Skip to main content

Showing 1–13 of 13 results for author: Venugopal, K R

.
  1. arXiv:1609.01860  [pdf

    cs.NI

    RRDVCR: Real-Time Reliable Data Delivery Based on Virtual Coordinating Routing for Wireless Sensor Networks

    Authors: Venkatesh, C S Sengar, K R Venugopal, S S Iyengar, L M Patnaik

    Abstract: Real-time industrial application requires routing protocol that guarantees data delivery with reliable, efficient and low end-to-end delay. Existing Routing(THVR) [13] is based velocity of Two-Hop Velocity and protocol relates two-hop velocity to delay to select the next forwarding node, that has overhead of exchanging control packets, and depleting the available energy in nodes. We propose a Real… ▽ More

    Submitted 7 September, 2016; originally announced September 2016.

  2. arXiv:1403.3255  [pdf, ps, other

    cs.DC

    Improved Bully Election Algorithm for Distributed Systems

    Authors: P Beaulah Soundarabai, Ritesh Sahai, Thriveni J, K R Venugopal, L M Patnaik

    Abstract: Electing a leader is a classical problem in distributed computing system. Synchronization between processes often requires one process acting as a coordinator. If an elected leader node fails, the other nodes of the system need to elect another leader without much wasting of time. The bully algorithm is a classical approach for electing a leader in a synchronous distributed computing system, which… ▽ More

    Submitted 28 February, 2014; originally announced March 2014.

    Comments: 12 pages

    Journal ref: International Journal of Information Processing, 7(4), 43-54, 2013

  3. Cancer Prognosis Prediction Using Balanced Stratified Sampling

    Authors: J S Saleema, N Bhagawathi, S Monica, P Deepa Shenoy, K R Venugopal, L M Patnaik

    Abstract: High accuracy in cancer prediction is important to improve the quality of the treatment and to improve the rate of survivability of patients. As the data volume is increasing rapidly in the healthcare research, the analytical challenge exists in double. The use of effective sampling technique in classification algorithms always yields good prediction accuracy. The SEER public use cancer database p… ▽ More

    Submitted 12 March, 2014; originally announced March 2014.

    MSC Class: 62D05 ACM Class: I.2.6; H.2.8

    Journal ref: International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), Vol.3, No. 1, February 2014, pp 9-18

  4. arXiv:1403.0001  [pdf, ps, other

    cs.NI

    Link-Reliability Based Two-Hop Routing for Wireless Sensor Networks

    Authors: T Shiva Prakash, K B Raja, K R Venugopal, S S Iyengar, L M Patnaik

    Abstract: Wireless Sensor Networks (WSNs) emerge as underlying infrastructures for new classes of large scale net- worked embedded systems. However, WSNs system designers must fulfill the Quality-of-Service (QoS) requirements imposed by the applications (and users). Very harsh and dynamic physical environments and extremely limited energy/computing/memory/communication node resources are major obstacles for… ▽ More

    Submitted 28 February, 2014; originally announced March 2014.

    Comments: 15 pages. arXiv admin note: substantial text overlap with arXiv:1402.7198

    Journal ref: International Journal of Information Processing, 7(1), 15-29, 2013

  5. arXiv:1402.7200  [pdf, ps, other

    cs.IR

    Mathematical Model of Semantic Look - An Efficient Context Driven Search Engine

    Authors: Leena Giri G, Srikanth P L, S H Manjula, K R Venugopal, L M Patnaik

    Abstract: The WorldWideWeb (WWW) is a huge conservatory of web pages. Search Engines are key applications that fetch web pages for the user query. In the current generation web architecture, search engines treat keywords provided by the user as isolated keywords without considering the context of the user query. This results in a lot of unrelated pages or links being displayed to the user. Semantic Web is b… ▽ More

    Submitted 28 February, 2014; originally announced February 2014.

    Comments: 12 pages

    Journal ref: International Journal of Information Processing, 7(2), 20-31, 2013

  6. arXiv:1402.7198  [pdf, ps, other

    cs.NI

    Two-Hop Routing with Traffic-Differentiation for QoS Guarantee in Wireless Sensor Networks

    Authors: T Shiva Prakash, K B Raja, K R Venugopal, S S Iyengar, L M Patnaik

    Abstract: This paper proposes a Traffic-Differentiated Two-Hop Routing protocol for Quality of Service (QoS) in Wireless Sensor Networks (WSNs). It targets WSN applications having different types of data traffic with several priorities. The protocol achieves to increase Packet Reception Ratio (PRR) and reduce end-to-end delay while considering multi-queue priority policy, two-hop neighborhood information, l… ▽ More

    Submitted 28 February, 2014; originally announced February 2014.

    Comments: 13 pages

    Journal ref: International Journal of Information Processing, 7(3), 100-112, 2013

  7. arXiv:1402.7190  [pdf, ps, other

    cs.DB

    Two Stage Prediction Process with Gradient Descent Methods Aligning with the Data Privacy Preservation

    Authors: S kumarasawamy, Srikanth P L, Manjula S H, K R Venugopal, L M Patnaik

    Abstract: Privacy preservation emphasize on authorization of data, which signifies that data should be accessed only by authorized users. Ensuring the privacy of data is considered as one of the challenging task in data management. The generalization of data with varying concept hierarchies seems to be interesting solution. This paper proposes two stage prediction processes on privacy preserved data. The pr… ▽ More

    Submitted 28 February, 2014; originally announced February 2014.

    Comments: 14 pages

    Journal ref: International Journal of Information Processing, 7(3), 68-82, 2013

  8. EDOCR: Energy Density On-demand Cluster Routing in Wireless Sensor Networks

    Authors: B M Thippeswamy, S Reshma, K Shaila, K R Venugopal, S S Iyengar, L M Patnaik

    Abstract: Energy management is one of the critical parameters in Wireless Sensor Networks. In this paper we attempt for a solution to balance the energy usage for maximizing the network lifetime, increase the packet delivery ratio and throughput. Our proposed algorithm is based on Energy Density of the clusters in Wireless Sensor Networks. The cluster head is selected using two step method and on-demand rou… ▽ More

    Submitted 14 February, 2014; originally announced February 2014.

    Comments: 18 pages,7 Figures

    Journal ref: International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

  9. DRSP : Dimension Reduction For Similarity Matching And Pruning Of Time Series Data Streams

    Authors: R H Vishwanath, T V Samartha, K C Srikantaiah, K R Venugopal, L M Patnaik

    Abstract: Similarity matching and join of time series data streams has gained a lot of relevance in today's world that has large streaming data. This process finds wide scale application in the areas of location tracking, sensor networks, object positioning and monitoring to name a few. However, as the size of the data stream increases, the cost involved to retain all the data in order to aid the process of… ▽ More

    Submitted 10 December, 2013; originally announced December 2013.

    Comments: 20 pages,8 figures, 6 Tables

    Journal ref: International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.3, No.6,pp.107-126, November 2013

  10. arXiv:1309.2517  [pdf, ps, other

    cs.DB

    Forecasting Stock Time-Series using Data Approximation and Pattern Sequence Similarity

    Authors: R. H. Vishwanath, S. Leena, K. C. Srikantaiah, K. Shreekrishna Kumar, P. Deepa Shenoy, K. R. Venugopal, S. S. Iyengar, L. M. Patnaik

    Abstract: Time series analysis is the process of building a model using statistical techniques to represent characteristics of time series data. Processing and forecasting huge time series data is a challenging task. This paper presents Approximation and Prediction of Stock Time-series data (APST), which is a two step approach to predict the direction of change of stock price indices. First, performs data a… ▽ More

    Submitted 10 September, 2013; originally announced September 2013.

    Comments: 11 pages

    Journal ref: International Journal of Information Processing, 7(2), 90-100, 2013

  11. Bidirectional Growth based Mining and Cyclic Behaviour Analysis of Web Sequential Patterns

    Authors: K. C. Srikantaiah, N. Krishna Kumar, K. R. Venugopal, L. M. Patnaik

    Abstract: Web sequential patterns are important for analyzing and understanding users behaviour to improve the quality of service offered by the World Wide Web. Web Prefetching is one such technique that utilizes prefetching rules derived through Cyclic Model Analysis of the mined Web sequential patterns. The more accurate the prediction and more satisfying the results of prefetching if we use a highly effi… ▽ More

    Submitted 15 April, 2013; originally announced April 2013.

    Comments: 19 pages

    Journal ref: International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.3, No.2, March 2013

  12. arXiv:1209.5244  [pdf

    cs.DB

    Ranking Search Engine Result Pages based on Trustworthiness of Websites

    Authors: K. C. Srikantaiah, P. L. Srikanth, V. Tejaswi, K. Shaila, K. R. Venugopal, L. M. Patnaik

    Abstract: The World Wide Web (WWW) is the repository of large number of web pages which can be accessed via Internet by multiple users at the same time and therefore it is Ubiquitous in nature. The search engine is a key application used to search the web pages from this huge repository, which uses the link analysis for ranking the web pages without considering the facts provided by them. A new algorithm ca… ▽ More

    Submitted 24 September, 2012; originally announced September 2012.

    Comments: 10 pages; IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 2, July 2012

  13. arXiv:0912.0950  [pdf

    cs.CR cs.CV

    Fingerprint Verification based on Gabor Filter Enhancement

    Authors: B N Lavanya, K B Raja, K R Venugopal

    Abstract: Human fingerprints are reliable characteristics for personnel identification as it is unique and persistence. A fingerprint pattern consists of ridges, valleys and minutiae. In this paper we propose Fingerprint Verification based on Gabor Filter Enhancement (FVGFE) algorithm for minutiae feature extraction and post processing based on 9 pixel neighborhood. A global feature extraction and fingerp… ▽ More

    Submitted 4 December, 2009; originally announced December 2009.

    Comments: 7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 138-144, November 2009, USA