Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Geetha, V."

Filter results by typing the first few letters
Now showing 1 - 20 of 58
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    A Nested Texture Inspired Novel Image Pattern Based Optical Camera Communication
    (Institute of Electrical and Electronics Engineers Inc., 2022) Salvi, S.; Geetha, V.
    Pattern recognition is a vital component of display-based optical camera communication. However, as the distance between the transmitter LED panel and the receiver camera increases, the visibility of the pattern reduces. Decoding each pattern requires extensive computational resources. This paper proposes a nested texture-inspired novel binary hierarchical image pattern classification-based modulation for optical camera communication to provide efficient pattern classification and achieve longer communication distance. Custom 8× 8 patterns are generated at the transmitter based on input data using nested outer and inner patterns. On the receiver side, multi-threaded pattern matching is performed simultaneously for inner and outer patterns for faster decoding. A simulator is built to test the performance of linear search and two variants of binary search for pattern matching. A hardware prototype and Matlab app are designed to perform experiments to test the performance of the proposed technique in a real-world environment. Experiments were conducted to select optimal camera parameter values for the best signal to noise ratio (SNR) and to analyze the impact of pattern intensity profile on decoding at various distances. The proposed pattern communication technique showcased 48.6% and 42.5% improvement in bit error ratio (BER) compared to Data Matrix and QR Code Pattern-based communication techniques, respectively. © 2013 IEEE.
  • No Thumbnail Available
    Item
    A Novel 2D LED Matrix and Aztec Pattern Inspired Optical Camera Communication for Industrial IoT
    (Institute of Electrical and Electronics Engineers Inc., 2022) Salvi, S.; Geetha, V.
    Recently, the problem of Radio Frequency saturation has become more prominent. It is due to the increased number of intelligent devices connected to the network. This paper proposes an Aztec pattern-inspired optical camera communication system with the motivation to provide an alternate communication system without compromising the number of connected devices in a typical industrial environment. The Signal-to-Noise Ratio is evaluated in the proposed system, and its intensity profile is studied. The proposed technique outperformed traditional QR code-inspired methods in terms of power consumption and Packet Error Rate(%). © 2022 IEEE.
  • No Thumbnail Available
    Item
    A Shadow Based Low-Cost Hand Movement Recognition System for Human Computer Interaction
    (Institute of Electrical and Electronics Engineers Inc., 2021) Geetha, V.; Salvi, S.; Sahoo, P.; Dodiya, M.; Gupta, S.
    TIn this paper, we propose and implement a real-time hand motion detection system which uses shadows projected by hand and detected by low cost Light Dependent Resistor (LDR). The main advantage of the shadow approach is real-time recognition and its application in Post COVID 19 world where contactless interactions are required. Our proposed approach uses 2D hand motion shadows to determine sequence of light blocking the LDRs and thus making the system less complex and less compute intensive compared to 3D image recognition based systems. The accuracy of the proposed system is tested under various lighting conditions and 82-95\% accuracy is observed under normal lighting conditions. © 2021 IEEE.
  • No Thumbnail Available
    Item
    A survey and comparison of GTS allocation and scheduling algorithms in IEEE 802.15.4 wireless sensor networks
    (2013) Rao, S.; Keshri, S.; Gangwar, D.; Sundar, P.; Geetha, V.
    Multimedia applications in the wireless domain require not only contention-based communication, but also reservation based one. The IEEE 802.15.4 standard is widely used for Wireless Sensor Networks (WSNs), and is a standard for low rate, low power and low cost WPANs (Wireless Personal Area Networks). Moreover, it supports the allocation of Guaranteed Time Slot (GTS) to the devices in Contention free period (CFP). With time, many GTS scheduling and allocation algorithms have been proposed with the aim to make maximum the use of GTS. This paper provides a survey and comparison on the current state-of-the-art researches in this important area. We have firstly summarized all the important algorithms proposed till now and then classified and compared them based on various parameters including type, delay, bandwidth, cost, topology, traffic and energy efficiency. © 2013 IEEE.
