srinivas koppu - Academia.edu (original) (raw)
Papers by srinivas koppu
Frontiers in Public Health
Augmented Reality (AR) is an innovation that empowers us in coordinating computerized data into t... more Augmented Reality (AR) is an innovation that empowers us in coordinating computerized data into the client's real-world space. It offers an advanced and progressive methodology for medicines, providing medication training. AR aids in surgery planning, and patient therapy discloses complex medical circumstances to patients and their family members. With accelerated upgrades in innovation, the ever-increasing number of medical records get accessible, which contain a lot of sensitive medical data, similar to medical substances and relations between them. To exploit the clinical texts in these data, it is important to separate significant data from these texts. Drugs, along with some kind of the fundamental clinical components, additionally should be perceived. Drug name recognition (DNR) tries to recognize drugs specified in unstructured clinical texts and order them into predefined classifications, which is utilized to deliver a connected 3D model inside the present reality client...
International Journal of Engineering Systems Modelling and Simulation
2017 International Conference on Trends in Electronics and Informatics (ICEI), 2017
Face recognition system is one of the biometrics methods that are used in the variety range of ap... more Face recognition system is one of the biometrics methods that are used in the variety range of applications using the image processing techniques. Face recognition system is developed using the Mat lab environment with the procedures followed by principal component analysis and the linear discriminant analysis. The performance is measured using the time rate, distance rate, pixel values and the feature extracted resolution rate. The perfect recognition is executed when the time span around 50% and the distance rate around the 90 % And in the case of pixel and resolution, when the pixel values are increasing then, the resolution factor should also be in an increasing order. If the extracted feature contains more pixels then the resolution factor is more that relates to the quality in extracting the feature. The performance is measured using the two different software metric methods namely spearmen and Pearson metric. Then the overall measure is defined by gaining with the two metric methods. The performance is plotted using the graph to predict the rate of time and extracted feature.
Computers and Electrical Engineering, 2022
Data mining is being used throughout the world by many industries .To face the marketing competit... more Data mining is being used throughout the world by many industries .To face the marketing competition, the marketing industry need to analyse the shopping basket of the customers to get their preferences, habits and their relationships. For this most of the industries use Apriori Algorithm, which was proposedby Agrawal, in 1993.Problem with Apriori is that all the items in the item set have same importance, but in real life it is better to have recommendations according to the relevant season, project and time. The solution was to divide the items or projects into categories and weights are given according to the no of items sold for each category. Then calculate the weighted support and confidence.
Journal of King Saud University - Computer and Information Sciences, 2021
Detection of flame based on computational vision has visible attention in the past years. Many se... more Detection of flame based on computational vision has visible attention in the past years. Many selective features such as shape, colour, texture, etc., have been used to detect flames. The drawback to detect flames with these features are that they uses Lucas-Kanade method which is an optical flow method and it adopt flow constancy same for the adjacent pixels. This will reduce the reliability to detect flames from the videos. In this paper point-wise approach is used in which the conditions are applied to every pixel instead of continuous regions. And also this paper is not uses thermal heat fire detection method as used in classical approach. In this paper we have used binarization algorithm which provides accuracy of detecting fire flames as it very useful for detecting suspicious regions of flames in video files and also helps to eliminate background nosiness from the videos. With the first section, moving pixel’s region is calculated and differentiated from the rigid object reg...
Computer vision and augmented reality industry focus on reconstructing 3D view of an object for t... more Computer vision and augmented reality industry focus on reconstructing 3D view of an object for the purpose of improvising the visual effect. There are various applications which are in need of 3D Models like street views, film industry, game industry etc. The 3D Models cannot be directly captured using video or still cameras. The cameras have the capability to acquire high quality 2D images at various angles. Our paper focuses on identifying the feature points from 2D image acquired from calibrated camera and reconstructing those features using depth analysis to obtain the 3D view of the object or image. The final obtained 3D view would be a dense reconstruction of the input 2D Image. This reconstruction methodology is less complex when compared to traditional mathematical modelling techniques. The methodology could be easily incorporated into any application domain like surveillance in the form of facial reconstruction of 3D.
Medical image data protection is very important as medical image sharing has increased tremendous... more Medical image data protection is very important as medical image sharing has increased tremendously. Cryptography and image steganography are two important fields that help in medical data security. The security of the medical images has always been a concern. The method proposed could be used to securely transfer the medical images over the internet. An approach is proposed to combine both concepts of steganography and cryptography together to attain various medical image security attacks. In the proposed framework, the message is embedded in the image. Blowfish algorithm is used for encryption and decryption of image. LSB algorithm is utilized to embed the message into the image. The proposed approach mainly concentrates on the confidentiality of patient information during the transfer of medical images over the internet.
