Qualification: 
Ph.D, M.E
p_prakash1@cb.amrita.edu

Dr. Prakash P. currently serves as Assistant Professor at the department of Computer Science and Engineering, Amrita School of Engineering, Coimbatore Campus. His areas of research include Cloud Computing, Automata Theory and Analysis of Algorithms. Dr. Prakash's broad areas of research interest are Cloud computing and Big data analytics. More specifically, his work involves in developing the algorithms or frameworks for the energy efficient in high performance computing. He is also exploring the integration and data analysis of Internet of Things (IoT) with cloud computing.

Educational Qualifications

PhD in Information and Communication Engineering Anna University, Chennai, India 2016
ME in Computer Science and Engineering Sri Sivasubramaniya Nadar (SSN) College of Engineering, Chennai, India 2005-2007
BE in Computer Science and Engineering Kongu Engineering College, Perundurai, Erode, Tamilnadu, India 1999-2003

Work Experiences

  • Assistant Professor, Department of Computer Science and Engineering at Amrita Vishwa Vidyapeetham, Coimbatore from June 2013 onwards.
  • Assistant Professor, Department of Computer Science and Engineering at Sri Krishna College of Engineering & Technology, Coimbatore during August 2009 to May 2013.
  • Programmer Analyst at Cognizant Technology Solutions LTD, Chennai from June 2007 to July 2009.
  • Lecturer at Kongu Engineering College from October 2003 to April 2005.

Teaching

  • Cloud Computing and Services
  • Big Data Analytics
  • Formal Language and Automata Theory
  • Computer Language Engineering
  • Object Oriented Programming

Awards and Recognition

  • "Distinguished Facilitator Award (Technical) – Inspire" Faculty award by Infosys technologies Bangalore 2015 and 2013.
  • Guided the team of Janani N. and Shiva Jegan R.D who won the "MCA best project award (2015)" at Amrita Vishwa Vidyapeetham.
  • One of Top 10 teams at "Amrita TBI innovation Challenge`2017", organized Amrita Technology Business Incubator.
  • "Star of the Month" award from Cognizant Technology Solutions for the month of April 2009 and November 2008.
  • Received "Silver Medal", from SSN College of engineering as recognition for securing rank in ME (CSE).
  • Acknowledged by Texas Instruments for the project guidance.
  • Appreciated by Confederation of Indian Industry (CII) for the active participation of Teacher’s day celebration events.

Invited Talks

  • Delivered a technical talk at Karpagam University, Coimbatore on "Hadoop: Easy way to do Big Data Analytics".
  • Technical talk at SNS College of Technology on "Web Technology".
  • Delivered a guest lecture at Sona College of Technology, Salem on "Computational Theory".
  • Guest Lecture on "CloudSIM - Packages for Cloud Computing" at Sri Krishna College of Engineering and Technology.
  • Technical Talk on "Cloud Computing" at STC College Pollachi .
  • Technical talk on "Cloud Simulation Tools" at Karpagam University.
  • Delivered a technical talk at Info Institute of Technology, Coimbatore on "Cloud Resource Management Concepts".
  • Delivered a guest lecture at Sona College of Technology, Salem on "Undecidability and complexity Problems"

Publications

Publication Type: Journal Article

Year of Publication Publication Type Title

2017

Journal Article

S. Arun, Chandrasekaran, A., and Dr. Prakash P, “CSIS: Cloud service identification system”, International Journal of Electrical and Computer Engineering, vol. 7, no. 1, pp. 513-520, 2017.[Abstract]


To meet the need of the computational power, most of the users may go for a cloud based services for its scalability, flexibility and reliability. Cloud services have become an integral part of IT and analytical enterprises. Owing to increase in necessity of commercial cloud products being readily available, it has become extremely difficult for users to identify suitable cloud services. This paper proposes the recommender system precisely designed for the discovery of cloud services. Though there is an exponential increase in demand for cloud services, the amount of research done in this particular field is abysmal. Cloud Service Identification System (CSIS) crawls through Internet, identifies cloud services and stores them in a database. The user's search query is processed and recommends cloud services accurately. Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved.

