger
5. Journal No. 44/2021 Dated 29/10/2021 202141046168 A Data Security in Wireless Network Security Using the Modified Cryptography Algorithm

Scholars Guided for award of PhD

S. No. Name of the Scholar From Date To Date University Remarks
1. Mr V. V. Sunil Kumar 2014 2018 SVU, UP Awarded in 2018
2. Mr Shoban Babu 2014 2019 SVU, UP Awarded in 2019
3. Mr Y. Ratna Rao 2014 2019 SVU, UP Awarded in 2019
4. Mr Malla Reddy 2014 2019 SVU, UP Awarded in 2019
5. Mr. K.V.D. Sagar 2015 2021 SVU, UP Awarded in 2021
6. Mr Pwvan Dilip 2017 SVU,UP About to Submit

 

Conferences conducted

  1. A two-day National Conference on Wireless Communications & Sensor Networks NCWCSN -2014 from 7th -8th March
  2. A Two-Day National Conference on “Advancements in Embedded Systems and Sensor Networks” NCAESN 2015 sponsored by the Department of Science and Technology (DST), New Delhi, on 22nd and 23rd May
  3. A Two-Day National Conference on “Recent Advancements in Electronics, Computers, and Bioinformatics” NCRAECB 2016 sponsored by the Department of Science and Technology (DST), New Delhi on 22nd and 23rd April

SERB-DST Projects Applied

S. No. Title of the Project PI/Co-PI Amount Rs. Status
1 Computer vision-based on-road vehicle detection and recognition: A surveillance application suitable for complex Indian road conditions. PI 32,52,600 Applied
2. Design of an Enhanced Hand Gesture Interface System for Indian School Education Co-PI 9,92,000 Applied

Subjects Taught

  • C, C++, Java and Python
  • Computer Networks
  • Discrete Mathematics
  • Software Engineering
  • Webservices
  • MWT
  • Enterprise Programming
  • Web Technologies
  • DBMS, COOS, DWDM

Books Published

 

S. No Title Publisher ISBN Number Year of Publication URL Link
 

1

Testing                     Embedded

Systems through CRSE Methodology

Lambert Academic Publishers 978-3-659-81324-5. 2016 https://www.morebooks.de/gb/search?utf8=%E2%9C%93&q=Kamesh
 

 

2

Enhancing the Intelligence and Security of Tagging Systems” in Lambert Academic Publishers, 2016. ISBN NO: 978-3- 659-85287-9 Lambert Academic Publishers 978-3-659-85287-9 2016
 

3

Developing Embedded Systems through Cleanroom Software

Engineering

Lambert Academic Publishers 978-3-659-85949-6 2016
4 Practical                      Approach through C and D.S. Programming Lulu Publication Raleigh 978-1-365-90518-6 2017 https://www.lulu.com/en/en/shop/dr-duvvuri-b-k-kamesh-and-prof-a-prakash/practical-approach-through-c-and-ds-programming/paperback/product-1q2zzwjd.html
5 A Practical Approach for OOP through Java Lulu Publication Raleigh 978-0-359-70132-2 2019 https://www.lulu.com/en/en/shop/dr-sasi-bhanu-j-and-dr-kamesh-duvvuri/practical-approach-for-oop-through-java/ebook/product-176kd9ep.html
6 A Modern Approach of c Language Lulu Publication Raleigh ISBN

978-1-716-46528-4

2020 Lulu
7 Recent Software Engineering Lulu Publication Raleigh ISBN

978-1-4583-3677-4

2021 Lulu
8 Comprehensive Computer Networks Lulu Publication Raleigh ISBN 978-1-387-61897-2 2022 Lulu

 

Brochure