Skip to main content

Showing 1–16 of 16 results for author: Patnaik, L M

.
  1. arXiv:1609.01860  [pdf

    cs.NI

    RRDVCR: Real-Time Reliable Data Delivery Based on Virtual Coordinating Routing for Wireless Sensor Networks

    Authors: Venkatesh, C S Sengar, K R Venugopal, S S Iyengar, L M Patnaik

    Abstract: Real-time industrial application requires routing protocol that guarantees data delivery with reliable, efficient and low end-to-end delay. Existing Routing(THVR) [13] is based velocity of Two-Hop Velocity and protocol relates two-hop velocity to delay to select the next forwarding node, that has overhead of exchanging control packets, and depleting the available energy in nodes. We propose a Real… ▽ More

    Submitted 7 September, 2016; originally announced September 2016.

  2. arXiv:1407.2082  [pdf

    cs.AR

    FPGA Based Efficient Multiplier for Image Processing Applications Using Recursive Error Free Mitchell Log Multiplier and KOM Architecture

    Authors: Satish S Bhairannawar, Rathan R, Raja K B, Venugopal K R, L M Patnaik

    Abstract: The Digital Image processing applications like medical imaging, satellite imaging, Biometric trait images etc., rely on multipliers to improve the quality of image. However, existing multiplication techniques introduce errors in the output with consumption of more time, hence error free high speed multipliers has to be designed. In this paper we propose FPGA based Recursive Error Free Mitchell Log… ▽ More

    Submitted 8 July, 2014; originally announced July 2014.

  3. QoS group based optimal retransmission medium access protocol for wireless sensor networks

    Authors: Kumaraswamy M, Shaila K, Tejaswi V, Venugopal K R, S S Iyengar, L M Patnaik

    Abstract: This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, short-range, low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture, industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide au… ▽ More

    Submitted 11 April, 2014; originally announced April 2014.

    Comments: 9 pages in IEEE format and 6 figures

    Journal ref: IJCNC, Vol.6, No.2, March 2014

  4. arXiv:1403.3255  [pdf, ps, other

    cs.DC

    Improved Bully Election Algorithm for Distributed Systems

    Authors: P Beaulah Soundarabai, Ritesh Sahai, Thriveni J, K R Venugopal, L M Patnaik

    Abstract: Electing a leader is a classical problem in distributed computing system. Synchronization between processes often requires one process acting as a coordinator. If an elected leader node fails, the other nodes of the system need to elect another leader without much wasting of time. The bully algorithm is a classical approach for electing a leader in a synchronous distributed computing system, which… ▽ More

    Submitted 28 February, 2014; originally announced March 2014.

    Comments: 12 pages

    Journal ref: International Journal of Information Processing, 7(4), 43-54, 2013

  5. Cancer Prognosis Prediction Using Balanced Stratified Sampling

    Authors: J S Saleema, N Bhagawathi, S Monica, P Deepa Shenoy, K R Venugopal, L M Patnaik

    Abstract: High accuracy in cancer prediction is important to improve the quality of the treatment and to improve the rate of survivability of patients. As the data volume is increasing rapidly in the healthcare research, the analytical challenge exists in double. The use of effective sampling technique in classification algorithms always yields good prediction accuracy. The SEER public use cancer database p… ▽ More

    Submitted 12 March, 2014; originally announced March 2014.

    MSC Class: 62D05 ACM Class: I.2.6; H.2.8

    Journal ref: International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), Vol.3, No. 1, February 2014, pp 9-18

  6. arXiv:1403.0001  [pdf, ps, other

    cs.NI

    Link-Reliability Based Two-Hop Routing for Wireless Sensor Networks

    Authors: T Shiva Prakash, K B Raja, K R Venugopal, S S Iyengar, L M Patnaik

    Abstract: Wireless Sensor Networks (WSNs) emerge as underlying infrastructures for new classes of large scale net- worked embedded systems. However, WSNs system designers must fulfill the Quality-of-Service (QoS) requirements imposed by the applications (and users). Very harsh and dynamic physical environments and extremely limited energy/computing/memory/communication node resources are major obstacles for… ▽ More

    Submitted 28 February, 2014; originally announced March 2014.

