Designation | Professor |
Years of Experience | 23 |
Department | CSE |
Email Id | kamesh.dk@mlrit.ac.in |
JNTUH Unique Id | 2784-161027-112616 |
Areas of Specialization | • Software Engineers • Machine Learning • Data Science • Cloud Computing |
UG Degree | MCA |
PG Degree | M.Tech - CSE |
Ph.D | Ph.D |
Joining Date | 27-05-2024 |
Nature of Association | Regular |
Journal Publications | Conference Publications |
Total Publications |
||||
Number of National Journal Publications | Number of International Journal Publications | Total Indexed Journal Publications | National Conference Publications | International Conference Publications | Total Conference Publications | |
0 | 75 | 75
(2-IEEE, 6-SCI 29- SCOPUS 6-Springer Chapters 32-Google Scholar Indexed,
|
8 | 21
(11-Springer Conferences) 10 – Google Indexed conferences |
29 | 104 |
Serial Number | Title of the Article | Name of the Conference | Volume Number | Issue Number | Page Number | Year |
1. | Automated Generation of Test Cases from Output Domain of an Embedded System uses Genetic Algorithms | The proceedings of IEEE sponsored International Conference on Network and Computer Science (ICNCS 2011) | – | – | 216-220 | 2011 |
2. | Automated Generation of Test Cases from Output Domain and critical regions of the embedded Systems using Genetic Algorithms | In the proceedings of IEEE sponsored 2nd National Conference on Emerging Trends and Applications in Computer Science (NCETACS 2010 | – | – | 1-6 | 2011 |
3. | An AI Based Chat Bot for Banking Applications using Intelligent Chat Bots | 2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE) | 2023 | |||
4. | Hermes – Smart College Application using Android | 2024 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC) | 2024 | |||
5. |
Statistical Approach of Big Data Analytics in Health care |
2024 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC) | 2024 | |||
6. | Greenhouse Environments Yield Prediction for Plant Growth Using Deep Learning | 2024 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC) | 2024 | |||
Machine Learning: Image Authentication Based using 3-Level Security System | 2024 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC) | 2024 |
Serial Number | Title of the Article | Name of the Journal | Volume Number | Issue Number | Page Number | Year |
1. | Development of a Data Recovery System for the Data Transmitted over Rayleigh Faded Channel | ScienceDirect Procedia Computer Science 00 (2015) 000–000 | 1-5 | 2015 | ||
2. | Testing Distributed Embedded Systems through Instruction Set Simulators | in PONTE International Journal of Science and Research (SCI) | 73 | 7 | 353-382 | 2017 |
3. | An Efficient Method for Testing Distributed Embedded Systems Using In-circuit Emulators | International Journal of Sciences and Research. (SCI) | 73 | 7 | 390- 422 | 2017 |
4. | An Effective Model for Testing Distributed Embedded Systems Using Scaffolding Method | International Journal of Sciences and Research. (SCI) | 73 | 8 | 1- 22 | 2017 |
5. | Enhancing the Fault Tolerance of a Multi-Layered IoT Network through Rectangular and Interstitial Mesh in the Gateway Layer |
Journal of Sensor and Actuator Networks” [MPDI] SCI |
Vol 1 | 1-17 | 2023 | |
6. | Building an Expert System through machine learning for Predicting the Quality of a WEB site based on its completion | Journal of Computers – MDPI | Vol 1 | 1-16 | 2023 |
Serial Number | Title of the Article | Name of the Journal | Volume Number | Issue Number | Page Number | Year |
1. | Snort Rule Detection for Countering in Network Attack | FICTA-2016 SPRINGER Publication, 2016, International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA’16) | 16th -17th September | 2016 | ||
2. | Identification of effective parameters for designing a data channel | 1st International Conference on Artificial Intelligence & Cognitive Computing (AICC-2018) | 02 – 03 February | 2018 | ||
3. | Automating web interface in relation to user behavior | 1st International Conference on Artificial Intelligence & Cognitive Computing (AICC-2018) | 02 – 03 February | 2018 | ||
