Dr.M.Balraju

@pallaviengineeringcollege.ac.in

Principal, CSE
PALLAVI ENGINEERING COLLEGE



              

https://researchid.co/drmraju

Name
Years of Experience DOJ: February, 2018
Teaching: 28 years
Research: 10 years
Principal: 10 years
Email Id &Ph drrajucse@ & 9247755185

EDUCATION

Doctoral Degree : Ph.D. CSE, JNTU Hyderabad
PG Degree : M.Tech. CSE, , JNTU Hyderabad
UG Degree : B.E . ECE- MVSREC (OU), Hyderabad

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Science, Computer Engineering

10

Scopus Publications

6896

Scholar Citations

7

Scholar h-index

7

Scholar i10-index

Scopus Publications

  • BUILDING SECURITY BARRIERS BY MODIFIED ALGORITHMS IN BLOCKCHAIN TO PREVENT SQL INJECTION AND XSS
    Joshi Padma N, Dr.Ravishankar N., Dr. Raju M. B., Ravi N.Ch., and N.Ch. Sai Vyuha

    ENGG Journals Publications
    Now a days security of user credentials and confidential data of the user in database plays important role in web applications. Blockchain technology performs the hashing during the block generation process. MD5, SHA128, SHA256, and SHA512 are only few of numerous hashing algorithms. The use of SHA256 in Blockchain has been discovered. There are several aspects to consider while picking an appropriate hashing algorithm, including collision ratio, storage space, and time complexity. There are fewer collisions with SHA256 and it takes up less space. Modified MD5 is the hashing algorithm used in the suggested research. On the other hand, SHA256 takes more storage capacity, but traditional MD5 has a lower collision resistance. study's objective is to develop a faster and more collision-resistant version of the standard MD5 algorithm. Because of this, a system that is both secure and efficient is essential. This study tested the improved MD5 for storage capacity and collision probability, as well as a CPU clock cycle simulation. In terms of collision resistance, the improved MD5 results clearly exceed SHA256, MD5, and SHA1 while consuming less storage space and time. Moreover paper is also considering role of block chain to enhance security by preventing Sql Injection and XSS.

  • SURGICAL STRIKING SQL INJECTION ATTACKS USING LSTM
    Joshi Padma N, Dr. Ravishankar N., Dr. Raju M. B., and Ravi N.Ch.

    ENGG Journals Publications

  • Multi-class classification for large datasets with optimized SVM by non-linear kernel function
    Lingam Sunitha and M Bal Raju

    IOP Publishing
    Abstract Most important part of Support Vector Machines(SVM) are the kernels. Although there are several widely used kernel functions, a carefully designed kernel will help improve the accuracy of SVM. The proposed work aims to develop a new kernel function for a multi-class support vector machine, perform experiments on various data sets, and compare them with other classification methods. Directly it is not possible multiclass classification with SVM. In this proposed work first designed a model for binary class then extended with the one-verses-all approach. Experimental results have proved the efficiency of the new kernel function. The proposed kernel reduces misclassification and time. Other classification methods observed better results for some data sets collected from the UCI repository.

  • Secure Software Immune Receptors from SQL Injection and Cross Site Scripting Attacks in Content Delivery Network Web Applications
    Joshi Padma N, N. Ravishankar, M.B. Raju, and N. Ch. Sai Vyuha

    IEEE
    In our proposed work the web security has been enhanced using additional security code and an enhanced frame work. Administrator of site is required to specify the security code for particular date and time. On user end user would be capable to login and view authentic code allotted to them during particular time slot. This work would be better in comparison of tradition researches in order to prevent sql injection attack and cross script because proposed work is not just considering the security, it is also focusing on the performance of security system. This system is considering the lot of security dimensions. But in previous system there was focus either on sql injection or cross script. Proposed research is providing versatile security and is available with low time consumption with less probability of unauthentic access.

  • An Implementation of an Industrial Internet of Things on an SMT Assembly Line
    Gaurav Bhandari, Prakash Hiremath M., Ashish Joglekar, Anupama Kulkarni, Devadatta Kulkarni, C. Mahadeva, Sampad B. Mohanty, D. Raghunath, M. B. Raju, Rajeev Shorey,et al.

    IEEE
    Industry 4.0 is the latest trend in the manufacturing sector that focuses on intelligent manufacturing and smart factories. This leads to opportunities in automation, optimization, asset management and predictive maintenance, which helps reduce downtime and increase revenue. In this paper, we propose the solution that was created for a particular SMT PCB manufacturing facility in Mysuru (Vinyas IT), the features it has to offer and the methodologies that were implemented in order to achieve our goals. We will also highlight the important aspects of the solution that will be showcased during the demonstration and the impact of our solution.

