Manoj Kumar Kandala’s research while affiliated with Sri Venkateswara College of Engineering and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (6)


Fig.1: Training sample from IAM-OnDB
Synthesizing and Imitating Handwriting Using Deep Recurrent Neural Networks and Mixture Density Networks
  • Conference Paper
  • Full-text available

October 2018

·

3,586 Reads

·

20 Citations

Manoj Kumar Kandala

·

·

N Sudhakar Reddy

Handwriting is a skill developed by humans from the very early stage in the order to represent his/her thoughts visually using letters and making meaningful words and sentences. Every person improves this skill by practicing and develops his/her own style of writing. Because of the distinctiveness of handwriting style, it is frequently used as a measure to identify a forgery. Even though the applications of synthesizing of handwriting is less, this problem can be generalized and can be functionally applied to other more practical problems. Synthesizing the handwriting is a quite complicated task to achieve. Deep recurrent neural networks specifically Deep LSTM cells can be used along with a Mixture Density Network to generate artificial handwriting data. But using this model we can only generate random handwriting styles which are being hallucinated by the model. Mimicking a specific handwriting style is not so efficient with this model. Mimicking or imitating a specific handwriting style can have an extensive variety of applications like generating personalized handwritten documents, editing a handwritten document by using the similar handwriting style and also it is extended to compare handwriting styles to identify a forgery. A web prototype is developed along with the model to test the results where the user can enter the text input and select handwriting style to be used. And the application will return the handwritten document containing input text mimicking the selected handwriting style. The application will also provide a way to fine-tune the handwriting styles by changing few parameters.

Download


Table 1 . List of properties in the Chrome History API
A Framework to Collect and Visualize User’s Browser History for Better User Experience and Personalized Recommendations

August 2017

·

1,064 Reads

·

12 Citations

Smart Innovation

In all the modern browsers, maintaining user’s web history is one of the primary tasks. Browser history will help to summarize the activity of the user during a certain period. However, current browser history is not so efficient to visualize in a user-friendly manner and also doesn’t provide enough information for personalized recommendations. One of the key reason is that browsers never maintain any inter-connection between history items. Overall history is maintained in a linear fashion with no information about how the user reached to a particular state. Another issue is that it is not possible to calculate how much time the user spent on any particular website using current history system. This paper provides a conceptual idea of solving these issues by providing a framework that solves this issue by introducing linked data and also describes how this can benefit in improving user experience and quality of recommendations.


Users’ Privacy Conservation Techniques in Search Portals: Does the Search Engine Know You?

December 2016

·

155 Reads

This book deals about the privacy concerns facing by the users in web search engines. Now-a-Days, Privacy is a major constraint in internet. Different Techniques for preserving the user's privacy is demonstrated and briefly explained in this book. Research methodologies related to enhancing privacy are introduced. Those concepts are very good reference for researchers and students who are working on search engines.


Fig 1: Structural Representation of Projected Approach  
Table 1 .1 Overall hospital management sample table.
Review on Cost Effective and Dynamic Security Provision Strategy of Staging Data items in Cloud

November 2016

·

1,008 Reads

·

18 Citations

Research Journal of Pharmaceutical Biological and Chemical Sciences

Cloud computing is a thriving technology that relies on sharing computing resources rather than having a local server in order to handle the application. Cloud usually uses the phrase of " pay as you go " to describe its functionality. The security issue is the major concern in data interchange since the entire user cannot pertain to access all the data from the server. In this paper, Cost Effective and dynamic Security Provision strategy of Staging Data items in the cloud has been proposed. The concept of utilizing staging data items rather than direct cloud access is taken as the core idea to reduce the cost of utilization as well as the concept of Anonymization is discussed that reduces the size of data utilization and behaves as the security provision strategy according to the severity of the data to per users. The effective check taken in the projected approach is a flow time monitoring to provide the cost reduction and security enhancing scheme in a dynamic way.


Preserving User's Privacy in Personalized Search

December 2014

·

512 Reads

·

27 Citations

International Journal of Applied Engineering Research

Personalized web search (PWS) has incontestable its effectiveness in rising the standard of assorted search services on the web. However, evidences show that users' reluctance to disclose their non-public data throughout search has become a significant barrier for the wide proliferation of PWS. Having a tendency to study privacy protection in PWS applications that model user preferences as hierarchic user profiles and also tendency to propose a PWS framework referred to as UPS which will adaptively generalize profiles by queries whereas respecting user specified privacy needs. Runtime generalization aims at gaining a balance between 2 prophetical metrics that appraise the utility of personalization and also the privacy risk of exposing the generalized profile. Having a tendency to gift 2 greedy algorithms, specifically Greedy IL for runtime generalization.It will also conjointly give a web prediction mechanism for deciding whether or not personalizing a question is helpful.MD5 Algorithm is used for generating a unique identity & it is stored in the records instead of user sensitive data. Privacy can be obtained without revealing user profile.

Citations (4)


... In the literature many algorithms were proposed for the generation of synthetic handwriting and they can be grouped in two different families: template-based approaches [7,6,12] and learning-based approaches [10,16,17]. The main difference between these two methodologies is that template-based approaches generate synthetic samples by perturbing real samples while learning-based approaches train neural networks to build a high-dimensional interpolation between training examples that will be used to generate synthetic samples. ...

Reference:

Generation of Synthetic Drawing Samples to Diagnose Parkinson’s Disease
Synthesizing and Imitating Handwriting Using Deep Recurrent Neural Networks and Mixture Density Networks

... This could be due to several major reasons, including but not limited to: 1) additional external requirements, constraints, or user feedback are discovered or introduced in the middle of a project which significantly complicates the original decision making problem [23,30,31]; 2) developers discover many more options, criteria, and their trade-offs than they anticipated at the beginning [81]; and/or 3) developers are required to explain or document their decisions and design rationale after the fact for the long-term maintainability and success of a software project [25,39,75,76,79,104,112]. In these situations, it is hard and involves duplicate work for developers to recall and retrace their steps for reaching their current state of sensemaking (the linear history visualization in almost all current browsers is known to be not particularly effective [16,67,124]) and recollect all the relevant evidence again. ...

A Framework to Collect and Visualize User’s Browser History for Better User Experience and Personalized Recommendations

Smart Innovation

... The way in which Harr cascade works is they begin by scanning the image from top left pixel to the bottom right corner of the image. The procedure is repeated many times [12]. In every iteration we get some results which are amplified in the next round but the overall results are compiled altogether when the features have to be submitted [13]. ...

Review on Cost Effective and Dynamic Security Provision Strategy of Staging Data items in Cloud

Research Journal of Pharmaceutical Biological and Chemical Sciences

... The key problem area in this field are multi-pose images and images with occlusion problems [5]. The solution of these a fore mentioned problems has been given in a part to part solution, for example, the solution implementing a part CNN for piece by piece facial detection implementation and then using a Bilinear CNN to combine the above part-solutions [7]. ...

Preserving User's Privacy in Personalized Search
  • Citing Article
  • December 2014

International Journal of Applied Engineering Research