4. | Machine Learning-Based Software effort estimation of suggestive Agile and Scrumban Methodologies | Proceedings of the 14th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2022) | 16th-17th December | 2022 | ||
5. | Automatic Facial Expression Recognition based on Spatial and
Temporal Sequencing |
2nd International Conference on Cognitive and Intelligent Computing (ICCIC) | 27th -28th December | 2022 | ||
6. | Machine Learning-Based Software Effort Estimation of Suggestive Agile and Scrumban Methodologies | Proceedings of the 14th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2022) | pp. 508–519 | https://doi.org/10.1007/978-3-031-27524-1_4 | 2022 |
S. No | Title of the Article | Name of the Journal/
Conference |
Volume Number | Issue Number | Page Number | Year | |
1. | A Study on Big Data and its Importance | International Journal of Applied Engineering Research | 9 | 20 | 7469-7479 | 2014 | |
2. | Surfing Large Websites Based on User Behavior | International Journal of Applied Engineering Research | 9 | 20 | 7717-7726 | 2014 | |
3. | Searching Large Application-Specific WEB Sites through Concept-based Categorization | International Journal of Applied Engineering Research | 9 | 21 | 10005-10021 | 2014 | |
4. | Building Fault Tolerance within Clouds for Providing Uninterrupted Software as a Service | Journal Theoretical and Applied Information & Technology | 8 | 1 | 321-336 | 2016 | |
5. | Camera-based text-to-speech conversion, obstacle and currency detection for blind persons | Indian Journal of Science and Technology | 9 | 30 | 355-375 | 2016 | |
6. | Authenticating Clients without using their Login I.D.s using Mind Metrics | Indian Journal of Science and Technology | 9 | 30 | 1-6 | 2016 | |
7. | Building fault tolerance within the cloud at network levels | International Journal of Electrical and Computer Engineering | 6 | 4 | 1560-1569 | 2016 | |
8. | Text to Speech Conversion | Indian Journal of Science and Technology | 9 | 30 | 1-3 | 2016 | |
9. | Characterization of number plates through digital images | ARPN Journals | 11 | 24 | 14147-14155 | 2016 | |
10. | Vision-based security system | Journal of Applied Engineering and Sciences, Medwell Journals | 11 | 7 | 2016 | ||
11. | Embedded Technology for Vehicle Cabin Safety Monitoring and Alerting System | Jour of Adv Research in Dynamical & Control Systems | 11 | 563-571 | 2017 | ||
12. | ARM-based Vehicle Tracking and Alerting System | Jour of Adv Research in Dynamical & Control Systems | 11 | 563-571 | 2017 | ||
13. | Architectural Models for Fault Tolerance within Clouds at Infrastructure Level | ARPN Journal of Engineering and Applied Sciences | 12 | 11 | 1525-1535 | 2017 | |
14. | On Selection of User Interface Dynamically for Displaying Data Mined Results | ARPN Journal of Engineering and Applied Sciences | 12 | 11 | 1-12 | 2017 | |
15. | An Efficient Architectural model for Building Cognitive expert systems related to Traffic Management System in Smart cities | Journal of Engineering and Applied Sciences (Medwell Journals) | 12 | 9 | 2437- 2445 | 2017 | |
16. | A Systematic Review on Integrity and Security in Adoption of Cloud Computing Technologies | International Journal of Engineering & Technology | 2 | 7 | 1017-1019 | 2018 | |
17. | On selection of user interface dynamically for displaying data mined results | RPN Journal of Engineering and Applied Sciences
|
12 | 11 | 3561-3572
|
2018 | |
18. | Measuring Electricity Consumption of Appliances and Monitoring Them Using IoT and Machine Learning | International Research Journal of Engineering and Technology (IRJET) | 5 | 4 | 386-390 | 2018 | |
19. | An advanced framework to identify cybercrime using data analytics | International Journal of Pure and Applied Mathematics | 120 | 6 | 3363-3375 | 2018 | |
20. | An efficient technique for energy proficient clustering-based routing protocol for packet split and merge in wireless sensor networks | International Journal of Pure and Applied Mathematics | 120 | 6 | 3719-3734 | 2018 | |
