6 results on '"Varma Nadimpalli"'
Search Results
2. Convolutional Neural Net based Dementia and Tumour Classification from MRI Brain Images
- Author
-
Abhilash Srivastava, Aakash Varma Nadimpalli, and Ruban Nersisson
- Subjects
Artificial neural network ,Contextual image classification ,business.industry ,Computer science ,Process (engineering) ,Globe ,Convolutional neural network ,Data science ,Field (computer science) ,Odds ,medicine.anatomical_structure ,medicine ,Web application ,business - Abstract
The main purpose of this project is to make the medical scan examination process more efficient economically and also with respect to time. Moreover, Medicinal errors influence one of each 10 patients around the globe. Specialists took an investigation at concentrates that analysed the restorative demise rate data from 2010 to 2018 and extrapolated that in excess of 250,000 deaths for every year had begun from a helpful mix-up, which implies 9.5% of all deaths consistently alone in the US. This framework that we have proposed diminishes the odds of this human blunder caused in the field of prescription. The target of this venture or framework is to make a Web application which is an entry that can be accessed freely by anybody around the globe. Honestly by making the framework open source we are intending to go past the requirements that we have now and making it available to others to both build up the framework and utilise the framework free of expense. We have received a procedure by the help of open source structures. This framework that we have proposed diminishes the odds of this human blunder caused in the field of prescription. The model proposed in this paper have gone a bit more technically advanced and computerised this procedure of distinguishing irregularities inside the cerebrum with the assistance of Artificial Intelligence. The objective of this project or system is to make a web application which is a portal that can be accessed freely by anyone around the world. The technology which has been deployed for the system to become automated by making the system learn and predicting on its own is Convolutional Neural Network.
- Published
- 2020
3. RF induced communication errors in RFFE MIPI controlled Power Amplifiers
- Author
-
Douglas Teeter, Praveen Varma Nadimpalli, Ming Ji, David Widay, and David Southcombe
- Subjects
Engineering ,RF front end ,CMOS ,Serial communication ,business.industry ,Controller (computing) ,Amplifier ,Electronic engineering ,Electrical engineering ,Radio frequency ,Routing (electronic design automation) ,business ,Signal - Abstract
As the number of RF components increases inside mobile devices, the industry has rapidly adopted and utilized MIPI's RFFE serial bus specification [1] to communicate with these devices and reduce the amount of control line routing between components. However, the use of a serial bus within the RF front end increases the risk that RF energy, particularly from the Power Amplifier (PA), can corrupt the RFFE bus communication. RF coupling to areas such as the RFFE serial clock (SCLK) signal seen within the PA's RFFE state machine can result in communication errors with the PA. This coupling can be to the SCLK signal itself, or to the PA's CMOS controller's ground reference. PA designers must pay special attention to the positioning and design of the CMOS controller and the internal routing of signals to the controller to avoid these problems. This paper provides a detailed analysis of how RF energy coupling to the internal CMOS controller can create “glitches” on the SCLK signal that cause communication errors. A simple example is provided to illustrate how choices in PA module layout can significantly impact these issues. A natural extension of these concepts applies to phone or radio board layouts, too.
- Published
- 2016
4. Trans receiving multimedia using Raspberry-Pi
- Author
-
Dinesh Kumar Atukuri, Vamsee Sai Malllapu, Sundeep Goud Malkapuram, Abdul Razaque, Satya Siva Varma Nadimpalli, Suharsha Vommina, and Sai Subramanya Vamsi Chavali
- Subjects
010302 applied physics ,business.industry ,Smart objects ,Computer science ,02 engineering and technology ,Python (programming language) ,01 natural sciences ,Data flow diagram ,Raspberry pi ,Software ,Embedded system ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Discrete cosine transform ,Wireless ,Robot ,020201 artificial intelligence & image processing ,business ,computer ,computer.programming_language - Abstract
Internet of things (IOT) can be considered as a combination of effective hardware and impressive software which results in smart objects which are able to communicate and interact among themselves. However, data flow accuracy between two movable devices is a growing problem. This paper proposes and implements two approaches: Discrete Cosine Transfer (DCT) and Inter-Process Communication (IPC) for maintaining stable communication. In our proposed approach, we use a movable semi-autonomous robot that travels to remote places in order to transmit and receive the information. The Receiving and transmitting process is handled using an IPC. The IPC is supported by using network layers that provide accurate interaction between multiple objects. DCT helps save bandwidth by compressing the technique when the IPC is initiating the communication process. The DCT involves in compressing the data and converting it into sin and cos signals. Our proposed approaches, DCT and IPC, are implemented using the Python platform. Our proposed approaches deployed on robots could improve accuracy and reduce bandwidth consumption that will help in military and coal mining applications.
- Published
- 2016
5. Secure data sharing in multi-clouds
- Author
-
Saty Siva Varma Nadimpalli, Dammannagari Nayani Reddy, Suharsha Vommina, Dinesh Kumar Atukuri, Divya Vegi, Vamsee Sai Malllapu, Poojitha Anne, and Abdul Razaque
- Subjects
Information privacy ,Cloud computing security ,Computer science ,business.industry ,Data security ,020206 networking & telecommunications ,020207 software engineering ,Cloud computing ,02 engineering and technology ,Computer security model ,Computer security ,computer.software_genre ,ComputingMilieux_GENERAL ,Data sharing ,Utility computing ,Cloud testing ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer - Abstract
Security is the main concern in the cloud computing environment. The usage of the cloud computing in increasing gradually, where the security is still lagging. Traditionally, use of single cloud in cloud computing environment leads to security issues, malicious users, and also untrusted users. The recent research proved that Multi cloud computing provides all the services in a single architecture by combining many clouds. This research aims in providing the reliable source of dependency on multi clouds. The main purpose of this paper is to use multi-clouds for data security and reduce data risks for an efficient and reliable data accessibility. Different techniques are used to implement the multi cloud computing, which lacks in the providing efficiency, data security and privacy, low cost. The leverage of security in multi-clouds is enhanced through application of Data Sharing Algorithm.
- Published
- 2016
6. BM (Break-Merge): An Elegant Approach for Privacy Preserving Data Publishing
- Author
-
Sandeep Varma Nadimpalli and Valli Kumari Vatsavayi
- Subjects
Privacy preserving ,Information privacy ,Privacy by Design ,On the fly ,Computer science ,Privacy software ,Data publishing ,Computer security ,computer.software_genre ,Merge (version control) ,computer ,Privacy principles - Abstract
Publishing of person specific data has elevated much concern on the individual privacy. Many frameworks and privacy principles were proposed to protect the privacy of the published data. However, techniques must be investigated onattacker's background knowledge. This paper proposes a new approach, Break-Merge (BM) to reduce the associations between quasi-identifiers and sensitive attributes in an anonymized data. On the fly our approach reduces the attacker's inferring nature on sensitive data drastically by decomposing the anonymizedtable into Quasi-identifier table (QIT) and Sensitive attribute tables (ST's).
- Published
- 2011
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.