Entity

Time filter

Source Type

Hyderabad, India

Kumar A.,Indian Institute of Technology Roorkee | Yadav K.L.,Indian Institute of Technology Roorkee | Singh H.,Indian Institute of Technology Roorkee | Pandu R.,Alagappa Chettiar College of Engineering And Technology | Ravinder Reddy P.,CBIT
Physica B: Condensed Matter | Year: 2010

Spinel-perovskite nanocomposites of xCrFe2O4-(1-x)BiFeO3 with x=0.0, 0.1, 0.2, 0.3, 0.4 were prepared by sol gel method. The XRD showed the phase formation of nanocomposites at 700 °C. Particle size was observed to be ∼100 nm by TEM. The variation of dielectric constant and dielectric loss with frequency showed dispersion in the low frequency range. Magnetization was found to increase with increasing concentration of ferrite content. Dielectric analysis showed the conducting behaviour at higher temperature. Magnetocapacitance was also observed in the prepared nanocomposites which may be the sign of magnetoelectric coupling in the synthesized nanocomposites at room temperature. © 2010 Elsevier B.V. All rights reserved. Source


Jalla H.R.,CBIT
Advances in Intelligent Systems and Computing | Year: 2016

Many business applications use data mining techniques. Small organizations collaborate with each other to develop few applications to run their business smoothly in competitive world. While developing an application the organization wants to share data among themselves. So, it leads to the privacy issues of the individual customers, like personal information. This paper proposes a method which combines Walsh Hadamard Transformation (WHT) and existing data perturbation techniques to ensure privacy preservation for business applications. The proposed technique transforms original data into a new domain that achieves privacy related issues of individual customers of an organization. Experiments were conducted on two real data sets. From the observations it is concluded that the proposed technique gives acceptable accuracy with K-Nearest Neighbour (K-NN) classifier. Finally, the calculation of data distortion measures were done. © Springer India 2016. Source


Jyothi B.V.,CBIT | Eswaran K.,SNIST
ISMS 2010 - UKSim/AMSS 1st International Conference on Intelligent Systems, Modelling and Simulation | Year: 2010

In this paper, we describe two new approaches to content-based image retrieval (CBIR) based on preference information provided by the user interacting with an image search system. First, we present the existing methods of image retrieval with relevance feedback, which serve then as a reference for the new approaches. The first extension of the distance function-based CBIR approach makes it possible to apply this approach to complex objects .Next we discuss the second approach for image retrieval. That new algorithm is based on an approximation of user preferences by a neural network. Finally we discuss the advantages and disadvantages and further improvements and future scope in this particular area. © 2010 IEEE. Source


Vodithala S.,KITS | Pabboju S.,CBIT
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS | Year: 2015

Software reuse is one of the major research area in component based software engineering (CBSE). It is an area which integrates all the other technical areas like data mining, soft computing, artificial intelligence etc. The major areas which are to be focused in software reuse are classification, clustering, searching, indexing and retrieval of software components. There are many techniques described in literature each with their advantages and limitations. In this paper, we propose a dynamic approach where the components are retrieved by using genetic algorithm. The proposed algorithm mainly focuses on the termination condition or stopping criteria of Genetic Algorithm, which changes dynamically based on the user query. Genetic Algorithm (GA) stops the evolution i.e., reaches convergence when the average fitness value of the population becomes equal to the fitness value of the user query. © 2015 IEEE. Source


Radhika K.,CBIT | Reddy A.V.G.,Osmania University
ICECT 2011 - 2011 3rd International Conference on Electronics Computer Technology | Year: 2011

Next generation wireless networks are expected to exhibit heterogeneity in terms of wireless access technologies, services and application requirements. These heterogeneous wireless access networks consist of the integration of various wireless networks especially Wi-Fi (WLAN), Wi-Max and 3G/B3G cellular networks. One of the challenging problems is to choose the optimal network depending upon the type of the demanding application. Vertical handoff occurs when a mobile terminal decides to switch to the selected network from the current network. This paper mainly deals with a network selection algorithm based on Fuzzy Multiple Attribute Decision Making. The algorithm considers the factors of Received Signal Strength(RSS), Monetary cost(C), Band Width (BW), Velocity (V) and user preference (P). It finds the Network selection function (NSF) that measures the efficiency in utilizing radio resources by handing off to a particular network. The network that provides highest NSF is selected as the best network to hand off from the current access network. © 2011 IEEE. Source

Discover hidden collaborations