Chittoor, India
Chittoor, India

Time filter

Source Type

Muni Rathnam S.,SITAMS | Ramashri T.,SVU
Journal of Theoretical and Applied Information Technology | Year: 2014

Remote Sensing is vital because of their pressing need due to the analysis of natural hazards. Among the various natural hazards, the Volcanoes are terrific hazard which may harm the nature as well as the living things. Due to the aforesaid reasons, the identification of volcanoes and their hotspot identification are important to protect the living things. A mechanism which will be utilized to identify the volcanoes and their hotspot from the satellite images is proposed. Initially, the color space of the satellite image will be converted to another color space to identify the contents of the image clearly. After this process, the image will be segmented to identify the volcano's hotspot. In order to identify the hotspot of volcano, the Artificial Neural Network (ANN) is utilized which uses Standard Back Propagation (SBP) Algorithm. The proposed mechanism will be developed with the aid of the platform MATLAB (version 7.11). © 2005 - 2014 JATIT & LLS. All rights reserved.

Vijaya Kishore V.,SITAMS
Proceedings of the 2013 3rd IEEE International Advance Computing Conference, IACC 2013 | Year: 2013

Several lung diseases are diagnosed detecting patterns of lung tissue in various medical imaging obtained from MRI, CT, US and DICOM. In recent years many image processing procedures are widely used on medical images to detect lung patterns at an early and treatment stages. Several approaches to lung segmentation combine geometric and intensity models to enhance local anatomical structure. When the lung images are added with noise, two difficulties are primarily associated with the detection of nodules; the detection of nodules that are adjacent to vessels or the chest wall corrupted and having very similar intensity; and the detection of nodules that are non-spherical in shape due to noise. In such cases, intensity thresholding or model based methods might fail to identify those nodules. Edges characterize boundaries and are hence of fundamental importance in image processing. Image edge detection significantly reduces the amount of data by filtering and preserving the important structural attributes. So understanding of edge detecting algorithms is necessary. In this paper Morphology based Region of interest segmentation combined with watershed transform of DICOM lung image is performed and comparative analysis in noisy environment such as Gaussian, Salt & Pepper, Poisson and speckle is performed. The ROI lung area blood vessels and nodules from the major lung portion are extracted using different edge detection filters such as Average, Gaussian, Laplacian, Sobel, Prewitt, Unsharp and LoG in presence of noise. The results are helpful to study and analyse the influence of noise on the DICOM images while extracting region of interest and to know how effectively the operators are able to detect, overcoming the impact of different noise. The evaluation process is based on parameters from which decision for the choice can be made. © 2013 IEEE.

Gundala S.,SITAMS | Ramanaiah V.K.,Yogi Vemana University | Kesari P.,JNTUK UCE
2014 International Conference on Advances in Electronics, Computers and Communications, ICAECC 2014 | Year: 2015

The power consumption is a major concern for emerging applications like mobile phones, digital cameras, pace makers and multimedia processors. The power consumption can decreases by number of ways. The multiple supply voltage design is a dominant technique for the reduction of power consumption in System on Chips/Cores. The System on Chips/Cores uses level shifters and the level shifter will become overhead, when its own power consumption & delay is high. In this paper a nanosecond delay level Shifter with logic level correction circuit is introduced that performs level up shifting as well as logic level correction to keep the VOUT stable, equals to VDD or VSS with low power consumption. The circuit is designed and simulated in a 90nm process technology. The proposed technique is a unique component, will comprise a feedback network to keep the output as stable as possible. Robustness of the new level shifter design has examined at an operating frequencies of 10 KHz, 500 KHz, and 1 MHz with varying load of 10 fF to 70 fF and varying temperature from-20 °C to 70 °C. The proposed design reliably shifts 0.4V input signal to 1V output signal with a delay as low as 0.8ns and average power consumption of 80nW at a frequency of 1MHz. © 2014 IEEE.

Sarvabhatla M.,Prof. | Murugan G.,SITAMS | Vorugunti C.,Dhirubhai Ambani Institute of ICT
2014 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2014 | Year: 2015

Cloud computing is a collection of virtually massive distributed large scale computers to handle enormous enterprise computing, hardware, storage needs. An exponential advancement of communication and information technologies results in substantial traffic for accessing of cloud resources wired and mobile, through various communication devices like desktop, laptop, tabs, etc. via Internet. Significance of enterprise data and increased access rates from low-resource terminal devices demands for reliable and low cost authentication techniques. Lots of researchers have proposed authentication schemes based on password, biometric, steganography etc. with varied efficiencies. In 2014, Nimmy et al proposed a steganography based mutual authentication protocol for cloud computing and claimed that their scheme resists major cryptographic attacks. Unfortunately, in this paper we will show that Nimmy et al is vulnerable to offline password guessing attack and Denial of Service attack. As a part of our contribution, we propose a low cost steganography based authentication scheme which is strongly secure and best suited for asymmetric cloud computing environment. © 2014 IEEE.