  • Contemplating Security of Http from SQL Injection and Cross Script
    Padma N. Joshi, N. Ravishankar, M.B. Raju, and N.CH. Ravi

    IEEE
    In Existing security system there is authentication at user level the user id and password submitted by user is verified at login process end if the user id and password exist then the user would be able to access the system. But some smart user usually uses SQL injection in order to violate the security of database using wild character of SQL. They sometime use SQL statement too in order to get the login process confused. They pass the sub query of sql in password field instead of password in order to get the confirmation. Here we have to develop a secure system for authentication access and apply SQL INJECTION attack to check its security.

  • Encountering SQL Injection in Web Applications
    Padma N Joshi, N. Ravishankar, M. B. Raju, and N.CH. Ravi

    IEEE
    Web has seen an exponential increase in number of applications over past decade. Current day web applications provide a lot more services than simple content delivery. web-based model of computing has been subject several attacks such as cross-site scripting & SQL injection. SQL Injection Attacks are comparatively recent threat to privacy, integrity & accessibility of all online requests & their technical infrastructure, secretarial for practically fourth of internet vulnerabilities. This research paper has represented types of attacks & classification of SQL injection attack. Next survey based on research done represented in tabular form. After that discussed about pattern locked proposed model & conclusion then future scope, suggested way for researchers for preventing SQL injection attacks.

  • Performance study of cooperative relay assisted transmission models
    Kande Srinivas and M.B Raju

    IEEE
    This Orthogonal Frequency Division Multiple Access (OFDMA) and Single Carrier Frequency Division Multiple Access (SC-FDMA) are strong multiple access candidates for the uplink of the International Mobile Telecommunications-Advanced (IMT-Advanced). These multiple access techniques in combination with other promising technologies such as multi-hops transmission and Multiple-Input-Multiple-Output (MIMO) will be utilized to reach the targeted IMT-Advanced system performance. In this paper, OFDMA and SC-FDMA are adopted for the downlink and uplink transmission of Long Term Evolution (LTE). Two transmission scenarios are considered, namely the single hop transmission and the relay assisted transmission (two hops). In addition, a hybrid multiple access technique that combines the advantages of OFDMA and SC-FDMA in term of low Peak-to-Average Power Ratio (PAPR) and better link performance in terms of Symbol Error Rate (SER) has been proposed in relay assisted transmission scenario. Simulation results show that the obtained results from the relay-assisted transmission (two hops) are better than those obtained from the direct transmission (one hop) for all the studied scenarios.

  • Binary merge coding for lossless image data compression
    N. Subhash Chandra, M. Bala Raju, M. Arya bahanu, B. Raja Vikram, A. Govardhan, and S. Mahaboob Basha

    Science Publications
    Problem statement: Image processing applications were drastically inc reasing over the years. In such a scenario, the fact that, the digit al images need huge amounts of disk space seems to be a crippling disadvantage during transmission and storage. So, there arises a need for data compression of images. Approach: This study proposed a novel technique called binar y merge coding for lossless compression of images. This met hod was based on spatial domain of the image and it worked under principle of Inter-pixel redund ancy reduction. This technique was taken advantage of repeated values in consecutive pixels positions. For a set of repeated consecutive values only one value was retained. Results: The proposed binary merge coding achieved the compression rate of the brain image was 1.6572479. Comparatively, it is 100% more than the compression rate achieved by standard JPEG. Conclusion/Recommendations: This technique was simple in implementation and required no additional memory area. The experimental results of binary merge coding were compared with standard JPEG and it showed that, the binary merge coding improved compression rate compared to JPEG. The same algorithm can be extending to color images. This algorithm can also used for lossy comp ression with few modifications.

  • RELIABILITY STUDIES OF COMMUNITY TELEVISION RECEIVERS FOR SATELLITE INSTRUCTIONAL TELEVISION EXPERIMENT (SITE).
    B. S. Rao, Ramavtar Gupta, and M. B. Raju

    Informa UK Limited
    In this paper various failures that occur in solidstate television receivers have been briefly discussed. Reliability calculations like Failure Rate, Mean Time Before Failure, etc., have been presented and suggestions made for minimizing the down-time of the receiver particularly from technoeconomic considerations.

RECENT SCHOLAR PUBLICATIONS

  • An integrated medical image compression approach with deep learning and binary plane difference
    BPS Kumar, KV Ramanaiah
    2019 International Conference on Smart Systems and Inventive Technology 2019

  • Region based medical image compression with Binary Plane Coding
    V Krishna, VPC Rao
    ARPN Journal of Engineering and Applied Sciences 12 (17) 2017

  • Selfish Node Handling in The Context of Replica Allocation in MANET's
    K Navatha, N Sravanthi, L Sunitha, EV Ramana
    International Journal of Computer Science and Network Security (IJCSNS) 15 2015

  • Automatic outlier identification in data mining using IQR in real-time data
    L Sunitha, M BalRaju, J Sasikiran, EV Ramana
    International Journal of Advanced Research in Computer and Communication 2014