More »»

2016

Journal Article

A. Kumar, Sathasivam, C., and Dr. Prakash P, “Virtual machine placement in cloud computing Environment”, Indian Journal of Science and Technology, vol. 9, no. 29, 2016.[Abstract]


Objectives: Hardware virtualization is an evolving technology, because it has the potential to facilitate the consolidation of multiple workloads on a single physical host directly through cloud. We introduce the First-Last algorithm to minimize energy consumption and migration. Methods: The problem is treated as an instance of bin packing algorithm which focuses on saving energy. However the overloading of active hosts and the resultant migration are the drawbacks of this approach. This algorithm was tested on a set of heterogeneous virtual machines which have demands in both single and multi-dimension and came either statically or dynamically to the server. Findings: The virtual machine placement problem can be treated as a bin packing problem, wherein the physical machines/hosts are the bins and the virtual machines are the objects. It can then be solved through various approaches such as first fit, best fit, next fit et cetera. Using the first fit algorithm, the virtual machine is placed into the first active host which can accommodate it. If none of the active hosts satisfy the VM's demand, then a new host is made active. In the best fit method, all the active hosts are checked first and then the host which would suffer minimum resource wastage upon VM placement is chosen. Next fit algorithm places the VM in the last/most recently activated host. While first fit is best suited for optimal performance, best fit keeps the least number of hosts active, thereby saving energy but at the cost of performance since migration overhead increases. Next fit approach would fail unless the virtual machines have been arranged in the increasing order of their demands. The firstlast algorithm that we introduce balances on energy consumption as well as performance by reducing migration. It also reduces the time complexity to a certain extent. Applications: The algorithm has a comparatively lower time complexity than the existing virtual machine placement algorithms. It also reduces the energy consumption as well as migration to a certain extent.

More »»

2015

Journal Article

N. Janani, Jegan, R. D. Shiva, and Dr. Prakash P, “Optimization of virtual machine placement in cloud environment using genetic algorithm”, Research Journal of Applied Sciences, Engineering and Technology, vol. 10, no. 3, pp. 274-287, 2015.[Abstract]


The current trend in the computing era is cloud computing, which helps in providing seamless service to the user, but optimizing the utilization of the available resources and an efficient placement of the virtual machines are not so significant in the existing phenomena. Virtual machines are software computers that act as the key feature in providing services to the existing physical machine. VM placement is the process of mapping the virtual machine requests or images to the physical machines, according to the availability of resources in these hosts. Hence in this study, we have studied on various methods in which the placement are being done and have proposed an idea which, treats the available pool of physical resources as each knapsacks, which are solved using genetic algorithm, to get an optimal placement. Starting with this aspect, we enhanced the solution by considering multiple and multidimensional parameters in the virtual machine request, so that the migration of the virtual machines will be reduced and hence power-saving. © Maxwell Scientific Organization, 2015.

More »»

2015

Journal Article

Dr. Shriram K Vasudevan, Dr. Prakash P, P.b, S., and S.a, S., “A study on SONET and SDH with their defects in optical network”, Indian Journal of Science and Technology, vol. 8, no. 29, 2015.[Abstract]


Background Objectives: Data transmission over a communication channel, should provide important facilities to be added, including data framing, error checking and to manage the channel. Methods/Stastical Analysis: This is a complete review paper and theoretically we intend to explain the basics of SONET / SDH, Architecture, Bit rates, Netowork configurations etc. All these are standardised and approved by ANSI. Conclusion: One would get to know what Synchronous Optical Network / Synchronous Digital Hierarchy (SONET/SDH) is all about and how exactly are they used through this paper. Also, the merits and de-merits are completely analysed.

More »»

2015

Journal Article

T. B. Stanley, S. Krishnan, M., and Dr. Prakash P, “A security framework for internet of things (Iot) authentication using certificates”, International Journal of Applied Engineering Research, vol. 10, no. 12, pp. 30337-30344, 2015.[Abstract]


As more number of devices are connected to internet day by day, directly or indirectly for different needs like monitoring, management, automation and so on. Number of devices connected to internet is more than the number of people connected to it. Among the devices that are connected to the internet, most of the devices are used for communication and collection of data in real time. Providing security for devices over the internet is becoming challenging task since data processing is in real time. In this paper, we introduce a new cost effective framework using a private Certificate Authority (CA) to detect these rogue devices trying to connect to the web server and then to prevent them from connecting to the web server. We use MAC address with certificates for authenticating a device. Our proposed security framework improves the security by detecting and preventing the rouge devices in Internet of Things (IoT). Most number of attacks are reduced by identifying and restricting the rouge devices in the network.

