1. "Facial Expression Analysis by k-means Clustering on Fiducial points of face" to be presented at The 12th International Conference on Computer Vision Theory and Applications
2. "Social Influence As A Parameter to Prioritize Social Problems" presented at the International Conference On Advanced Technologies For Societal Application
3. "Advanced Dual Layered Encryption for Block Based Approach to Image Steganography" presented at the IEEE International Conference On Computing, Analytics And Security Trends
4. "Age Estimation using LS-SVM Regression on Facial Images" presented at the International Symposium on Visual Computing
5. "Fiducial points detection of a face using RBF-SVM and Adaboost Classification" presented at ACCV 2nd Workshop On Spontaneous Facial Behaviour Analysis
6. "Advanced 3-DES Block Based Least Significant Bit Algorithm for Image Steganography" presented at the IEEE World Congress On Internet Security
7. "An Advanced Diffie-Hellman Approach to Image Steganography" presented at the IEEEComsoc Sponsored 10th IEEE International Conference on Advanced Networks and Telecommunications Systems
8. "Using Blowfish Encryption to Enhance Security Feature Of An Image" presented at the IEEE International Conference On Information Communication And Management
9. "Statistical Approach for Disk Scheduling Algorithm" presented at the IEEE, ACM and Internet Society Of Thailand Chapter 2nd World Congress On Engineering Science And Technology
10. "An Innovative Trigonometric Approach to Cryptography" presented at the IEEE Sponsored International Conference On Control, Computing, Communication And Materials
11. "Adaptive Standard Deviation Based Disk Scheduling Algorithm" presented at the IEEE Sponsored International Conference On Advanced Computing and Software Engineering
12. "Face Verification Across Age Progression Using Facial Feature Extraction" presented at the IEEE International Conference On Signal And Information Processing
13. "Traffic Timer Synchronization based on Congestion" presented at the IEEE Sponsored International Conference on Computational Systems and Information Technology for Sustainable Solution
14. "Innovative Enhancement Of Caesar Cipher Algorithm for Cryptography" presented at the IEEE Sponsored 2nd International Conference On Advances in Computing, Communication And Automation Refer: Gowda, S.N., 2016, September. Innovative enhancement of the Caesar cipher algorithm for cryptography. In Advances in Computing, Communication, & Automation (ICACCA)(Fall), International Conference on (pp. 1-4). IEEE.
15. "Dual Layered Secure Algorithm For Image Steganography" presented at the 2nd IEEE International Conference On Applied and Theoretical Computing and Communication Technologies
16. "Surveillance Video Based Robust Detection And Notification Of Real Time suspicious activities in indoor scenarios" presented at the 3rd International Conference on Signal and Image Processing
17. "Innovative Approach to Hide Data in Images" presented at the International Conference on Emerging Trends in Engineering and Technology
18. "Block Based Least Significant Bit Algorithm for Image Steganography" presented at the 2016 Annual International Conference on Intelligent Computing, Computer Science and Information Systems
19. "Dynamic Mean Based Job Scheduling Algorithm" presented at the Sixth IEEE Sponsored International Conference on Digital Information Processing and Communications
Journal Publications
1. "Count Based Page Replacement Technique" published in the International Journal Of Advances In Electronics And Computer Science August edition.
2. "Statistical Approach to Determine Most Efficient Value For Time Quantum In Round Robin Scheduling" published in the International Journal Of Computer Science And Information Technology August edition.
2. "Social Influence As A Parameter to Prioritize Social Problems" presented at the International Conference On Advanced Technologies For Societal Application
3. "Advanced Dual Layered Encryption for Block Based Approach to Image Steganography" presented at the IEEE International Conference On Computing, Analytics And Security Trends
4. "Age Estimation using LS-SVM Regression on Facial Images" presented at the International Symposium on Visual Computing
5. "Fiducial points detection of a face using RBF-SVM and Adaboost Classification" presented at ACCV 2nd Workshop On Spontaneous Facial Behaviour Analysis
6. "Advanced 3-DES Block Based Least Significant Bit Algorithm for Image Steganography" presented at the IEEE World Congress On Internet Security
7. "An Advanced Diffie-Hellman Approach to Image Steganography" presented at the IEEEComsoc Sponsored 10th IEEE International Conference on Advanced Networks and Telecommunications Systems
8. "Using Blowfish Encryption to Enhance Security Feature Of An Image" presented at the IEEE International Conference On Information Communication And Management
9. "Statistical Approach for Disk Scheduling Algorithm" presented at the IEEE, ACM and Internet Society Of Thailand Chapter 2nd World Congress On Engineering Science And Technology
10. "An Innovative Trigonometric Approach to Cryptography" presented at the IEEE Sponsored International Conference On Control, Computing, Communication And Materials
11. "Adaptive Standard Deviation Based Disk Scheduling Algorithm" presented at the IEEE Sponsored International Conference On Advanced Computing and Software Engineering
12. "Face Verification Across Age Progression Using Facial Feature Extraction" presented at the IEEE International Conference On Signal And Information Processing
13. "Traffic Timer Synchronization based on Congestion" presented at the IEEE Sponsored International Conference on Computational Systems and Information Technology for Sustainable Solution
14. "Innovative Enhancement Of Caesar Cipher Algorithm for Cryptography" presented at the IEEE Sponsored 2nd International Conference On Advances in Computing, Communication And Automation Refer: Gowda, S.N., 2016, September. Innovative enhancement of the Caesar cipher algorithm for cryptography. In Advances in Computing, Communication, & Automation (ICACCA)(Fall), International Conference on (pp. 1-4). IEEE.
