Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–9 of 9 results for author: R, V K

.
  1. arXiv:2307.08048  [pdf

    eess.IV cs.CV

    A Novel SLCA-UNet Architecture for Automatic MRI Brain Tumor Segmentation

    Authors: Tejashwini P S, Thriveni J, Venugopal K R

    Abstract: Brain tumor is deliberated as one of the severe health complications which lead to decrease in life expectancy of the individuals and is also considered as a prominent cause of mortality worldwide. Therefore, timely detection and prediction of brain tumors can be helpful to prevent death rates due to brain tumors. Biomedical image analysis is a widely known solution to diagnose brain tumor. Althou… ▽ More

    Submitted 16 July, 2023; originally announced July 2023.

  2. arXiv:2108.04460  [pdf

    cond-mat.mtrl-sci

    Contiguous Hetero-structures & Co-existing Morphological Derivatives of Preferentially Grown Carbo-nitrides in Long Term Aged SS 316LN with Varying Nitrogen Concentration

    Authors: Alphy George, Vaishnavi Krupa B. R., R. Mythili, Arup Dasgupta, J. Ganesh Kumar, G. V. Prasad Reddy

    Abstract: To assess long-term structural integrity under operational conditions in nuclear reactors, SS 316LN with varying nitrogen content is subjected to thermal aging for 20000 hours at 650°C. While the annealing twins and heterogeneous grain evolution by bimodal division are independent of chemical composition, the type, size and morphology of evolving secondary phases are characteristic for nitrogen co… ▽ More

    Submitted 10 August, 2021; originally announced August 2021.

  3. arXiv:2012.00866  [pdf, other

    cs.DS

    Huskysort

    Authors: R. C. Hillyard, Yunlu Liaozheng, Sai Vineeth K. R

    Abstract: Much of the copious literature on the subject of sorting has concentrated on minimizing the number of comparisons and/or exchanges/copies. However, a more appropriate yardstick for the performance of sorting algorithms is based on the total number of array accesses that are required (the "work"). For a sort that is based on divide-and-conquer (including iterative variations on that theme), we can… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

    Comments: 9 pages, Github repo for the algorithm included

  4. arXiv:1901.02033  [pdf, ps, other

    cs.IT

    The Effect of Introducing Redundancy in a Probabilistic Forwarding Protocol

    Authors: Vinay Kumar B. R., Roshan Antony, Navin Kashyap

    Abstract: This paper is concerned with the problem of broadcasting information from a source node to every node in an ad-hoc network. Flooding, as a broadcast mechanism, involves each node forwarding any packet it receives to all its neighbours. This results in excessive transmissions and thus a high energy expenditure overall. Probabilistic forwarding or gossiping involves each node forwarding a received p… ▽ More

    Submitted 10 January, 2019; v1 submitted 7 January, 2019; originally announced January 2019.

    Comments: Appears in the Proceedings of the 2018 National Conference on Communications (NCC 2018)

  5. arXiv:1407.2082  [pdf

    cs.AR

    FPGA Based Efficient Multiplier for Image Processing Applications Using Recursive Error Free Mitchell Log Multiplier and KOM Architecture

    Authors: Satish S Bhairannawar, Rathan R, Raja K B, Venugopal K R, L M Patnaik

    Abstract: The Digital Image processing applications like medical imaging, satellite imaging, Biometric trait images etc., rely on multipliers to improve the quality of image. However, existing multiplication techniques introduce errors in the output with consumption of more time, hence error free high speed multipliers has to be designed. In this paper we propose FPGA based Recursive Error Free Mitchell Log… ▽ More

    Submitted 8 July, 2014; originally announced July 2014.

  6. QoS group based optimal retransmission medium access protocol for wireless sensor networks

    Authors: Kumaraswamy M, Shaila K, Tejaswi V, Venugopal K R, S S Iyengar, L M Patnaik

    Abstract: This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, short-range, low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture, industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide au… ▽ More

    Submitted 11 April, 2014; originally announced April 2014.

    Comments: 9 pages in IEEE format and 6 figures

    Journal ref: IJCNC, Vol.6, No.2, March 2014

  7. arXiv:1309.5601  [pdf, ps, other

    cs.CR cs.NI

    Multiple Domain Secure Routing for Wireless Sensor Networks

    Authors: Lata B T, Jansi P K R, Shaila K, D N Sujatha, Venugopal K R, L M Patnaik

    Abstract: Secure Transmission of data packets in Wireless Sensor Networks is an important area of Research. There is a possibility of an attacker creating security holes in the network. Hence, network security and reliability can be achieved by discovering random multiple paths using multiple domains, and forwarding data packets from the source node to the destination node. We have designed, Multiple Domain… ▽ More

    Submitted 22 September, 2013; originally announced September 2013.

    Comments: 10 pages

    Journal ref: International Journal of Information Processing, 7(2), 59-68, 2013

  8. arXiv:1303.5867  [pdf

    cs.IR cs.DB

    Similarity based Dynamic Web Data Extraction and Integration System from Search Engine Result Pages for Web Content Mining

    Authors: Srikantaiah K C, Suraj M, Venugopal K R, L M Patnaik

    Abstract: There is an explosive growth of information in the World Wide Web thus posing a challenge to Web users to extract essential knowledge from the Web. Search engines help us to narrow down the search in the form of Search Engine Result Pages (SERP). Web Content Mining is one of the techniques that help users to extract useful information from these SERPs. In this paper, we propose two similarity base… ▽ More

    Submitted 23 March, 2013; originally announced March 2013.

    Comments: 8 pages

    Journal ref: ACEEE International Journal on Information Technology, Volume 3, Issue 1, 2013

  9. arXiv:1001.4186  [pdf

    cs.CR

    Fingerprint Recognition Using Minutia Score Matching

    Authors: Ravi. J, K. B. Raja, Venugopal. K. R

    Abstract: The popular Biometric used to authenticate a person is Fingerprint which is unique and permanent throughout a person's life. A minutia matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. In this paper we projected Fingerprint Recognition using Minutia Score Matching method (FRMSM). For Fingerprint thinning, the Block Filter is used, wh… ▽ More

    Submitted 23 January, 2010; originally announced January 2010.

    Comments: 8 Pages

    Journal ref: IJEST Volume 1 Issue 2 2009 35-42