T. Venkat Narayana RaoSreenidhi Institute of Science & Technology | SNIST · Department of Computer Science & Engineering
T. Venkat Narayana Rao
B.E M.Tech MBA Ph D
About
24
Publications
7,283
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
77
Citations
Introduction
Skills and Expertise
Publications
Publications (24)
The performance of Vision-and-Language Pre-training (VLP) on several coupled vision-and-languagedownstream tasks has been demonstrated. VLP techniques currently rely largely on picture featureextraction processes, the majority of which require region supervision (e.g., object detection) and theconvolutional architecture (e.g., ResNet). Although it...
IoT has opened a huge portal of possibilities where every gadget or thing can be connected on the internet to participate in data exchange. Presently, it is used across a wide spectrum of applications like irrigation and other agricultural activities, retail, healthcare, smart vehicles, and so on. IoT has encountered several drawbacks in terms of s...
As the days pass, the amount of work to do increases day by day, so there is a considerable need to automate the work. This necessity has led to the invention of a new technology named Artificial Intelligence. Artificial Intelligence or Machine Intelligence is a branch of science that deals with a machine'ss ability to learn, understand, think, and...
In the modern era, digital communications play a vital role. For an elementary security, encryption is preventing a huge number of problems. When a data is passed through many number of nodes, we don’t know what vulnerability is present at each node. Our data may be affected. GPG encryption is a tool for encrypting emails, digital materials. It use...
In the recent era as the technology is growing rapidly, the use of internet has grown at an exponential rate. The growth has started increasing in between the years 1995-2000.The success of internet has brought great change to the world as we know; however, the problems are common as an obstacle to every productive growth. As the thousands of sites...
In the recent era, as technology is growing rapidly the usage of social media is also increasing as a result large databases are required for storing the images. With the advancements in the technology, the storage of these images in computers has become possible. But retrieving the images is becoming a big task. We need to store them in a sequenti...
Personalized learning refers to a variety of instructional methods, academic support strategies, and educational programs that are proposed to address specific interests and learning needs of the students. The key goal of integrating technology with personalized learning is to have students progress from high school to college or a career. But curr...
Web usage mining attempts to discover useful knowledge from the secondary data obtained from the interactions of the users with the Web. It is the type of Web mining activity that involves the automatic discovery of out what users are looking for on the Internet. In this chapter methodology of web usage mining explained in detail which are data col...
Background: Worldwide and across India breast cancer is the most common cause of cancer deaths in women. Early or timely detection leads to decrease in the mortality rate. Hence, classification of patients based on the size of the tumor/abnormal masses and less treatment cost must be high priority. Methods/Statistical Analysis: In this paper mammog...
Edge detection is the most important feature of image processing for object detection, it is crucial to have a good understanding of edge detection algorithms/operators. Computer vision is rapidly expanding field that depends on the capability to perform faster segments and thus to classify and infer images. Segmentation is central to the successfu...
Abstract- The process of data acquisition gained momentum due to the efficient representation of storage/retrieving systems. Due to the commercial and application value of these stored data, Database Management has become essential for the reasons like consistency and atomicity in giving birth to DBMS. The existing database management systems canno...
This paper proposes a reversible data hiding mechanism based on multiresolution analysis with difference expansion algorithm. Based on the multiresolution analysis of an image, gradient information of crude original image is exploited to select proper embedding areas. Adaptively embedding method based on Difference Expansion Algorithm is proposed t...
This paper, discuss the features and concepts pertaining to the three popular visible reversible watermarking algorithms and analyze them to evaluate with metrics such as MSE and PSNR values based on implementation i.e. a) Wavelet based watermarking technique b) Tian's difference expansion technique c) LSB-prediction error expansion technique. It i...
RADIUS (Remote Authentication Dial in User Service) is a protocol used for authentication, authorization and accounting of network objects in networking environment. The protocol has set of weaknesses due to its implementation. First the overview presents the basic operation and functioning of RADIUS protocol. Then analysis part focuses on Vulnerab...
In recent years, digital watermarking has been studied intensively to provide copyright protection to multimedia data including image, audio and video. While this is usually considered an improvement in everyday lifestyle, it also makes unauthorized copying and distributing of multimedia images, data much easier, therefore presenting a challenge in...
Genetic programming (GP) is an automated method for creating a working computer program from a high-level problem statement of a problem. Genetic programming starts from a high-level statement of "what needs to be done" and automatically creates a computer program to solve the problem. In artificial intelligence, genetic programming (GP) is an evol...
This paper is written using an intelligent vehicle movement monitoring system which is based on GPS and GPRS. In this system GPS information is transmitted by means of GPRS wireless network to the monitoring centre. The Monitoring Centre displays the above information on Google Map by means of Internet and sends commands to all the subsystems. This...