Papers by Prof A Govardhan
Advances in Intelligent Systems and Computing, 2016
Exposure to violent content in movies will have an effect on both behavioural and psychological a... more Exposure to violent content in movies will have an effect on both behavioural and psychological aspects of children. Efficient algorithms are needed to automatically detect the violent content in movies. Existing work in identifying violent content in Hollywood movies is studied along with the datasets on which the evaluation is carried out. We have also examined the different set of challenges posed by Tollywood movies and how the existing work may not be able to handle the challenges is presented. An approach based on rough sets is proposed to handle the highly dynamic nature of violent scenes.
Article history: Received 12 March 2015 Accepted 28 June 2015 Available online 22 July 2015

TELKOMNIKA (Telecommunication Computing Electronics and Control), 2019
As per the global digital report, 52.9% of the world population is using the internet, and 42% of... more As per the global digital report, 52.9% of the world population is using the internet, and 42% of the world population is actively using e-commerce, banking, and other online applications. Web services are software components accessed using networked communications and provide services to end users. Software developers provide a high quality of web service. To meet the demands of user requirements, it is necessary for a developer to ensure quality architecture and quality of services. To meet the demands of user measure service quality by the ranking of web services, in this paper, we analyzed QWS dataset and found important parameters are best practices, successability, availability, response time, reliability and throughput, and compliance. We have used various data mining techniques and conducted experiments to classify QWS data set into four categorical values as class1, 2, 3, and 4. The results are compared with various techniques random forest, artificial neural network, J48 decision tree, extreme gradient boosting, K-nearest neighbor, and support vector machine. Multiple classifiers analyzed, and it was observed that the classifier technique eXtreme gradient boosting got the maximum accuracy of 98.44%, and random forest got the accuracy of 98.13%. In future, we can extend the quality of web service for mixed attributes.

International Journal of Distributed and Parallel systems, 2013
We present here a cost effective framework for a robust scalable and distributed job processing s... more We present here a cost effective framework for a robust scalable and distributed job processing system that adapts to the dynamic computing needs easily with efficient load balancing for heterogeneous systems. The design is such that each of the components are self contained and do not depend on each other. Yet, they are still interconnected through an enterprise message bus so as to ensure safe, secure and reliable communication based on transactional features to avoid duplication as well as data loss. The load balancing, fault-tolerance and failover recovery are built into the system through a mechanism of health check facility and a queue based load balancing. The system has a centralized repository with central monitors to keep track of the progress of various job executions as well as status of processors in real-time. The basic requirement of assigning a priority and processing as per priority is built into the framework. The most important aspect of the framework is that it avoids the need for job migration by computing the target processors based on the current load and the various cost factors. The framework will have the capability to scale horizontally as well as vertically to achieve the required performance, thus effectively minimizing the total cost of ownership.

International Journal of Future Computer and Communication, 2013
Mobile Agents no longer is limited to simple message communication but finds its applications in ... more Mobile Agents no longer is limited to simple message communication but finds its applications in applications like distributed computing and network monitoring systems. The two key features expected from mobile agents are Location Transparency & Distributed Decision Making. Location Transparency is achieved through Inter-Agent communication protocol by ensuring the message is delivered to the remote host irrespective of its location on a network. At the same time agents can be programmed with limited amount intelligence so that the agents can take decisions on their own and react to certain situations while they are touring a remote host without depending on the instructions from the agent server. This paper explains how adaptive agents capable of performing multiple tasks on a single visit to remote host can communicate with other agents attached to the same or a different agent server. The complete protocol is explained along with each scenario based on the agent state on a host or a remote server. The paper also explains how agents can take decisions on their own without involving the agent servers. Index Terms-Mobile agents, agent communication, JADE agents, adaptive agents, distributed decision making.

