Balaraja Lavanya

Learn More
As the operating frequency of electronic systems increases, the electromagnetic interference (EMI) effect becomes a serious problem especially in consumer electronics, microprocessor based systems, and data transmission circuits. Many approaches have been proposed to reduce EMI, such as shielding box, skew-rate control, and spread However, the SSCG has(More)
In bioinformatics, the discovery of transcription factor binding affinities is important. This is done by sequence analysis of micro array data. The determination of continuous and gapped motifs accurately from the given long sequence of data, say genetic data is challenging and requires a detailed study. In this paper, we propose an algorithm that can be(More)
Longest Common Subsequence (LCS) and Shortest Common Subsequence (SCS) problems are to find subsequences in given sequences in which the subsequence is as long as possible and as short as possible subsequence respectively. These subsequences are not necessarily contiguous or unique. In this paper we have proposed two new approaches to find LCS and SCS, of N(More)
With the drastic growth of Internet and VLSI design, applications of WSNs are increasing tremendously that ranges from environmental monitoring, habitat monitoring, traffic surveillance to battle fields. In WSN a number of tiny sensor nodes managed by small batteries are deployed in a hostile environment to monitor the physical parameters. During(More)
The objective of this paper is to provide directional control during handling maneuvers and effective isolation of passengers or pay load from road disturbances. Active suspension system is considered to be a way of increasing the freedom that one has to specify independently the characteristics of load carrying, handling and ride quality. In this paper, a(More)
Face identification plays one of the most important roles in biometrics to recognize a person. However, face identification is very difficult because of variations in size, orientations, different illuminations, and face expressions. In this paper, a hybrid approach is proposed based on principal component analysis (PCA) and tolerance rough similarity (TRS)(More)
In search of extensive security for data gave an idea of developing a methodology; such as the one that when tried to unwrap can never get exposed. In this research, data security is done in two methods; alphabetical encoding along with DNA operations, then Position weight matrix is calculated on the original data. The advantage of alphabetical encoding is(More)
  • 1