G. N. Sekhar

Learn More
Over the last two decades, in the field of secure communication and financial on-line applications, we have witnessed an explosive growth in biometric personal authentication systems which are covenant with a measurable physical characteristic or behavioral trait. On-line refers to making use of the time functions of the signing process. Verification of(More)
In online applications, there is a foreseeable explosive growth in biometric personal authentication systems which are covenant with a measurable behavioral trait. Hand written object [HO] verification is the process used to recognize an individual, which is intuitive reliable indicator. Verification of a HO as a biometric modality still is a challenging(More)
In Heterogeneous systems, Vertical Handoff calculations (VHAs) used to permit mobile terminals (MT) to keep up the system association when versatile hub switch starting with one remote system then onto the next one. The Vertical Handover Decision is NP-Hard issue, thus assessment of all VHA is imperative perspective while working with Vertical Handoff(More)
—Hand written object [HO] verification is the process used to recognize an individual, is intuitive reliable indicator which can be character recognition, handwriting verification, style classification, shape recognition and signature recognition. This paper discusses the trajectory generation [TG] methods, as novel methods to deal inter-class and(More)
The next generation wireless systems will support heterogeneous traffic with seamless mobility. A single network alone cannot cope up with such heterogeneous requirements. Hence it is desirable to interoperate between diverse and complementary radio access technologies (RATs).In such system, user will switch between different radio access technologies(More)