  • No Thumbnail Available
    Item
    A USER AUTHENTICATION AND ACCESS CONTROL SCHEME FOR IoT-BASED HEALTHCARE USING BLOCKCHAIN
    (Institute of Electrical and Electronics Engineers Inc., 2021) Geetha, V.; Balakrishnan, B.
    IoT devices do not possess the potential to protect themselves from risk of the attackers as they are resource-constrained. Blockchain is arising as a decentralized and distributed technology with proficiency in delivering secure management, access control and user authentication for protecting data and services of IoT devices, guaranteeing integrity, confidentiality and availability. IoT-based healthcare applications has many benefits like reduced cost of healthcare, improved quality, remote monitoring of patients etc. Ensuring a robust and secure interactions between patient and healthcare providers is very important to protect sensitive medical data. A distributed and reliable user authentication and access control scheme to be used in IoT based Healthcare is designed and implemented here with the help of local gateways directly interfaced to smart contract based Ethereum Blockchain. The local gateways can manage multiple local IoT devices and improve scalability. This reduces the overhead of performing resource-consuming authentication tasks and blockchain-communication at the IoT devices. To exhibit the working of the framework, a case study is presented with two laptops and a Raspberry Pi. © 2021 IEEE.
  • No Thumbnail Available
    Item
    An Image Transmission Technique using Low-Cost Li-Fi Testbed
    (Institute of Electrical and Electronics Engineers Inc., 2021) Salvi, S.; Geetha, V.; Maru, H.; Kumar, N.; Ahmed, R.
    Visible Light Communication (VLC) or Light Fidelity (Li-Fi) with Light Emitting Diodes (LEDs) as transmitter and light sensor as receiver will turn the present lightening system into a communication system. Li-Fi based data communication provides secure communication within the luminous coverage of the light source. Thus, it has several applications in places where Radio Frequency interference is not desirable. Similar to other wireless communication techniques even Li-Fi is used for transmission and reception of digital data. Li-Fi system can also be used to transfer images from one device to another. In this paper, a preliminary study is discussed by proposing and implementing an encoding and decoding scheme for transmission of the binary image using Li-Fi. The proposed system is evaluated based on the light intensity, distance, accuracy, size of the image, image resolution, and transmission time. © 2021 IEEE.
  • No Thumbnail Available
    Item
    An implemented example of XKMS with web services
    (IGI Global, 2023) Pawar, S.; Ankitha, K.; Geetha, V.
    Web service is a loosely coupled system, which gets remote request for a particular service and returns results after executing that service. The data transfer of the web service is a request/response system which carries input parameters through request message and carries executed results of the web services. Both request and response messages are carried in the form of SOAP message which is XML based. XML signature and XML encryption are two methods of securing data transfer through simple access protocol (SOAP) messages from web services. The main goal of the XKMS initiative is to make it possible to create XML-based trust web services for handling and administration of PKI-based cryptographic keys. By making it possible to develop such web services, XKMS helps to simplify working with PKI and makes it simpler for web services to integrate security features into their programmes. This chapter provides a thorough working of the implemented draught of the W3C working group's XKMS specification. © 2023, IGI Global. All rights reserved.
  • No Thumbnail Available
    Item
    Assessing the Impact of ESG Factors on Firm Performance: Empirical Evidence from CRIP Sector
    (Springer Science and Business Media Deutschland GmbH, 2025) Rajath, B.S.; Abhilash, G.; Devarajappa, S.; Geetha, V.; Devi, G.; Jain, S.K.; Priyanka, H.B.; Kalli, R.