15. "Dual Layered Secure Algorithm For Image Steganography" presented at the 2nd IEEE International Conference On Applied and Theoretical Computing and Communication Technologies
16. "Surveillance Video Based Robust Detection And Notification Of Real Time suspicious activities in indoor scenarios" presented at the 3rd International Conference on Signal and Image Processing
17. "Innovative Approach to Hide Data in Images" presented at the International Conference on Emerging Trends in Engineering and Technology
18. "Block Based Least Significant Bit Algorithm for Image Steganography" presented at the 2016 Annual International Conference on Intelligent Computing, Computer Science and Information Systems
19. "Dynamic Mean Based Job Scheduling Algorithm" presented at the Sixth IEEE Sponsored International Conference on Digital Information Processing and Communications
Journal Publications
1. "Count Based Page Replacement Technique" published in the International Journal Of Advances In Electronics And Computer Science August edition.
2. "Statistical Approach to Determine Most Efficient Value For Time Quantum In Round Robin Scheduling" published in the International Journal Of Computer Science And Information Technology August edition.
1) Complete Traffic Synchronization based on congestion
An entire system is being produced to dynamically change the existing traffic system. First image processing is done to detect the lane with maximum density. This is done using OpenCV in C++. But when an emergency vehicle approaches the lane in which it is arriving is freed. Priority is set to avoid ambiguous choice of emergency vehicle. The emergency vehicle is detected using a bandpass filter. All signals are being maintained using a database. The database is necessary to avoid signals with broken roads etc. The database is created using mySQL which is stored in an AWS cloud. The entire execution is managed by programming a Raspberry Pi using Python.
2) Social Problems Prioritization using Social media using R Language
An app was developed which helped to prioritize general social problems being experienced by the public. A set of photos would be uploaded under a particular hashtag (for example #helpbangalore), these would be shared to the public who could voice their opinion by 'retweeting' or 'favouriting' the images they felt were most important. This would be kept for a week and the photos would be ordered based on highest number of retweets and favourites to help the local in charge to deal with the problem the people found most important.
3) Detection of emergency vehicles using sound sensor module
All emergency vehicles repeat sounds of some frequency. This was taken as the idea and a sound sensor module was designed with a filter to help block out other frequencies. Also each emergency vehicle was given priority,with ambulances being given highest priority.
An entire system is being produced to dynamically change the existing traffic system. First image processing is done to detect the lane with maximum density. This is done using OpenCV in C++. But when an emergency vehicle approaches the lane in which it is arriving is freed. Priority is set to avoid ambiguous choice of emergency vehicle. The emergency vehicle is detected using a bandpass filter. All signals are being maintained using a database. The database is necessary to avoid signals with broken roads etc. The database is created using mySQL which is stored in an AWS cloud. The entire execution is managed by programming a Raspberry Pi using Python.
2) Social Problems Prioritization using Social media using R Language
An app was developed which helped to prioritize general social problems being experienced by the public. A set of photos would be uploaded under a particular hashtag (for example #helpbangalore), these would be shared to the public who could voice their opinion by 'retweeting' or 'favouriting' the images they felt were most important. This would be kept for a week and the photos would be ordered based on highest number of retweets and favourites to help the local in charge to deal with the problem the people found most important.
3) Detection of emergency vehicles using sound sensor module
All emergency vehicles repeat sounds of some frequency. This was taken as the idea and a sound sensor module was designed with a filter to help block out other frequencies. Also each emergency vehicle was given priority,with ambulances being given highest priority.