17 results on '"N. Sandeep"'
Search Results
2. Analyzing Vocal Patterns to Determine Gender, Age and Emotion
- Author
-
Chaitanya, N. Sandeep, Shivani, Pilli, Sahithi, Nallapuneni, Sravanthi, Muttevi, Aditya, Juvas, Tsihrintzis, George A., Series Editor, Virvou, Maria, Series Editor, Jain, Lakhmi C., Series Editor, Kiran Mai, C., editor, Kiranmayee, B. V., editor, Favorskaya, Margarita N., editor, Chandra Satapathy, Suresh, editor, and Raju, K. Srujan, editor
- Published
- 2021
- Full Text
- View/download PDF
3. Segmentation of Brain Tumour in Multi-Contrast Mri Image Using U-Net Model
- Author
-
Chaitanya, N. Sandeep, primary, Karadi, Prathyusha, additional, Kurapati, Surendra, additional, Rohith, Ankathi, additional, and Krishna, Yenreddy Vamshi, additional
- Published
- 2022
- Full Text
- View/download PDF
4. JSON as ORM Mapping Database Layer for the SaaS-Based Multi-tenant Application
- Author
-
Raghu, Rajalingam, Varma, N. Sandeep, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Sa, Pankaj Kumar, editor, Bakshi, Sambit, editor, Hatzilygeroudis, Ioannis K., editor, and Sahoo, Manmath Narayan, editor
- Published
- 2018
- Full Text
- View/download PDF
5. Ocean Wave Modeling from Satellite Images Using Data Assimilation
- Author
-
A. Sashikanth Sarma, M. Sai Pravallika, B. Naga Varun, M. Jaya Priya, S. Vasavi, and N. Sandeep
- Subjects
Data assimilation ,Wind wave ,Satellite ,Geology ,Remote sensing - Published
- 2021
6. Assessment of Sedimentation in the Reservoir—A Case Study
- Author
-
M. N. Sandeep, S. S. Suja, C. E. Suhurban Beegam, B. Sindhu, and Nisha Antony
- Subjects
Hydrology ,Flood control ,Volume (thermodynamics) ,Particle-size distribution ,Flood mitigation ,Environmental science ,Sediment ,Bathymetry ,Sedimentation ,Deposition (geology) - Abstract
One of the primary purposes of creating impounding in the rivers with dams in the form of reservoirs is flood control. In Kerala, the recent floods have amplified the importance of the role of reservoirs in flood mitigation. The loss of reservoir capacity due to the deposition of sediments is a major concern in reservoir management. In this paper, sedimentation in Chulliyar Reservoir in Kerala is considered for a case study. The methodology adopted for sedimentation study and results are presented. After conducting a bathymetric survey, the entire catchment area was divided into zones by considering suitable grid size. Based on grid locations undisturbed soil core samples were collected for conducting analysis to find components of sediments deposited in the reservoir. Based on the soil grain size analysis results, the percentage volume of each soil component in the total volume of sediment deposition was also determined. It was also noted the major constituent of the deposition comprise of sand particles and there was a reduction in storage capacity of the reservoir due to sediment depositions.
