Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    CCLHF-Net: Constrained Convolution Layer and Hybrid Features-Based Skip Connection Network for Image Forgery Detection

    Nowadays, images are playing a crucial role in various important applications like medical, forensic, and legal. However, if someone tampers with these images, they become invalid. Unfortunately, the increasin...

    Koyya Deepthi Krishna Yadav, Ilaiah Kavati in Arabian Journal for Science and Engineering (2024)

  2. No Access

    Article

    Sentiment classification with modified RoBERTa and recurrent neural networks

    The unprecedented growth in the use of social media platforms, where opinions and decisions are made and updated within seconds. Hence, Twitter is becoming a huge commercial interest for brands and companies t...

    Ramalingaswamy Cheruku, Khaja Hussain, Ilaiah Kavati in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    Enhanced resource provisioning and migrating virtual machines in heterogeneous cloud data center

    Data centers have become an indispensable part of modern computing infrastructures. It becomes necessary to manage cloud resources efficiently to reduce those ever-increasing power demands of data centers. Dyn...

    Dinesh Reddy Vemula, Mahesh Kumar Morampudi in Journal of Ambient Intelligence and Humani… (2023)

  4. No Access

    Chapter and Conference Paper

    Smart Contract Based Next-Generation Public Key Infrastructure (PKI) Using Permissionless Blockchain

    The traditional Public Key Infrastructure (PKI) solutions are centralized and non-transparent schemes which struggle to combat the current era of distributed applications. One of the major challenging issues o...

    Aswani Devi Aguru, Suresh Babu Erukala, Ilaiah Kavati in Hybrid Intelligent Systems (2022)

  5. No Access

    Chapter and Conference Paper

    Deep Learning-Based Pothole Detection for Intelligent Transportation Systems

    The presence of potholes on the roads is one of the major causes of road accidents as well as wear and tear of vehicles. Various methods have been implemented to solve this problem ranging from manual reportin...

    Ilaiah Kavati in Edge Analytics (2022)

  6. No Access

    Chapter and Conference Paper

    Non-invertible Cancellable Template for Fingerprint Biometric

    In this work we propose an approach for generation of secure and non-invertible fingerprint templates. Firstly, we have to find the points around the reference point and select the n points sorted in ascending...

    Ilaiah Kavati, G Kiran Kumar, M Venu Gopalachari in Hybrid Intelligent Systems (2022)

  7. No Access

    Chapter and Conference Paper

    Computer Vision based Animal Collision Avoidance Framework for Autonomous Vehicles

    Animals have been a common sighting on roads in India which leads to several accidents between them and vehicles every year. This makes it vital to develop a support system for driverless vehicles that assists...

    Savyasachi Gupta, Dhananjai Chand, Ilaiah Kavati in Computer Vision and Image Processing (2021)

  8. No Access

    Chapter and Conference Paper

    Real-Time Traffic Sign Recognition and Classification Using Deep Learning

    Traffic signs convey information, an instruction, or a warning to the driver. Recognizing these traffic signs and classifying them into their appropriate classes is an imperative task for autonomous driving as...

    Ilaiah Kavati, E. Suresh Babu in Proceedings of the 12th International Conf… (2021)

  9. No Access

    Chapter and Conference Paper

    Spatial Co-location Pattern Mining Using Delaunay Triangulation

    Spatial data mining is the process of finding interesting patterns that may implicitly exist in spatial database. The process of finding the subsets of features that are frequently found together in a same loc...

    G. Kiran Kumar, Ilaiah Kavati in Advances in Machine Learning and Data Scie… (2018)

  10. No Access

    Chapter and Conference Paper

    Fast Fingerprint Retrieval Using Minutiae Neighbor Structure

    This paper proposes a novel fingerprint identification system using minutiae neighborhood structure. First, we construct the nearest neighborhood for each minutia in the fingerprint. In the next step, we extra...

    Ilaiah Kavati, G. Kiran Kumar in Advances in Machine Learning and Data Scie… (2018)

  11. No Access

    Book

  12. No Access

    Chapter

    Hierarchical Decomposition of Extended Triangulation for Fingerprint Indexing

    In biometric identification systems, the identity corresponding to the query image is determined by comparing it against all images in the database. This exhaustive matching process increases the response time...

    Ilaiah Kavati, Munaga V. N. K. Prasad in Efficient Biometric Indexing and Retrieval… (2017)

  13. No Access

    Chapter

    A New Cluster-Based Indexing Technique for Palmprint Databases Using Scores and Decision-Level Fusion

    This chapter proposes a new clustering-based indexing technique for large biometric databases. We compute a fixed-length index code for each biometric image in the database by computing its similarity against ...

    Ilaiah Kavati, Munaga V. N. K. Prasad in Efficient Biometric Indexing and Retrieval… (2017)

  14. No Access

    Chapter

    Efficient Score-Based Indexing Technique for Fast Palmprint Retrieval

    Biometric identification systems capture biometric (i.e., fingerprint, palm, and iris) images and store them in a central database. During identification, the query biometric image is compared against all imag...

    Ilaiah Kavati, Munaga V. N. K. Prasad in Efficient Biometric Indexing and Retrieval… (2017)

  15. No Access

    Chapter

    Conclusions and Future Scope

    This chapter discusses the outcomes of our research. This chapter summarizes our research contributions and also discuss some future research directions.

    Ilaiah Kavati, Munaga V. N. K. Prasad in Efficient Biometric Indexing and Retrieval… (2017)

  16. No Access

    Chapter

    Introduction

    In biometric identification systems, the identity corresponding to an individual is determined by comparing his/her template against all user templates in the database. This exhaustive matching process increas...

    Ilaiah Kavati, Munaga V. N. K. Prasad in Efficient Biometric Indexing and Retrieval… (2017)

  17. No Access

    Chapter and Conference Paper

    An Efficient Coding Method for Indexing Hand-based Biometric Databases

    Biometric identification systems capture biometric (i.e., fingerprint, palm, and iris) images and store them in a central database. During identification, the query biometric image is compared against all imag...

    Ilaiah Kavati, Munaga V. N. K. Prasad in Artificial Intelligence and Evolutionary A… (2015)

  18. No Access

    Chapter and Conference Paper

    Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Features

    Palmprint technology is a new branch of biometrics used to identify an individual. Palmprint has rich set of features like palm lines, wrinkles, minutiae points, texture, ridges etc. Several line and texture e...

    Munaga V. N. K. Prasad, Ilaiah Kavati in Recent Trends in Computer Networks and Dis… (2014)

  19. No Access

    Chapter and Conference Paper

    A New Indexing Method for Biometric Databases Using Match Scores and Decision Level Fusion

    This paper proposes a new clustering-based indexing technique for large biometric databases. We compute a fixed length index code for each biometric image in the database by computing its similarity against a ...

    Ilaiah Kavati, Munaga V. N. K. Prasad in Advanced Computing, Networking and Informa… (2014)

  20. No Access

    Chapter and Conference Paper

    Vein Pattern Indexing Using Texture and Hierarchical Decomposition of Delaunay Triangulation

    In biometric identification systems, the identity corresponding to the query image is determined by comparing it against all images in the database. This exhaustive matching process increases the response time...

    Ilaiah Kavati, Munaga V. N. K. Prasad in Security in Computing and Communications (2013)

previous disabled Page of 2