    In recent times, managers and politicians have been impacted by key variables such as ethics, corporate governance, and ESG, leading to investment choices and the establishment of strong rules. There is an increasing focus on the understanding of environmental stability and the socio-economic growth of nation-states, which has led to the priority of sustainable and responsible investment methods. Nevertheless, there remains a void in investigating the CSR- and associated corporate characteristics that impact business performance The main purpose of the current research is to explore the influence of ESG factors on company performance, with a special emphasis on the Infrastructure, Construction, Real Estate, Infrastructure, and Project (CRIP) sectors. The research employed the Crisil ESG database, providing comprehensive financial data and ESG ratings of 42 organizations. Fixed effect panel regression was performed to evaluate the impact of ESG disclosure on company performance. The data revealed that the combined ESG score has a positive and large effect on the (WACC) Weighted Average Cost of Capital. The findings from the study are meant to aid varied stakeholders for policy-making and strategic decision-making in the Indian CRIP business. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.
  • Thumbnail Image
    Item
    Constructing an enriched domain taxonomy for Hindi using word embeddings
    (2018) Keshava, V.; Avvara, P.; Sowmya, Kamath S.; Geetha, V.
    Domain-specific taxonomies constitute a valuable resource as they offer extensive support in information retrieval related activities like browsing, searching, recommendations and personalization. Such taxonomies can bridge the gap between the lack of domain-specific querying knowledge in potential users and the actual content. In case of multilingual content, taxonomies can play a pivotal role in boosting search performance for content across language barriers. In this paper, a domain-agnostic framework for building an evolving, domain-specific taxonomy for the Hindi, given a set of well-organized data points is proposed. The approach is intended for designing a hierarchical taxonomy enriched with synonyms and other morphological variants using WordNet and Word2vec models respectively. The hierarchical structure acts as a base which binds the taxonomy to a given domain. Such enrichment can improve taxonomy coverage within the given domain. The focus is also on building a taxonomy that can self-evolve over time, with high precision and recall, with minimal manual effort. � 2017 IEEE.
  • No Thumbnail Available
    Item
    Constructing an enriched domain taxonomy for Hindi using word embeddings
    (Institute of Electrical and Electronics Engineers Inc., 2017) Keshava, V.; Pravalika, P.; Kamath S․, S.S.; Geetha, V.
    Domain-specific taxonomies constitute a valuable resource as they offer extensive support in information retrieval related activities like browsing, searching, recommendations and personalization. Such taxonomies can bridge the gap between the lack of domain-specific querying knowledge in potential users and the actual content. In case of multilingual content, taxonomies can play a pivotal role in boosting search performance for content across language barriers. In this paper, a domain-agnostic framework for building an evolving, domain-specific taxonomy for the Hindi, given a set of well-organized data points is proposed. The approach is intended for designing a hierarchical taxonomy enriched with synonyms and other morphological variants using WordNet and Word2vec models respectively. The hierarchical structure acts as a base which binds the taxonomy to a given domain. Such enrichment can improve taxonomy coverage within the given domain. The focus is also on building a taxonomy that can self-evolve over time, with high precision and recall, with minimal manual effort. © 2017 IEEE.
  • No Thumbnail Available
    Item
    Customized Obstacle Dataset Generation from RGB-D Datasets
    (Institute of Electrical and Electronics Engineers Inc., 2024) Vijetha, U.; Geetha, V.
    The field of Obstacle Detection in computer vision is evolving rapidly, with many researchers contributing innovative solutions to address different challenges. However, the current landscape presents several barriers that hinder effective comparison and collaboration among researchers. A significant challenge arises from the limited availability of publicly accessible obstacle datasets, with existing datasets predominantly focused on specific contexts such as obstacles on roads, sidewalks, or particular industrial settings. The varied application contexts, environments, and hardware equipment in use compel researchers to develop and use custom datasets tailored to their application-specific requirements. Constraints such as time, funding, and limited access to resources often discourage researchers from re-creating new datasets for the purpose of comparative evaluations, resulting in incomplete insights into the strengths and weaknesses of different approaches. To address this deficiency in comparative analysis, we propose a novel method for generating obstacle datasets from existing RGB-D datasets dynamically. The proposed method offers a quick and effortless way to generate customized variants of Obstacle dataset, without having to manually build them from the ground up. The cross-dataset compatibility of the proposed method further enhances the versatility and wide adoption potential of the proposed method. © 2024 IEEE.
