M. K. Venkatesha

M. K. Venkatesha
  • B.E, M.Sc.(Engg.), Ph. D
  • Professor at RNS Institute of Technology

About

37
Publications
42,982
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
413
Citations
Current institution
RNS Institute of Technology
Current position
  • Professor

Publications

Publications (37)
Article
Full-text available
A framework for feature level fusion-based authentication system is proposed in this paper. Feature level fusion improves the robustness and classification accuracy compared to unimodal authentication system. This work is carried in two-folds. The first experiment fuses the translation, rotation and scale (TRS) invariant statistical features of iri...
Article
Full-text available
With the intense need of security, a reliable authentication system can be attained using multimodal biometrics. Predominately vein patterns are attracting the researchers for developing authentication system. Multimodal biometric system not only aims at combining traits but also on fusion at various levels. Proposed approach fuses invariant iris f...
Article
Full-text available
One of the prominent indicators of drowsiness is yawning. The main intention for a real-time application such as detecting the driver's yawning is that the response of the detector must be as quick as possible. A novel yawning detection system is proposed which is based on a two agent expert system. The features of the face have to be extracted to...
Conference Paper
For any real-time application, detection and tracking of features becomes very important. The detection and tracking algorithms have to be very robust and efficient with least or zero false positives and false negatives. We use a novel combination for detection and tracking purpose. In this paper we propose a robust mouth region extraction and trac...
Article
A microprocessor based precision step tracking system for monitoring the look angle of a ground station antenna for receiving maximum signal strength from a geostationary synchronous satellite is presented. The performance of this method is compared with the other usual mode of control used viz, monopulse method for its accuracy. The proposed metho...
Article
A simple and efficient method for the finite-element solution of 3-D unbounded region field problem is presented in this paper. The proposed technique consists in a global mApplng of the original unbounded region onto a bounded domain by applying a standard inversion transformation to the spatial coordinates. Same numerical values of the potential...
Article
The finite-element method can be used for an approximate solution of axisymmetric exterior-field problems by truncating the unbounded domain, or by applying various techniques of coupling a finite region of interest with the remaining far region, which is properly modelled. In this paper, we propose the solution of axisymmetric exterior-field probl...
Article
A Multimodal authentication system with fusion at decision level employing Iris and Finger Vein is developed. This paper also proposes a novel feature extraction technique for finger vein and iris traits. This approach combines the decisions from the individual modalities using the conventional AND rule. Experimental results demonstrate the effecti...
Article
Reversible logic gates are in high demand in the world of low-power digital circuits and quantum computers since the power dissipation problems which occur in the computational operations of a computer can be avoided by using reversible structures instead of the conventional irreversible logic structures. One important task is to compare the inputs...
Article
Full-text available
Reversible Logic is gaining significant consideration as the potential logic design style for implementation in modern nanotechnology and quantum computing with minimal impact on physical entropy .Fault Tolerant reversible logic is one class of reversible logic that maintain the parity of the input and the outputs. Significant contributions have be...
Conference Paper
The primary application of biometric technology is to analyze human characteristics for security purpose as security issues have been the focused interest in recent years. A survey of different fusion techniques in multimodal biometrics is made. This paper also attempts to identify some of the challenges and issues that confront research in multimo...
Article
Full-text available
This paper proposes an online signature authentication based on polynomial modeling. The derived feature acceleration is used. The order of the polynomial is carefully selected for each subject using the acceleration vector. The dynamic warping algorithm and mean squared error measure aid in standard template selection process for a subject. The be...
Article
In this work, shape analysis of the acceleration plot, using lower order Zernike moments is performed for authentication of on-line signature. The on-line signature uses time functions of the signing process. The lower order Zernike moments represent the global shape of a pattern. The derived feature, acceleration vector is computed for the sample...
Article
AbstractCurrent network based authentication applications require simple robust methods which are faster and does not choke the bandwidth. Minimal features are considered using subpattern analysis which leads to less response time in a real time scenario. Certain subsections of signature vary in a genuine case subdivision process. With a high degre...
Article
Full-text available
Authentication systems which are covenant with a measurable behavioral and physiological traits are essential for an online system. In this paper, two types of biometric sample authentication from different databases on a common algorithm using Continuous Dynamic Programming [CDP] are discussed. Using a common algorithm, a method for user-dependent...
Article
Full-text available
