Hyderabad, India
Hyderabad, India

Time filter

Source Type

Proceedings of the 2013 International Conference on Information Systems and Computer Networks, ISCON 2013 | Year: 2013

Security has gained a lot of importance as information technology is widely used. Cryptography refers to the study of mathematical techniques and related aspects of Information Security like data confidentiality, data Integrity, and of data authentication. Visual cryptography (VC) is a process where a secret image is encrypted into shares which refuse to divulge information about the original secret image. Its strength is a fact that the decryption of the secret image is through human visual system without computation. A basic model for visual cryptography for natural images was proposed by Naor and Shamir. In this paper, a novel method of VC is presented for halftone images which represent the resultant image in the same size as the original secret image. Hiding of the visual information based on pseudo randomization and pixel reversal is also proposed. © 2013 IEEE.

Nagaraja A.,VNR VJIET | Saravana Kumar R.,RADYSIS
ACM International Conference Proceeding Series | Year: 2015

Symmetric cryptography is used in wireless networks, with the help of session keys to make it used for the public. Keys that are randomly generated to provide security are called as Session key and this is the encryption and decryption key to establish the communication between a user and another computer. However, using session keys, the memory can be managed dynamically by different encryption and decryption techniques. When memory gets overloaded with many requests, then dynamically memory is to be allocated with the help of session keys and gets connected to the external devices. By performing the dynamic operations memory can be managed and users can get uninterrupted process in accessing the network. In this paper, we show that with the help of session keys we can provide the authentication to request handler devices. By this memory can be handled very easily and the congestion can be controlled with the help of session keys. © 2015 ACM.

Srikanth P.,VNR VJIET | Deverapalli D.,Shri Vishnu Engineering College for Woman
Proceedings - 6th International Advanced Computing Conference, IACC 2016 | Year: 2016

This paper predicts the Diabetes Disease based on Data Mining Techniques of Classification Algorithms. Classification Algorithm and tools may reduce heavy work on Doctors. In this paper Evaluated as Classification Algorithms for the Classify of some Diabetes Disease Patient Datasets. Data Mining is one of the main Algorithm is Classification. Classification Algorithm Examine of the Decision Tree Algorithm, Byes Algorithm and Rule based Algorithm. These algorithms are evaluate Error Rates and identify of the patients based evolution Function of the measure the accurate results. © 2016 IEEE.

Nireekshana T.,VNR VJIET | Chowdary P.K.,VNR VJIET
2015 Conference on Power, Control, Communication and Computational Technologies for Sustainable Growth, PCCCTSG 2015 | Year: 2015

FACTS devices such as Thyristor Controlled Series Compensator can help to increase power transfer capacity in heavily loaded network because of its capability to control power flow flexibly. In a multi-machine network, the influence of TCSC'S on the network flows is complex since the control of any one device influences all others. In a competitive power market, the location of these devices control will affect the operations of the system. Optimal location and control of these devices will be very important for power market regulators. In this the use of TCSC to maximize Available Transfer Capability generally defined as the maximum power transfer transaction between a specific power-seller and a power-buyer in a network. Genetic Algorithm is used as the optimal location tool to determine the location and the parameters of TCSC simultaneously. By Using IEEE 30 BUS System we can get location of the devices by ATC and maximum enhance by a new approach of Genetic Algorithm. © 2015 IEEE.

Gupta G.S.,VNR VJIET | Harinath P.N.V.,M. Technology in Advanced Manufacturing Systems
Materials Today: Proceedings | Year: 2015

This paper is on an experimental investigation for evaluating physical, mechanical and thermal properties of an ablative phenolic laminates by manufacturing and testing them. These are manufactured by changing various parameters like with and without reinforcement of micro silica powder of 15 weight percentage of matrix as filler material and the ply orientation of 0° and 35° rosette. These properties of prepared materials have been tabulated and compared as part of analysis. Literature study reveals that S-Glass laminates exhibit better thermal properties than E glass laminates. Hence, this investigation is carried out for enhancement of properties in E-glass laminates. © 2015 Elsevier Ltd.

