Bangalore, India
Bangalore, India

Time filter

Source Type

Abd S.A.,Dayananda Sagar College of Engineering | Manjunath S.S.,DSCE | Abdulhayan S.,DSCE
2016 International Conference on Computation System and Information Technology for Sustainable Solutions, CSITSS 2016 | Year: 2016

Device-to-Device technology is the contemporary technology to Machine-to-Machine communication Technology in 5th Generation. The specification given in the 3GPP speaks about different Interfaces and layering in D2D communication in 5th Generation. The Devices considered for communication in 5G technology are User Equipment, eNodeB, MME etc but the simulation we carried out in our experiment is between UE and UE. In our Experimentation we were able to transfer the Images from one UE to the required UE with IP protocol for Networking. We are employing Matlab Simulation for D2D communication between UEs. This papers discusses the transaction carried out in Matlab according to 3GPP Specification under 5G scenario. © 2016 IEEE.


Anandkumar C.P.,DSCE | Prasad A.M.,DSCE | Suma V.,RIIC
Advances in Intelligent Systems and Computing | Year: 2017

Existing multipath routing methods in a Wireless Sensor Networks (WSNs) have presented the effective distribution of traffic over multipath to accomplish required quality of service (QOS). But, failure of the any link in WSN affects the data transmission performance, security of data, scalability and reliability of WSN. Hence, by considering the reliability, scalability, security and congestion for the multipath in a wireless sensor network, it is necessary to design and develop a service focused multi path routing scheme which should provide high failure tolerance and effective routing scheme. This paper put forth a Secure Multipath AODV (SMAODV) protocol in which RSA algorithm is used for secure data transmission and path vacant ratio is calculated to discover the link disjoint path to destination sensor node from source sensor node from all presented paths in a network. Load balancing metrics and technique like detection of congestion, congestion notification and congestion control is used to fine tune and balance the load over multi paths. Split the data packets into multiple fragments and sent it to the destination node through multipath based on the path vacant ratio. © Springer Nature Singapore Pte Ltd. 2017.


Srividya B.V.,DSCE | Akhila S.,BMSCE
Proceedings of International Conference on Circuits, Communication, Control and Computing, I4C 2014 | Year: 2014

Public key cryptosystem or the asymmetric crypto system is more secure than secret key method because of a pair of related keys used by both sender and receiver. The problem in most of the cryptosystem is that the plain text is considered as an integer number that leads poor security. In this paper we propose an efficient Bezier curve based public key cryptography technique over Galois field GF(pm), where p=2,3,5,7. Here the plaint text is considered as a (x, y) coordinate over curve elements. © 2014 IEEE.


Santhosh B.,DSCE | Meghana N.M.,DSCE
Advances in Intelligent Systems and Computing | Year: 2016

With tremendously increasing demand for multimedia communication, it is essential to safeguard the video data from various attacks during its transmission over internet. Video encryption ensures privacy and security of the video content. For the purpose of authentication or to identify tampering if any, secret information is concealed in these encrypted videos. This paper puts forward an efficient and robust methodology for embedding the secret information directly into encrypted videos, which guarantees the confidentiality of the video content. The input video is first compressed using the popular H.264/AVC compression technique and by analyzing the properties of H.264 encoding technique, the three portions containing the sensitive data are encrypted. A standard RC4 stream cipher has been employed for encrypting the codewords of Motion vector differences, Intra prediction modes and Residual coefficients. The secret data can then be hidden by the data hider using a unique Codeword substitution technique without being aware of the video contents. Thus the technique ensures confidentiality of the video content. The hidden data can then be directly extracted by the intended authenticated receiver even without decrypting the video sequence. To validate the feasibility and the performance of the proposed work, the result metrics PSNR, SSIM and VQM have been estimated. © Springer India 2016.


Jamuna S.,DSCE | Agrawal V.K.,CORI
2012 International Conference on Devices, Circuits and Systems, ICDCS 2012 | Year: 2012

Today Field Programmable Gate Arrays (FPGAs) are widely used in many applications. These FPGAs are prone to different types of faults similar to other complicated integrated circuit chips. Faults may occur due to many reasons like environmental conditions or aging of the device. The rate of occurrence of permanent faults can be quite high in emerging technologies, and hence there is a need for periodic testing of such FPGAs. The Configurable Logic Blocks (CLBs) are the main logic resources for implementing sequential as well as combinatorial circuits. Built-in self-test (BIST) is a design technique that allows a circuit to test itself. It is a set of structured-test techniques for combinational and sequential logic, memories, multipliers and other embedded logic blocks. BIST controller coordinates the operations of different blocks of the BIST. BIST controller is designed to work in different modes. Here, we introduce a new approach for FPGA testing that exploits the reprogramability of an FPGA to create the BIST logic by configuring it only during off-line testing. In this way, testability is achieved without any overhead, since the BIST logic "disappears" when the circuit is reconfigured for its normal system operation. We are implementing a restartable logic BIST controller for the configurable logic blocks in Virtex-5 FPGAs by using the resources of FPGA itself. We have used XILINX ISE12.1 for simulation and synthesis. © 2012 IEEE.


