Shesh Srivatsa

Shesh Srivatsa
Independent Researcher · Consulting

About

58
Publications
16,391
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
879
Citations

Publications

Publications (58)
Article
Full-text available
Near-alpha titanium alloys are used for moderate-temperature applications in the early stages of the compressor in gas turbine engines. The quasi-static and fatigue properties of these alloys depend heavily on microstructure due to the absence of hard second phases and inclusions which can nucleate voids or cracks. Moreover, these alloys are known...
Article
To fulfill the end-users demand for access to the Internet 'anywhere-anytime' and ensure quality of service, is the WiMAX (Worldwide Interoperability for Microwave Access) technology standardized based on IEEE 802.16 that provides efficient packet radio interface enabling transmission of high data rates. WiMAX network became popular and receives gr...
Article
The surface integrity of machined components is defined by several characteristics, of which residual stress is extremely important. Residual stress is known to have an effect on critical mechanical properties such as fatigue life, corrosion cracking resistance, and dimensional tolerance of machined components. Among the factors that affect residua...
Article
Full-text available
To establish any mobile network system, the basic task is to foresee the coverage of the proposed system in general. Many such different approaches have been developed, over the past, to predict coverage using what are known as propagation models. In this paper, measurement based path loss example and shadowing parameters are applied on path loss m...
Conference Paper
Adaptive Viterbi decoder is used for decoding codes of long constraint length, where as viterbi decoder is used for decoding short constraint lengths. In order to minimize power consumption and BER, we have implemented FastRadix 2 ACS in Viterbi decoder and Adaptive Viterbi decoder. The area consumption was more in Viterbi compared to Adaptive Vite...
Chapter
This paper presents a comprehensive computational model for the prediction of the transient Electroslag Remelting (ESR) process for cylindrical ingots based on axisymmetric two-dimensional analysis. The model analyzes the behavior of the slag and growing ingot during the entire ESR process involving a hot-slag start with an initial transient, near-...
Article
Full-text available
In this paper, a supervised approach for word sense disambiguation using neural network with minimal feature sets was implemented. Three different networks represented with one hidden layer in which the hidden neurons ranging from 5 to 20 with the increase of 5 neurons at a time are constructed for disambiguation. Disambiguation is tried with minim...
Article
Designing a cost effective, fault tolerant survivable network, with optimal number of links is of prime importance, especially in the design of adhoc network topologies. Several methods have been proposed in literature for the same. However, the performances of the different methods vary according to the required connectivity and the number of node...
Article
A model to predict residual stresses produced from milling is presented. It uses process conditions as inputs and predicts surface and subsurface residual stress profiles due to milling. The model formulation incorporates cutting force and cutting temperature predictions and utilizes those parameters to define the thermomechanical loading experienc...
Article
In this paper, the performance of case based word sense disambiguation attained by two different set of knowledge features, such as bigram and trigram are analyzed for identifying the best for word sense disambiguation. To uncover the ambiguous of a word, so many knowledge features like part of features (PoS), collocation, bag of words, noun-verb r...
Article
In general, different levels of knowledge are used for disambiguation. In this paper, only three knowledge features or sources (trigram) are used to achieve the word sense disambiguation. Case based approach is applied for the disambiguation process. Cases are nothing but the refined form of words collected from Semcor, used for deriving the sense...
Article
Full-text available
A significant proportion of the urban population depends on public transport for their daily commute. The use of paper tickets in public transport is a prevalent practice. However, this system has its own drawbacks; the entire responsibility of distributing the tickets and handling money transactions is that of the ticket distributor. Further, pape...
Article
Adaptive viterbi decoder is used for decoding codes of long constraint length, Where as viterbi decoder is used for decoding short constraint lengths. In order to minimize power consumption and BER, we have implemented Radix 2 ACS in viterbi decoder and Adaptive Viterbi decoder. The area consumption was less in viterbi compared to Adaptive Viterbi...
Article
Viterbi decoding is an optimal algorithm for decoding convolutional code in maximal likelihood sense. Its main drawback is that the decoding complexity grows exponentially with the code length. So, it can be utilized only for relatively short codes. In order to minimize power consumption and minimize BER, experimental calculations indicate that the...
Article
Full-text available
The objective of our paper is to predict the chances of diabetic patient getting heart disease. In this study, we are applying Naïve Bayes data mining classifier technique which produces an optimal prediction model using minimum training set. Data mining is the analysis step of the Knowledge Discovery in Databases process (KDD). Data mining involve...
Article
Finite element modeling of the machining process has been quite successful in recent years. The model can be used to better understand the interactions between chip flow, heat generation, residual stress, tool stress, tool wear, tool chatter and dimensional accuracy. One of the key inputs to the model is the high strain rate (>10(4) 1/sec) flow str...
