srinivas koppu - Academia.edu (original) (raw)

Papers by srinivas koppu

Research paper thumbnail of An empirical study to demonstrate that EdDSA can be used as a performance improvement alternative to ECDSA in Blockchain and IoT

Research paper thumbnail of Medicine Drug Name Detection Based Object Recognition Using Augmented Reality

Frontiers in Public Health

Augmented Reality (AR) is an innovation that empowers us in coordinating computerized data into t... more Augmented Reality (AR) is an innovation that empowers us in coordinating computerized data into the client's real-world space. It offers an advanced and progressive methodology for medicines, providing medication training. AR aids in surgery planning, and patient therapy discloses complex medical circumstances to patients and their family members. With accelerated upgrades in innovation, the ever-increasing number of medical records get accessible, which contain a lot of sensitive medical data, similar to medical substances and relations between them. To exploit the clinical texts in these data, it is important to separate significant data from these texts. Drugs, along with some kind of the fundamental clinical components, additionally should be perceived. Drug name recognition (DNR) tries to recognize drugs specified in unstructured clinical texts and order them into predefined classifications, which is utilized to deliver a connected 3D model inside the present reality client...

Research paper thumbnail of Past, present and future of gene feature selection for breast cancer classification - a survey

International Journal of Engineering Systems Modelling and Simulation

Research paper thumbnail of Quantitative performance analysis of face recognition system

2017 International Conference on Trends in Electronics and Informatics (ICEI), 2017

Face recognition system is one of the biometrics methods that are used in the variety range of ap... more Face recognition system is one of the biometrics methods that are used in the variety range of applications using the image processing techniques. Face recognition system is developed using the Mat lab environment with the procedures followed by principal component analysis and the linear discriminant analysis. The performance is measured using the time rate, distance rate, pixel values and the feature extracted resolution rate. The perfect recognition is executed when the time span around 50% and the distance rate around the 90 % And in the case of pixel and resolution, when the pixel values are increasing then, the resolution factor should also be in an increasing order. If the extracted feature contains more pixels then the resolution factor is more that relates to the quality in extracting the feature. The performance is measured using the two different software metric methods namely spearmen and Pearson metric. Then the overall measure is defined by gaining with the two metric methods. The performance is plotted using the graph to predict the rate of time and extracted feature.

Research paper thumbnail of Hand gesture recognition based on a Harris Hawks optimized Convolution Neural Network

Computers and Electrical Engineering, 2022

Research paper thumbnail of Dynamically Improved Weighted Apriori Algorithm in Market Analysis

Data mining is being used throughout the world by many industries .To face the marketing competit... more Data mining is being used throughout the world by many industries .To face the marketing competition, the marketing industry need to analyse the shopping basket of the customers to get their preferences, habits and their relationships. For this most of the industries use Apriori Algorithm, which was proposedby Agrawal, in 1993.Problem with Apriori is that all the items in the item set have same importance, but in real life it is better to have recommendations according to the relevant season, project and time. The solution was to divide the items or projects into categories and weights are given according to the no of items sold for each category. Then calculate the weighted support and confidence.

Research paper thumbnail of High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem

Journal of King Saud University - Computer and Information Sciences, 2021

Research paper thumbnail of 5368 Flame Detection in Videos Using Binarization

Detection of flame based on computational vision has visible attention in the past years. Many se... more Detection of flame based on computational vision has visible attention in the past years. Many selective features such as shape, colour, texture, etc., have been used to detect flames. The drawback to detect flames with these features are that they uses Lucas-Kanade method which is an optical flow method and it adopt flow constancy same for the adjacent pixels. This will reduce the reliability to detect flames from the videos. In this paper point-wise approach is used in which the conditions are applied to every pixel instead of continuous regions. And also this paper is not uses thermal heat fire detection method as used in classical approach. In this paper we have used binarization algorithm which provides accuracy of detecting fire flames as it very useful for detecting suspicious regions of flames in video files and also helps to eliminate background nosiness from the videos. With the first section, moving pixel’s region is calculated and differentiated from the rigid object reg...

Research paper thumbnail of 3D reconstruction of a scene from multiple 2D images

Computer vision and augmented reality industry focus on reconstructing 3D view of an object for t... more Computer vision and augmented reality industry focus on reconstructing 3D view of an object for the purpose of improvising the visual effect. There are various applications which are in need of 3D Models like street views, film industry, game industry etc. The 3D Models cannot be directly captured using video or still cameras. The cameras have the capability to acquire high quality 2D images at various angles. Our paper focuses on identifying the feature points from 2D image acquired from calibrated camera and reconstructing those features using depth analysis to obtain the 3D view of the object or image. The final obtained 3D view would be a dense reconstruction of the input 2D Image. This reconstruction methodology is less complex when compared to traditional mathematical modelling techniques. The methodology could be easily incorporated into any application domain like surveillance in the form of facial reconstruction of 3D.