More »»

2014

Journal Article

A. Baskar, Vasudevan, S. K., Dr. Prakash P, and Suresh, C., “Ergodesk-desktop ergonomics using the new quadratic search algorithm”, Research Journal of Applied Sciences, Engineering and Technology, vol. 8, no. 15, pp. 1762-1765, 2014.[Abstract]


Ergonomics is nothing but the rules governing the workplace. ErgoDesk is the ultimate drug-free way to look after your spine and health. This research provides an interesting and realistic solution towards achieving the goal maintaining good health. Physical stress at the work environment can reduce efficiency of the individuals at work. Ergonomics is described as the rules to be adapted by one, at work environment. The main focus of ergonomics is to reduce the physical stress caused by factors like improper body mechanics, repetitive motor movements, static positions, vibrations, lighting and impact or contact with objects. Henceforth, through this paper, we present a distinct tool called the "ERGODESK", which could be useful for monitoring a computer user's posture and activities. In this study, we present a real time feedback system for detecting people and their postures and generating summaries of postures and activities over a specified period of time. The system runs reliably on different people and under any lighting. The fundamental challenge, to detect the change in user's posture most accurately in the least time, has been analysed and a solution in form of new Quadratic Search Algorithm has been proposed. The system captures an image of the user at regular intervals of time, carries out certain pre-processing steps and then checks for a change in user's posture by comparing it with a reference image acquired previously in series of steps as per the New Quadratic Search algorithm. Then the user is notified about the change of his ergonomic posture.

More »»

2014

Journal Article

A. Baskar, V., S. K., and Dr. Prakash P, “Advanced investigation and comparative study of graphics processing unit-queries countered”, Research Journal of Applied Sciences, Engineering and Technology, vol. 8, no. 15, pp. 1766-1771, 2014.[Abstract]


GPU, Graphics Processing Unit, is the buzz word ruling the market these days. What is that and how has it gained that much importance is what to be answered in this research work. The study has been constructed with full attention paid towards answering the following question. What is a GPU? How is it different from a CPU? How good/bad it is computationally when comparing to CPU? Can GPU replace CPU, or it is a day dream? How significant is arrival of APU (Accelerated Processing Unit) in market? What tools are needed to make GPU work? What are the improvement/focus areas for GPU to stand in the market? All the above questions are discussed and answered well in this study with relevant explanations. © Maxwell Scientific Organization, 2014.

More »»

2014

Journal Article

S. Jegan D., Dr. Shriram K Vasudevan, K., A., Dr. Prakash P, S., S., and V., G., “Cloud Computing: A Technical Gawk”, International Journal of Applied Engineering Research, vol. 9, no. 14, pp. 2539-2554, 2014.[Abstract]


As we all know, running a business application is far too expensive. To maintain your business to have a long run, organization require power, work force, network, bandwidth, server, many complicated software, too expensive hardware and stream of experts to maintain them. Hence maintaining a business is a very tedious task especially in terms of costs. Scalability has. © Research India Publications.

More »»

2014

Journal Article

G. Mounika, Rahmyashree, R., Dr. Prakash P, Vasudevan, S. K., and Suresh, C., “Cannier and intelligent office environment: An interesting attempt”, International Journal of Applied Engineering Research, vol. 9, no. 18, pp. 4825-4836, 2014.[Abstract]


Technology has developed to such an extent that it has induced smartness to even a normal, inanimate object. This smartness is needed to decrease human effort. As the effort taken by the humans, have certainly reduced, they switched from being hard workers, to smart workers. Therefore, home and office automation has been made easy, by not only in facilitating better transfer of information, but also encouraging time management. To make life simple, automating some of the day to day appliances; such as lights, fans, TVs, curtain etc... supplements quality and harmony. The vision behind Smart environment is, to incorporate various services, with the help of a common communication system. Smart environment focuses on well-being of the users, by allowing them to follow their activities, effortlessly. It also initiates an opportunity to use this system at offices also. Profile setting for a room is carried out automatically. Energy conservation is promoted by executing instructions as to switch off appliances in the room, when not in use. This is done through the PIR sensor. This arrangement is highly secure, intelligent and serves the purpose. Communication is enabled through email, using popular encryption standards. More »»

2014

Journal Article

, ,, Dr. Prakash P, and Shriram, K. V., “An Enhanced and Efficient Security Using Steganography”, International Journal of Applied Engineering Research, vol. 9, no. 10, pp. 1411-1417, 2014.[Abstract]


In this fast paced world, electronic communication has become one of the significant media that connects different parts of the world. As a result, security has become an issue where it is increasingly susceptible to eavesdropping and malicious interventions. The need to solve this problem has led to the development of steganography schemes. Steganography which is different from cryptography is a tool for privacy and security. Steganography is a powerful technique that provides a high level of security, particularly when it is combined with encryption. Cryptography involves converting a message text into an unreadable cipher while steganography works by hiding messages in inconspicuous objects that are then sent to the intended recipient. Digital Watermarking is a technology which provides authentication and copywrite protection for multimedia contents over the internet and is basically used for intellectual property protection. In this project we propose an advanced system of encrypting data that combines the features of cryptography, digital watermarking and steganography along with multimedia data hiding. Thus even if steganography fails, the message cannot be recovered because a cryptography technique is used as well. This system provides authentication, imperceptibility, robustness and security with high PSNR (Peak Signal to Noise Ratio) value and less MSE (Mean Square Error) value. © Research India Publications.