- Published
- 2021
7. Load Settlement Behaviour of Soft Soil with 3D-Reinforced Sand Piles
- Author
-
M. N. Sandeep, O. Megha, and K. S. Beena
- Subjects
Volume content ,Volume (thermodynamics) ,Settlement (structural) ,Foundation (engineering) ,Soil horizon ,Relative density ,Geotechnical engineering ,Bearing capacity ,Pile ,Geology - Abstract
Nowadays due to scarcity of land, structures are built in sites with the available soil conditions including soft soil layers. In site conditions where deep foundations are not a viable solution due to economic considerations, the existing foundation soil has to be modified for better bearing capacity and reduced settlement. In the present scenario, a wide variety of ground improvement techniques is available including modification by inclusions and confinement. The use of sand piles is a proven technique to improve the desirable properties of soft soil. In this study, the effectiveness of sand piles is further improved by introducing 3D elements into the sand piles. A series of laboratory plate load tests were conducted on a model footing resting on soft clay reinforced with sand pile with and without 3D elements in it. The tests were conducted using two different shapes of 3D elements, namely tetrapod and pentapod. Also, tests were conducted for different volume ratios of 3D elements as 1.82, 2.27 and 2.73% at a constant relative density. Between the two shapes, pentapod elements were more effective due to better confinement of soil between the legs owing to the geometry. Also, the bearing capacity is improved by increasing the volume content of 3D elements from 1.82 to 2.73%. From the results, it can be found that for clay only, the bearing capacity at a settlement ratio of 4% is 94.86 kN/m2. The bearing capacity of the clay is improved to 122.76 kN/m2 when reinforced with sand pile only at 50% relative density. For same relative density of sand pile, the bearing capacity of clay is improved to 167.40 and 212.04 kN/m2 for sand piles-reinforced tetrapod and pentapod elements, respectively, at volume content of 2.73%. This shows that 3D elements can be effectively used in sand piles for improving the properties of soft clay.
- Published
- 2021
8. Identification of Security Threats Using Honeypots
- Author
-
N. Sandeep Chaitanya and Rajitha Bhargavi Movva
- Subjects
Honeypot ,business.industry ,Network security ,Computer science ,Denial-of-service attack ,Computer security ,computer.software_genre ,Encryption ,Phishing ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Identification (information) ,The Internet ,business ,computer ,Hacker - Abstract
The number of devices connected to computer networks is growing rapidly and also the network attacks are growing. Attacks on the internet keep on increasing and it causes harm to our security system. In the field of network security, a honeypot is a computer system or application created to attract attackers, who are trying to attack computer networks through the use of spam, phishing, DDoS (Distributed Denial of service), or other nefarious methods. This paper proposes that, once an attacker falls into this trap, the honeypot allows administrators to obtain valuable data about the type of attacker, the activity he was attempting, and helps in identifying the attacker. Even though if an attacker using encryption to steal the data, honeypot can capture the malicious activities and send the alert messages to the admin. Through this resultant data, we can analyze hacker’s intensions and new hacking techniques by using visualization tool which helps preventing from future attacks.
- Published
- 2021
9. Analyzing Vocal Patterns to Determine Gender, Age and Emotion
- Author
-
Nallapuneni Sahithi, Pilli Shivani, Juvas Aditya, Muttevi Sravanthi, and N. Sandeep Chaitanya
- Subjects
NumPy ,media_common.quotation_subject ,Emotion classification ,Alienation ,Support vector machine ,Feeling ,Isolation (psychology) ,Natural (music) ,Psychology ,computer ,Human communication ,computer.programming_language ,media_common ,Cognitive psychology - Abstract
The speech represents a significant role in human communication as we can convey our feelings through it. Emotion is a strong feeling that is derived from one’s circumstance or surroundings. Speech analysis is important to have natural interplay between human beings and machines and also to reduce the alienation and isolation in human beings. In speech emotion detection, the emotional state of an individual is extracted from their speech. Our project aims to design and develop a hybrid system to detect emotion, gender and age by analyzing vocal patterns (or speech) in which the current system fails to do since it uses separate systems for the detection of gender, age and emotion. We will be taking speech signals as an input, which will be converted into NumPy array and later classified using the SVM algorithm.
