Search For:

Displaying 1-16 out of 16 total
Development of Fuzzy Software Operational Profile
Found in: Secure System Integration and Reliability Improvement
By K. Saravana Kumar, Ravindra Babu Misra, Neeraj Kumar Goyal
Issue Date:July 2008
pp. 195-196
Software operational profile (SOP) has found its extensive use in applications such as estimation of software reliability, allocation of testing resources, evaluation of software quality attribute and testing of software etc. However, due to limited data r...
 
Localizing Parts of Faces Using a Consensus of Exemplars
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Peter N. Belhumeur,David W. Jacobs,David J. Kriegman,Neeraj Kumar
Issue Date:December 2013
pp. 2930-2940
We present a novel approach to localizing parts in images of human faces. The approach combines the output of local detectors with a nonparametric set of global models for the part locations based on over 1,000 hand-labeled exemplar images. By assuming tha...
 
Learning Automata Based Contention Aware Data Forwarding Scheme for Safety Applications in Vehicular Ad Hoc Networks
Found in: 2013 IEEE 10th International Conference on e-Business Engineering (ICEBE)
By Neeraj Kumar,Rahat Iqbal,Anne James,Amit Dua
Issue Date:September 2013
pp. 385-392
With an exponential growth of demands of the users to access various resources during mobility lead to the popularity of Vehicular Ad Hoc Networks (VANETs). Users may access various resources from cloud which consists of many resources for the ease of user...
 
A Novel Hybrid Approach for Web Caching
Found in: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
By Rajeev Tiwari,Neeraj Kumar
Issue Date:July 2012
pp. 512-517
With the advancement of technology and development of many new applications now a days, the World Wide Web (WWW) suffers from scaling and reliability problems due to overloaded and congested proxy servers. Caching at local proxy servers helps, but cannot s...
 
Two faces are better than one: Face recognition in group photographs
Found in: Biometrics, International Joint Conference on
By Ohil K. Manyam,Neeraj Kumar,Peter Belhumeur,David Kriegman
Issue Date:October 2011
pp. 1-8
Face recognition systems classically recognize people individually. When presented with a group photograph containing multiple people, such systems implicitly assume statistical independence between each detected face. We question this basic assumption and...
 
Fusing with context: A Bayesian approach to combining descriptive attributes
Found in: Biometrics, International Joint Conference on
By Walter J. Scheirer,Neeraj Kumar,Karl Ricanek,Peter N. Belhumeur,Terrance E. Boult
Issue Date:October 2011
pp. 1-8
For identity related problems, descriptive attributes can take the form of any information that helps represent an individual, including age data, describable visual attributes, and contextual data. With a rich set of descriptive attributes, it is possible...
 
X-MODDES (eXtended Multi Operator Delimiter Based Data Encryption Standard)
Found in: Future Networks, International Conference on
By Prosanta Gope, Akhil Kaushik, Kushal Arora, Neeraj Kumar
Issue Date:January 2010
pp. 399-403
An Algorithm is considered computationally secure if it can not be broken with standard resources, either current or future. In this paper we have introduced a new block cipher algorithm named X-MODDES. It is unique independent approach which uses several ...
 
Synthesis and Modeling of Spiral Inductor at 90nm Technology
Found in: Advances in Recent Technologies in Communication and Computing, International Conference on
By Neeraj Kumar Shukla, Shilpi Birla, R.K. Singh
Issue Date:October 2009
pp. 738-740
Spiral Inductors suffer from complex loss mechanism in the metal and substrate and consume large chip area making them difficult to characterize and expensive to implement. The performance of on chip spiral inductors is a limiting factor. The spiral induct...
 
The Impact of Loop Unrolling on Controller Delay in High Level Synthesis
Found in: Design, Automation and Test in Europe Conference and Exhibition
By Neeraj Kumar Singh, Preeti Ranjan Panda
Issue Date:April 2007
pp. 79
Loop unrolling is a well-known compiler optimization that can lead to significant performance improvements. When used in high level synthesis (HLS) unrolling can affect the controller complexity and delay. We study the effect of the loop unrolling factor o...
 
Neural Network Based Energy Efficient Clustering and Routing in Wireless Sensor Networks
Found in: Networks & Communications, International Conference on
By Neeraj Kumar Nehra, Manoj Kumar, R.B. Patel
Issue Date:December 2009
pp. 34-39
Energy is a valuable resource in Wireless Sensor Networks (WSNs). The status of energy consumption should be continuously monitored after network deployment. The information about energy status can be used to early notify both sensor nodes and Network Depl...
 
Formal Specification of Medical Systems by Proof-Based Refinement
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Dominique Méry, Neeraj Kumar Singh
Issue Date:January 2013
pp. 1-25
Formal methods have emerged as an alternative approach to ensuring quality and correctness of highly critical systems, overcoming limitations of traditional validation techniques such as simulation and testing. We propose a refinement-based methodology for...
     
The cardiac pacemaker case study and its implementation in safety-critical Java and Ravenscar Ada
Found in: Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems (JTRES '12)
By Ana Cavalcanti, Andy Wellings, Neeraj Kumar Singh
Issue Date:October 2012
pp. 62-71
The cardiac pacemaker has emerged as a case study for evaluating the effectiveness of techniques for the verification and design of embedded systems with complex control requirements. This paper reports on the experiences of using this case study to evalua...
     
Critical systems development methodology using formal techniques
Found in: Proceedings of the Third Symposium on Information and Communication Technology (SoICT '12)
By Dominique Méry, Neeraj Kumar Singh
Issue Date:August 2012
pp. 3-12
Formal methods have emerged as an alternative approach to ensuring the quality and correctness of the high confidence critical systems, overcoming limitations of the traditional validation techniques such as simulation and testing. This paper presents a me...
     
Automatic code generation from event-B models
Found in: Proceedings of the Second Symposium on Information and Communication Technology (SoICT '11)
By Dominique Mery, Neeraj Kumar Singh
Issue Date:October 2011
pp. 179-188
This paper presents a translation tool that automatically generates efficient target programming language code (C, C++, Java and C#) from Event-B formal specification related to the analysis of complex problems. This tool is a collection of plug-ins, which...
     
Face swapping: automatically replacing faces in photographs
Found in: ACM Transactions on Graphics (TOG)
By Dmitri Bitouk, Neeraj Kumar, Peter Belhumeur, Samreen Dhillon, Shree K. Nayar
Issue Date:August 2008
pp. 1-49
In this paper, we present a complete system for automatic face replacement in images. Our system uses a large library of face images created automatically by downloading images from the internet, extracting faces using face detection software, and aligning...
     
The impact of loop unrolling on controller delay in high level synthesis
Found in: Proceedings of the conference on Design, automation and test in Europe (DATE '07)
By Neeraj Kumar Singh, Preeti Ranjan Panda, Srikanth Kurra
Issue Date:April 2007
pp. 391-396
Loop unrolling is a well-known compiler optimization that can lead to significant performance improvements. When used in High Level Synthesis (HLS) unrolling can affect the controller complexity and delay. We study the effect of the loop unrolling factor o...
     
 1