More »»

2014

Journal Article

V. Sucharitha, Subash, S. R., and Dr. Prakash P, “Visualization of Big Data: Its tools and challenges”, International Journal of Applied Engineering Research, vol. 9, no. 18, pp. 5277-5290, 2014.[Abstract]


The rapid development of the heterogeneous networking and social websites is leading to the exponential growth in the amount of the data. To examine the bulky amount of data, from concealed patterns and unidentified correlations, the big data analysts require visualization tools. The visualization tools help in gaining insight about the data. The volume of big data is huge with multiple dimensions. To efficiently manage the large volumes of data, we face many difficulties. In this paper, a survey about big data visualization, its tools and its challenges is done. Various tools and hurdles in big data visualization are discussed. © Research India Publications.

More »»

2013

Journal Article

K. R. Kawshik, Vasudevan, S. K., Dr. Prakash P, and Gunasekaran, K., “An analysis and study on software health management of aircraft and other automobiles”, International Journal of Applied Engineering Research, vol. 8, no. 15, pp. 1815-1822, 2013.[Abstract]


What do we aim at is, the first point to be made clear. Simple, this paper should give an insight of what SHM (software health management) is all about? Also care has been taken in such a way that the benefits, implementation and architecture details and points of concern are all covered. There are very few papers available in this area, which made the project and study very interesting. Firstly, this mechanism is dealt with respect to an aircraft. So all the information summarized in this paper are in relevance with aircraft. But, the same can be extended to other automobiles as well. Almost everyone loves to travel in a sophisticated medium. Say, an Aircraft Airbus A380. It is very comfortable, fast and finally people inside should feel that they are secured and they will reach the destination safely. Same is the case with any automobile even. If a BMW car is bought, safety is the most important attribute to be listened into. If it is less expensive and not secured, then buyer would not spend for killing himself. Point is simple. Security and safety is so important and it carries a lot of weightage. This paper is aimed at improving safety aspects of an aircraft. The idea can be extended to any automobile as well. © Research India Publications.

More »»

2013

Journal Article

K. Velusamy, Venkitaramanan, D., Vasudevan, S. K., Dr. Prakash P, and Arumugam, B., “Internet of things in cloud”, Journal of Engineering and Applied Sciences, vol. 8, no. 9, pp. 304- 313, 2013.[Abstract]


The daily lives are more integrated into networks of wireless sensors and smart surroundings for its health, safety and comfort applications. From smart homes to smart office environments, these wireless sensor networks are used to increase the individuals comfort. Internet of things relies on networks to create an omnipotent sensor based network and device control measures based on IP addressing. Cloud computing when integrated with the internet of things can provide added ultra-technical value. Aggregating various resources and tailoring it into things like semantics paves way for the evolution of cloud of things (COD). Arduino, the open source programmable microcontroller device that can sense and interact with the environment with wired and wireless connectivity to the internet plays a major role in this study. This intelligent system communicates directly with the appliances which are IP assigned to the cloud database such that the user accounts have the accurate control over the registered appliances and totally reduces human intervention. In this proposed study, researchers put forward, the methods for the implementation of a low cost internet of things on cloud using Arduino. Also, this study proposes a Smart Energy Management System (SEMs), that will make use of internet of things with >1 type of wireless communication technique based on the requirement to collect energy information from the users and communicate it to the cloud server and saves energy efficiently.

More »»

Publication Type: Book Chapter

Year of Publication Publication Type Title

2016

Book Chapter

K. K., S., D., and Dr. Prakash P, “A Study on Security Issues in Cloud Computing”, in Advances in Intelligent Systems and Computing (AISC Springer), vol. 398, 2016, pp. 167-175.[Abstract]


Cloud computing focuses on maximizing the effectiveness of shared resources. It is also cost-effective, flexible, quick data storage, and is one of the most successful services in the internet. Cloud services are often outsourced to a third party, increasing the security threats. They are also delivered through the traditional network protocols and so a threat to the protocols is a threat to the cloud as well. In this paper, the major security issues are analyzed and sufficient countermeasures are provided, in order to minimize the security threats concerning cloud computing.

