Prof.d.s.r. Murthy | Jawaharlal Nehru Technological University Hyderabad (original) (raw)

Uploads

Papers by Prof.d.s.r. Murthy

Research paper thumbnail of A study of some problems in cryptography and image processing

Research paper thumbnail of Modular Arithmetic Inverse of a Rectangular Matrix

International Journal of Advanced Research in Computer Science, 2010

In this paper, we have devoted our attention to the study of the modular arithmetic inverse of a ... more In this paper, we have devoted our attention to the study of the modular arithmetic inverse of a rectangular matrix. Here, we have shown that (AB) mod N = I, where A is of size m x n and B is of size n x m in which m n. Keywords: Rectangular matrix, Arithmetic inverse, Modular arithmetic inverse, Block cipher, Square matrix.

Research paper thumbnail of Semantic Similarity Based Automatic Document Summarization Method

International Journal of Engineering and Advanced Technology, 2019

Document summarization is the process of generating the summary of the documents gathered from th... more Document summarization is the process of generating the summary of the documents gathered from the web sources. It reduces the burden of web readers by reducing the necessity of reading the entire document contents by generating the short summary. In our previous research work this is performed by introducing the method namely Noun weight based Automated Multi-Document Summarization method (NW-AMDSM). However the previous research work doesn’t concentrate on the semantic similarity which might reduce the accuracy of the summarization outcome. This is resolved in the proposed research method by introducing the method namely Semantic Similarity based Automatic Document Summarization Method (SS-ADSM). In this research work, multi document grouping is done is based on semantic similarity computation, thus the document with similar contents can be grouped more accurately. Here the semantic similarity computation is performed with the help of word net analyzer. The document grouping is do...

Research paper thumbnail of A Study on Asymmetric Key Exchange Authentication Protocols

Key exchange protocols enable the use of shared- key cryptography to protect transmitted data ove... more Key exchange protocols enable the use of shared- key cryptography to protect transmitted data over insecure networks. The key exchange protocols are classified into i) symmetric ii) asymmetric (public key). Many public-key-based (asymmetric) key-exchange protocols already exist and have been implemented for a variety of applications and environments. We present a general framework for authentication problems and design principles of different asymmetric key exchange protocols. The analysis of these protocols also includes merits and demerits of each protocol. The study of these protocols emphasizes various observations that can motivate researchers in key management issues of networks.

Research paper thumbnail of A Study on Asymmetric Key Exchange

Key exchange protocols enable the use of sharedkey cryptography to protect transmitted data over ... more Key exchange protocols enable the use of sharedkey cryptography to protect transmitted data over insecure networks. The key exchange protocols are classified into i) symmetric ii) asymmetric (public key). Many public-key-based (asymmetric) key-exchange protocols already exist and have been implemented for a variety of applications and environments. We present a general framework for authentication problems and design principles of different asymmetric key exchange protocols. The analysis of these protocols also includes merits and demerits of each protocol. The study of these protocols emphasizes various observations that can motivate researchers in key management issues of networks.

Research paper thumbnail of Spatio-Temporal Neural Network Approach for Location Prediction State-of-the-Art, Challenges and Future Directions

International Journal of Computer Sciences and Engineering

Research paper thumbnail of An Automatic Text Summarization Method With The Concern Of Covering Complete Formation

Recent Patents on Computer Science

: Text summarization is the process of generating the short description about the entire document... more : Text summarization is the process of generating the short description about the entire documents which is more difficult to read. This method provides the convenient way of extracting the most useful information and short summary about the documents. This is focused in the existing research work by introducing the Fuzzy Rule based Automated Summarization Method (FRASM). The existing ensures the accurate text summarization outcome which is better than other summarization technique. However, existing work tends to have various limitations which might limit its applicability to the various real world applications. The existing method is only suitable for the single document summarization where various applications such as research industries tend to summarize information from multiple documents. This focused and resolved in the proposed research method by introducing the Multi-document Automated Summarization Method (MDASM). The main contribution of the proposed work is to introduce the summarization framework which would resultant with the accurate summarized outcome from the multiple documents. In this work multi document summarization is performed whereas in the existing system single document summarization only performed. Initially document clustering is performed using modified k means cluster algorithm to group the similar kind of documents that provides the same meaning. This is identified by measuring the frequent term measurement. After clustering, pre-processing is performed by introducing the Hybrid TF-IDF and Singular value decomposition technique which would eliminate the irrelevant content and would resultant with the required content. And then sentence measurement is done by introducing the additional metrics namely Title measurement in addition to the existing work metrics to accurately retrieve the sentences with more similarity. Finally fuzzy rule system is applied to perform text summarization. The overall evaluation of the research work is conducted in the matlab simulation environment from which it is proved that the proposed research method ensures the optimal outcome than the existing research method in terms of accurate summarization. MDASM produces 89.28% increased accuracy, 89.28% increased precision, 89.36% increased recall value and 70% increased f-measure value which performs better than FRASM.

Research paper thumbnail of A Block Cipher Having a Key on One Side of the Plain Text Matrix and its Inverse on the Other Side

International Journal of Computer Theory and Engineering, 2010

Abstract—In this paper, we have modified the Hill cipher by developing an iterative procedure con... more Abstract—In this paper, we have modified the Hill cipher by developing an iterative procedure consisting of three steps. In the first step, the plain text matrix is multiplied with the key matrix on one side and with its inverse on the other side. In the second step, the plain text matrix ...

Research paper thumbnail of Curriculum Vitae Academic Qualifications

Research paper thumbnail of Novel Authentication Protocol Using Multi Cryptographic Hashfunctions and Steganography

Authentication plays a vital role in securing communication network between two parties.

