Prof.d.s.r. Murthy | Jawaharlal Nehru Technological University Hyderabad (original) (raw)
Uploads
Papers by Prof.d.s.r. Murthy
International Journal of Advanced Research in Computer Science, 2010
In this paper, we have devoted our attention to the study of the modular arithmetic inverse of a ... more In this paper, we have devoted our attention to the study of the modular arithmetic inverse of a rectangular matrix. Here, we have shown that (AB) mod N = I, where A is of size m x n and B is of size n x m in which m n. Keywords: Rectangular matrix, Arithmetic inverse, Modular arithmetic inverse, Block cipher, Square matrix.
International Journal of Engineering and Advanced Technology, 2019
Document summarization is the process of generating the summary of the documents gathered from th... more Document summarization is the process of generating the summary of the documents gathered from the web sources. It reduces the burden of web readers by reducing the necessity of reading the entire document contents by generating the short summary. In our previous research work this is performed by introducing the method namely Noun weight based Automated Multi-Document Summarization method (NW-AMDSM). However the previous research work doesn’t concentrate on the semantic similarity which might reduce the accuracy of the summarization outcome. This is resolved in the proposed research method by introducing the method namely Semantic Similarity based Automatic Document Summarization Method (SS-ADSM). In this research work, multi document grouping is done is based on semantic similarity computation, thus the document with similar contents can be grouped more accurately. Here the semantic similarity computation is performed with the help of word net analyzer. The document grouping is do...
Key exchange protocols enable the use of shared- key cryptography to protect transmitted data ove... more Key exchange protocols enable the use of shared- key cryptography to protect transmitted data over insecure networks. The key exchange protocols are classified into i) symmetric ii) asymmetric (public key). Many public-key-based (asymmetric) key-exchange protocols already exist and have been implemented for a variety of applications and environments. We present a general framework for authentication problems and design principles of different asymmetric key exchange protocols. The analysis of these protocols also includes merits and demerits of each protocol. The study of these protocols emphasizes various observations that can motivate researchers in key management issues of networks.
Key exchange protocols enable the use of sharedkey cryptography to protect transmitted data over ... more Key exchange protocols enable the use of sharedkey cryptography to protect transmitted data over insecure networks. The key exchange protocols are classified into i) symmetric ii) asymmetric (public key). Many public-key-based (asymmetric) key-exchange protocols already exist and have been implemented for a variety of applications and environments. We present a general framework for authentication problems and design principles of different asymmetric key exchange protocols. The analysis of these protocols also includes merits and demerits of each protocol. The study of these protocols emphasizes various observations that can motivate researchers in key management issues of networks.
International Journal of Computer Sciences and Engineering
Recent Patents on Computer Science
: Text summarization is the process of generating the short description about the entire document... more : Text summarization is the process of generating the short description about the entire documents which is more difficult to read. This method provides the convenient way of extracting the most useful information and short summary about the documents. This is focused in the existing research work by introducing the Fuzzy Rule based Automated Summarization Method (FRASM). The existing ensures the accurate text summarization outcome which is better than other summarization technique. However, existing work tends to have various limitations which might limit its applicability to the various real world applications. The existing method is only suitable for the single document summarization where various applications such as research industries tend to summarize information from multiple documents. This focused and resolved in the proposed research method by introducing the Multi-document Automated Summarization Method (MDASM). The main contribution of the proposed work is to introduce the summarization framework which would resultant with the accurate summarized outcome from the multiple documents. In this work multi document summarization is performed whereas in the existing system single document summarization only performed. Initially document clustering is performed using modified k means cluster algorithm to group the similar kind of documents that provides the same meaning. This is identified by measuring the frequent term measurement. After clustering, pre-processing is performed by introducing the Hybrid TF-IDF and Singular value decomposition technique which would eliminate the irrelevant content and would resultant with the required content. And then sentence measurement is done by introducing the additional metrics namely Title measurement in addition to the existing work metrics to accurately retrieve the sentences with more similarity. Finally fuzzy rule system is applied to perform text summarization. The overall evaluation of the research work is conducted in the matlab simulation environment from which it is proved that the proposed research method ensures the optimal outcome than the existing research method in terms of accurate summarization. MDASM produces 89.28% increased accuracy, 89.28% increased precision, 89.36% increased recall value and 70% increased f-measure value which performs better than FRASM.
International Journal of Computer Theory and Engineering, 2010
AbstractIn this paper, we have modified the Hill cipher by developing an iterative procedure con... more AbstractIn this paper, we have modified the Hill cipher by developing an iterative procedure consisting of three steps. In the first step, the plain text matrix is multiplied with the key matrix on one side and with its inverse on the other side. In the second step, the plain text matrix ...
