B. V. Kumar

Learn More
Due to increasing crime rate identification using biometrics has become an important field of research. When it is not possible to take snapshot, to read iris, to take finger prints etc then identification using gait may be proved an effective tool to identify a person. This paper presents a method which distinguishs between normal and abnormal gait. A(More)
Rapid adoption of RFID has proved to be a comprehensive litmus test for technologies enabling collaborative commerce. Webservices technology helps bind various components of a typical RFID deployment, namely applications, middleware and edge software, within and also across corporate boundaries. These enterprise scale components are being built as per(More)
This paper introduces Gabor wavelet grids localized within the region of importance (ROI) for a robust pattern recognition system that is capable of recognizing various image classes. The representation of the patterns is based on Gabor wavelet transforms. The features are extracted as a vector of values using an optimally chosen multiple frequency,(More)
It is necessary to use Student dataset in order to analyze student's performance for future improvements in study methods and overall curricular. Incremental learning methods are becoming popular nowadays since amount of data and information is rising day by day. There is need to update classifier in order to scale up learning to manage more training(More)
Wireless sensor network is defined as the network composed of tiny and energy restricted sensor nodes. Sensor nodes collect the useful information from surrounding environment and deliver it to the base station. Sensor nodes have limited energy. Routing protocols must consume minimum energy in order to prolong the network lifetime. Clustering is most energy(More)
— Alamouti code is a simple space-time code that can be used for transmit diversity systems. This is a class of easily decoded space-time codes that achieve full diversity order in Rayleigh fading channels. Alamouti code exist only for certain numbers of transmit antennas and do not provide array gain like diversity techniques that exploit transmit channel(More)
As Sensor networks are being used in remote environment monitoring, healthcare, machine automation, security of these networks is becoming a central concern. Till now main concern was to make sensor networks useful and deployable and little emphasis was placed on security. This paper analyses security issues and vulnerabilities in wireless sensor networks.(More)