Kiran Kumar Anumandla

ORCID: 0000-0002-2067-8711
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced MIMO Systems Optimization
  • Cognitive Radio Networks and Spectrum Sensing
  • Wireless Communication Networks Research
  • Blind Source Separation Techniques
  • Metaheuristic Optimization Algorithms Research
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Evolutionary Algorithms and Applications
  • Video Coding and Compression Technologies
  • Chaos-based Image/Signal Encryption
  • Inertial Sensor and Navigation
  • Autonomous Vehicle Technology and Safety
  • Advanced Adaptive Filtering Techniques
  • Image and Video Quality Assessment
  • Geophysics and Gravity Measurements
  • Integrated Circuits and Semiconductor Failure Analysis
  • Internet of Things and AI
  • Earthquake Detection and Analysis
  • Microgrid Control and Optimization
  • Advanced Malware Detection Techniques
  • Ionosphere and magnetosphere dynamics
  • Neuroscience and Neural Engineering
  • Brain Tumor Detection and Classification
  • Advanced Steganography and Watermarking Techniques
  • GNSS positioning and interference
  • Security in Wireless Sensor Networks

Koneru Lakshmaiah Education Foundation
2016-2023

Indian Institute of Technology Hyderabad
2017-2020

Narayan Medical College and Hospital
2020

Enam Medical College & Hospital
2020

University of Hyderabad
2012-2015

Pseudorandom number generators (PRNGs) play a pivotal role in generating key sequences of cryptographic protocols. Among different schemes, simple chaotic PRNG (CPRNG) exhibits the property being extremely sensitive to initial seed and, hence, unpredictable. However, CPRNG is vulnerable if compromised. In this brief, we propose novel physical unclonable function-based (PUF-CPRNG), where secured by it from PUF. Furthermore, proposed PUF-CPRNG includes dynamic refreshing logic ensure that...

10.1109/tvlsi.2020.2979269 article EN IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2020-03-24

Forecasting of total electron content (TEC)/global positioning system (GPS) signal delays in storm conditions is considered the most challenging task for accurate position estimation, especially critical applications. Therefore, a storm-time ionospheric model proposed to forecast TEC based on artificial neural network (ANN) using singular spectrum analysis (SSA). The study area covers four Global Navigation Satellite System (GNSS) stations located low-latitude and two GNSS mid-latitude...

10.1049/iet-rsn.2019.0551 article EN IET Radar Sonar & Navigation 2020-06-11

The advancement of Internet Things (IoT) -based computing platforms open novel possibilities for exploring and leveraging Global Navigation Satellite Systems (GNSS). This work utilizes machine learning models discusses the application IoT scenarios ionospheric monitoring forecasting systems. A workflow effectiveness end-to-end solution in navigation applications through results obtained from Successive Variational Mode–Decomposition– Kernel Extreme Learning Machine (SVMD–KELM) method, which...

10.1109/tgrs.2023.3328858 article EN IEEE Transactions on Geoscience and Remote Sensing 2023-01-01

In this study, a scalable coprocessor for accelerating the Differential Evolution (DE) algorithm is presented. The interfaced with PowerPC embedded processor of Xilinx Virtex-5 FX70T Field Programmable Gate Array. proposed design, DE module tightly coupled fitness function to reduce communication and control overhead. fixed point implemented in whereas both floating are processor. Performance evaluated by optimising benchmark functions different complexities. implementation results show that...

10.1049/iet-cdt.2012.0109 article EN IET Computers & Digital Techniques 2013-08-20

In the existing literature forced termination probability is analyzed after completion of spectrum allocation (SA) process. Since depends on results, it necessary to take into account during this paper, a two dimensional Markov model used for analyzing access. The process assumes mean arrival time primary and secondary users calculates probability. current work, considered as one objective function along with three network utility functions namely Max-Sum-Reward, Max-Min-Reward...

10.1109/spin.2015.7095314 article EN 2015-02-01

Cognitive radio is a promising technology for efficient spectrum utilization. It explores dynamic access features while satisfying interference constraints. In this work, joint power and allocation algorithm proposed to maximize the cognitive network throughput constraints of both primary secondary users in network. Evolutionary algorithms are used solve problem. Furthermore, algorithmic performance compared terms quality solution. And also we optimized maximum utilization capacity each user...