Chapter
Volume 22B describes the methods, models, and tools used to simulate manufacturing processes and predict the microstructure and mechanical properties of metals and metal parts. It covers a wide range of processes from melting, casting, and solidification to heat treating, welding, and machining. It also addresses powder metallurgy, additive manufac...
Article
Full-text available
Schema matching is the task of finding semantic correspondences between elements of two schemas. It takes two schemas as input and returns a mapping that identifies corresponding elements in the two schemas. Schema matching is an important and vital step in many schema and data translation and integration applications, such as integration of web da...
Article
Full-text available
The insertion of new materials into aircraft systems takes several years and many millions of dollars. Experimental trials to define the manufacturing process to meet the specifications can add significant time and cost. Many military programs have small lot production in either initial engine development programs or specialized production, providi...
Article
Full-text available
Survivability of a computer communication network is the ability of a network to provide continuous service in the presence of link or node failures. It is an essential and considerable concern in the design of high speed communication network topologies. The connectivity number of a network is the graph theoretical metric to measure survivability...
Article
Full-text available
In the era of information society, computer networks and their related applications are the emerging technologies. Network Intrusion Detection aims at distinguishing the behavior of the network. As the network attacks have increased in huge numbers over the past few years, Intrusion Detection System (IDS) is increasingly becoming a critical compone...
Article
Full-text available
Schema matching, finding semantic correspondences between elements of two schemas, is an essential activity in many application domains such as data mining, data warehousing, web data integration, and XML message mapping. In this paper, a decision tree based approach is presented to match the similarity between two XML schemas. Experimental results...
Article
The topological design of a computer communication network assigns the links and link capacities for connecting network nodes within several constraints, with a goal to achieve a specified performance at a minimal cost. A reasonable approach is to generate a potential network topology. This paper presents a spanning tree based method for systematic...
Article
A good computer network is hard to disrupt. It is desired that the computer communication network remains connected even when some of the links or nodes fail. Since the communication links are expensive, one wants to achieve these goals with fewer links. The computer communication network is fault tolerant if it has alternative paths between vertic...
Article
The approach proposed in this study uses a simple path matching algorithm to perform the structural matching. The novelty in this approach is that the path matching algorithm considers only the paths to leaf nodes in the schema trees for the matching process there by eliminating the need for repeatedly parsing the elements of the schema tree as in...
Article
This paper presents design and architecture of real time web-centric tele health diabetes diagnosis expert system. Diabetes is the single most important metabolic disease, which can affect nearly every organ system in the body. It has been projected that 300 million individuals would be afflicted with diabetes by the year 2025. However, access to m...
Article
Next Generation Wireless Networks demand for 'anywhere and anytime' access to high-speed data for real and non-real time multimedia services. Providing seamless handoff between different wireless access networks plays a vital role. In this paper, we propose a new handoff mechanism based on the information from the physical layer, data link layer, n...
Article
Full-text available
This paper presents design and development of a portable cardiac telemedicine system that continuously acquires ECG signals from high-risk cardiac patients who can move around anywhere by a mobile phone using blue tooth technology. Mobile phone has an in built analyzer to detect abnormality. In case of panic, mobile phone automatically initiates an...
Article
The link deficit algorithm proposed by Steigletiz, Weiner and Kletman is a heuristic to generate a potential network topology. This heuristic begins by numbering the nodes at random. If the nodes are numbered in a systematic manner, the link deficit algorithm yields a starting network which needs relatively lesser amount of perturbation before an a...
Conference Paper
This paper presents the design of a real-time web centric intelligent health care diagnosis system using unified modeling language (UML) to support diabetes diagnosis. Using this expressive language we are addressing all the views needed to develop real time web centric intelligent health care diagnostic system. UML which is a standard language for...
Conference Paper
This paper presents visualization and construction of a real-time web centric intelligent health care diagnosis system using Unified Modeling Language(UML) to support diabetes diagnosis. Using this expressive language we are addressing all the views needed to develop real time web centric intelligent health care diagnostic system. UML which is a st...
Article
In this study, we propose a new technique based on the information from the Data Link Layer and Network Layer, which reduces the handoff delay and improves the TCP Performance in integrated wireless networks. The Candidate Access Route Discovery (CARD) Protocol is used to identify the Neighbor Routers during handover. The proposed technique is deve...