Research paper thumbnail of CRYSTOGRAPHY BASED MEDICAL IMAGE SECURITY with LSB- BLOWFISH ALGORITHMS

Medical image data protection is very important as medical image sharing has increased tremendous... more Medical image data protection is very important as medical image sharing has increased tremendously. Cryptography and image steganography are two important fields that help in medical data security. The security of the medical images has always been a concern. The method proposed could be used to securely transfer the medical images over the internet. An approach is proposed to combine both concepts of steganography and cryptography together to attain various medical image security attacks. In the proposed framework, the message is embedded in the image. Blowfish algorithm is used for encryption and decryption of image. LSB algorithm is utilized to embed the message into the image. The proposed approach mainly concentrates on the confidentiality of patient information during the transfer of medical images over the internet.

Research paper thumbnail of A Comparative Study on Selecting and Ranking the Test Cases in Software Testing

Software testing is usually measured by executing the ‘n’ number of test cases and those test cas... more Software testing is usually measured by executing the ‘n’ number of test cases and those test cases has to be designed using the familiar test case design techniques. The aim of Test case design technique is to ensure the detection of typical bugs, systematic coverage and redundant testing. Executing and checking the test cases is not possible all the time in the manual testing. Therefore selecting a test case and ranking is important. The objective of the test case selection is to have a better test case from a pool of test cases and assigning the rank to each test case will leads the software asan error free and which gives a good efficiency. Ranking of test cases is especially useful if a system is a having large number of test cases. Hence selecting and ranking a test case plays an important role in the software testing. In this paper, importance of selection and ranking test cases are analysed and its methods are discussed.

Research paper thumbnail of E-RIHT: Enhanced Hybrid IP Traceback Scheme with 16-bit marking field

Internet is a worldwide network and used in almost every field of work such as industrial, educat... more Internet is a worldwide network and used in almost every field of work such as industrial, educational, military etc. Based on the use, its security needs differ. Few applications may need less security and few may need high security. Today various internet attacks are being developed every day, such as viruses, DoS (Denial of Service), spoofing, etc. Spoofing is a kind of attack in which attacker masks itself under some other user’s IP address. Thus, it is difficult to find the original attacker. IP traceback technique is used to detect the DoS attack. This paper is based on IP traceback, which will help to detect the spoofing attacker by using packet marking and packet logging technique. In packet marking technique router marks identification information of its own into the forwarded packets. In packet logging, routers keep the digest information regarding the forwarded packets. Proposed scheme is termed as E-RIHT (Enhanced Routers Interface Hybrid Traceback) in this, memory requi...

Research paper thumbnail of Detection of Enemy Intervention in Border and Battle Fields Using Smart DustTechnology

International journal of advanced research in electrical, electronics and instrumentation engineering, 2016

Terrorism it is the greatest menace to the security of our nation which is subverting through bor... more Terrorism it is the greatest menace to the security of our nation which is subverting through borders. The borders of Bangladesh and Kashmir are quite composite and also they are large, such that any armed forces or even satellites also cannot be able to monitor the intervening terrorists. To solve these sorts of problems an effective solution is provided in this paper. The main objective of this project is to design a wireless sensor mote which is like small dust and comprises of numerous sensors with a controller in it. It has the capability to sense the intervention of the enemies through the battle fields and borders. The speciality of this mote is that it can be positioned in few hours over a large area with limited persons. A Network can be formed by these motes among themselves. The networks are light in size, promptly deployable and have a wireless connection to the outside world. On board hardware comprises of various sensors and a microcontroller to route the values of the...

Research paper thumbnail of Automated category Text identification using Machine Learning

2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), 2020

Novice counselors are far more likely to maintain their own therapy interests and tend to use the... more Novice counselors are far more likely to maintain their own therapy interests and tend to use the closed issue effectively to test interpretation with instructor. While experienced therapists teach counseling skills to newbie counselors, they don't forget that a consumer's reaction to the problem of a novice therapist is essential to imagine in a suitable method. To answer the question, we've built a computer to imagine the go with the therapy communiqué flow. Nevertheless, the professional psychiatrist, as the gadget person demands a manual adjustment of the original category outcome and the painting pressure is immense, since the precision of the description of verbal communication results may be very low from the inside of the current system. To improve this issue, we have applied the class approach of text records with SVM (Support Vector System) as a system gaining knowledge of method to visualize the flow of interaction in therapy. However, we contrasted and tested...