    Comments: 15 pages. arXiv admin note: substantial text overlap with arXiv:1402.7198

    Journal ref: International Journal of Information Processing, 7(1), 15-29, 2013

  7. arXiv:1402.7200  [pdf, ps, other

    cs.IR

    Mathematical Model of Semantic Look - An Efficient Context Driven Search Engine

    Authors: Leena Giri G, Srikanth P L, S H Manjula, K R Venugopal, L M Patnaik

    Abstract: The WorldWideWeb (WWW) is a huge conservatory of web pages. Search Engines are key applications that fetch web pages for the user query. In the current generation web architecture, search engines treat keywords provided by the user as isolated keywords without considering the context of the user query. This results in a lot of unrelated pages or links being displayed to the user. Semantic Web is b… ▽ More

    Submitted 28 February, 2014; originally announced February 2014.

    Comments: 12 pages

    Journal ref: International Journal of Information Processing, 7(2), 20-31, 2013

  8. arXiv:1402.7198  [pdf, ps, other

    cs.NI

    Two-Hop Routing with Traffic-Differentiation for QoS Guarantee in Wireless Sensor Networks

    Authors: T Shiva Prakash, K B Raja, K R Venugopal, S S Iyengar, L M Patnaik

    Abstract: This paper proposes a Traffic-Differentiated Two-Hop Routing protocol for Quality of Service (QoS) in Wireless Sensor Networks (WSNs). It targets WSN applications having different types of data traffic with several priorities. The protocol achieves to increase Packet Reception Ratio (PRR) and reduce end-to-end delay while considering multi-queue priority policy, two-hop neighborhood information, l… ▽ More

    Submitted 28 February, 2014; originally announced February 2014.

    Comments: 13 pages

    Journal ref: International Journal of Information Processing, 7(3), 100-112, 2013

  9. arXiv:1402.7190  [pdf, ps, other

    cs.DB

    Two Stage Prediction Process with Gradient Descent Methods Aligning with the Data Privacy Preservation

    Authors: S kumarasawamy, Srikanth P L, Manjula S H, K R Venugopal, L M Patnaik

    Abstract: Privacy preservation emphasize on authorization of data, which signifies that data should be accessed only by authorized users. Ensuring the privacy of data is considered as one of the challenging task in data management. The generalization of data with varying concept hierarchies seems to be interesting solution. This paper proposes two stage prediction processes on privacy preserved data. The pr… ▽ More

    Submitted 28 February, 2014; originally announced February 2014.

    Comments: 14 pages

    Journal ref: International Journal of Information Processing, 7(3), 68-82, 2013

  10. EDOCR: Energy Density On-demand Cluster Routing in Wireless Sensor Networks

    Authors: B M Thippeswamy, S Reshma, K Shaila, K R Venugopal, S S Iyengar, L M Patnaik

    Abstract: Energy management is one of the critical parameters in Wireless Sensor Networks. In this paper we attempt for a solution to balance the energy usage for maximizing the network lifetime, increase the packet delivery ratio and throughput. Our proposed algorithm is based on Energy Density of the clusters in Wireless Sensor Networks. The cluster head is selected using two step method and on-demand rou… ▽ More

    Submitted 14 February, 2014; originally announced February 2014.

    Comments: 18 pages,7 Figures

    Journal ref: International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

  11. DRSP : Dimension Reduction For Similarity Matching And Pruning Of Time Series Data Streams

    Authors: R H Vishwanath, T V Samartha, K C Srikantaiah, K R Venugopal, L M Patnaik

    Abstract: Similarity matching and join of time series data streams has gained a lot of relevance in today's world that has large streaming data. This process finds wide scale application in the areas of location tracking, sensor networks, object positioning and monitoring to name a few. However, as the size of the data stream increases, the cost involved to retain all the data in order to aid the process of… ▽ More

    Submitted 10 December, 2013; originally announced December 2013.