10.1002/itl2.207 article EN Internet Technology Letters 2020-07-13

Nowadays Vehicle Ad hoc Networks have an interesting research and application area in real time scenario. Vehicles are embedded with smart sensors, processing ability wireless communication capabilities will lead to efficient development of road safety, comfort, information sharing control while on the road. In this paper, traffic related issues like signal jumps, expiry RCs, Pollution status etc., can be identified corrective actions initiated. This system also used for other applications...

10.1109/iccci.2017.8117756 article EN 2022 International Conference on Computer Communication and Informatics (ICCCI) 2017-01-01

The proposed work aims to design a Wavefront Parallel Processing (WPP) based streaming Deblocking Filter (DBF) architecture for High-Efficiency Video Coding (HEVC). This supports scalable pipeline stages such as 1, 2, 4 and 8 with Unit (CU) sizes, i.e., 8×8, 16×16, 32×32 64×64 Largest (LCU) processing respectively. Based on the requirements of speed area consumer electronic application, one aforementioned sizes CU or LCU is selected. hardware uses an intelligent Memory Organization (MO) WPP...

10.1109/tce.2019.2960565 article EN IEEE Transactions on Consumer Electronics 2019-12-18

Differential Evolution (DE) is a meta-heuristic algorithm widely being used for solving optimization problems. The computation time of the DE scales up with complexity This limits its usage in real embedded applications. work compares execution floating point implemented on 32-bit PowerPC440 (PPC440) and MicroBlaze (MB) processors. Further, hardware accelerator SoC compared unit (FPU) enabled PPC440 processors operating at 125 MHz. For performance comparison, three benchmark test functions...

10.1109/tencon.2016.7848635 article EN 2016-11-01

Deep learning and Machine Learning Algorithms has become the most popular method for analyzing extracting features especially in medical images. And feature extraction made this task much easier. Our aim is to check which technique works best a classifier. We used Ophthalmic Images applied techniques such as Gabor, LBP (Local Binary Pattern), HOG (Histograms of Oriented Gradients), SIFT (Scale-Invariant Feature Transform), where obtained are passed through classifiers RFC (Random Forest...

10.3390/asec2023-15231 article EN cc-by 2023-10-26

The rapid advancement of technology has led to the pervasive presence electronic devices in our lives, enabling convenience and connectivity. Cryptography offers solutions, but vulnerabilities persist due physical attacks like malware. This emergence Physical Unclonable Functions (PUFs). PUFs leverage inherent disorder systems generate unique responses challenges. Strong PUFs, susceptible modeling attacks, can be predicted by malicious parties using machine learning algebraic techniques....

10.3390/asec2023-15948 article EN cc-by 2023-11-09

In this paper, a hardware solution for multi-objective differential evolution (MODE) algorithm is presented. The proposed developed as co-processor and interfaced with PowerPC440 processor of Virtex-5 field programmable gate array to accelerate execution speed on an embedded platform. It validated by optimising four standard benchmark functions its time compared the same running 32-bit processor. Further, case study, used solve Spectrum Allocation (SA) problem in Cognitive Radio Network...

10.1504/ijica.2017.088176 article EN International Journal of Innovative Computing and Applications 2017-01-01

DM3730 processor is fabricated on single chip Texas Instrument's advanced 45-nm technology with improved performance. ARM architecture provides best Graphics less power consumption. 1GHz comes in 0.4mm pitch POP (Package Package) memory mounted top of the processor. Debugging at hardware/software level necessary for developing an efficient system. Image Processing application requires, Camera, Speakers, GSM module, keyboard, mouse, internet connection installing required software's, hence...

10.1109/i2ct42659.2018.9057844 article EN 2018-10-01

Scan based attacks are the major security concerns of a design. These majorly employed to understand camouflaged logic during reverse engineering. The state- of-the-art techniques like scan chain scrambling hinder accessibility chains, but prone layout level engineering attacks. In proposed methodology, design is secured by adding an extra input port (DSI) flipflop using dummy contacts, which ensure that DSI cannot be distinguished from SI even with techniques. Dummy connections introduced...

10.1109/ecctd49232.2020.9218406 article EN 2020-09-01
Coming Soon ...