21. | Home automation using GSM | International Journal of Pure and Applied Mathematics | 120 | 6 | 3735-3744 | 2018 | |
22. | Social Network inference for optimized ECommerce using Emotion A.I. | Jour of Adv Research in Dynamical & Control Systems | 10 | 7 | 1790-1799 | 2018 | |
23. | Advanced Method for Diabetes Monitoring of Elderly and Disabled Persons Using Internet of Things (IoT) | Jour of Adv Research in Dynamical & Control Systems | 10 | 7 | 1597-1600 | 2018 | |
24. |
Assessing completeness of a WEB site from Quality Perspective
|
International Journal of Electrical and Computer Engineering, | 9 | 6 | 5596-5603 | 2019 | |
25. |
Identification of effective parameters for designing a data channel |
Advances in Intelligent Systems and Computing | 815 | 103-115 | 2019 | ||
26. |
Automating WEB interface in relation to user behavior
|
Advances in Intelligent Systems and Computing | 815 | 91-102 | 2019 | ||
27. | An Implementation of Anomaly Detection in IoT DTA Using a Deep(OC-NN) with the Long Short-Term Memory Network(LSTM) | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | 8 | 8 | 1835-1840 | 2019 | |
28. | An Implementation of Anomaly Detection in IoT Medical Data using Deep Anomaly Detection Models | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | 8 | 8 | 578-582 | 2019 | |
29. | Assessing Completeness of a WEB site from Quality Perspective | International Journal of Electrical and Computer Engineering (IJECE) | 9 | 6 | 5596-5603 | 2019 | |
30. | Retrieving Songs by Lyrics Query Using Information Retrieval | International Journal of Engineering and Advanced Technology (IJEAT) | 8 | 6S | 990-992 | 2019 | |
31. | Automatic Path Maker for Emergency Vehicles | International Journal of Engineering and Advanced Technology (IJEAT) | 9 | 1S6 | 168-174 | December 2019 | |
32. | The Belief of World Records Fusion and its Software to Cyber Protection | International Journal of Recent Technology and Engineering (IJRTE) | 8 | 4S3 | 413-417 | December 2019 | |
33. | Vision-Based Security System | International Journal of Recent Technology and Engineering (IJRTE) | 8 | 4S3 | 404-406 | December 2019 | |
34. | Implement of Smart Health Care Monitoring System using Mobile IoT and Cloud Computing Technologies | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | 9 | 2S5 | 67-72 | December 2019 | |
35. | The belief of world records Fusion and its software to Cyber Protection
|
International Journal of Innovative Technology and Exploring Engineering (IJITEE) | 8 | 4S3 | 413-417 | December 2019 | |
36. | Web Page Information Extraction Using Deep Learning | Solid State Technology | 63 | 2S | 6838-6847 | September 2020
|
|
37. | Detecting Faults within a Cloud Using Machine Learning Techniques | IOP Conference Series: Materials Science and Engineering, | 981(2), | 022-029 | 2020 | ||
38. | Anomaly Detections in smart Cities security using Image Recognition and Convolutional Neural Networks | International Conference on Emerging Technology in Computing, Communication, and Electronics | 2021 | ||||
39. | Real-Time Detection of Anomalies on Performance Data of Container Virtualization Platforms | ECS Transactions | 107(1) | 20021–20031 | 2022 | ||
40. | Detecting Fake Faces in Smart Cities Security Surveillance Using Image Recognition and Convolutional Neural Networks | ECS Transactions | 107(1) | 19749–19758 | 2022 | ||
41. | Predicting Suitable Careers Through Deep Belief Networks and Game Playing | Journal of Positive School Psychology | Vol. 6 | No. 6 | 10136-10151 | 2022 | |
42. | An AI Based Chat Bot For Banking Applications using Intelligent Chat Bots | IEEE International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering, RMKMATE 2023, | 2023 | ||||
Serial Number | Title of the Article | Name of the Journal/
Conference |
Volume Number | Issue Number | Page Number | Year |
1. | On Verification of State-based Internal Behavioral Models of Embedded Systems | IJCEA- International Journal of Communication Engineering Applications | 2 | 2 | 73-85 | 2011 |