Software testing is usually measured by executing the ‘n’ number of test cases and those test cas... more Software testing is usually measured by executing the ‘n’ number of test cases and those test cases has to be designed using the familiar test case design techniques. The aim of Test case design technique is to ensure the detection of typical bugs, systematic coverage and redundant testing. Executing and checking the test cases is not possible all the time in the manual testing. Therefore selecting a test case and ranking is important. The objective of the test case selection is to have a better test case from a pool of test cases and assigning the rank to each test case will leads the software asan error free and which gives a good efficiency. Ranking of test cases is especially useful if a system is a having large number of test cases. Hence selecting and ranking a test case plays an important role in the software testing. In this paper, importance of selection and ranking test cases are analysed and its methods are discussed.
Internet is a worldwide network and used in almost every field of work such as industrial, educat... more Internet is a worldwide network and used in almost every field of work such as industrial, educational, military etc. Based on the use, its security needs differ. Few applications may need less security and few may need high security. Today various internet attacks are being developed every day, such as viruses, DoS (Denial of Service), spoofing, etc. Spoofing is a kind of attack in which attacker masks itself under some other user’s IP address. Thus, it is difficult to find the original attacker. IP traceback technique is used to detect the DoS attack. This paper is based on IP traceback, which will help to detect the spoofing attacker by using packet marking and packet logging technique. In packet marking technique router marks identification information of its own into the forwarded packets. In packet logging, routers keep the digest information regarding the forwarded packets. Proposed scheme is termed as E-RIHT (Enhanced Routers Interface Hybrid Traceback) in this, memory requi...
International journal of advanced research in electrical, electronics and instrumentation engineering, 2016
Terrorism it is the greatest menace to the security of our nation which is subverting through bor... more Terrorism it is the greatest menace to the security of our nation which is subverting through borders. The borders of Bangladesh and Kashmir are quite composite and also they are large, such that any armed forces or even satellites also cannot be able to monitor the intervening terrorists. To solve these sorts of problems an effective solution is provided in this paper. The main objective of this project is to design a wireless sensor mote which is like small dust and comprises of numerous sensors with a controller in it. It has the capability to sense the intervention of the enemies through the battle fields and borders. The speciality of this mote is that it can be positioned in few hours over a large area with limited persons. A Network can be formed by these motes among themselves. The networks are light in size, promptly deployable and have a wireless connection to the outside world. On board hardware comprises of various sensors and a microcontroller to route the values of the...
2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), 2020
Novice counselors are far more likely to maintain their own therapy interests and tend to use the... more Novice counselors are far more likely to maintain their own therapy interests and tend to use the closed issue effectively to test interpretation with instructor. While experienced therapists teach counseling skills to newbie counselors, they don't forget that a consumer's reaction to the problem of a novice therapist is essential to imagine in a suitable method. To answer the question, we've built a computer to imagine the go with the therapy communiqué flow. Nevertheless, the professional psychiatrist, as the gadget person demands a manual adjustment of the original category outcome and the painting pressure is immense, since the precision of the description of verbal communication results may be very low from the inside of the current system. To improve this issue, we have applied the class approach of text records with SVM (Support Vector System) as a system gaining knowledge of method to visualize the flow of interaction in therapy. However, we contrasted and tested...
Advances in Intelligent Systems and Computing, 2018
Operating Systems have been widely expanding in terms of capabilities and resources. One of the m... more Operating Systems have been widely expanding in terms of capabilities and resources. One of the many unavoidable concerns is the occurrence of a fault in the system. A fault is a violation of the existing system. A fault leads to a single or multiple failure in the system. In order to avoid this type of failure, we need to remove or control the fault. The commonly used techniques for controlling and isolating faults in the system are replication and check pointing. This paper aims to provide control over the detected fault by using the antique technique of triple modular redundancy (TMR) which is a type of N-modular redundancy techniques. Although it has the highest form of reliability, it has not been used to create a fault tolerant system. In our paper, we propose a system using the technique of triple modular redundancy to effectively mask and mitigate the detected faults to provide uninterrupted usage of the entire operating system.
Journal of Life Science, 2008
IEICE Transactions on Information and Systems, 2022
Blockchain is one of the prominent rapidly used technology in the last decade in various applicat... more Blockchain is one of the prominent rapidly used technology in the last decade in various applications. In recent years, many researchers explored the capabilities of blockchain in smart IoT to address various security challenges. Integration of IoT and blockchain solves the security problems but scalability still remains a huge challenge. To address this, various AI techniques can be applied in the blockchain IoT framework, thus providing an efficient information system. In this survey, various works pertaining to the domains which integrate AI, IoT and Blockchain has been explored. Also, this article discusses potential industrial use cases on fusion of blockchain, AI and IoT applications and its challenges.