  • No Thumbnail Available
    Item
    Deepfake Image Detection using CNNs and Transfer Learning
    (Institute of Electrical and Electronics Engineers Inc., 2021) Kumar, N.; Pranav, P.; Nirney, V.; Geetha, V.
    Headways in deep learning has enabled the creation of fraudulent digital content with ease. This fraudulent digital content created is entirely indistinguishable from the original digital content. This close identicalness has what it takes to cause havoc. This fraudulent digital content, popularly known as deepfakes having the potential to change the truth and decay faith, can leave impressions on a large scale and even our daily lives. Deepfake is composed of two words, the first being deep: deep learning and the second being fake: fake digital content. Artificial intelligence forming the nucleus of any deepfake formulation technology empowers it to dodge most of the deepfake detection techniques through learning. This ability of deepfakes to learn and elude detection technologies is a matter of significant concern. In this research work, we focus on our efforts towards the detection of deepfake images. We follow two approaches for deepfake image detection, and the first is to build a custom CNN based deep learning network to detect deepfake images, and the second is to use the concept of transfer learning. © 2021 IEEE.
  • No Thumbnail Available
    Item
    Deployment of Computer Vision Application on Edge Platform
    (Institute of Electrical and Electronics Engineers Inc., 2021) Geetha, V.; Kiran, C.; Sharma, M.; Rakshith Kumar, J.
    In our work, we propose a low cost device which will aid visually impaired people to understand what is in their surroundings without the requirement of internet. Current technology makes use of Cloud Architecture and would require internet to achieve this purpose. But these systems will not work in areas with poor internet connectivity. Edge platform built on Raspberry Pi powered with Intel Neural Compute Stick is used by us for this purpose. Multi Label Image Classification Deep Learning Model is trained in the cloud. It is later optimised and deployed on Edge Device which is Raspberry Pi. Setup also consists of PiCamera which will record the video and give it as input to deployed model. Model will describe the items present in video, basically describing the surroundings. The output is in the form of audio which is played through speakers, thus enabling visually impaired people to understand their surroundings without the requirement of internet. Deployment of popular Machine Learning and Deep Learning Models is also examined in the edge device and a comprehensive performance evaluation is performed. © 2021 IEEE.
  • No Thumbnail Available
    Item
    Design, Implementation, and Evaluation of a Low-Cost Visible Light Communication Testbed
    (Springer Science and Business Media Deutschland GmbH, 2024) Salvi, S.; Geetha, V.
    The proposed testbed demonstrated and studied the behavior of channels and modulation techniques. Modulation techniques such as On-Off Keying (OOK) and Pulse Duration Modulation (PDM) were implemented on the testbed. Their performance was evaluated based on the distance between the transmitter and receiver, bit rate, and accuracy. A free-space optical communication channel model was also implemented in MATLAB to study the impact of physical characteristics on channel performance. Physical factors such as room dimensions, LED power, and transmitter field of view (FoV) were considered for the simulation. Additionally, the results of the proposed testbed were compared with the standard indoor free-space optical communication channel model implemented in MATLAB. It was observed that the PDM modulation technique consistently provided a 2x improvement in accuracy over OOK modulation for the same distance. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.
  • Thumbnail Image
    Item
    Effect of mobility over performance of the ad hoc networks
    (2006) Geetha, V.; Aithal, S.; ChandraSekaran, K.
    An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. A number of routing protocols like Dynamic Source Routing (DSR), Ad Hoc On-Demand Distance Vector Routing (AODV), Destination-Sequenced Distance-Vector (DSDV) and Temporally Ordered Routing Algorithm (TORA) are normally used in ad hoc networks. In this paper an attempt has been made to compare the effect of mobility in case of on-demand reactive routing protocols for mobile ad hoc networks: AODV with traditional proactive DSDV protocol. The performance is analyzed using varying number of connections in the network, mobility pause and speed of the node. These simulations are carried out using the ns-2 network simulator. � 2006 IEEE.
