Uday Joshi

Learn More
With the increasing number of computers on the Internet, there is a growing interest in harnessing the unused and inexpensive computational resources over the Internet. However, current approaches such as the Grid computing paradigm are not sufficient. We present our preliminary work that uses extends Peer-2-Peer (P2P) computing with a framework that allows(More)
With an aging global population, it is important that clinicians empower their patients. Empowering the patient-physician interaction leads to a more positive health outcome. This chapter discusses the potential of adopting Customer Relationship Management (CRM) as a way of guiding non-critical care services (i.e. linking the problems of customer-focused(More)
  • Uday Joshi, Bhakti Palkar, Khushi Khanchandani
  • 2015
Image compression can be done in two ways namely lossy or lossless. Lossy methods are used for expected results like photographs where some negligible loss of data is tolerable. Rapid growth of medical science such as ehealth and telemedicine requires lossless Image compression. The correlation and redundancy which exists across different medical images are(More)
Security is becoming the primary concern of society. Having a security system is therefore becoming a requirement. Video surveillance plays a vital role in security systems. Consider a video stream taken by a fixed camera to monitor motion-restricted area. The system works on a real-time video,from the camera, which is accessed frame to frame. The proposed(More)
Security is becoming the primary concern of society due to a booming population, increasing scarcity of jobs, growing problems especially in urban cities, and the number of antisocial activities, etc. Having a security system is therefore becoming a requirement. Surveillance camera's output, when monitored, can track unauthorized objects from causing a(More)
We propose a remote file system for use in desktop grid applications. The proposed system provides programs with the ability to query and update files on remote machines without requiring any changes to the program code. The system (a) generates a profile of the program file operations and (b) uses the profile to implement collective and pre-fetched I/O.
  • 1