- IoT-based Smart Home Systems
- IoT and GPS-based Vehicle Safety Systems
- Augmented Reality Applications
- Industrial Vision Systems and Defect Detection
- Autonomous Vehicle Technology and Safety
- Fire Detection and Safety Systems
- Context-Aware Activity Recognition Systems
- Image Retrieval and Classification Techniques
- IoT and Edge/Fog Computing
- Parallel Computing and Optimization Techniques
- Smart Agriculture and AI
- Robotics and Automated Systems
- Neural Networks and Applications
- Cloud Computing and Resource Management
- Anomaly Detection Techniques and Applications
- Distributed and Parallel Computing Systems
- Computational Physics and Python Applications
- Smart Grid Energy Management
- Water Quality Monitoring Technologies
- Sensor Technology and Measurement Systems
- Digital Media Forensic Detection
- Traffic Prediction and Management Techniques
- Advanced Image and Video Retrieval Techniques
- User Authentication and Security Systems
- Traffic control and management
Intel (India)
2022-2024
Amrita Vishwa Vidyapeetham
2013-2023
KPR Institute of Engineering and Technology
2023
PRIST University
2013-2015
Thiagarajar College of Engineering
2014
Vellore Institute of Technology University
2009-2011
University of Illinois Urbana-Champaign
2011
College of Applied Sciences, Nizwa
2010
University of Massachusetts Amherst
2002
In the cloud computing paradigm, load balancing is one of challenges, With Tremendous increase in users and their demand different services on platform, fruitful or efficient usage resources environment became a critical concern. Load playing vital role maintaining rhythm Cloud computing. The performance metrics algorithms are response time waiting time. this paper we mainly focus two cloud, Min-Min Max-Min algorithm.
In this paper we consider the problem of key management in a highly-mobile wireless networking environment, such as dynamic, distributed setting which command and control nodes move along with individual users. scenario, data must be securely multicast from one source to many users, requiring that users properly keyed. Furthermore, because out session (due mobility, attrition, reinforcement), order preserve confidentiality, it becomes necessary rekey each time user enters or leaves. We...
We present HYBRO, an automatic methodology to generate high coverage input vectors for Register Transfer Level (RTL) designs based on branch-coverage directed approach. HYBRO uses dynamic simulation data and static analysis of RTL control flow graphs (CFGs). A concrete is applied over a fixed number cycles. Instrumented code records the branches covered. The corresponding symbolic trace extracted from CFG with execution engine. guard in expression mutated. If mutated has dependent that have...
ChatGPT uses a generative pretrained transformer neural network model, which is under the larger umbrella of models. One major boom after advent prompt engineering, most critical part that utilizes Large Language Models (LLM) and helps provide desired outputs based on style tone interactions carried out with it. Reinforcement learning from human feedback (RLHF) was used as aspect for fine-tuning LLM-based This work proposes selection strategy incorporated in RLHF process to prevent...
Background/Objectives: This paper focus on the necessity of intelligent traffic system and peculiar way implementation with embedded tools. Here it is implemented using an object counting methods detection emergency vehicles simultaneously thereby control signals based priority outcome. Methods/Statistical analysis: Presently various do provide a cost effective solution, but rate successful operation bad. Inductive loop detectors installed under surface, this fails in case poor road...
A brain tumour is a malignant condition that spreads extremely quickly and requires rapid detection. In recent years, it has become apparent deep learning promising technique for classifying tumours. To identify these tumours, this work proposes hybrid CNN architecture, implementing InceptionV3, ResNet-50, VGG16, DenseNet. evaluate approach, total of 3929 images was obtained from Kaggle, including 2556 non-tumorigenic 1373 tumorigenic specimens. Initially, the method extracts features MRI...
Background/Objectives: This paper focus on the necessity of automated street light system and peculiar way implementation with embedded tools. As automation booming in industry a fast pace, requirement replacing primitive operation lights quite intelligence is necessary. Methods/Statistical Analysis: The previous systems were implemented LDR IR sensors, here presence movementin roads are sensed by sensors powers only after evening. excess use energy involved above reduced our prototype. Here...
The biggest threat in the data transfer is through any medium is, chance for it being hacked.Any information, these days are hackable.So utmost care has to be taken communication done, particular, if confidential.The so claimed most sheltered have also been hacked nowadays.The digital watermarking a widely used method information hiding authenticate as well secure content an image.This paper describes hybrid technique embed secret message into image using visual cryptography and...
Abstract Sudden, unprecedented electric blackouts and outages come as a dampener for system that thrives on electrical energy. Reliability efficiency are essential features any power grid system. The conventional systems incapable of making use real-time information from consumer side well the supply end more efficient transmission. Smart system, in which tremendous research has been done improvised manifold over past decade, helps meeting incessant fluctuations demand huge population....
We present a methodology to generate input stimulus for design validation using GoldMine, an automatic assertion generation engine that uses data mining and formal verification. GoldMine mines the simulation traces of behavioral Register Transfer Level (RTL) decision tree based learning algorithm produce candidate assertions. These assertions are passed verification engine. If is false, counterexample trace generated. In this work, we feed these iteratively refine original data. introduce...
Background/Objective: The Indian automobile market has seen a drastic change in its trends over the past decade with several road commuters opting for mid-range sedans and SUVs, owing to safety features of cars that two-wheelers can never provide. At times, driver is not fully aware his surroundings, leading inconveniences compromises on safety. Methods/Statistical Analysis: This problem facets it. Blocked vision due large vehicle front major hassle persists especially during heavy traffic,...
Crimes in the modern world have been increasing dramatically proportion with technological growth. In many situations, investigators a sketch of criminal, generated from details given by eye witnesses. There is need better methodology for identifying culprits those images. Nowadays, RAM and memory sizes become huge turn, there tremendous increase size databases. Investigators datasets details, photographs, images criminals or crime scenes this second important consideration. Image search has...