Pandu VisuVel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology | VELTECH · Department of Computer Science and Engineering
Pandu Visu
B.Tech(IT)., M.E(CSE)., Ph.D
About
22
Publications
3,632
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
94
Citations
Publications
Publications (22)
Plants are one of the long lasting species on Earth and are used for various purposes such as medicine, food and organics. Apex point and base point, coined here, are very important points of leaf facilitating extraction of various leaf shape based features. The main challenge in automatic plant recognition system is automatically identifying apex-...
Cloud computing and its services are growing day by day in a real world scenario. In hybrid cloud architecture also, we have same service security threats like poodle (Padding Oracle on Downgraded Legacy Encryption) attack that will affect the SSL-based communication between client and server. If the connection between client and server is compromi...
Background/Objectives: Brainwave based accident avoidance system for drowsy drivers. Methods/Statistical Analysis: Accident avoidance system is an effective way to prevent accident caused due to drowsy driving. Every year, approximately 100,000 crashes are caused by drowsy driving. These kind of crashes are most common in highways during long journ...
In real world, optical character recognition (OCR) is one of the key terms challenging image processing stream. Various applications are emerging based on OCR; one fine good example of these terms was recognizing vehicle’s number plate in tolls. Since various researchers are under strong discussion in this area, here we proposed a new algorithm for...
Vehicular ad hoc networks (VANETs) use unidentified routing protocols that hide node uniqueness and which protects the node from outside observers to provide privacy protection. However, existing unidentified routing protocols depend on either hop-by-hop encryption or unnecessary traffic whichever makes high cost or cannot provide full privacy prot...
Cloud computing is a significant shift of computational paradigm where computing as a utility and storing data remotely have a great potential. Cloud server provides a low cost, flexible, location independent platform for storing client's data. It can provide user along with varieties of service, framework, applications and storage of a huge amount...
To achieve data storage security in cloud, bio cryptography techniques can be used. This study presents Personal identification using fingerprint and Iris biometric technology. Usually unimodal biometric techniques are used. Cloud computing provides many resources, very convenient charged service and minimum cost computing. This leads the cloud com...
The most important application of MANETs is to maintain anonymous communication in attacking environment. Though lots of anonymous protocols for secure routing have been proposed, but the proposed solutions happen to be vulnerable at some point. The service rejection attacks or DoS, timing attacks makes both system and protocol vulnerable. This pap...
Wireless sensor networks are used in various fields that deployment of the sensors and collecting data’s from that sensors are major problem because of routing protocols which are not sufficient to handle reactive situation. In these paper we proposed a new protocol called Inception complex stable routing protocol which is reactive that it can hand...
Hadoop is an advanced framework with separated File storage system to organize these data's in distributed environment. Hadoop is a form of cluster with which is subjected to wide range of visualized data. Job sequence is one of the most peculiar sequences often handled by the scheduler in order to split and merge the job and its probable environme...
Power constraints play a key role in designing Human Area Networks (HANs) for bio authentication vehicle based on driver's identity. To alleviate the power constraints, we advocate a design that uses an asynchronous time encoding mechanisms for representing bio authentication information and the skin surface as the communication channel. Time encod...
Big data deals with large volumes of tons and tons of data. Since managing this much amount of data is not in the mere way for the traditional data mining techniques. Technology is in the world of pervasive environment i.e., technology follows up with its tremendous growth. Hence coordinating these amount of data in a linear way is mere little diff...
In the last few decades data mining is one of the important research areas in data maintenance of computing. In computing world, plentiful algorithms are proposed for mining. The few applications of data mining are web mining, video mining, knowledge mining and string mining. In these applications, string mining is focused and concentrated to overc...
In real world data mining is emerging in various era, one of its most outstanding performance is held in various research such as Big data, multimedia mining, text mining etc. Each of the researcher proves their contribution with tremendous improvements in their proposal by means of mathematical representation. Empowering each problem with solution...
Wireless Network is an active research area in computer networks. There are many research issues in wireless network such as Identification of optimal route for data communication, efficient utilization of energy, clustering, providing congestion free communication, offering scalability, maintaining the Quality of Service (QoS), in which routing be...
A Novel method used for recognizing a human body in all textural posture was proposed here. The method is to recognize the human gesture so that the human can be identified easily. If the human is subjected to the identification where the intensity of environment lapse, "mapping" is applied to separate the human from environmental background. The s...
Networking becomes most important resources in the modern world. The networking explored as wired networking, wireless networking, vehicular networking and sensor networking. The wireless networking becomes mandatory resources of our day to day life. Most of the modern engineering applications require wireless networking. Therefore, the research in...
Routing in the adhoc network is major critical issue which desires the performance of wireless networks. Providing optimal routing in wireless network is more complicated than wired networks due to many pitfalls like limited power, less bandwidth. Therefore, the routing protocol in wireless environment requires many additional considerations such a...
Wireless Body Area Networks (WBANs) are a growing field of research; the challenges and applications have been explored and resolved by many researchers. The benefits of mobile communication based WBANs is using cellular communication as communication methodologies in the WBANs. Especially in emergency systems like medicare and military system, WBA...
Problem statement: Parallel array multipliers were required to achieve high execution speed for Digital Signal Processing (DSP) applications. Approach: The purpose of this article was to investigate Field Programmable Gate Arrays (FPGAs) implementation of standard Braun's multipliers on Spartan-3AN, Virtex-2, Virtex-4 and Virtex-5 FPGAs using Very...
Problem statement: The modern world is based on using physical, biological and social systems more effectively using advanced computerized techniques. A great amount of data being generated by such systems; it leads to a paradigm shift from classical modeling and analyses based on basic principles to developing models and the corresponding analyses...
A Mobile Ad-hoc Network (MANET) is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. Nodes in ad-hoc networks play both the roles of routers and terminals. Moreover, the routing path in ad-hoc networks is dynamic; it is not fix...