  • Data mining: Estimation of missing values using lagrange interpolation technique
    L Sunitha, M BalRaju, J Sasikiran
    International Journal of Advanced Research in Computer Engineering and 2013

  • Color image compression based on luminance and chrominance using Binary Wavelet Transform (BWT) and Binary Plane Technique (BPT)
    DM Ashok, DTB Reddy
    International Journal of Computer Science and Information Technology 2012

  • LOSS LESS COMPRESSION OF IMAGES USING BINARY PLANE, DIFFERENCE AND HUFFMAN CODING (BDH TECHNIQUE).
    NS Chandra, M Balraju, SM Basha, MR Krishna Reddy, TB Reddy, ...
    Journal of Theoretical & Applied Information Technology 4 (12) 2008

  • An Hybrid Approach of Lossless Compression for Color Images
    MU Asian
    Asian J. Inforni. Technol 7 (11), 472-474 2008

  • Durable antibacterial finish on cotton fabric by using chitosan‐based polymeric core‐shell particles
    W Ye, JH Xin, P Li, KLD Lee, TL Kwong
    Journal of Applied Polymer Science 102 (2), 1787-1793 2006

  • Sol–Gel Synthesis of PZT–Glass Nanocomposites Using a Simple System and Characterization
    V Kumar, AT Achuthan, K Sivanandan, PV Divya, KP Rema
    International journal of applied ceramic technology 3 (5), 345-352 2006

  • Mechanical compression influences intracellular Ca2+ signaling in chondrocytes seeded in agarose constructs
    SR Roberts, MM Knight, DA Lee, DL Bader
    Journal of applied physiology 90 (4), 1385-1391 2001

  • Antimicrobial agents from plants: antibacterial activity of plant volatile oils
    HJD Dorman, SG Deans
    Journal of applied microbiology 88 (2), 308-316 2000

  • THE EFFECTIVE APPROACH FOR COLOR IMAGE COMPRESSION BASED ON LUMINANCE AND CHROMINANCE USING BINARY PLANE TECHNIQUE (BPT)
    SS Ahmad


  • Data Mining: Finding Outliers from Different Types of Data using Dissimilarity Data Structure
    L Sunitha, M BalRaju, J Sasikiran


  • VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORKS: EVALUATION AND PROTECTION
    F Fatima, L Sunitha, EV Ramana


MOST CITED SCHOLAR PUBLICATIONS

  • Antimicrobial agents from plants: antibacterial activity of plant volatile oils
    HJD Dorman, SG Deans
    Journal of applied microbiology 88 (2), 308-316 2000
    Citations: 6471

  • Mechanical compression influences intracellular Ca2+ signaling in chondrocytes seeded in agarose constructs
    SR Roberts, MM Knight, DA Lee, DL Bader
    Journal of applied physiology 90 (4), 1385-1391 2001
    Citations: 171

  • Durable antibacterial finish on cotton fabric by using chitosan‐based polymeric core‐shell particles
    W Ye, JH Xin, P Li, KLD Lee, TL Kwong
    Journal of Applied Polymer Science 102 (2), 1787-1793 2006
    Citations: 170

  • Automatic outlier identification in data mining using IQR in real-time data
    L Sunitha, M BalRaju, J Sasikiran, EV Ramana
    International Journal of Advanced Research in Computer and Communication 2014
    Citations: 34

  • LOSS LESS COMPRESSION OF IMAGES USING BINARY PLANE, DIFFERENCE AND HUFFMAN CODING (BDH TECHNIQUE).
    NS Chandra, M Balraju, SM Basha, MR Krishna Reddy, TB Reddy, ...
    Journal of Theoretical & Applied Information Technology 4 (12) 2008
    Citations: 13

  • Sol–Gel Synthesis of PZT–Glass Nanocomposites Using a Simple System and Characterization
    V Kumar, AT Achuthan, K Sivanandan, PV Divya, KP Rema
    International journal of applied ceramic technology 3 (5), 345-352 2006
    Citations: 12

  • Data mining: Estimation of missing values using lagrange interpolation technique
    L Sunitha, M BalRaju, J Sasikiran
    International Journal of Advanced Research in Computer Engineering and 2013
    Citations: 11

  • Color image compression based on luminance and chrominance using Binary Wavelet Transform (BWT) and Binary Plane Technique (BPT)
    DM Ashok, DTB Reddy
    International Journal of Computer Science and Information Technology 2012
    Citations: 6

  • An integrated medical image compression approach with deep learning and binary plane difference
    BPS Kumar, KV Ramanaiah
    2019 International Conference on Smart Systems and Inventive Technology 2019
    Citations: 4

  • Region based medical image compression with Binary Plane Coding
    V Krishna, VPC Rao
    ARPN Journal of Engineering and Applied Sciences 12 (17) 2017
    Citations: 4