- Published
- 2021
10. An Intelligent and Smart IoT-Based Food Contamination Monitoring System
- Author
-
M. Harshitha, Kusuma Sowmya, Ch. Rupa, N. Sandeep, and B. Bindu Priya
- Subjects
Food poisoning ,Computer science ,business.industry ,Mechanism (biology) ,media_common.quotation_subject ,digestive, oral, and skin physiology ,Monitoring system ,medicine.disease ,Risk analysis (engineering) ,Work (electrical) ,medicine ,Quality (business) ,Internet of Things ,business ,Literature survey ,Food contaminant ,media_common - Abstract
It is no wonder that one in six Indians fall ill due to food poisoning. Food Poisoning can lead to various diseases like diarrhoea, fever and many other health issues. Also, there are no current mechanisms and devices to effectively monitor the quality and freshness of food. This calls for a device to accurately monitor and report the freshness of food. In this work, we proposed a mechanism to effectively supervise the status of food. The main issues identified by the literature survey are that they have used mechanisms that are purely based on one parameter. We have resolved this issue by proposing a mechanism that monitors by taking into account all the parameters that can actually predict the status of food like moisture, pH and odour. The main strength of this work is that it is cost-effective and at the same time produces accurate and reliable results when compared to the existing mechanisms in this area.
- Published
- 2020
11. Load-Settlement Behaviour of Ballasted Rail Track Stabilized with Geosynthetics
- Author
-
K. S. Beena, M. N. Sandeep, and K. Ambily
- Subjects
Ballast ,Aggregate (composite) ,Breakage ,Settlement (structural) ,Environmental science ,Geotechnical engineering ,Geosynthetics ,Track (rail transport) ,Infiltration (HVAC) ,Granular material - Abstract
Ballasted rail track system is one of the most important land transportation systems. Ballast aggregate is free draining granular material that helps to transmit and distribute an induced cyclic load to the underlying sub-ballast and sub-grade at a reduced and acceptable level of stress. Upon repeated train loading, ballast deteriorates and becomes fouled because of breakage and infiltration of external fine particles. It adversely affects the permanent settlement and strength of track. Geosynthetics are the most suitable method used to stabilize ballast track system. Performance of track is also depending on the strength of sub-grade soil. Main objective of the study is to investigate the load-settlement behaviour of ballasted rail track by using non-synthetic geocell with different pocket sizes placed above sub-ballast and sub-grade materials. The sand is used as sub-grade material. When placing 2D pocket size geocell above sub-ballast and sub-grade material, the settlement of ballast is decreased by 16.67% and 12.5%, respectively, and corresponding percentage reduction in ballast breakage is 50.46% and 44.7%, respectively.
- Published
- 2020
12. Introduction to Climate Change Over the Indian Region
- Author
-
Megha Nivsarkar, Anita Nagarajan, M. Rajeevan, Ayantika Dey Choudhury, Milind Mujumdar, Rahul Chopra, R.K. Mehajan, Jyoti P. Jadhav, Aparna Joshi, J. Sanjay, Abha Tewari, Chirag Dhara, N. Sandeep, P. Swapna, Anant Parekh, T. P. Sabin, Dev Niyogi, Manmeet Singh, Matthew Collins, Chellappan Gnanaseelan, and Raghavan Krishnan
- Subjects
Climatology ,Climate change ,Environmental science - Published
- 2020
13. Sea-Level Rise
- Author
-
G. Nidheesh, M. Ravichandran, A. S. Unnikrishnan, J. Jyoti, P. Swapna, N. Sandeep, and J. S. Deepa
- Subjects
Oceanography ,Sea level rise ,Environmental science - Published
- 2020
14. Optimal Cluster Count and Coverage Analysis in a Gaussian Distributed WSNs Using TESM
- Author
-
D. N. Sandeep, Gaurav Srivastava, Rabindra K. Barik, Sadanand Yadav, Akhilendra Pratap Singh, Vinay Kumar, and Sanjay B. Dhok
- Subjects
Reduction (complexity) ,symbols.namesake ,Base station ,Uniform distribution (continuous) ,Computer science ,Gaussian ,Node (networking) ,Computer Science::Networking and Internet Architecture ,symbols ,Intrusion detection system ,Topology ,Wireless sensor network ,Energy (signal processing) - Abstract
In wireless sensor network, node deployment can be established as a Gaussian or a uniform distribution. Gaussian distribution provides a reduction in energy hole problem and is preferable to realistic applications like intrusion detection. This paper proposed the cluster size optimization for the Gaussian distributed sensor network where the base station (BS) follows a Tunable Elfes sensing model (TESM), and the mode of communication between node is considered to be of single-hop and multi-hop. Further, we derived the analytical expression of finding the optimal number of clusters. After analyzing the simulation result, it is noted that multi-hop communication model consumes less energy. Also, in this paper, the effect of using Tunable Elfes sensing model (TESM) on coverage is quantitatively analyzed. It is observed that the coverage fraction decreases significantly with an increase in the separation between the nodes.