Computers & Electrical Engineering
International Journal of Computer Aided Engineering and Technology
Frontiers in Public Health
Augmented Reality (AR) is an innovation that empowers us in coordinating computerized data into t... more Augmented Reality (AR) is an innovation that empowers us in coordinating computerized data into the client's real-world space. It offers an advanced and progressive methodology for medicines, providing medication training. AR aids in surgery planning, and patient therapy discloses complex medical circumstances to patients and their family members. With accelerated upgrades in innovation, the ever-increasing number of medical records get accessible, which contain a lot of sensitive medical data, similar to medical substances and relations between them. To exploit the clinical texts in these data, it is important to separate significant data from these texts. Drugs, along with some kind of the fundamental clinical components, additionally should be perceived. Drug name recognition (DNR) tries to recognize drugs specified in unstructured clinical texts and order them into predefined classifications, which is utilized to deliver a connected 3D model inside the present reality client...
International Journal of Engineering Systems Modelling and Simulation
2017 International Conference on Trends in Electronics and Informatics (ICEI), 2017
Face recognition system is one of the biometrics methods that are used in the variety range of ap... more Face recognition system is one of the biometrics methods that are used in the variety range of applications using the image processing techniques. Face recognition system is developed using the Mat lab environment with the procedures followed by principal component analysis and the linear discriminant analysis. The performance is measured using the time rate, distance rate, pixel values and the feature extracted resolution rate. The perfect recognition is executed when the time span around 50% and the distance rate around the 90 % And in the case of pixel and resolution, when the pixel values are increasing then, the resolution factor should also be in an increasing order. If the extracted feature contains more pixels then the resolution factor is more that relates to the quality in extracting the feature. The performance is measured using the two different software metric methods namely spearmen and Pearson metric. Then the overall measure is defined by gaining with the two metric methods. The performance is plotted using the graph to predict the rate of time and extracted feature.
Computers and Electrical Engineering, 2022
Data mining is being used throughout the world by many industries .To face the marketing competit... more Data mining is being used throughout the world by many industries .To face the marketing competition, the marketing industry need to analyse the shopping basket of the customers to get their preferences, habits and their relationships. For this most of the industries use Apriori Algorithm, which was proposedby Agrawal, in 1993.Problem with Apriori is that all the items in the item set have same importance, but in real life it is better to have recommendations according to the relevant season, project and time. The solution was to divide the items or projects into categories and weights are given according to the no of items sold for each category. Then calculate the weighted support and confidence.
Journal of King Saud University - Computer and Information Sciences, 2021
Detection of flame based on computational vision has visible attention in the past years. Many se... more Detection of flame based on computational vision has visible attention in the past years. Many selective features such as shape, colour, texture, etc., have been used to detect flames. The drawback to detect flames with these features are that they uses Lucas-Kanade method which is an optical flow method and it adopt flow constancy same for the adjacent pixels. This will reduce the reliability to detect flames from the videos. In this paper point-wise approach is used in which the conditions are applied to every pixel instead of continuous regions. And also this paper is not uses thermal heat fire detection method as used in classical approach. In this paper we have used binarization algorithm which provides accuracy of detecting fire flames as it very useful for detecting suspicious regions of flames in video files and also helps to eliminate background nosiness from the videos. With the first section, moving pixel’s region is calculated and differentiated from the rigid object reg...
Computer vision and augmented reality industry focus on reconstructing 3D view of an object for t... more Computer vision and augmented reality industry focus on reconstructing 3D view of an object for the purpose of improvising the visual effect. There are various applications which are in need of 3D Models like street views, film industry, game industry etc. The 3D Models cannot be directly captured using video or still cameras. The cameras have the capability to acquire high quality 2D images at various angles. Our paper focuses on identifying the feature points from 2D image acquired from calibrated camera and reconstructing those features using depth analysis to obtain the 3D view of the object or image. The final obtained 3D view would be a dense reconstruction of the input 2D Image. This reconstruction methodology is less complex when compared to traditional mathematical modelling techniques. The methodology could be easily incorporated into any application domain like surveillance in the form of facial reconstruction of 3D.
Medical image data protection is very important as medical image sharing has increased tremendous... more Medical image data protection is very important as medical image sharing has increased tremendously. Cryptography and image steganography are two important fields that help in medical data security. The security of the medical images has always been a concern. The method proposed could be used to securely transfer the medical images over the internet. An approach is proposed to combine both concepts of steganography and cryptography together to attain various medical image security attacks. In the proposed framework, the message is embedded in the image. Blowfish algorithm is used for encryption and decryption of image. LSB algorithm is utilized to embed the message into the image. The proposed approach mainly concentrates on the confidentiality of patient information during the transfer of medical images over the internet.
Software testing is usually measured by executing the ‘n’ number of test cases and those test cas... more Software testing is usually measured by executing the ‘n’ number of test cases and those test cases has to be designed using the familiar test case design techniques. The aim of Test case design technique is to ensure the detection of typical bugs, systematic coverage and redundant testing. Executing and checking the test cases is not possible all the time in the manual testing. Therefore selecting a test case and ranking is important. The objective of the test case selection is to have a better test case from a pool of test cases and assigning the rank to each test case will leads the software asan error free and which gives a good efficiency. Ranking of test cases is especially useful if a system is a having large number of test cases. Hence selecting and ranking a test case plays an important role in the software testing. In this paper, importance of selection and ranking test cases are analysed and its methods are discussed.
Internet is a worldwide network and used in almost every field of work such as industrial, educat... more Internet is a worldwide network and used in almost every field of work such as industrial, educational, military etc. Based on the use, its security needs differ. Few applications may need less security and few may need high security. Today various internet attacks are being developed every day, such as viruses, DoS (Denial of Service), spoofing, etc. Spoofing is a kind of attack in which attacker masks itself under some other user’s IP address. Thus, it is difficult to find the original attacker. IP traceback technique is used to detect the DoS attack. This paper is based on IP traceback, which will help to detect the spoofing attacker by using packet marking and packet logging technique. In packet marking technique router marks identification information of its own into the forwarded packets. In packet logging, routers keep the digest information regarding the forwarded packets. Proposed scheme is termed as E-RIHT (Enhanced Routers Interface Hybrid Traceback) in this, memory requi...
International journal of advanced research in electrical, electronics and instrumentation engineering, 2016
Terrorism it is the greatest menace to the security of our nation which is subverting through bor... more Terrorism it is the greatest menace to the security of our nation which is subverting through borders. The borders of Bangladesh and Kashmir are quite composite and also they are large, such that any armed forces or even satellites also cannot be able to monitor the intervening terrorists. To solve these sorts of problems an effective solution is provided in this paper. The main objective of this project is to design a wireless sensor mote which is like small dust and comprises of numerous sensors with a controller in it. It has the capability to sense the intervention of the enemies through the battle fields and borders. The speciality of this mote is that it can be positioned in few hours over a large area with limited persons. A Network can be formed by these motes among themselves. The networks are light in size, promptly deployable and have a wireless connection to the outside world. On board hardware comprises of various sensors and a microcontroller to route the values of the...
2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), 2020
Novice counselors are far more likely to maintain their own therapy interests and tend to use the... more Novice counselors are far more likely to maintain their own therapy interests and tend to use the closed issue effectively to test interpretation with instructor. While experienced therapists teach counseling skills to newbie counselors, they don't forget that a consumer's reaction to the problem of a novice therapist is essential to imagine in a suitable method. To answer the question, we've built a computer to imagine the go with the therapy communiqué flow. Nevertheless, the professional psychiatrist, as the gadget person demands a manual adjustment of the original category outcome and the painting pressure is immense, since the precision of the description of verbal communication results may be very low from the inside of the current system. To improve this issue, we have applied the class approach of text records with SVM (Support Vector System) as a system gaining knowledge of method to visualize the flow of interaction in therapy. However, we contrasted and tested...
Advances in Intelligent Systems and Computing, 2018
Operating Systems have been widely expanding in terms of capabilities and resources. One of the m... more Operating Systems have been widely expanding in terms of capabilities and resources. One of the many unavoidable concerns is the occurrence of a fault in the system. A fault is a violation of the existing system. A fault leads to a single or multiple failure in the system. In order to avoid this type of failure, we need to remove or control the fault. The commonly used techniques for controlling and isolating faults in the system are replication and check pointing. This paper aims to provide control over the detected fault by using the antique technique of triple modular redundancy (TMR) which is a type of N-modular redundancy techniques. Although it has the highest form of reliability, it has not been used to create a fault tolerant system. In our paper, we propose a system using the technique of triple modular redundancy to effectively mask and mitigate the detected faults to provide uninterrupted usage of the entire operating system.
Journal of Life Science, 2008
IEICE Transactions on Information and Systems, 2022
Blockchain is one of the prominent rapidly used technology in the last decade in various applicat... more Blockchain is one of the prominent rapidly used technology in the last decade in various applications. In recent years, many researchers explored the capabilities of blockchain in smart IoT to address various security challenges. Integration of IoT and blockchain solves the security problems but scalability still remains a huge challenge. To address this, various AI techniques can be applied in the blockchain IoT framework, thus providing an efficient information system. In this survey, various works pertaining to the domains which integrate AI, IoT and Blockchain has been explored. Also, this article discusses potential industrial use cases on fusion of blockchain, AI and IoT applications and its challenges.
Computers & Electrical Engineering
International Journal of Computer Aided Engineering and Technology