Communications in Computer and Information Science, 2011
Indirect association is a new kind of infrequent pattern, which provides a new way for interpreti... more Indirect association is a new kind of infrequent pattern, which provides a new way for interpreting the value of infrequent patterns and can effectively reduce the number of uninteresting infrequent patterns. The concept of indirect association is to "indirectly" connect two rarely co-occurred items via a frequent itemset called mediator, and if appropriately utilized it can help to identify real interesting "infrequent itempairs" from databases. Indirect association rule is said to be positive (Negative) if mediator set contains presence (presence or absence) of items. Existing indirect association mining methods mine positive mediator sets. To the best of our knowledge, no research work has been conducted on mining indirect negative associations. In this paper, we propose an approach for mining indirect negative associations. The proposed method can discover all positive and negative indirect association between itemsets.
International journal of Web & Semantic Technology, 2011
The World Wide Web (WWW) allows the people to share the information (data) from the large databas... more The World Wide Web (WWW) allows the people to share the information (data) from the large database repositories globally. The amount of information grows billions of databases. We need to search the information will specialize tools known generically search engine. There are many of search engines available today, retrieving meaningful information is difficult. However to overcome this problem in search engines to retrieve meaningful information intelligently, semantic web technologies are playing a major role. In this paper we present survey on the search engine generations and the role of search engines in intelligent web and semantic search technologies.
Computer Science & Information Technology ( CS & IT ), 2013
Rainfall is considered as one of the major components of the hydrological process; it takes signi... more Rainfall is considered as one of the major components of the hydrological process; it takes significant part in evaluating drought and flooding events. Therefore, it is important to have an accurate model for rainfall prediction. Recently, several data-driven modeling approaches have been investigated to perform such forecasting tasks as multilayer perceptron neural networks (MLP-NN). In fact, the rainfall time series modeling (SARIMA) involvesimportant temporal dimensions. In order to evaluate the incomes of both models, statistical parameters were used to make the comparison between the two models. These parameters include the Root Mean Square Error RMSE, Mean Absolute Error MAE, Coefficient Of Correlation CC and BIAS. Two-Third of the data was used for training the model and One-third for testing.

Advances in Intelligent Systems and Computing, 2015
The series "Advances in Intelligent Systems and Computing" contains publications on theory, appli... more The series "Advances in Intelligent Systems and Computing" contains publications on theory, applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent systems and computing. The publications within "Advances in Intelligent Systems and Computing" are primarily textbooks and proceedings of important conferences, symposia and congresses. They cover significant recent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and worldwide distribution. This permits a rapid and broad dissemination of research results.
Web services are expected to play significant role for message communications over internet appli... more Web services are expected to play significant role for message communications over internet applications. Most of the future work is web security. Online shopping and web services are increasing at rapid rate. In this paper we presented the fundamental concepts related to Network security, web security threats. QoS web service security intrusion detection is important concern in network communications and firewalls security; we discussed various issues and challenges related to web security. The fundamental concepts network security XML firewall, XML networks. We proposed a novel Dynamic Intruder Detection System (DIDA) is safe guard against SSL secured transactions over message communications in intermediate routers that enable services to sender and receiver use Secured Session Layer protocol messages. This can be into three stages 1. Sensor 2. Analyzer and 3.User Interface.
1Scholar in the Dept of Computer Science & Engineering , JNTU, Hyderabad Email: Scholar in the De... more 1Scholar in the Dept of Computer Science & Engineering , JNTU, Hyderabad Email: Scholar in the Dept of Computer Science & Engineering , JNTU.Hyderabad. 2Professor, Dept of Computer Science & Engg., .Al Habeeba College of Engineering, Chevella, Ranga Reddy Dt ...
Incremental Learning Algorithm for Dynamic Data Streams
The recent advances in hardware and software have enabled the capture of different measurements o... more The recent advances in hardware and software have enabled the capture of different measurements of data in a wide range of fields. These measurements are generated continuously and in a very high fluctuating data rates. Examples include sensor networks, web logs, and computer network traffic. The storage, querying and mining of such data sets are highly computationally challenging tasks. Mining
Evaluating the performance of watershed and morphology on microarray spot segmentation
… (ICCCNT), 2010
Microarrays are novel and dominant techniques that are being made use in the analysis of the expr... more Microarrays are novel and dominant techniques that are being made use in the analysis of the expression level of DNA, with pharmacology, medical diagnosis, environmental engineering, and biological sciences being its current applications. Studies on microarray ...
Uploads
Papers by Prof A Govardhan