- Published
- 2019
15. 5G Cellular: Concept, Research Work and Enabling Technologies
- Author
-
D. N. Sandeep, Harishchandra Dubey, Vinay Kumar, Rabindra K. Barik, Sanjay B. Dhok, and Sadanand Yadav
- Subjects
business.industry ,Computer science ,020208 electrical & electronic engineering ,020206 networking & telecommunications ,02 engineering and technology ,Data flow diagram ,Cellular communication ,Information and Communications Technology ,GSM ,Paradigm shift ,0202 electrical engineering, electronic engineering, information engineering ,Mobile technology ,Telecommunications ,business ,5G ,Efficient energy use - Abstract
The enormous growth in communication technology is resulting in an excessively connected network where billions of connected devices produce massive data flow. The upcoming 5th generation mobile technology needs a major paradigm shift so as to fulfil the growing demand for reliable, ubiquitous connectivity, augmented bandwidth, lower latency and improved energy efficiency. All new mobile technologies for 5G are expected to be operational by 2020. This paper presents the basic concepts, working research groups for 5G, standards and the various enabling technologies. Besides, the paper presents a comparative analysis of 5G over the contemporary cellular technologies (LTE, GSM) based on various relevant parameters. This review is helpful for the new researchers, aspiring to work in the field of 5G technology.
- Published
- 2018
16. Static and Incremental Cyclic Loading of Ring and Circular Footings on Coir Geocell-Reinforced Sand
- Author
-
Afi R. Sudhakar and M N Sandeep
- Subjects
Embedment ,Settlement (structural) ,Cushion ,Foundation (engineering) ,Cyclic loading ,Geotechnical engineering ,Water tanks ,Coir ,Ring (chemistry) ,Geology - Abstract
Ring footings are widely used as foundation for water tanks, television antennas, silos, chimneys, oil storage tanks, etc. This paper presents an experimental study to investigate the cyclic as well as static behavior of model ring footing and circular footing resting on coir geocell-reinforced sand. The parameters studied are coir geocell width, and depth of embedment of geocell. The studies have shown that, with the provision of geocell-reinforced sand cushion, there is substantial reduction in settlement of both ring and circular footings due to modified stress distribution. The beneficial effect in terms of increased load carrying capacity and reduced settlement is related to the width and depth of placing geocell mattress.
- Published
- 2018
17. JSON as ORM Mapping Database Layer for the SaaS-Based Multi-tenant Application
- Author
-
N. Sandeep Varma and Rajalingam Raghu
- Subjects
Multitenancy ,Database ,business.industry ,Computer science ,InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS ,Software as a service ,computer.software_genre ,Business operations ,Database design ,JSON ,Software deployment ,Schema (psychology) ,business ,computer ,computer.programming_language - Abstract
SaaS-based multi-tenant application deployment model is becoming more popular as it is a more cost-effective way of deployment, quickly go online in less time. There are numerous technical or deployment issues/challenges needs to be addressed when applications are deployed in multi-tenant SaaS model, so that all tenants co-exist together and continue their operations smoothly without impacting their business operations. One of the complex and challenging design issues in multi-tenant SaaS application model is database design. When single database(shared schema with shared table) is shared among all the tenants it leads to complex database design. If all the tenants require different columns along with the core columns within the same table, it will become extremely difficult to design and maintain the database by itself. In this paper, we propose a JSON-based solution to address the complex database design for the multitenant SaaS model.
- Published
- 2018
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.