V. N. Kamalesh

V. N. Kamalesh
Madhav university · computer science & enginering

Master of Technology

About

26
Publications
3,182
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
114
Citations

Publications

Publications (26)
Article
Full-text available
In this work, the proposed comprehensive study sheds light on social computing in e-democratic systems. The social computing platforms and the need for digital based democratic process are thoroughly explained in this work. The significant contribution of our study is depicted in the three stages such as observations, challenges and solutions. Firs...
Article
Full-text available
— Face mask detection system is recently gained a wider interest from the computer vision research community after the COVID-19 outbreak. As highlighted in the literature, so far a considerably small amount of research is conducted to detect mask over face. Hence, our research contribution aims to a build a technique that can accurately detect mask...
Article
Full-text available
This paper has revealed the benefits of multi interval features in the field of gait recognition. For each normalized silhouette, the outer contour is constructed by considering only the leftmost and rightmost pixels. Then, distance vector is generated by computing distances between the leftmost and rightmost pixels. The same technique is applied t...
Article
Full-text available
This paper has demonstrated the merits of 2D histogram in the field of gait biometric recognition. In this paper, a new gait representation method i.e. local transitional energy image (LTEI) is proposed in order to capture the spatio temporal characteristics for an individual. LTEI is obtained by averaging all backward and forward frame difference...
Research
Full-text available
This paper proposed a new part based representation to address the gait covariate factors especially clothing condition, since clothing may hide the dynamics of human body parts. Based on this observation, firstly GEI (i.e. Gait Energy Image) is split into three robust parts such as HeadEI (Head Energy Image), HandEI (Hand Energy Image) and FEI (Fo...
Article
Full-text available
This paper explored a new part based gait recognition method to address the gait covariate factors. Firstly, three robust parts such as vertical-half, head, and lower leg are cropped from the Gait Energy Image (GEI). Since, these selected parts are not affected by the major gait covariates than other parts. Then, Radon transform is applied to each...
Article
Full-text available
p>The rapid continuous growth of communication networks in size, complexity and dependencies, makes them extremely challenging to maintain the survivability of the complete large network. The complexity may be due to advance voice and video services like IP TVs, IP telephony, video streaming which demands high reliability and survivability. Network...
Chapter
Full-text available
This paper has demonstrated a simple and robust interval type features based gait recognition approach. For each an individual, first gait energy image (GEI) is generated. Next, gradient matrices are obtained based on the neighborhood gradient computational procedures (i.e., horizontal/vertical, opposite, and diagonal pixels). Then, multi-interval...
Article
Full-text available
The key challenges while designing a communication network structures and critical network topologies is to take accounts of aspects related to failures. Over years efforts are being made for constructing quality fault tolerance network structures. The performance of a network application depends on the stability and survivability of underlined int...
Research
Full-text available
In this paper, firstly the human skeleton is extracted from the each silhouette of an individual. Then, skeleton energy image (SkGEI) is obtained by averaging the sequence of skeletons. Further, HOG features (Histogram of Oriented Gradients) are obtained from the skeleton energy image. Finally, a simple KNN (K-Nearest Neighbor) classifier is used f...
Chapter
In current technological development on the design of wireless communication network, it is observed that one of the critical issues is dependable network. The dependable network encompasses the properties like availability, reliability and survivability. The wireless networks are more complicated with problems such as allocation of frequencies, se...
Article
Background: One of the key considerations in the topological design of a network is the fault tolerance and survivability of the network topology. A deterministic measure for fault tolerance proposed by computer scientist and researchers is the k-node connectivity number of the network graph. Fault may happen at the physical level or at the softwar...
Article
Background: Gait uniquely distinguishes the persons by using their physiological and psychological state. For this reason, human gait recognition at a distance recently gained wider interest from research community. In recent days, the concept of fusion based biometric systems has attracted many researchers and it is proved that gait can be valuabl...
Article
Designing a cost effective, fault tolerant survivable network, with optimal number of links is of prime importance, especially in the design of adhoc network topologies. Several methods have been proposed in literature for the same. However, the performances of the different methods vary according to the required connectivity and the number of node...
Article
Full-text available
A significant proportion of the urban population depends on public transport for their daily commute. The use of paper tickets in public transport is a prevalent practice. However, this system has its own drawbacks; the entire responsibility of distributing the tickets and handling money transactions is that of the ticket distributor. Further, pape...
Article
Cloud computing is the provision of providing dynamically scalable and often virtualized resources as a service over the Internet. It is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort and cloud provider interac...
Article
Full-text available
Survivability of a computer communication network is the ability of a network to provide continuous service in the presence of link or node failures. It is an essential and considerable concern in the design of high speed communication network topologies. The connectivity number of a network is the graph theoretical metric to measure survivability...
Article
The topological design of a computer communication network assigns the links and link capacities for connecting network nodes within several constraints, with a goal to achieve a specified performance at a minimal cost. A reasonable approach is to generate a potential network topology. This paper presents a spanning tree based method for systematic...
Article
A good computer network is hard to disrupt. It is desired that the computer communication network remains connected even when some of the links or nodes fail. Since the communication links are expensive, one wants to achieve these goals with fewer links. The computer communication network is fault tolerant if it has alternative paths between vertic...
Article
The link deficit algorithm proposed by Steigletiz, Weiner and Kletman is a heuristic to generate a potential network topology. This heuristic begins by numbering the nodes at random. If the nodes are numbered in a systematic manner, the link deficit algorithm yields a starting network which needs relatively lesser amount of perturbation before an a...
Article
Full-text available
The topological design of a network assigns the links and link capacities for connecting the network nodes. This is a critical phase of network synthesis, partly because the routing, flow control and other behavioral design algorithms rest largely on the given network topology. The goal of the topological design of a computer communication network...

Network

Cited By