Research paper thumbnail of Fault Control Using Triple Modular Redundancy (TMR)

Advances in Intelligent Systems and Computing, 2018

Operating Systems have been widely expanding in terms of capabilities and resources. One of the m... more Operating Systems have been widely expanding in terms of capabilities and resources. One of the many unavoidable concerns is the occurrence of a fault in the system. A fault is a violation of the existing system. A fault leads to a single or multiple failure in the system. In order to avoid this type of failure, we need to remove or control the fault. The commonly used techniques for controlling and isolating faults in the system are replication and check pointing. This paper aims to provide control over the detected fault by using the antique technique of triple modular redundancy (TMR) which is a type of N-modular redundancy techniques. Although it has the highest form of reliability, it has not been used to create a fault tolerant system. In our paper, we propose a system using the technique of triple modular redundancy to effectively mask and mitigate the detected faults to provide uninterrupted usage of the entire operating system.

Research paper thumbnail of Effects of Punica granatum L. Extracts on Serum Lipids Level in Ovariectomized Rats

Journal of Life Science, 2008

Research paper thumbnail of Fusion of Blockchain, IoT and Artificial Intelligence - A Survey

IEICE Transactions on Information and Systems, 2022

Blockchain is one of the prominent rapidly used technology in the last decade in various applicat... more Blockchain is one of the prominent rapidly used technology in the last decade in various applications. In recent years, many researchers explored the capabilities of blockchain in smart IoT to address various security challenges. Integration of IoT and blockchain solves the security problems but scalability still remains a huge challenge. To address this, various AI techniques can be applied in the blockchain IoT framework, thus providing an efficient information system. In this survey, various works pertaining to the domains which integrate AI, IoT and Blockchain has been explored. Also, this article discusses potential industrial use cases on fusion of blockchain, AI and IoT applications and its challenges.

Research paper thumbnail of Deep learning disease prediction model for use with intelligent robots

Computers & Electrical Engineering

Research paper thumbnail of An efficient image system-based grey wolf optimiser method for multimedia image security using reduced entropy-based 3D chaotic map

International Journal of Computer Aided Engineering and Technology

Research paper thumbnail of An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture

Research paper thumbnail of An empirical study to demonstrate that EdDSA can be used as a performance improvement alternative to ECDSA in Blockchain and IoT

Research paper thumbnail of Medicine Drug Name Detection Based Object Recognition Using Augmented Reality

Frontiers in Public Health

Augmented Reality (AR) is an innovation that empowers us in coordinating computerized data into t... more Augmented Reality (AR) is an innovation that empowers us in coordinating computerized data into the client's real-world space. It offers an advanced and progressive methodology for medicines, providing medication training. AR aids in surgery planning, and patient therapy discloses complex medical circumstances to patients and their family members. With accelerated upgrades in innovation, the ever-increasing number of medical records get accessible, which contain a lot of sensitive medical data, similar to medical substances and relations between them. To exploit the clinical texts in these data, it is important to separate significant data from these texts. Drugs, along with some kind of the fundamental clinical components, additionally should be perceived. Drug name recognition (DNR) tries to recognize drugs specified in unstructured clinical texts and order them into predefined classifications, which is utilized to deliver a connected 3D model inside the present reality client...

Research paper thumbnail of Past, present and future of gene feature selection for breast cancer classification - a survey

International Journal of Engineering Systems Modelling and Simulation

Research paper thumbnail of Quantitative performance analysis of face recognition system

2017 International Conference on Trends in Electronics and Informatics (ICEI), 2017

Face recognition system is one of the biometrics methods that are used in the variety range of ap... more Face recognition system is one of the biometrics methods that are used in the variety range of applications using the image processing techniques. Face recognition system is developed using the Mat lab environment with the procedures followed by principal component analysis and the linear discriminant analysis. The performance is measured using the time rate, distance rate, pixel values and the feature extracted resolution rate. The perfect recognition is executed when the time span around 50% and the distance rate around the 90 % And in the case of pixel and resolution, when the pixel values are increasing then, the resolution factor should also be in an increasing order. If the extracted feature contains more pixels then the resolution factor is more that relates to the quality in extracting the feature. The performance is measured using the two different software metric methods namely spearmen and Pearson metric. Then the overall measure is defined by gaining with the two metric methods. The performance is plotted using the graph to predict the rate of time and extracted feature.

Research paper thumbnail of Hand gesture recognition based on a Harris Hawks optimized Convolution Neural Network

Computers and Electrical Engineering, 2022

Research paper thumbnail of Dynamically Improved Weighted Apriori Algorithm in Market Analysis

Data mining is being used throughout the world by many industries .To face the marketing competit... more Data mining is being used throughout the world by many industries .To face the marketing competition, the marketing industry need to analyse the shopping basket of the customers to get their preferences, habits and their relationships. For this most of the industries use Apriori Algorithm, which was proposedby Agrawal, in 1993.Problem with Apriori is that all the items in the item set have same importance, but in real life it is better to have recommendations according to the relevant season, project and time. The solution was to divide the items or projects into categories and weights are given according to the no of items sold for each category. Then calculate the weighted support and confidence.

Research paper thumbnail of High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem

Journal of King Saud University - Computer and Information Sciences, 2021

Research paper thumbnail of 5368 Flame Detection in Videos Using Binarization

Detection of flame based on computational vision has visible attention in the past years. Many se... more Detection of flame based on computational vision has visible attention in the past years. Many selective features such as shape, colour, texture, etc., have been used to detect flames. The drawback to detect flames with these features are that they uses Lucas-Kanade method which is an optical flow method and it adopt flow constancy same for the adjacent pixels. This will reduce the reliability to detect flames from the videos. In this paper point-wise approach is used in which the conditions are applied to every pixel instead of continuous regions. And also this paper is not uses thermal heat fire detection method as used in classical approach. In this paper we have used binarization algorithm which provides accuracy of detecting fire flames as it very useful for detecting suspicious regions of flames in video files and also helps to eliminate background nosiness from the videos. With the first section, moving pixel’s region is calculated and differentiated from the rigid object reg...

Research paper thumbnail of 3D reconstruction of a scene from multiple 2D images

Computer vision and augmented reality industry focus on reconstructing 3D view of an object for t... more Computer vision and augmented reality industry focus on reconstructing 3D view of an object for the purpose of improvising the visual effect. There are various applications which are in need of 3D Models like street views, film industry, game industry etc. The 3D Models cannot be directly captured using video or still cameras. The cameras have the capability to acquire high quality 2D images at various angles. Our paper focuses on identifying the feature points from 2D image acquired from calibrated camera and reconstructing those features using depth analysis to obtain the 3D view of the object or image. The final obtained 3D view would be a dense reconstruction of the input 2D Image. This reconstruction methodology is less complex when compared to traditional mathematical modelling techniques. The methodology could be easily incorporated into any application domain like surveillance in the form of facial reconstruction of 3D.

Research paper thumbnail of CRYSTOGRAPHY BASED MEDICAL IMAGE SECURITY with LSB- BLOWFISH ALGORITHMS

Medical image data protection is very important as medical image sharing has increased tremendous... more Medical image data protection is very important as medical image sharing has increased tremendously. Cryptography and image steganography are two important fields that help in medical data security. The security of the medical images has always been a concern. The method proposed could be used to securely transfer the medical images over the internet. An approach is proposed to combine both concepts of steganography and cryptography together to attain various medical image security attacks. In the proposed framework, the message is embedded in the image. Blowfish algorithm is used for encryption and decryption of image. LSB algorithm is utilized to embed the message into the image. The proposed approach mainly concentrates on the confidentiality of patient information during the transfer of medical images over the internet.

Research paper thumbnail of A Comparative Study on Selecting and Ranking the Test Cases in Software Testing

Software testing is usually measured by executing the ‘n’ number of test cases and those test cas... more Software testing is usually measured by executing the ‘n’ number of test cases and those test cases has to be designed using the familiar test case design techniques. The aim of Test case design technique is to ensure the detection of typical bugs, systematic coverage and redundant testing. Executing and checking the test cases is not possible all the time in the manual testing. Therefore selecting a test case and ranking is important. The objective of the test case selection is to have a better test case from a pool of test cases and assigning the rank to each test case will leads the software asan error free and which gives a good efficiency. Ranking of test cases is especially useful if a system is a having large number of test cases. Hence selecting and ranking a test case plays an important role in the software testing. In this paper, importance of selection and ranking test cases are analysed and its methods are discussed.