Sarvabhatla M.,NBKRIST | Narayana K.L.,SITAMS | Vorugunti C.S.,Dhirubhai Ambani Institute of ICT
2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems, SPICES 2015 | Year: 2015

The advancement of communication technology resulted in increasing number of security threats over public Internet on remote servers. In 2014, Shipra et al. proposed an improved remote user authentication scheme using smart cards with check digits. Shipra et al. claimed that their scheme is secure and efficient against all major cryptographic attacks. Unfortunately, their scheme is vulnerable to some of the cryptographic attacks, particularly 'online password guess attack' as discussed in this manuscript. As a part of our contribution, we propose a robust and extra secure authentication scheme for remote users based on smart cards with check digits, with slight increase in the cost. Security is the fundamental compared to complexity, since complexity can be easily manage with improved technology. © 2015 IEEE.

Sarvabhatla M.,NBKRIST | Giri M.,SITAMS | Vorugunti C.S.,Dhirubhai Ambani Institute of ICT
Proceedings - 5th IEEE International Conference on Computer and Communication Technology, ICCCT 2014 | Year: 2014

To safeguard trustworthy remote user authentication services, various user authentication schemes for internet based E-Commerce, M-Commerce applications has been proposed. These schemes are proposed with an intention to legalize only authorized access to remote server resources, so that critical information can be protected from misuse. Very recently, A.K Das et al. proposed a user remote user authentication scheme using a hash function, which they claimed to provide enhanced privacy and their scheme is light weight due to usage of efficient one way hash function and bitwise XOR operations. In this paper we will cryptanalyze and show that A.K das et al scheme is susceptible to privileged insider attack, on success of the attack, the attacker can perform all major cryptographic attacks. © 2014 IEEE.

Sarvabhatla M.,NBKRIST | Giri M.,SITAMS | Vorugunti C.S.,Dhirubhai Ambani Institute of ICT
Proceedings - 5th IEEE International Conference on Computer and Communication Technology, ICCCT 2014 | Year: 2014

The Emerging E-commerce and high hit rate web applications requires distribution of computational resources in a wide-area network with components administered locally and independently to provide faster response time to remote users. The dynamic and multi-institutional nature of these environments poses challenging security issues. Trust relationships among the communicating entities and faster access to resources are a major concern. Many researchers have proposed security protocols for grid system security based on Public Key Infrastructure (PKI), which needs huge computation resources. Few researchers like Chang et al, Das et al. etc. have proposed grid security protocols based on non public key settings which reduces huge computation processes but prone to mallicious attacks. In this paper we will propose a grid security protocol with out public key settings using light cryptographic operations like hash, XOR etc. which resists major cryptographic attacks and provides mutual authentication among the entities involved. © 2014 IEEE.

Krishna M.V.,SITAMS | Ajitha D.,SITAMS
2014 International Conference on Science Engineering and Management Research, ICSEMR 2014 | Year: 2014

Making Network on Chip is carried out here, we introduce another system on-chip (Noc) that handles exact limitations of the flawed parts of the Noc. The proposed Noc is focused around new slip location components suitable for element Nocs, where the number and position of processor components or defective squares differ amid runtime. The Noc medium performs an abnormal state of modularity, adaptability, and throughput. A Noc includes switches and interconnections permitting correspondence between the PEs and/or Ips. The Noc depends on information parcel trade. The way for an information parcel between a source and a terminus through the switches is characterized by the steering calculation. Subsequently, the way that an information bundle is permitted to take in the system depends chiefly on the addictiveness allowed by the routing algorithm, which is connected provincially in every switch being crossed and to every information parcel. © 2014 IEEE.

Machiraju P.K.,SITAMS | Pushpamithra D.Y.,SITAMS
2014 International Conference on Science Engineering and Management Research, ICSEMR 2014 | Year: 2014

Level up and level down applications can be performed by using the novel Efficient Voltage Level Shifter (EVLS). Based on its input voltage the proposed EVLS can able to perform level up shift or level down shift. EVLS means, the circuit monitors its input voltage and performs level up shift, when its input voltage is low and level down shift when its input voltage is high. This novel level shifter consistently performs level up shift from 0.6V to 1.2V and level down shift from 1.2V to 0.6V. A new design of level up and down shifter for low power application has been presented. The circuit has been designed and simulated with 90nm process technology. In analysis of power and delay, the new proposed EVLS shifter has level up and level down average power dissipation of 24.7145nW and with a delay of 2.053ns has achieved. © 2014 IEEE.

Thulasi Krishna S.,Rayalaseema University | Sreekanth S.,SITAMS
International Journal of Pharmacy and Technology | Year: 2016

Software Development Life Cycle Model gives theoretical guide line regarding development of the software. Software development models are very important for developing software in a systematic manner such that it will be delivered within the time deadline and also should satisfy quality parameters. Generally we have many different techniques and methods used in software development life cycle. An overview of the more common system development process models used to guide the system Analysis,Design,Development and Maintenance of developed software. I propose new Software development process model that is “Confident Software Development Process Model”. In this model we have not frozen requirement phase,one can move easily from design phase to requirement phase if a new requirement surfaces. We can easily incorporate small to large changes in any phase. This is very useful to developers to develop new software. © 2016,International Journal of Pharmacy and Technology. All rights reserved.

Loading SITAMS collaborators
Loading SITAMS collaborators