Article
Full-text available
We propose a medical network based on a state-of-the-art medical kiosk that addresses the problems of providing preventive and diagnostic healthcare. This paper presents a web-centric diabetic expert system kiosk that is similar to a bank ATM. The patients can directly enter and can be screened for diabetes, with all the necessary tests that are fu...
Article
Arrhythmias are disorders of the regular rhythmic beating of the heart. They may indicate a serious problem and lead to heart disease, stroke or sudden cardiac death. The aim of the research reported in this paper is to design and implement a portable monitoring and alerting telemedicine system for cardiac patients. Apart from conventional monitori...
Article
Undoubtedly, blindness is a major trauma, which affects an individual not only physically but also emotionally. There are approximately 46 million visually impaired people throughout the world. It is becoming a global problem. In India alone, 19 million people are totally blind or else have visual defects. Out of this 19 million, 15 million reside...
Conference Paper
The goal of topological design of a K-Connected wireless communication network is to achieve a specified performance at minimal cost and delay. Unfortunately, the problem is complexity intractable Steiglitz, Winner and Klietman have presented an optimal algorithm for generating a potential network topology. In this paper we present first, an optima...
Article
Cardiovascular disease is the world's leading killer disease, accounting for 16.7 million deaths annually. About 22 million people all over the world run the risk of sudden heart failure. However, deaths from cardiovascular diseases have decreased substantially over the past two decades, largely as a result of advances in acute care and cardiac sur...
Article
Full-text available
The goal of topological design of a computer communication network is to achieve a specified performance at a minimal cost. Unfortunately, the problem is completely intractable. A reasonable approach is to generate a potential network topology. One such heuristic for generating a potential network topology is due to Steiglitz, Weiner and Kleitman a...
Article
The often found problem in the Intensive Care Unit (ICU) of Hospitals is that the physician is unable to be there all the time with patient monitoring equipment to monitor individual patient`s biomedical parameters. Also, the nurses in charge of ICU have to be on constant move from patient to patient to monitor the vital parameters. This study prop...
Article
Rotating components of aircraft engines are generally manufactured by forging followed by heat treatment. Due to the residual stresses induced during heat treatment, components often distort when material is removed during machining to the final shape. Using trial-and-error approaches, it can be very difficult to develop a sequence of machining ope...
Conference Paper
This paper addresses one of the important aspects of the turbine disk forging process — the design of die geometry to achieve near-net-shape forging. The problem is formulated as a parametric geometry and high-fidelity analysis based optimization problem. The forging weight is minimized within prescribed processing windows and forging rules includi...
Conference Paper
The design and manufacturing process for engine disk is multidisciplinary and highly iterative in nature. An accurate simulation of the manufacturing process is necessary in order to close the design loop. An integrated procedure, which is the ultimate goal of this research, does not exist, and opportunities for optimization of the individual steps...
Article
The goal of the topological design of a Computer Communication Network is to achieve a specified performance at a minimal cost. Unfortunately, the problem is completely intractable. A reasonable approach is to generate a potential network topology. One heuristic for generating a potential network topology is due to Steiglitz, Weiner and Kleitman. T...
Article
A steady-state approximation for the analysis of radial forging is presented. The approximation is used with the finite element method for 3-D analysis to determine billet temperatures and deformations during forging.
Article
Two major finite element analysis methods (FEMs) are now in use in forging design. One analyzes plastic deformation (metal flow during forgings), and the other examines the heat treatment process. ALPID (Analysis of Large Plastic Incremental Deformation) is a program which examines two-dimensional geometries of visco-plastic materials. The program...
Article
Full-text available
The topological design of a network assigns the links and link capacities for connecting the network nodes. This is a critical phase of network synthesis, partly because the routing, flow control and other behavioral design algorithms rest largely on the given network topology. The goal of the topological design of a computer communication network...
Article
Optimal features refer about achieving best accuracy with minimum features. In this paper, optimal features are used for word sense disambiguation using case based approach. Disambiguation is tried with two (bigram) and three (trigram) and four (n-gram) features. Feature size of input (ambiguous word) and cases are taken as two for bigram three for...
Article
From the transition of PSTN telephone communication services where data is sent as transmission medium; then came the voice combined with data as VoIP technology for communication transmission keeping the cost effectiveness in concern[1]. As trend changes which is part and parcel of technology advent, today we are in migration from voice communicat...

Network

Cited By