2. | Internal Behavioral Modeling of Embedded Systems through State Box Structures | IJANA-International Journal Advanced Networking & Applications | 2 | 6 | 887-889 | 2011 |
3. | Code Generation for Hardware Modeling through Clear Box structure | IJCEA- International Journal of Communication Engineering Applications | 2 | 3 | 8-11 | 2011 |
4. | A Novel Approach Towards the Performance Optimization of the Embedded System
|
RJCSE – An
International -Research Journal of Computer System Engineering |
2 | 2 | 89-99 | 2011 |
5. | Code Generation for Embedded Software for Modeling Clear Box Structures | in IJANA- International Journal Advanced Networking & Applications | 3 | 2 | 1080-1093 | 2011 |
6. | Generating Code Related to Embedded Software for Modeling Clear Box Structures | IJCEA- International Journal of Communication Engineering & Applications | 2 | 4 | 313
– 329 |
2011 |
7. | Testing Embedded Systems through Refined CRSE Methodology | IJESR – International Journal of Scientific & Engineering Research | 2 | 1 | 811
– 816 |
2011 |
8. | The Relevance of Clean Room Software Engineering Methodology for the Development of Embedded Systems | IJCIS – International Journal of Computer Information System | 2 | 6 | 79
– 104 |
2011 |
9. |
An Efficient Elliptic Curve Cryptography Application in Constrained Mobile Environment |
GJCAT – International Journal of Computer Information System | 1 | 4 | 495
– 501 |
2011 |
10. |
A Generalized Method for Data Extraction from Web Pages |
IJESAT – International Journal of Engineering Science & Advanced Technology | 2 | 2 | 200
– 204 |
2012 |
11. | An Efficient Mechanism for Intrusion Detection and Prevention System | IJESAT – International Journal of Engineering Science & Advanced Technology | 2 | 3 | 200
– 204 |
2012 |
12. | Real-Time Multicast Data Transfer in Mobile Networks | Golden Research Thoughts | 1 | 10 | 1 – 4 | 2012 |
13. | Automated generation of Test cases for testing critical regions of Embedded systems through Adjacent Pairwise Testing |
MCMST – International Journal of Mathematics and Computational Methods in Science & Technology |
2 | 2 | 10
– 15 |
2012 |
14. | An efficient mechanism for intrusion detection and prevention system | International Journal of Engineering Science and advanced technology | 2 | 1 | 23
– 31 |
2012 |
15. | Estimating the Failure rates of Embedded Software through Program Slices | International Journal of Systems and Technology | 6 | 1 | 49-58 | 2013 |
16. | Assessment of the risk associated with paths in the usage model using software-based Fault Trees | International Journal of Computer Information Systems | 7 | 4 | 47-63 | 2013 |
17. | Developing Usage Models through Stimulus Response Sequences | International Journal of Advances in Science and Technology | 7 | 4 | 20
– 36 |
2013 |
18. | Assessment of Failure rates of usage paths through Hardware Fault Tree Analysis | International Journal of Mathematics and Computational Methods in Science & Technology | 3 | 2 | 64-74 | 2013 |
19. | Assessing the probability failure of arcs and distribution of test cases among the paths in the usage model | International Journal of Advances in Science and Technology | 7 | 4 | 108-121 | 2013 |
20. | Generating Test cases through Markov Models for undertaking Comprehensive Testing of Embedded Systems | International Journal of P2P Network Trends and Technology (IJPTT) | 3 | 10 | 408-429 | 2013 |
21. | Enriching the Test Cases for Testing the Critical Regions of Embedded Systems | International Journal of Research and Reviews in Applicable Mathematics & Computer Science, | 3 | 2 | 84-102 | 2013 |
22. | Home Automation using GSM | International Journal of Engineering Sciences Research-IJESR | 6 | 1617-1620 | 2015 | |
23. | A Review of Data Mining using Bigdata in Health Informatics | International Journal of Scientific and Research Publications | 5 | 3 | 1-7 | 2015 |
24. | A survey on Anomaly detection techniques for IoT based Healthcare.
