Pandu Visu

Pandu Visu
Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology | VELTECH · Department of Computer Science and Engineering

B.Tech(IT)., M.E(CSE)., Ph.D

About

22
Publications
3,632
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
94
Citations

Publications

Publications (22)
Article
Full-text available
Plants are one of the long lasting species on Earth and are used for various purposes such as medicine, food and organics. Apex point and base point, coined here, are very important points of leaf facilitating extraction of various leaf shape based features. The main challenge in automatic plant recognition system is automatically identifying apex-...
Chapter
Cloud computing and its services are growing day by day in a real world scenario. In hybrid cloud architecture also, we have same service security threats like poodle (Padding Oracle on Downgraded Legacy Encryption) attack that will affect the SSL-based communication between client and server. If the connection between client and server is compromi...
Article
Background/Objectives: Brainwave based accident avoidance system for drowsy drivers. Methods/Statistical Analysis: Accident avoidance system is an effective way to prevent accident caused due to drowsy driving. Every year, approximately 100,000 crashes are caused by drowsy driving. These kind of crashes are most common in highways during long journ...
Article
Full-text available
In real world, optical character recognition (OCR) is one of the key terms challenging image processing stream. Various applications are emerging based on OCR; one fine good example of these terms was recognizing vehicle’s number plate in tolls. Since various researchers are under strong discussion in this area, here we proposed a new algorithm for...
Article
Vehicular ad hoc networks (VANETs) use unidentified routing protocols that hide node uniqueness and which protects the node from outside observers to provide privacy protection. However, existing unidentified routing protocols depend on either hop-by-hop encryption or unnecessary traffic whichever makes high cost or cannot provide full privacy prot...
Article
Full-text available
Cloud computing is a significant shift of computational paradigm where computing as a utility and storing data remotely have a great potential. Cloud server provides a low cost, flexible, location independent platform for storing client's data. It can provide user along with varieties of service, framework, applications and storage of a huge amount...
Article
Full-text available
To achieve data storage security in cloud, bio cryptography techniques can be used. This study presents Personal identification using fingerprint and Iris biometric technology. Usually unimodal biometric techniques are used. Cloud computing provides many resources, very convenient charged service and minimum cost computing. This leads the cloud com...
Conference Paper
The most important application of MANETs is to maintain anonymous communication in attacking environment. Though lots of anonymous protocols for secure routing have been proposed, but the proposed solutions happen to be vulnerable at some point. The service rejection attacks or DoS, timing attacks makes both system and protocol vulnerable. This pap...
Article
Wireless sensor networks are used in various fields that deployment of the sensors and collecting data’s from that sensors are major problem because of routing protocols which are not sufficient to handle reactive situation. In these paper we proposed a new protocol called Inception complex stable routing protocol which is reactive that it can hand...
Article
Hadoop is an advanced framework with separated File storage system to organize these data's in distributed environment. Hadoop is a form of cluster with which is subjected to wide range of visualized data. Job sequence is one of the most peculiar sequences often handled by the scheduler in order to split and merge the job and its probable environme...
Article
Full-text available
Power constraints play a key role in designing Human Area Networks (HANs) for bio authentication vehicle based on driver's identity. To alleviate the power constraints, we advocate a design that uses an asynchronous time encoding mechanisms for representing bio authentication information and the skin surface as the communication channel. Time encod...
Article
Big data deals with large volumes of tons and tons of data. Since managing this much amount of data is not in the mere way for the traditional data mining techniques. Technology is in the world of pervasive environment i.e., technology follows up with its tremendous growth. Hence coordinating these amount of data in a linear way is mere little diff...
Article
In the last few decades data mining is one of the important research areas in data maintenance of computing. In computing world, plentiful algorithms are proposed for mining. The few applications of data mining are web mining, video mining, knowledge mining and string mining. In these applications, string mining is focused and concentrated to overc...
Article
In real world data mining is emerging in various era, one of its most outstanding performance is held in various research such as Big data, multimedia mining, text mining etc. Each of the researcher proves their contribution with tremendous improvements in their proposal by means of mathematical representation. Empowering each problem with solution...
Article
Wireless Network is an active research area in computer networks. There are many research issues in wireless network such as Identification of optimal route for data communication, efficient utilization of energy, clustering, providing congestion free communication, offering scalability, maintaining the Quality of Service (QoS), in which routing be...
Article
A Novel method used for recognizing a human body in all textural posture was proposed here. The method is to recognize the human gesture so that the human can be identified easily. If the human is subjected to the identification where the intensity of environment lapse, "mapping" is applied to separate the human from environmental background. The s...
Article
Networking becomes most important resources in the modern world. The networking explored as wired networking, wireless networking, vehicular networking and sensor networking. The wireless networking becomes mandatory resources of our day to day life. Most of the modern engineering applications require wireless networking. Therefore, the research in...
Article
Full-text available
Routing in the adhoc network is major critical issue which desires the performance of wireless networks. Providing optimal routing in wireless network is more complicated than wired networks due to many pitfalls like limited power, less bandwidth. Therefore, the routing protocol in wireless environment requires many additional considerations such a...
Article
Wireless Body Area Networks (WBANs) are a growing field of research; the challenges and applications have been explored and resolved by many researchers. The benefits of mobile communication based WBANs is using cellular communication as communication methodologies in the WBANs. Especially in emergency systems like medicare and military system, WBA...
Article
Full-text available
Problem statement: Parallel array multipliers were required to achieve high execution speed for Digital Signal Processing (DSP) applications. Approach: The purpose of this article was to investigate Field Programmable Gate Arrays (FPGAs) implementation of standard Braun's multipliers on Spartan-3AN, Virtex-2, Virtex-4 and Virtex-5 FPGAs using Very...
Article
Full-text available
Problem statement: The modern world is based on using physical, biological and social systems more effectively using advanced computerized techniques. A great amount of data being generated by such systems; it leads to a paradigm shift from classical modeling and analyses based on basic principles to developing models and the corresponding analyses...
Conference Paper
A Mobile Ad-hoc Network (MANET) is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. Nodes in ad-hoc networks play both the roles of routers and terminals. Moreover, the routing path in ad-hoc networks is dynamic; it is not fix...

Network

Cited By