M.Tech, BE

Nalini S. currently serves as Assistant Professor(Sr.Grade)  at the department of Computer Science, Amrita School of Engineering, Bengaluru.


  • 2013: M.Tech.
  • 2004: B. E. 



Publication Type: Conference Paper

Year of Publication Title


G. .A.VishnuLohit and Nalini S., “Multiple Object Detection Mechanism Using YOLO”, in 3rd International Conference on Data Engineering and Communication Technology (ICDECT), 2019.


Sumedh N, O. V. L. Narayana, Madhav Reddy, Nalini S., Ms. Priya B. K., and Dr. T. K. Ramesh, “Modular Assembly Systems in Industry 4.0 Milieu”, in 2nd IEEE International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES) 2018, Delhi Technological University, New Delhi, 2018.


N. K. Prasath, Nalini S., and Dr. Shriram K Vasudevan, “Dynamic reliable algorithm for IoT based systems”, in 2017 International Conference on Signal Processing and Communication (ICSPC), Coimbatore, India, 2017.[Abstract]

“Internet of Things” - The Recent development of this decade has initiated many innovative start-ups. The Internet of Things, being a distinct and developing domain, is now being researched by many eminent firms and scientists. This definitely leads to a world which is completely connected with machines that have the ability to communicate between themselves. This paper gives a different approach for implementing Machine-To-Machine communication using the Internet. Load balancing is the main focus of this paper. The proposed algorithm produces a good results when implemented.

More »»


and Nalini S., “Detection and Tracking of objects using thresholding technique”, in International Conference On Smart Technologies For Smart Nation (SmartTechCon2017), Reva University, Bengaluru, 2017.


K. C.S. and Nalini S., “Healthcare Monitoring System based on IOT ”, in 2nd International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS-2017), R.V. College of Engineering, Bengaluru, 2017.

Publication Type: Journal Article

Year of Publication Title


R. Sreedasyam, Rao, A., Sachidanandan, N., Nalini S., and Dr. Shriram K Vasudevan, “Aarya-A Kinesthetic companion for children with Autism Spectrum Disorder”, Journal of Intelligent and Fuzzy Systems, vol. 32, pp. 2971-2976, 2016.[Abstract]

Autism Spectrum Disorder (ASD) is defined as a condition or disorder that begins in childhood and that causes problems in establishing relationships and communicating with other people. Aarya works as a personal well-being companion to children with Autism Spectrum Disorder while they interact with a virtual environment that is gesture based. By making an ASD affected child face real world situations, we try to improve his/her confidence in facing the world and being open to learning various skills. Social interaction and communication are the major challenges faced by children with ASD. In Aarya, we use gesture-based interface that is the Microsoft Kinect so that the child can find it easier to interact in the real world environment. Through the interactions made with the children and the results obtained, we understand that this tool can be a companion while giving chance for growth and improving their interacting ability. With further refinement and expert inputs, this tool can be built better. © 2017-IOS Press and the authors. All rights reserved.

More »»


and Nalini S., “Implementation of data integrity and regenerating data using erasure code”, International Journal of Applied Engineering Research, vol. 10, pp. 37469-37472, 2015.[Abstract]

To ensure outsourced information in distributed storage against defilements, adding adaptation to non-critical failure to distributed storage, alongside proficient information respectability checking and recuperation systems, gets to be discriminating. Recovering codes give adaptation to internal failure by striping information crosswise over numerous servers, while utilizing less repair movement than conventional eradication codes amid disappointment recuperation. In this way, we ponder the issue of remotely checking the respectability of recovering coded information against debasements under a genuine distributed storage setting. We outline and execute a useful information uprightness security Data Integrity Protection (DIP) plan for a particular recovering code, while safeguarding its natural properties of adaptation to internal failure and repair-activity sparing. Our DIP plan is composed under a versatile Byzantine ill-disposed model, and empowers a customer to plausibly check the respectability of arbitrary subsets of outsourced information against general or vindictive debasements. It lives up to expectations under the straightforward supposition of slim distributed storage and permits diverse parameters to be adjusted for an execution security exchange off. We actualize and assess the overhead of our DIP conspire in a genuine distributed storage test bed under diverse parameter decisions. We further dissect the security qualities of our DIP plan by means of numerical models. We exhibit that remote trustworthiness checking can be possibly coordinated into recovering codes in handy organization.

More »»