More »»

2016

Book Chapter

S. Priyadharshini, Nivetha, D., Anjalikumari, T., and Dr. Prakash P, “Mobile controlled door locking system with two-factor authentication”, in Advances in Intelligent Systems and Computing (AISC Springer), vol. 398, Springer, 2016, pp. 133- 139.[Abstract]


In spite of the availability of digital password lockers and advanced door locks, hacking the lock code by an unauthorized person has become a plain-sailing task. Thus, the main goal of this paper is to design a highly advanced and secured home security system using mobile technology, video messaging, and electronic technology with two-factor authentication. The designed system directly communicates to the owner of the house when someone arrives at his door-step by sending a video along with a notification message. The owner sends a one-time password to the visitor’s mobile for him to enter in the keypad placed near the door.

More »»

Publication Type: Conference Proceedings

Year of Publication Publication Type Title

2015

Conference Proceedings

Dr. Prakash P, Kousalya, G., Dr. Shriram K Vasudevan, and Sangeetha, K. S., “Green Algorithm for Virtualized Cloud Systems to Optimize the EnergyConsumption”, Advances in Intelligent Systems and Computing (AISC Springer), vol. 324. Springer, pp. 701–707, 2015.[Abstract]


In recent days, most of the cloud users request data center in the cloud environment by applying an exhaustive data-centric workflows which leads to the major energy consumption. The major energy breaks out from the data center and makes way to CO2 emission which impacts the global warming. In this paper, we introduce optimized energy utilization in deployment and forecast (OEUDF) for data-intensive workflows in virtualized cloud systems which help to reduce the energy in the cloud workflow environment. In this approach, initially, we compute the optimal data-accessing energy path (ODEP) which helps us to deploy and configure the virtual machines; secondly, it computes the rank, according to that it will schedule the workflow activities in the cloud environment. If any unscheduled activities are in the submission pool, then OEUDF finds the suitable virtual machine and reconfigures the data center by minimizing the energy utilization. The experiment result indicates that the proposed algorithm gradually reduces the energy consumption.

More »»

2015

Conference Proceedings

K. S. Sangeetha and Dr. Prakash P, “Big data and cloud: a survey”, Advances in Intelligent Systems and Computing (AISC Springer), vol. 325. pp. 773-778, 2015.[Abstract]


Today, the world has become closer due to the development of Internet. More people communicate via Internet, and the volume of data to be handled also grows. Nowadays, we talk about peta- and zettabytes of data and this volume of data needs to be processed and analyzed further which had led to the research field of big data storage and analysis. Cloud computing is another emerging area in which the services such as infrastructure, storage, and software are provided to the consumers on demand basis. In this paper, we discuss about the big data, cloud computing, and how big data are handled in cloud computing environment.

More »»

2014

Conference Proceedings

Dr. Prakash P, Kousalya, G., Dr. Shriram K Vasudevan, and Rangaraju, K. K., “Hardware Based Distributive Power Migration and Management Algorithm for Cloud Environment”, In Proceedings of The 8th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE 2014), Lecture Notes in Electrical Engineering (LNEE), vol. 308. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 83–89, 2014.[Abstract]


In cloud computing setup of computers power consumption among the distributed computers needs to be minimal with every server running increases the power cost by an average of 50w-100w. A real time implementation of an algorithm to minimize the power consumed in a setup of a parent computer a PIC microprocessor and connected servers is needed to manage the unwanted waste in energy. The usual traditional scheduler doesn’t meet the requirements. We program the Microcontroller to implement our algorithm which ensured that minimum number of servers run for a given numbers of virtual machines. The Distributive Power Migration & Management Algorithm for Cloud Environment that uses the resources in an effective and efficient manner ensuring minimal use of power. The proposed algorithm performs computation more efficiently in a scalable cloud computing environment. The results indicate that the algorithm reduces up to 28% of the power consumption to execute services.

More »»

Scopus Author ID: 55971770300

ORCID: 0000-0001-9215-6122 

207
PROGRAMS
OFFERED
5
AMRITA
CAMPUSES
15
CONSTITUENT
SCHOOLS
A
GRADE BY
NAAC, MHRD
8th
RANK(INDIA):
NIRF 2018
150+
INTERNATIONAL
PARTNERS
  • Amrita on Social Media

  • Contact us

    Amrita Vishwa Vidyapeetham
    Amritanagar, Coimbatore - 641 112
    Tamilnadu, India
    • Fax: +91-422-2686274
    • Coimbatore : +91 (422) 2685000
    • Amritapuri   : +91 (476) 280 1280
    • Bengaluru    : +91 (080) 251 83700
    • Kochi              : +91 (484) 280 1234
    • Mysuru          : +91 (821) 234 3479
    • Contact Details »