J. Ranga Rao

Learn More
  • Corresponding Author, V Vijaya Kumar, V Vijaya Kumar, A Srikrishna, G Hemantha Kumar, Rayapati Venkat +2 others
  • 2009
Problem statement: A generalized skeleton transform allows a shape to be represented as a collection of modestly overlapped octagonal shape parts. One problem with several generalized Morphological skeleton transforms is that they generate noise after decomposition. The noise rate may not be effective for ordinary images; however this effect will be more(More)
Progress in personalised psychiatry is dependent on researchers having access to systematic and accurately acquired symptom data across clinical diagnoses. We have developed a structured psychiatric assessment tool, OPCRIT+, that is being introduced into the electronic medical records system of the South London and Maudsley NHS Foundation Trust which can(More)
Xanthoma of bone is a rare benign bone disorder. It radiologically presents as a lytic lesion, often with cortical expansion or disruption, mimics primary bone tumors and metastatic lesions. Histopathological study gives the definitive diagnosis. Xanthoma of bilateral tibia in a normolipidemic patient is rare and not yet reported in literature. Here with we(More)
  • Darnasi Veeraiah, R Upendar Rao, Ranga Rao
  • 2013
In now a days, most of the communication takes place through Internet. Most of the users are used to transmit their information through insecure channels that are interconnected throughout world. Thus, security must be provided to achieve confidentiality, access control, integrity and authentication. To ensure all these services, various cryptography and(More)
In this paper, we consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet to a malicious action(More)
  • Venkatesha Prasad, Ranga Rao, Huaizhou Shi
  • 2011
II III Acknowledgements I would like to deliver my deepest appreciation to my instructors, Dr. Venkatesha Prasad Ranga Rao and Huaizhou Shi for their invaluable support, guidance and encouragement during the whole thesis project. I would like to express my gratitude to them for the time we spent together discussing the simulations and results. I am also(More)
  • Andrei Bogdan Mihoci, Koen Langendoen, Stefan Dulman, Venkatesha Prasad, Ranga Rao, Msc Ir Andrei Pruteanu +2 others
  • 2011
The technology required to design and deploy large scale wireless sensor networks is available, affordable and shows an increased interest in various application domains. However, application development for distributed systems is a cumbersome task, typically carried out with low–level embedded programming paradigms. A middleware is usually employed to(More)
— In this article, a cognitive management framework is proposed for ensuring exploitation of the Future Internet (FI). Cognitive systems offer self-x and learning. A cognitive system has the ability to dynamically select its behavior through self-management/awareness functionality, taking into account information and knowledge on the context of the(More)
In the faceless world of the Internet, online fraud is one of the greatest reasons of loss for web merchants. Advanced solutions are needed to protect e-businesses from the constant problems of fraud. Many popular fraud detection algorithms require supervised training, which needs human intervention to prepare training cases. Since it is quite often for an(More)
  • 1