Research paper thumbnail of A study of some problems in cryptography and image processing

Research paper thumbnail of Modular Arithmetic Inverse of a Rectangular Matrix

International Journal of Advanced Research in Computer Science, 2010

In this paper, we have devoted our attention to the study of the modular arithmetic inverse of a ... more In this paper, we have devoted our attention to the study of the modular arithmetic inverse of a rectangular matrix. Here, we have shown that (AB) mod N = I, where A is of size m x n and B is of size n x m in which m n. Keywords: Rectangular matrix, Arithmetic inverse, Modular arithmetic inverse, Block cipher, Square matrix.

Research paper thumbnail of Semantic Similarity Based Automatic Document Summarization Method

International Journal of Engineering and Advanced Technology, 2019

Document summarization is the process of generating the summary of the documents gathered from th... more Document summarization is the process of generating the summary of the documents gathered from the web sources. It reduces the burden of web readers by reducing the necessity of reading the entire document contents by generating the short summary. In our previous research work this is performed by introducing the method namely Noun weight based Automated Multi-Document Summarization method (NW-AMDSM). However the previous research work doesn’t concentrate on the semantic similarity which might reduce the accuracy of the summarization outcome. This is resolved in the proposed research method by introducing the method namely Semantic Similarity based Automatic Document Summarization Method (SS-ADSM). In this research work, multi document grouping is done is based on semantic similarity computation, thus the document with similar contents can be grouped more accurately. Here the semantic similarity computation is performed with the help of word net analyzer. The document grouping is do...

Research paper thumbnail of A Study on Asymmetric Key Exchange Authentication Protocols

Key exchange protocols enable the use of shared- key cryptography to protect transmitted data ove... more Key exchange protocols enable the use of shared- key cryptography to protect transmitted data over insecure networks. The key exchange protocols are classified into i) symmetric ii) asymmetric (public key). Many public-key-based (asymmetric) key-exchange protocols already exist and have been implemented for a variety of applications and environments. We present a general framework for authentication problems and design principles of different asymmetric key exchange protocols. The analysis of these protocols also includes merits and demerits of each protocol. The study of these protocols emphasizes various observations that can motivate researchers in key management issues of networks.

Research paper thumbnail of A Study on Asymmetric Key Exchange

Key exchange protocols enable the use of sharedkey cryptography to protect transmitted data over ... more Key exchange protocols enable the use of sharedkey cryptography to protect transmitted data over insecure networks. The key exchange protocols are classified into i) symmetric ii) asymmetric (public key). Many public-key-based (asymmetric) key-exchange protocols already exist and have been implemented for a variety of applications and environments. We present a general framework for authentication problems and design principles of different asymmetric key exchange protocols. The analysis of these protocols also includes merits and demerits of each protocol. The study of these protocols emphasizes various observations that can motivate researchers in key management issues of networks.

Research paper thumbnail of Spatio-Temporal Neural Network Approach for Location Prediction State-of-the-Art, Challenges and Future Directions

International Journal of Computer Sciences and Engineering

Research paper thumbnail of An Automatic Text Summarization Method With The Concern Of Covering Complete Formation

Recent Patents on Computer Science

: Text summarization is the process of generating the short description about the entire document... more : Text summarization is the process of generating the short description about the entire documents which is more difficult to read. This method provides the convenient way of extracting the most useful information and short summary about the documents. This is focused in the existing research work by introducing the Fuzzy Rule based Automated Summarization Method (FRASM). The existing ensures the accurate text summarization outcome which is better than other summarization technique. However, existing work tends to have various limitations which might limit its applicability to the various real world applications. The existing method is only suitable for the single document summarization where various applications such as research industries tend to summarize information from multiple documents. This focused and resolved in the proposed research method by introducing the Multi-document Automated Summarization Method (MDASM). The main contribution of the proposed work is to introduce the summarization framework which would resultant with the accurate summarized outcome from the multiple documents. In this work multi document summarization is performed whereas in the existing system single document summarization only performed. Initially document clustering is performed using modified k means cluster algorithm to group the similar kind of documents that provides the same meaning. This is identified by measuring the frequent term measurement. After clustering, pre-processing is performed by introducing the Hybrid TF-IDF and Singular value decomposition technique which would eliminate the irrelevant content and would resultant with the required content. And then sentence measurement is done by introducing the additional metrics namely Title measurement in addition to the existing work metrics to accurately retrieve the sentences with more similarity. Finally fuzzy rule system is applied to perform text summarization. The overall evaluation of the research work is conducted in the matlab simulation environment from which it is proved that the proposed research method ensures the optimal outcome than the existing research method in terms of accurate summarization. MDASM produces 89.28% increased accuracy, 89.28% increased precision, 89.36% increased recall value and 70% increased f-measure value which performs better than FRASM.

Research paper thumbnail of A Block Cipher Having a Key on One Side of the Plain Text Matrix and its Inverse on the Other Side

International Journal of Computer Theory and Engineering, 2010

Abstract—In this paper, we have modified the Hill cipher by developing an iterative procedure con... more Abstract—In this paper, we have modified the Hill cipher by developing an iterative procedure consisting of three steps. In the first step, the plain text matrix is multiplied with the key matrix on one side and with its inverse on the other side. In the second step, the plain text matrix ...

Research paper thumbnail of Curriculum Vitae Academic Qualifications

Research paper thumbnail of Novel Authentication Protocol Using Multi Cryptographic Hashfunctions and Steganography

Authentication plays a vital role in securing communication network between two parties.