Research paper thumbnail of E-RIHT: Enhanced Hybrid IP Traceback Scheme with 16-bit marking field

Internet is a worldwide network and used in almost every field of work such as industrial, educat... more Internet is a worldwide network and used in almost every field of work such as industrial, educational, military etc. Based on the use, its security needs differ. Few applications may need less security and few may need high security. Today various internet attacks are being developed every day, such as viruses, DoS (Denial of Service), spoofing, etc. Spoofing is a kind of attack in which attacker masks itself under some other user’s IP address. Thus, it is difficult to find the original attacker. IP traceback technique is used to detect the DoS attack. This paper is based on IP traceback, which will help to detect the spoofing attacker by using packet marking and packet logging technique. In packet marking technique router marks identification information of its own into the forwarded packets. In packet logging, routers keep the digest information regarding the forwarded packets. Proposed scheme is termed as E-RIHT (Enhanced Routers Interface Hybrid Traceback) in this, memory requi...

Research paper thumbnail of Detection of Enemy Intervention in Border and Battle Fields Using Smart DustTechnology

International journal of advanced research in electrical, electronics and instrumentation engineering, 2016

Terrorism it is the greatest menace to the security of our nation which is subverting through bor... more Terrorism it is the greatest menace to the security of our nation which is subverting through borders. The borders of Bangladesh and Kashmir are quite composite and also they are large, such that any armed forces or even satellites also cannot be able to monitor the intervening terrorists. To solve these sorts of problems an effective solution is provided in this paper. The main objective of this project is to design a wireless sensor mote which is like small dust and comprises of numerous sensors with a controller in it. It has the capability to sense the intervention of the enemies through the battle fields and borders. The speciality of this mote is that it can be positioned in few hours over a large area with limited persons. A Network can be formed by these motes among themselves. The networks are light in size, promptly deployable and have a wireless connection to the outside world. On board hardware comprises of various sensors and a microcontroller to route the values of the...

Research paper thumbnail of Automated category Text identification using Machine Learning

2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), 2020

Novice counselors are far more likely to maintain their own therapy interests and tend to use the... more Novice counselors are far more likely to maintain their own therapy interests and tend to use the closed issue effectively to test interpretation with instructor. While experienced therapists teach counseling skills to newbie counselors, they don't forget that a consumer's reaction to the problem of a novice therapist is essential to imagine in a suitable method. To answer the question, we've built a computer to imagine the go with the therapy communiqué flow. Nevertheless, the professional psychiatrist, as the gadget person demands a manual adjustment of the original category outcome and the painting pressure is immense, since the precision of the description of verbal communication results may be very low from the inside of the current system. To improve this issue, we have applied the class approach of text records with SVM (Support Vector System) as a system gaining knowledge of method to visualize the flow of interaction in therapy. However, we contrasted and tested...

Research paper thumbnail of Fault Control Using Triple Modular Redundancy (TMR)

Advances in Intelligent Systems and Computing, 2018

Operating Systems have been widely expanding in terms of capabilities and resources. One of the m... more Operating Systems have been widely expanding in terms of capabilities and resources. One of the many unavoidable concerns is the occurrence of a fault in the system. A fault is a violation of the existing system. A fault leads to a single or multiple failure in the system. In order to avoid this type of failure, we need to remove or control the fault. The commonly used techniques for controlling and isolating faults in the system are replication and check pointing. This paper aims to provide control over the detected fault by using the antique technique of triple modular redundancy (TMR) which is a type of N-modular redundancy techniques. Although it has the highest form of reliability, it has not been used to create a fault tolerant system. In our paper, we propose a system using the technique of triple modular redundancy to effectively mask and mitigate the detected faults to provide uninterrupted usage of the entire operating system.

Research paper thumbnail of Effects of Punica granatum L. Extracts on Serum Lipids Level in Ovariectomized Rats

Journal of Life Science, 2008

Research paper thumbnail of Fusion of Blockchain, IoT and Artificial Intelligence - A Survey

IEICE Transactions on Information and Systems, 2022

Blockchain is one of the prominent rapidly used technology in the last decade in various applicat... more Blockchain is one of the prominent rapidly used technology in the last decade in various applications. In recent years, many researchers explored the capabilities of blockchain in smart IoT to address various security challenges. Integration of IoT and blockchain solves the security problems but scalability still remains a huge challenge. To address this, various AI techniques can be applied in the blockchain IoT framework, thus providing an efficient information system. In this survey, various works pertaining to the domains which integrate AI, IoT and Blockchain has been explored. Also, this article discusses potential industrial use cases on fusion of blockchain, AI and IoT applications and its challenges.

Research paper thumbnail of Deep learning disease prediction model for use with intelligent robots

Computers & Electrical Engineering

Research paper thumbnail of An efficient image system-based grey wolf optimiser method for multimedia image security using reduced entropy-based 3D chaotic map

International Journal of Computer Aided Engineering and Technology

Research paper thumbnail of An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture