Skip to main content

Showing 1–6 of 6 results for author: Raja, P V

Searching in archive cs. Search in all archives.
.
  1. End-to-end deep learning for directly estimating grape yield from ground-based imagery

    Authors: Alexander G. Olenskyj, Brent S. Sams, Zhenghao Fei, Vishal Singh, Pranav V. Raja, Gail M. Bornhorst, J. Mason Earles

    Abstract: Yield estimation is a powerful tool in vineyard management, as it allows growers to fine-tune practices to optimize yield and quality. However, yield estimation is currently performed using manual sampling, which is time-consuming and imprecise. This study demonstrates the application of proximal imaging combined with deep learning for yield estimation in vineyards. Continuous data collection usin… ▽ More

    Submitted 3 August, 2022; originally announced August 2022.

    Journal ref: Comput. Electron. Agric. 198 (2022)

  2. arXiv:1112.2265  [pdf

    cs.CR cs.NE

    A Novel Approach for Password Authentication Using Bidirectional Associative Memory

    Authors: A. S. N. Chakravarthy, Penmetsa V. Krishna Raja, Prof. P. S. Avadhani

    Abstract: Password authentication is a very important system security procedure to gain access to user resources. In the Traditional password authentication methods a server has check the authenticity of the users. In our proposed method users can freely select their passwords from a predefined character set. They can also use a graphical image as password. The password may be a character or an image it wil… ▽ More

    Submitted 10 December, 2011; originally announced December 2011.

    Comments: 13 pages

    Journal ref: Advanced Computing: An International Journal ( ACIJ ), Vol.2, No.6, November 2011

  3. arXiv:1110.1502  [pdf

    cs.CR

    Hilbert Matrix Based Cryptosystem using a Session Key

    Authors: Penmetsa V. Krishna Raja, A. S. N. Chakravarthy, P. S. Avadhani

    Abstract: Cryptography protects users by providing functionality for the encryption of data and authentication of other users. This technology lets the receiver of an electronic message verify the sender, ensures that a message can be read only by the intended person, and assures the recipient that a message has not be altered in transit. Classical cryptanalysis involves an interesting combination of analyt… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: five pages

    Journal ref: International Journal of Engineering Research and Applications (IJERA) Vol. 1, Issue 3, 2011, pp.711-715

  4. arXiv:1110.1498  [pdf

    cs.CR cs.NI

    A Cryptosystem Based on Hilbert Matrix using Cipher Block Chaining Mode

    Authors: Penmetsa V. Krishna Raja, A. S. N. Chakravarthy, P. S. Avadhani

    Abstract: Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical cryptanalysis involv… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: six pages; International Journal of Mathematics Trends and Technology- July to Aug Issue 2011

  5. arXiv:1110.1490  [pdf

    cs.CR cs.NE

    A Novel Approach for Pass Word Authentication using Brain -State -In -A Box (BSB) Model

    Authors: A. S. N. Chakravarthy, Penmetsa V. Krishna Raja, P. S Avadhani

    Abstract: Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle a… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: five pages

    Journal ref: International Journal of Computer Science and Information Technologies (IJCSIT), Volume 2 Issue 5 2011,2127-2131

  6. arXiv:1110.1488  [pdf

    cs.CR

    Handwritten Text Image Authentication using Back Propagation

    Authors: A. S. N. Chakravarthy, Penmetsa V. Krishna Raja, P. S. Avadhani

    Abstract: Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle a… ▽ More

    Submitted 7 October, 2011; originally announced October 2011.

    Comments: 10 pages pdf file

    Journal ref: International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011