systems in Smart Cities: Techniques, Issues, and opportunities. |
International Journal of Research | 3 | 1 | 1251-1258 | 2016 |
25. | A Study of Different Biometric Authentication Techniques in Cloud Computing | International Conference on Engineering Research & Technology (IJERT-2016) | 12 | 612-619 | 2016 | |
26. | Embedded Technology for Vehicle Cabin Safety Monitoring and Alerting System | Journal of Adv Research in Dynamical & Control Systems | 11 | 563-571 | 2017 | |
27. | The Significance of Delayed and Disrupted Tolerant Networks for Challenged Internet Where the End Nodes are Inconsistent | in International Journal of Advanced Scientific Technologies in Engineering and Management Sciences (IJASTEMS) | 3 | 10 | 18-22 | 2017 |
28. | Latency and Routing analysis in throw based DTN for challenged networks | International Journal of Advanced Trends in Engineering, Science and Technology (IJATEST) | 2 | 6 | 1-5 | 2017 |
29. | A Survey on Mobile Computing | International Conference of Engineering Research & Technology (ICERT) | 11 | 1-9 | NOV 2017 | |
30. | Clustering-based Forgy’s Algorithm using Java | International Journal of Research (IJR) | 5 | 1 | 1203-1207 | 2018 |
31. | Cloud Remote Monitoring System | International Journal of Creative Research Thoughts (IJCRT) | 6 | 1 | 2134-2136 | 2018 |
32. | A Content-based Analysis Refining and Feedback for Webpage | International Journal of Creative Research Thoughts (IJCRT) | 6 | 1 | 2201-2206 | 2018 |
33. | Efficient Query Processing in Payment Application Module | International Journal of Creative Research Thoughts (IJCRT) | 6 | 1 | 2080-2083 | 2018 |
34. | K-means Based Convex Hull Triangulation Clustering Algorithm | International Journal of Research (IJR) | 5 | 15 | 565- 567 | 2018 |
35. | Loan Approval Prediction Using Machine Learning | Journal of Applied Science and Computations | Feb 2022 | |||
36. | Forecast Probabilistic Features Prediction Model and Its Exigency | International Journal for Research (IJR) | Feb 2022 | |||
37. | “Location For Malware Attacks “ | International Journal for Research (IJR), | XI | II | 277-281 | Feb 2022 |
38. | “Modeling and Comparative Analysis of SRAM Cell Structures to Achieve Low Power | International Journal for Research (IJR) | XI | II | 282-286. | Feb 2022 |
39. | “Covid-19 Detecting Through Machine Learning Techniques” | Journal of Applied Science and Computations, | XIV | II | 96-108 | Feb 2022 |
40. | “Comparative analysis of deep learning image detection algorithms” | Journal of Applied Science and Computations | XIV | II | 109-116 | Feb 2022 |
41. | “College Enquiry Chat bot” | Journal of Applied Science and Computations | XIV | II | 117-121 | Feb 2022 |
42. | “Analysis Of Women Safety In Indian Cities Using Machine Learning On Tweets” | The International Journal Of Analytical & Experimental Modal Analysis | XIV | II | 875-878 | Feb 2022 |
43. | “Suggested Crop for Agriculture Development” | International Journal for Advanced Researches In Science & Technology | 12 | 2 | 87-90 | Feb 2022 |
44. | Predicting Suitable Careers Through Deep Belief
Networks And Game Playing |
Journal of Positive School Psychology | 6 | 6 | 10136-10151 | Jun’22 |
Serial Number | Title of the Article | Name of the Journal/
Conference |
Date
of Conference |
Year |
1. | Snort Rule Detection for Countering in Network Attack | FICTA-2016 SPRINGER Publication, 2016, International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA’16) | 16th and 17th September 2016 | 2016 |
2. | Text-to-Speech Conversion | 3rd International Conference on Advances in Computer Science, Engineering and Technology (ICACSET’16) | 22nd Sept 2016 | 2016 |
3. | Automating WEB interface in relation to user behavior | Artificial Intelligence & Cognitive Computing | 02 – 03 February | 2018 |
4. | Identification of effective parameters for designing a data channel | Artificial Intelligence & Cognitive Computing | 02 – 03 February | 2018 |
5. | An advanced framework to identify cybercrime using data analytics | Artificial Intelligence & Cognitive Computing | 02 – 03 February | 2018 |
6. | An efficient technique for energy-proficient clustering-based routing protocol for packet split and merge in wireless sensor networks | Artificial Intelligence & Cognitive Computing | 02 – 03 February | 2018 |
7. | Home automation using GSM | Artificial Intelligence & Cognitive Computing | 02 – 03 February | 2018 |
8. | Online speaker authentication using phonemic distance measurements | Artificial Intelligence & Cognitive Computing | 02 – 03 February | 2018 |
9. | A secured surveillance system for monitoring your home | Artificial Intelligence & Cognitive Computing | 02 – 03 February | 2018 |
10. | An architecture on drome agriculture IoT using Machine learning | 2nd International Conference on
Cognitive & Intelligent Computing (ICCIC-2022) |
27-28 December 2022 | 2022 |
11. | Machine Learning-Based Software effort estimation of suggestive Agile and Scrumban Methodologies | Proceedings of the 14th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2022) | 14-16 December | 2022 |
Non-Scopus-indexed conference papers.