    Comments: 20 pages,8 figures, 6 Tables

    Journal ref: International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.3, No.6,pp.107-126, November 2013

  12. arXiv:1309.5601  [pdf, ps, other

    cs.CR cs.NI

    Multiple Domain Secure Routing for Wireless Sensor Networks

    Authors: Lata B T, Jansi P K R, Shaila K, D N Sujatha, Venugopal K R, L M Patnaik

    Abstract: Secure Transmission of data packets in Wireless Sensor Networks is an important area of Research. There is a possibility of an attacker creating security holes in the network. Hence, network security and reliability can be achieved by discovering random multiple paths using multiple domains, and forwarding data packets from the source node to the destination node. We have designed, Multiple Domain… ▽ More

    Submitted 22 September, 2013; originally announced September 2013.

    Comments: 10 pages

    Journal ref: International Journal of Information Processing, 7(2), 59-68, 2013

  13. arXiv:1309.2517  [pdf, ps, other

    cs.DB

    Forecasting Stock Time-Series using Data Approximation and Pattern Sequence Similarity

    Authors: R. H. Vishwanath, S. Leena, K. C. Srikantaiah, K. Shreekrishna Kumar, P. Deepa Shenoy, K. R. Venugopal, S. S. Iyengar, L. M. Patnaik

    Abstract: Time series analysis is the process of building a model using statistical techniques to represent characteristics of time series data. Processing and forecasting huge time series data is a challenging task. This paper presents Approximation and Prediction of Stock Time-series data (APST), which is a two step approach to predict the direction of change of stock price indices. First, performs data a… ▽ More

    Submitted 10 September, 2013; originally announced September 2013.

    Comments: 11 pages

    Journal ref: International Journal of Information Processing, 7(2), 90-100, 2013

  14. Bidirectional Growth based Mining and Cyclic Behaviour Analysis of Web Sequential Patterns

    Authors: K. C. Srikantaiah, N. Krishna Kumar, K. R. Venugopal, L. M. Patnaik

    Abstract: Web sequential patterns are important for analyzing and understanding users behaviour to improve the quality of service offered by the World Wide Web. Web Prefetching is one such technique that utilizes prefetching rules derived through Cyclic Model Analysis of the mined Web sequential patterns. The more accurate the prediction and more satisfying the results of prefetching if we use a highly effi… ▽ More

    Submitted 15 April, 2013; originally announced April 2013.

    Comments: 19 pages

    Journal ref: International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.3, No.2, March 2013

  15. arXiv:1303.5867  [pdf

    cs.IR cs.DB

    Similarity based Dynamic Web Data Extraction and Integration System from Search Engine Result Pages for Web Content Mining

    Authors: Srikantaiah K C, Suraj M, Venugopal K R, L M Patnaik

    Abstract: There is an explosive growth of information in the World Wide Web thus posing a challenge to Web users to extract essential knowledge from the Web. Search engines help us to narrow down the search in the form of Search Engine Result Pages (SERP). Web Content Mining is one of the techniques that help users to extract useful information from these SERPs. In this paper, we propose two similarity base… ▽ More

    Submitted 23 March, 2013; originally announced March 2013.

    Comments: 8 pages

    Journal ref: ACEEE International Journal on Information Technology, Volume 3, Issue 1, 2013

  16. arXiv:1209.5244  [pdf

    cs.DB

    Ranking Search Engine Result Pages based on Trustworthiness of Websites

    Authors: K. C. Srikantaiah, P. L. Srikanth, V. Tejaswi, K. Shaila, K. R. Venugopal, L. M. Patnaik

    Abstract: The World Wide Web (WWW) is the repository of large number of web pages which can be accessed via Internet by multiple users at the same time and therefore it is Ubiquitous in nature. The search engine is a key application used to search the web pages from this huge repository, which uses the link analysis for ranking the web pages without considering the facts provided by them. A new algorithm ca… ▽ More

    Submitted 24 September, 2012; originally announced September 2012.

    Comments: 10 pages; IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 2, July 2012