#### Filter Results:

#### Publication Year

2000

2015

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

Content-based image retrieval (CBIR) systems normally return the retrieval results according to the similarity between features extracted from the query and candidate images. In certain circumstances, however users are most qualified to specify the query " content " or objects(e.g., Eiffel Tower) of their interest , not the computer and only wish to… (More)

- K. Anup Kumar
- 2012

In this paper, we have developed a block cipher by offering a modification to the classical Feistel cipher. Unlike in the case of the classical Feistel cipher wherein we have a binary string as a plaintext, here we have taken the plaintext as a matrix, which is divided into a pair of matrices. One of these matrices is multiplied with the key matrix on both… (More)

- K. Anup Kumar
- 2012

In this investigation, we have generalized the classical Feistel cipher by representing the plaintext in the form of a matrix instead of a binary string used in the case of classical Feistel cipher. In this, the plaintext matrix is divided into two matrices and one of these two is multiplied with the key matrix on both the sides. In the iteration process,… (More)

A deep knowledge of process execution behavior is very useful in formulating better scheduling techniques. In this paper we study the approaches to the process characterization problem. Also we propose a novel method to characterize and categorize process execution behaviors by using machine learning techniques that learn from previous execution instances… (More)

- K. Anup Kumar
- 2012

In this paper, we have developed a block cipher by modifying the Feistel cipher. Here we have taken the plaintext in the form of a pair of matrices and we have introduced a set of operations called key based substitution, Shifting of rows, Key based mixing of columns, modular arithmetic addition and shuffling. In this analysis, the key based substitution… (More)

- K. Anup Kumar
- 2012

In this investigation, we have developed a block cipher which includes the basic ideas of the modified Feistel cipher and the advanced Hill cipher. In the advanced Hill cipher, as the modular arithmetic inverse of a matrix is the same as the matrix itself, the computations involved in the development of the inverse of the matrix are reduced remarkably. The… (More)

- Nikola Kasabov, V. JaganNaveen, T. prabakar, J. Venkata Suman, P. Devi, Pradeep +10 others
- 2012

Noise reduction in speech applications has a significant amount of research for several decades. The ultimate goal of the speech signal processing research is to develop systems which can perform well in noisy environments. The main objective of this research work is to obtain a clean speech signal of higher quality by applying the optimal noise… (More)

The end-effectors of the manipulator are required to move in a particular fashion to accomplish a specified task. The execution of the specific task requires the manipulator to follow a preplanned path, which is the larger problem of motion or trajectory planning and motion control for the manipulator. The goal of trajectory planning is to describe the… (More)

- U. K Sastry, K. Anup Kumar
- 2012

— In this paper, we have developed a block cipher by modifying the Feistel cipher. In this, the plaintext is taken in the form of a pair of matrices. In one of the relations of encryption the plaintext is multiplied with the key matrix on both the sides. Consequently, we use the modular arithmetic inverse of the key matrix in the process of decryption. The… (More)

- U. K Sastry, K. Anup Kumar
- 2012

— In this investigation, we have modified the Feistel cipher by taking the plaintext in the form of a pair of square matrices. Here we have introduced the operation multiplication with the key matrices and the modular arithmetic addition in encryption. The modular arithmetic inverse of the key matrix is introduced in decryption. The cryptanalysis carried… (More)