Kishore Kumar

Learn More
OBJECTIVES To describe formal, external to programme methods for size estimation of high-risk populations and compare execution challenges and validity of results. DESIGN A cross-sectional HIV risk behavioural and biological survey was implemented among 24, 10 and five female sex workers, high-risk men who have sex with men and injecting drug user survey(More)
— Kalman filter is a well known adaptive filtering Algorithm, widely used for target tracking applications. When the system model and measurements are non linear, variation of Kalman filter like extended Kalman filter (EKF) and Unscented Kalman filters (UKF) are used. For obtaining reliable estimate of the target state, filter has to be tuned before the(More)
Visual cryptography encodes a secret image into n shares which are distributed to n participants. Pixel Sieve method was proposed recently to encode an image into shares, but the encryption quality is poor. In this paper an improved version of pixel sieve method is proposed to achieve more security then existing pixel sieve method. Based on cross merge and(More)
The end-effectors of the manipulator are required to move in a particular fashion to accomplish a specified task. The execution of the specific task requires the manipulator to follow a preplanned path, which is the larger problem of motion or trajectory planning and motion control for the manipulator. The goal of trajectory planning is to describe the(More)
A deep knowledge of process execution behavior is very useful in formulating better scheduling techniques. In this paper we study the approaches to the process characterization problem. Also we propose a novel method to characterize and categorize process execution behaviors by using machine learning techniques that learn from previous execution instances(More)
Visual cryptography encodes a secret image into n shares which are distributed to n participants. Pixel Sieve method was proposed recently to encode an image into shares, but the encryption quality is poor. In this paper an modified version of pixel sieve method is proposed to achieve more security than existing pixel sieve method. Based on key shifting(More)