Serial Number | Title of the Article | Name of the Journal/
Conference |
Page Number | Year |
1. | Attacking Embedded Systems Using Power Analysis | 4th National Conference on Recent Trends in Communications, Electronics and Information Technologies | – | 2014 |
2. | ARM-based Vehicle Tracking and Alerting System | 5th ICCET 2017 Fifth International Conference on Contemporary Engineering and Technology | 24th – 25th March | 2017 |
Membership in Editorial Board/ Reviewer
IDNO | Journal Name | Status | Date of Expiry |
20140086 | IJRET (International Journal of Research in Engineering and Technology) | Reviewer | http://ijret.org/ |
International Journal of Latest Trends in Engineering, Science and Technology (IJLTEST) | Reviewer | ijltest.org | |
EB2106821030 | International Journal of Advanced Computer Research (IJACR) | Reviewer | |
Pertanika Journal of Science &
Technology (JST)[SCOPUS] |
Reviewer | www.pertanika.upm.edu.my | |
INSC International Publishers | www.insc.in/membership |
S. No. | CBR No | Application No | Title |
1. | 12055 | 201821025141 | 1-Tala-Intelligent Tala |
2. | 20248 | 201941025201 | Design, Development on Solar Adsorption Desalination & Cooling System |
3. | 19530 | 202041016336A | System And Method for An Automatic Inspection of Rail Tracks |
4. | 329276-001No 329276-001 /D/GM /AG | Super Multi Wireless Charger | |
5. | Journal No. 44/2021 Dated 29/10/2021 | 202141046168 A | Data Security in Wireless Network Security Using the Modified Cryptography Algorithm |
S. No. | Name of the Scholar | From Date | To Date | University | Remarks |
1. | Mr V. V. Sunil Kumar | 2014 | 2018 | SVU, UP | Awarded in 2018 |
2. | Mr Shoban Babu | 2014 | 2019 | SVU, UP | Awarded in 2019 |
3. | Mr Y. Ratna Rao | 2014 | 2019 | SVU, UP | Awarded in 2019 |
4. | Mr Malla Reddy | 2014 | 2019 | SVU, UP | Awarded in 2019 |
5. | Mr. K.V.D. Sagar | 2015 | 2021 | SVU, UP | Awarded in 2021 |
6. | Mr Pwvan Dilip | 2017 | – | SVU,UP | About to Submit |
S. No. | Title of the Project | PI/Co-PI | Amount Rs. | Status |
1 | Computer vision-based on-road vehicle detection and recognition: A surveillance application suitable for complex Indian road conditions. | PI | 32,52,600 | Applied |
2. | Design of an Enhanced Hand Gesture Interface System for Indian School Education | Co-PI | 9,92,000 | Applied |
S. No | Title | Publisher | ISBN Number | Year of Publication | URL Link |
1 |
Testing Embedded
Systems through CRSE Methodology |
Lambert Academic Publishers | 978-3-659-81324-5. | 2016 | https://www.morebooks.de/gb/search?utf8=%E2%9C%93&q=Kamesh |
2 |
Enhancing the Intelligence and Security of Tagging Systems” in Lambert Academic Publishers, 2016. ISBN NO: 978-3- 659-85287-9 | Lambert Academic Publishers | 978-3-659-85287-9 | 2016 | |
3 |
Developing Embedded Systems through Cleanroom Software
Engineering |
Lambert Academic Publishers | 978-3-659-85949-6 | 2016 | |
4 | Practical Approach through C and D.S. Programming | Lulu Publication Raleigh | 978-1-365-90518-6 | 2017 | https://www.lulu.com/en/en/shop/dr-duvvuri-b-k-kamesh-and-prof-a-prakash/practical-approach-through-c-and-ds-programming/paperback/product-1q2zzwjd.html |
5 | A Practical Approach for OOP through Java | Lulu Publication Raleigh | 978-0-359-70132-2 | 2019 | https://www.lulu.com/en/en/shop/dr-sasi-bhanu-j-and-dr-kamesh-duvvuri/practical-approach-for-oop-through-java/ebook/product-176kd9ep.html |
6 | A Modern Approach of c Language | Lulu Publication Raleigh | ISBN
978-1-716-46528-4 |
2020 | Lulu |
7 | Recent Software Engineering | Lulu Publication Raleigh | ISBN
978-1-4583-3677-4 |
2021 | Lulu |
8 | Comprehensive Computer Networks | Lulu Publication Raleigh | ISBN 978-1-387-61897-2 | 2022 | Lulu |