Human faces are non-rigid objects with a high degree of variability in size, shape, color, and texture. The face databases are extensively used for evaluation of various algorithms used in facial expression/gesture recognition systems. Any automated system for face and facial gesture recognition has immense potential in identification of criminals,...
Article
Full-text available
Reversible logic gates are very much in demand for the future computing technologies as they are known to produce zero power dissipation under ideal conditions. This paper proposes an improved design of a multiplier using reversible logic gates. Multipliers are very essential for the construction of various computational units of a quantum computer...
Article
Full-text available
Reversible logic has received great attention in the recent years due to their ability to reduce the power dissipation which is the main requirement in low power digital design. It has wide applications advanced computing, low power CMOS design, Optical information processing, DNA computing, bio information, quantum computation and nanotechnology....
Conference Paper
A new low power low voltage CMOS thyristor delay element is proposed in this paper. The delay range of the proposed circuit is extended by reducing charge sharing problem. The delay element has less voltage and temperature sensitivity and consumes less power. The circuit is implemented in 130 nm technology and simulation result shows that the delay...
Article
Full-text available
Problem statement: The research addressed the computational load reduction in off-line signature verification based on minimal features using bayes classifier, fast Fourier transform, linear discriminant analysis, principal component analysis and support vector machine approaches. Approach: The variation of signature in genuine cases is studied ext...
Conference Paper
Full-text available
Zernike moments are image descriptors often used in pattern recognition. They offer rotation invariance. In this paper, we discuss a novel method of signature authentication using Zernike moments. Instead of working on primary features such as image or on-line data, working on the derived kinematic plot is a robust way of authentication. The derive...
Article
In online applications, authentication systems which are covenant with a measurable behavioral trait is essential. The flow of signature with respect to time is termed as online signature data. This paper deals with authentication of an individual's on-line signature using continuous dynamic programming [CDP]. Modern systems aim to move security fr...
Article
In online applications, authentication systems which are covenant with a measurable behavioral trait and physiological characteristics are essential. This paper deals with authentication of an individual's on-line signature data and textual iris information using continuous dynamic programming [CDP]. Instead of working on primary features such as i...
Conference Paper
Over the last two decades, in the field of secure communication and financial on-line applications, we have witnessed an explosive growth in biometric personal authentication systems which are covenant with a measurable physical characteristic or behavioral trait. On-line refers to making use of the time functions of the signing process. Verificati...
Article
In online applications, there is a foreseeable explosive growth in biometric personal authentication systems which are covenant with a measurable behavioral trait. Hand written object [HO] verification is the process used to recognize an individual, which is intuitive reliable indicator. Verification of a HO as a biometric modality still is a chall...
Conference Paper
Storing and retrieving the behavioral and physiological templates of a person for authentication using a common algorithm is indispensable in on-line applications. This paper deals with authentication of on-line signature data and textual iris information using continuous dynamic programming [CDP]. Kinematic derived feature, acceleration is conside...
Conference Paper
It is well understood that pulse width modulation offers several advantages over other methods when used for the control of power (especially for the control of induction motors). The advantages being that a nearly sinusoidal voltage may be generated and applied to the load. Depending on the switching frequency, higher frequency harmonics are gener...
Article
A novel method of power factor sensing and switching on/off of the power capacitor to the power line is presented. The system is reliable and rugged. The circuit is so simple that very little maintenance is required. Even with wide variation in the line power factor, the power factor can be maintained at any desired value. Experimental verification...
Article
Full-text available
Reversible logic is very important in construction of low power and low energy loss computational structures that are important in the construction of arithmetic circuits which are used in quantum computation and in low power digital circuits. In this paper an optimized and low quantum cost one digit carry select BCD adder using reversible logic ga...
Article
Full-text available
Reversible logic is very essential for the construction of low power, low loss computational structures which are very essential for the construction of arithmetic circuits used in quantum computation, nano technology and other low power digital circuits. In the present paper an optimized and low quantum cost one digit BCD adder and an optimized on...
Article
Full-text available
Hand written object [HO] verification is the process used to recognize an individual, is intuitive reliable indicator which can be character recognition, handwriting verification, style classification, shape recognition and signature recognition. This paper discusses the trajectory generation [TG] methods, as novel methods to deal inter-class and i...

Network

Cited By