Authentication plays a vital role in securing communication network between two parties.
International Journal of Advanced Research in Computer Science, 2010
In this paper, we have devoted our attention to the study of the modular arithmetic inverse of a ... more In this paper, we have devoted our attention to the study of the modular arithmetic inverse of a rectangular matrix. Here, we have shown that (AB) mod N = I, where A is of size m x n and B is of size n x m in which m n. Keywords: Rectangular matrix, Arithmetic inverse, Modular arithmetic inverse, Block cipher, Square matrix.
International Journal of Engineering and Advanced Technology, 2019
Document summarization is the process of generating the summary of the documents gathered from th... more Document summarization is the process of generating the summary of the documents gathered from the web sources. It reduces the burden of web readers by reducing the necessity of reading the entire document contents by generating the short summary. In our previous research work this is performed by introducing the method namely Noun weight based Automated Multi-Document Summarization method (NW-AMDSM). However the previous research work doesn’t concentrate on the semantic similarity which might reduce the accuracy of the summarization outcome. This is resolved in the proposed research method by introducing the method namely Semantic Similarity based Automatic Document Summarization Method (SS-ADSM). In this research work, multi document grouping is done is based on semantic similarity computation, thus the document with similar contents can be grouped more accurately. Here the semantic similarity computation is performed with the help of word net analyzer. The document grouping is do...
Key exchange protocols enable the use of shared- key cryptography to protect transmitted data ove... more Key exchange protocols enable the use of shared- key cryptography to protect transmitted data over insecure networks. The key exchange protocols are classified into i) symmetric ii) asymmetric (public key). Many public-key-based (asymmetric) key-exchange protocols already exist and have been implemented for a variety of applications and environments. We present a general framework for authentication problems and design principles of different asymmetric key exchange protocols. The analysis of these protocols also includes merits and demerits of each protocol. The study of these protocols emphasizes various observations that can motivate researchers in key management issues of networks.
Key exchange protocols enable the use of sharedkey cryptography to protect transmitted data over ... more Key exchange protocols enable the use of sharedkey cryptography to protect transmitted data over insecure networks. The key exchange protocols are classified into i) symmetric ii) asymmetric (public key). Many public-key-based (asymmetric) key-exchange protocols already exist and have been implemented for a variety of applications and environments. We present a general framework for authentication problems and design principles of different asymmetric key exchange protocols. The analysis of these protocols also includes merits and demerits of each protocol. The study of these protocols emphasizes various observations that can motivate researchers in key management issues of networks.
International Journal of Computer Sciences and Engineering
Recent Patents on Computer Science
: Text summarization is the process of generating the short description about the entire document... more : Text summarization is the process of generating the short description about the entire documents which is more difficult to read. This method provides the convenient way of extracting the most useful information and short summary about the documents. This is focused in the existing research work by introducing the Fuzzy Rule based Automated Summarization Method (FRASM). The existing ensures the accurate text summarization outcome which is better than other summarization technique. However, existing work tends to have various limitations which might limit its applicability to the various real world applications. The existing method is only suitable for the single document summarization where various applications such as research industries tend to summarize information from multiple documents. This focused and resolved in the proposed research method by introducing the Multi-document Automated Summarization Method (MDASM). The main contribution of the proposed work is to introduce the summarization framework which would resultant with the accurate summarized outcome from the multiple documents. In this work multi document summarization is performed whereas in the existing system single document summarization only performed. Initially document clustering is performed using modified k means cluster algorithm to group the similar kind of documents that provides the same meaning. This is identified by measuring the frequent term measurement. After clustering, pre-processing is performed by introducing the Hybrid TF-IDF and Singular value decomposition technique which would eliminate the irrelevant content and would resultant with the required content. And then sentence measurement is done by introducing the additional metrics namely Title measurement in addition to the existing work metrics to accurately retrieve the sentences with more similarity. Finally fuzzy rule system is applied to perform text summarization. The overall evaluation of the research work is conducted in the matlab simulation environment from which it is proved that the proposed research method ensures the optimal outcome than the existing research method in terms of accurate summarization. MDASM produces 89.28% increased accuracy, 89.28% increased precision, 89.36% increased recall value and 70% increased f-measure value which performs better than FRASM.
International Journal of Computer Theory and Engineering, 2010
AbstractIn this paper, we have modified the Hill cipher by developing an iterative procedure con... more AbstractIn this paper, we have modified the Hill cipher by developing an iterative procedure consisting of three steps. In the first step, the plain text matrix is multiplied with the key matrix on one side and with its inverse on the other side. In the second step, the plain text matrix ...
Authentication plays a vital role in securing communication network between two parties.