C. Ramesh Reddy

Learn More
Emerging embedded applications are based on evolving standards (e.g., MPEG2/4, H.264/265, IEEE802.11a/b/g/n). Since most of these applications run on handheld devices, there is an increasing need for a single chip solution that can dynamically interoperate between different standards and their derivatives. In order to achieve high resource utilization and(More)
In the recent times many accessible congestion control procedures have no capability to differentiate involving two major problems like packet loss by link crash and packet loss by congestion due to buffer overflow. Consequently these resolutions effect in form of wastage of possessions because they target only on the packet drop by link crash that has the(More)
We all are familiar about Steganography. We know that Steganography is a skill of hiding any information with invisible existence inside other objects, which are known as cover objects. These cover objects can be protocol, audio, video, text, image etc. Today HTML pages and spam emails are also being used for Steganography. With the help of Steganography we(More)
Big data has gained its popularity in the recent years due to the fact that there is a need for sophisticated method to collect, process, analyze and visualize huge volumes of data generated by our digital and computing world. Several challenges in handling petabytes of information, commonly named as Big data needs to be addressed in more efficient way. Big(More)
  • 1