Papers by baburao kodavati

Heterogeneous network is considered as key technologies involved in significant utilization of av... more Heterogeneous network is considered as key technologies involved in significant utilization of available unused spectrum. Through the implementation of heterogeneous network energy utilization is achieved through effective spectral efficiency with higher throughput. However, this heterogeneous network environment is subjected to the challenge of latency. To derive the complete potential of heterogeneous networks machine learning algorithms need to be adopted for a dynamic environment. In the case of a practical scenario, it is difficult to reduce the network latency due to the complex network nature. To overcome those limitations, this paper proposed a Q-learning Reinforcement learning (QleaRL) for reducing latency. The proposed QleaRL utilizes Cooperative Q - learning based on consideration of state, action, and reward. Through optimal policy, reinforcement learning is computed based on Q -values. The performance of the proposed QleaRL is evaluated for latency. Simulation of propos...
Design Engineering, Nov 3, 2021

2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), 2021
Due to the arrival of the coronavirus, the education system has completely transformed. In the wa... more Due to the arrival of the coronavirus, the education system has completely transformed. In the wake of this medical emergency and keeping the students' safety in mind with their academic concern, the schools and colleges have endorsed online classes. In online lectures, the teacher is unable to track attentiveness of the students. Academic institutions may not have the human resources or time required to manually analyze each student's video feed. The task of manually analyzing attention of students can be solved by automating it using Computer Vision and Machine Learning, by creating an application that can track the attention levels of each student. An automated solution would be a much cheaper and easier solution to this problem, along with the fact that it can eventually be applied to self-paced online courses as well.

A vehicle tracking system combines the installation of an electronic device in a vehicle, or flee... more A vehicle tracking system combines the installation of an electronic device in a vehicle, or fleet of vehicles, with purpose-designed computer software to enable the owner or a third party to track the vehicle's location, collecting data in the process. Modern vehicle tracking systems commonly use Global Positioning System (GPS) technology for locating the vehicle, but other types of automatic vehicle location technology can also be used. Vehicle information can be viewed on electronic maps via the Internet or specialized software. In the main they are easy to steal, and the average motorist has very little knowledge of what it is all about. To avoid this kind of steal we are going to implement a system it provides more security to the vehicle. Existing System: In the previous system security lock and alarm is implemented in a car. If a burglar can break open the lock, then it becomes easy for the burglar to steal the car. And in old security system if the car is stolen then it ...

The fifth generation (5G) wireless network technology is to be standardized by 2020, with the aim... more The fifth generation (5G) wireless network technology is to be standardized by 2020, with the aim of improving its reliability, capacity and energy efficiency, on the other hand, the system is to be designed to reduce the latency for massive connection density.There are several technique available to improve the reliability, capacity and energy efficiency. However, the availability of techniques to reduce the latency using 5G core systems with Software Defined Networking (SDN) is not available in researches. In this paper, we propose a new network topology that utilizes SDN to support the core network in reducing the latency requirement in 5G systems. This intelligent SDNframework is used in 5G subsystems for transmitting and receiving purposes. The utilization of SDNframework ensures that better routing path for data transmission with shortest paths. This will pave the way for reduced latency in 5G systems with the use of an improved routing model with SDN framework. The average la...
ABSTRACT: This paper presents a performance comparison of new authenticated encryption and decryp... more ABSTRACT: This paper presents a performance comparison of new authenticated encryption and decryption (AED) algorithm which are aimed at providing better security and resource efficiency compared to existing standards. Authenticated encryption and decryption technique guarantee both privacy and integrity. One of the most popular authenticated encryption and decryption algorithm is to improve the speed. In existed system encryption process is performed (i.e) plain text is converted into cipher text. Because of this there will be no proper security. Hence authenticated encryption and decryption is implemented (i.e) plain text is converted into cipher text & cipher text is converted into plain text. Hence this project gives better security compared to exist one.

Analytical Chemistry, 2021
In operando observation of reaction intermediates is crucial for unraveling reaction mechanisms. ... more In operando observation of reaction intermediates is crucial for unraveling reaction mechanisms. To address the sensitivity limitations of commercial ReactIR, a flow cell was integrated with a Fourier transform infrared (FTIR) spectrometer yielding a "flow FTIR" device coupled with an NMR spectrometer for the elucidation of reaction mechanisms. The former device detects the low-intensity IR peaks of reaction intermediates by adjusting the path length of the FTIR sample cell, whereas the flow NMR allows the quantitative analysis of reaction species, thus offsetting the limitations of IR spectroscopy resulting from different absorption coefficients of the normal modes. Using the flow NMR and FTIR device, the controversial mechanism of benzoxazole synthesis was conclusively determined by spectroscopic evaluation of the reaction intermediates. This system enabled the accurate acquisition of previously elusive kinetic data, such as the reaction time and rate-determining step. The implementation of reaction flow cells into NMR and FTIR systems could be widely applied to study various reaction mechanisms, including dangerous and harsh reactions, thus avoiding contact with potentially harmful reaction intermediates.
Journal of Turbomachinery, 1990
An experimental study of three-dimensional flow field in an annular compressor cascade with an up... more An experimental study of three-dimensional flow field in an annular compressor cascade with an upstream rotor has been carried out at four different incidences to the stator blade. Blade boundary layers and the three-dimensional flow field at the exit are surveyed using a hot-wire sensor and a five-hole probe, respectively. The data on the blade boundary layer, passage flow, and separated corner flow are presented. The upstream rotor wake has a major influence on the transition, laminar separation bubble, extent of wall/corner flow separation, aerodynamic losses, secondary flow, and three-dimensional flow inside the passage. A detailed interpretation of the effects of upstream wakes on the entire passage flow is presented and compared with the data in the absence of a rotor.

Gyro is one of the major parts of the space vehicle. Gyro is used to measure the rotational rate ... more Gyro is one of the major parts of the space vehicle. Gyro is used to measure the rotational rate of the space vehicle. One of the Laser technologies is used in the gyro. The laser beam must be incident on the photo diode without any abstraction. If any magnetic field is present, the laser beam is bending. But it must be avoided. But sometimes due to external influences gyro will effect by the magnetic field. So, we need to demagnetize the gyro. To demagnetizing the gyro, one method is used namely known as degaussing. Degaussing is the process of decreasing or eliminating an unwanted magnetic field. But it is generally not possible to reduce a magnetic field completely to zero, so degaussing typically induces a very small "known " field referred to as bias. The original method of degaussing was to install electromagnetic coils into system, known simply as coiling.The paper is how to degauss the gyro using microcontroller AT90S2313. To degaussing the gyro, applied voltage ti...

Abstract--This paper describes a new way of providing security for objects; the object can either... more Abstract--This paper describes a new way of providing security for objects; the object can either be a file or an automotive like car, etc. The method used for providing security to objects is by creating a virtual fence around the object in such a way that whenever the object is moved out of the fence it is considered as an event and the event is notified to the user. Encryption is one of the techniques for providing security to objects, and the key used for encryption plays major role in providing security. This paper explains a new way of key generation which makes the file to be decrypted at the same location and by the same person (who knows the password) where it is encrypted, and the decrypted file is deleted whenever the fence is exited. This paper also explains a method for providing security to automobile by creating a fence around the vehicle. The engine automatically locks whenever the fence is exited and when the vehicle is used by an unauthorized person.
This paper presents detect the presence of a target within a specified range(2 to 30m). The prese... more This paper presents detect the presence of a target within a specified range(2 to 30m). The present work generally relates to a radar system and more particularly, to improve range resolution (3 m) and minimum detection time (2 msec). Speed and accuracy are two important evaluation indicators in target detecting system. The challenges in developing the algorithm is finding the Doppler frequency and give caution signal to chief at an optimum instant of time to cause target kill. Time management serves to maintain a priority queue of all the tasks. In this work we have taken up issue of developing an algorithm using ADSP TS 201 DSP Processor.

This paper describes a new way of providing security for objects; the object can either be a file... more This paper describes a new way of providing security for objects; the object can either be a file or an automotive like car, etc. The method used for providing security to objects is by creating a virtual fence around the object in such a way that whenever the object is moved out of the fence it is considered as an event and the event is notified to the user. Encryption is one of the techniques for providing security to objects, and the key used for encryption plays major role in providing security. This paper explains a new way of key generation which makes the file to be decrypted at the same location and by the same person (who knows the password) where it is encrypted, and the decrypted file is deleted whenever the fence is exited. This paper also explains a method for providing security to automobile by creating a fence around the vehicle. The engine automatically locks whenever the fence is exited and when the vehicle is used by an unauthorized person.

International Journal of Wireless & Mobile Networks, Apr 30, 2011
This paper describes a new way of providing security for objects; the object can either be a file... more This paper describes a new way of providing security for objects; the object can either be a file or an automotive like car, etc. The method used for providing security to objects is by creating a virtual fence around the object in such a way that whenever the object is moved out of the fence it is considered as an event and the event is notified to the user. Encryption is one of the techniques for providing security to objects, and the key used for encryption plays major role in providing security. This paper explains a new way of key generation which makes the file to be decrypted at the same location and by the same person (who knows the password) where it is encrypted, and the decrypted file is deleted whenever the fence is exited. This paper also explains a method for providing security to automobile by creating a fence around the vehicle. The engine automatically locks whenever the fence is exited and when the vehicle is used by an unauthorized person.
International Journal of Communication Systems
Advances in reflectarrays and array lenses with electronic beam-forming capabilities are enabling... more Advances in reflectarrays and array lenses with electronic beam-forming capabilities are enabling a host of new possibilities for these high-performance, low-cost antenna architectures. This paper reviews enabling technologies and topologies of reconfigurable reflectarray and array lens designs, and surveys a range of experimental implementations and achievements that have been made in this area in recent years. The paper describes the fundamental design approaches employed in realizing reconfigurable designs, and explores advanced capabilities of these nascent architectures, such as multi-band operation, polarization manipulation, frequency agility, and amplification. Finally, the paper concludes by discussing future challenges and possibilities for these antennas.
Uploads
Papers by baburao kodavati