Yadlapalli R.T.,Andhra University | Kotapati A.,VNR VJIET
International Journal of Power Electronics | Year: 2014

The switched-mode power supplies are widely used in very low voltage and high-power applications where large conversion ratios are required. In such cases, the quadratic buck converter is the suitable one compared to buck, cascaded buck and multi-phase choppers, because of their limitations in switching frequency and losses. This paper presents mathematical analysis, design and simulation of a quadratic buck converter using fixed frequency Pulse-Width Modulation (PWM)-based Sliding-Mode (SM) controller in order to obtain fast dynamic performance. The design aspects include choice of sliding surface, deriving existing and stability conditions, control parameter selection and their analysis. The performance of the proposed converter is compared with the conventional Average Current-Mode (ACM) controller. In average current mode, the tuning of the PI controller for the inner current loop and outer voltage loop is done using bode plots. The simulation results for the two types of controllers are represented for analysing dynamic performance, as well as line and load regulations. Copyright © 2014 Inderscience Enterprises Ltd.

Lakshmi A.P.,VNR VJIET
2014 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2014 | Year: 2014

This paper presents a non-invasive method to differentiate malignant and benign brain tumours using Lab VIEW Software. Brain tumours are atypical growth of cells in the brain[l]. It is important to diagnose these tumours as malignant or benign as early as possible after detection. Benign tumours are encapsulated and have a controlled growth whereas malignant tumours are not encapsulated and lead to necrosis and pushing aside of neighbouring tissue which causes the build-up of cerebral fluids and oedema in the brain compared to benign tumours. Hence, malignant tumours have a much more severe impact on the brain tissue than benign tumours. So far in clinical practice, only pathology tests have been used to diagnose tumours. This paper is a step towards non-invasive identification of malignant and benign tumours. Here a script was developed in N1 Vision Assistant software which identifies tumours based on the amount of oedema, fluids and infection in the brain which is reflected in MRI scans[2]. © 2014 IEEE.

Nt J.,VNR VJIET | Mangathayaru N.,VNR VJIET
ACM International Conference Proceeding Series | Year: 2015

Medical records are very crucial and sensitive data. These records need to be maintained with maximum security preventing it from any kind of misuse. The medical records are sent to a research institute for analysis of the record or to figure out the cure for the disease. The data can be modified in the channel or might be misused by the third party agent who has access to either complete or partial medical records. One cannot completely trust the channel or the agent who has access to the data. To secure the medical data during transmission in the channel we encrypt the data before it is actually sent through the channel. By applying the process of encryption and decryption the data can be securely transmitted through the channel. The secondary issue identified was to figure out any untrustworthy agent, who might have probably leaked the data. In this paper we discuss an approach to provide security to extremely sensitive data by providing channel security. © 2015 ACM.

Ranapanga Y.,VNR VJIET
International Journal of Control and Automation | Year: 2016

Sea-skimming missiles fly at very low altitude (5m-10m) above the mean sea level. An altimeter based height control system is used to keep the missile at the desired height by measuring the instantaneous height of the missile above the sea level. The altimeter measurement comes with the disturbances which forces the missile to follow the sea waves resulting is a complex trajectory and high energy requirements. An extended state observer based height control system with a proportional derivative controller is used for the real time estimation and rejection of sea wave disturbances to achieve a stable flight path for the missile. Simulations are carried out in both continuous and digital domain to understand the hardware implementation imperatives of the same. © 2016 SERSC.

Rajkumar K.,SR Engineering College | Padmaja V.,VNR VJIET
Proceedings of the 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2016 | Year: 2016

Polarizability Tissue envisages is a developing system that uses polarized light to test the physical and physiological quality of tissues. Polarizability Ellipsometric procedures are used to comprehend the variety of polarization qualities of light through model malignant thyroid tissue. The generated signature matrix of optics framework offers clinicians some assistance with understanding and evaluates the malignant thyroid tissue properties and gives learning about the working of the malignant thyroid tissue. In this prescribed work malignant thyroid tissues gathered from pathology department, Gandhi Medical College, Secunderabad, India is utilized for perceiving the Mueller Matrix of the malignant thyroid tissue and getting the Depolarization, Diattenuation and Retardance images and values. Conditions to get an identifiable Mueller Matrix with gyratory optics are tended to and are utilized to comprehend the polarization assortment in the malignant thyroid tissue during the novel in a pixel by pixel examination system and by means of the standardized Mueller Matrix of the malignant thyroid tissue. © 2016 IEEE.

Loading VNR VJIET collaborators
Loading VNR VJIET collaborators