Sudir P.,SJCIT | Ravishankar M.,DSCE
Advances in Intelligent Systems and Computing | Year: 2014

Proposed approach explores a new framework for Curved video text detection and extraction by utilizing fast texture descriptor LU-transform and Maximal H-Transform for the text detection. Connected Component filtering method and Nearest Neighborhood (NN) constraint is utilized for false positive elimination. B-Spline curve is fitted to centroid of each character and each oriented character is vertically aligned by finding angle that aligns the normal vector to the vertical axis. The aligned text string is fed to OCR for recognition. Experiments on various curved video data and Hua’s horizontal video text dataset shows that proposed method is efficacious and robust in detecting and recognizing multioriented videotext. © Springer International Publishing Switzerland 2015.


Siddappaji,BMS College of Engineering | Sudha K.L.,DSCE
Proceedings - 2015 International Conference on Communication, Information and Computing Technology, ICCICT 2015 | Year: 2015

This paper compares the performance analysis of our proposed New Time Varying LMS (NTVLMS) algorithm with other well-known adaptive algorithms such as LMS, NLMS, RVSSLMS, NVSSLMS and TVLMS algorithm. These algorithms have been tested for their adaptive noise cancellation capabilities in the context of stationary signal corrupted by additive white Gaussian noise. The parameters Convergence rate, output SNR are used to analyse the performance. The computer simulation results show that the performance of proposed NTVLMS algorithm is better compared to the other algorithms. © 2015 IEEE.


Amutha S.,DSCE | Ramesh Babu D.R.,DSCE | Ravi Shankar M.,DSCE | Harish Kumar N.,DSCE
ITME 2011 - Proceedings: 2011 IEEE International Symposium on IT in Medicine and Education | Year: 2011

Mammography is an effective method for breast cancer detection and breast tumor analysis. In mammography, low dose x-ray is used for imaging, due to which the images are poor in contrast and are contaminated by noise. Hence it is difficult for the radiologist to screen the mammograms for diagnostic signs such as micro calcifications and masses. This ensures the need for image enhancement to aid radiologist. In this paper we present a different algorithm for enhancement of digital mammographic images. The proposed methodology uses mathematical morphology for contrast enhancement and wavelet for denoising. The main contribution of this paper is in differentiating the edge pixels from noise. A quantitative measure of Contrast Improvement Index (CII) and Edge Preservation Index (EPI) are used to evaluate the performance of the algorithm. The algorithm has been tested on a large number of images from standard dataset, comparing the results with the state-of-the-art. By both the analytical indices and ROC analysis, the proposed algorithm shows promising results in early detection of breast cancer and diagnosis. © 2011 IEEE.


Savitha S.K.,Visvesvaraya Technological University | Naveen N.C.,DSCE
Proceedings of the 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2016 | Year: 2016

Accuracy in diagnostics of life-threatening disease based on chest x-ray images is an atmost importance in healthcare sector, where medical image processing has already played a contributory role from more than a decade. In this regards, image enhancement plays a critical role in exposing more information to the foreground image of clinical importance. We have reviewed the most existing system pertaining to chest image enhancement and found that more enhancements could be done to enhance the signal quality. Therefore, we present a sophisticated algorithm that performs multiple operations for enhancing the chest x-rays. The proposed paper introduces techniques for enhancing chest x-rays using non-linear enhancement, primary enhancement, secondary enhancement algorithms on JSRT database. The proposed system shows better quality of enhanced region in comparison to the most frequently adopted techniques for medical image enhancement. © 2016 IEEE.


Christa S.,DSCE | Suma V.,DSCE
ACM International Conference Proceeding Series | Year: 2016

Software even though intangible should undergo evolution to fit into the ever changing real world scenarios. In this context software maintenance is an inevitable activity; further optimizing the activities related to maintenance is not possible due to the lacuna in various aspects of the pre-production phases. Since 1969, the issues raised by Lehman related to software maintenance remain the same. Each issue faced by the maintenance team directly reflects in the quality of the software product. According to the related work, very few research is going on in the field of software maintenance and still scarce when it comes to research on incident and associated ticket; a part of corrective maintenance. In depth research on incident tickets should be viewed as critical since, it provides information related to the kind of maintenance activities that is performed in any timestamp. Therefore classifying and analyzing tickets becomes a critical task in managing the operations of the service since each incident will be having a service level agreement associated with it. Further, incident analysis is essential to identify the patterns associated. Due to the existence of huge population of software in each organization and millions of incidents get reported per software product every year, it is practically impossible to manually analyze all the tickets. This paper focuses on projecting the importance of ticket analytics to maintain the quality of software products and also identifying the incidents and related tickets based on various factors which are supported by a case study from the data collected from various organizations. © 2016 ACM.

Loading DSCE collaborators
Loading DSCE collaborators