  • No Thumbnail Available
    Item
    Effect of mobility over performance of the ad hoc networks
    (2006) Geetha, V.; Aithal, S.; ChandraSekaran, K.
    An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. A number of routing protocols like Dynamic Source Routing (DSR), Ad Hoc On-Demand Distance Vector Routing (AODV), Destination-Sequenced Distance-Vector (DSDV) and Temporally Ordered Routing Algorithm (TORA) are normally used in ad hoc networks. In this paper an attempt has been made to compare the effect of mobility in case of on-demand reactive routing protocols for mobile ad hoc networks: AODV with traditional proactive DSDV protocol. The performance is analyzed using varying number of connections in the network, mobility pause and speed of the node. These simulations are carried out using the ns-2 network simulator. © 2006 IEEE.
  • No Thumbnail Available
    Item
    Energy efficient LEACH by enhancing the data update procedure of cluster head
    (2013) Rajan, P.; Geetha, V.
    There are several modification has been happened in LEACH protocol. Most of modifications are in cluster organization. This paper studies modified LEACH protocol using data update procedure of cluster head. In LEACH protocol frequency of sending data to the base station by smaller cluster is higher than bigger cluster due to that energy dissipation in smaller cluster is more than bigger cluster. This paper studies modified LEACH protocol in which frequency of sending data to the base station by each cluster is same. Simulation has been done in NS2 and simulation result shows that modified LEACH protocol is more energy efficient than LEACH protocol. � 2013 IEEE.
  • No Thumbnail Available
    Item
    Energy efficient LEACH by enhancing the data update procedure of cluster head
    (2013) Rajan, P.; Geetha, V.
    There are several modification has been happened in LEACH protocol. Most of modifications are in cluster organization. This paper studies modified LEACH protocol using data update procedure of cluster head. In LEACH protocol frequency of sending data to the base station by smaller cluster is higher than bigger cluster due to that energy dissipation in smaller cluster is more than bigger cluster. This paper studies modified LEACH protocol in which frequency of sending data to the base station by each cluster is same. Simulation has been done in NS2 and simulation result shows that modified LEACH protocol is more energy efficient than LEACH protocol. © 2013 IEEE.
  • No Thumbnail Available
    Item
    Enhanced back-off technique for IEEE 802.15.4 WSN standard
    (2014) Vutukuri, A.; Bhattacharya, S.; Raj, T.; Sridhar; Geetha, V.
    IEEE 802.15.4 is the standard for Low-rate Wireless Personal Area Networks. The CSMA-CA algorithm used in the standard for channel contention causes performance bottlenecks in certain scenarios. We have conducted a performance evaluation of the back-off algorithm with the help of simulations on star networks and identified two parameters which affect the performance of the algorithm - macMinBE and macMaxBE. Further, we have also proposed an enhanced algorithm which involves these two parameters and improves the performance of the back-off algorithm. � 2014 Springer International Publishing Switzerland.
  • No Thumbnail Available
    Item
    Enhanced back-off technique for IEEE 802.15.4 WSN standard
    (Springer Verlag service@springer.de, 2014) Vutukuri, A.; Bhattacharya, S.; Raj, T.; Sridhar; Geetha, V.
    IEEE 802.15.4 is the standard for Low-rate Wireless Personal Area Networks. The CSMA-CA algorithm used in the standard for channel contention causes performance bottlenecks in certain scenarios. We have conducted a performance evaluation of the back-off algorithm with the help of simulations on star networks and identified two parameters which affect the performance of the algorithm - macMinBE and macMaxBE. Further, we have also proposed an enhanced algorithm which involves these two parameters and improves the performance of the back-off algorithm. © 2014 Springer International Publishing Switzerland.
  • «
  • 1 (current)
  • 2
  • 3
  • »

Maintained by Central Library NITK | DSpace software copyright © 2002-2026 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify