8 results on '"Annam, Karthik"'
Search Results
2. Improved Artificial Neural Network with State Order Dataset Estimation for Brain Cancer Cell Diagnosis
- Author
-
Indira, D. N. V. S. L. S., primary, Ganiya, Rajendra Kumar, additional, Ashok Babu, P., additional, Xavier, A. Jasmine, additional, Kavisankar, L., additional, Hemalatha, S., additional, Senthilkumar, V., additional, Kavitha, T., additional, Rajaram, A., additional, Annam, Karthik, additional, and Yeshitla, Alazar, additional
- Published
- 2022
- Full Text
- View/download PDF
3. Automatic Detection of Brain Tumors Using Genetic Algorithms With Multiple Stages in Magnetic Resonance Images.
- Author
-
Annam, Karthik, Kumar, G Sunil, Babu, P Ashok, and Domala, Narsaiah
- Subjects
- *
BRAIN tumors , *MAGNETIC resonance imaging , *ERROR rates - Abstract
The field of biomedicine is still working on a solution to the challenge of diagnosing brain tumors, which is now one of the most significant challenges facing the profession. The possibility of an early diagnosis of brain cancer depends on the development of new technologies or instruments. Automated processes can be made possible thanks to the classification of different types of brain tumors by utilizing patented brain images. In addition, the proposed novel approach may be used to differentiate between different types of brain disorders and tumors, such as those that affect the brain. The input image must first undergo pre-processing before the tumor and other brain regions can be separated. Following this step, the images are separated into their respective colors and levels, and then the Gray Level Co-Occurrence and SURF extraction methods are used to determine which aspects of the photographs contain the most significant information. Through the use of genetic optimization, the recovered features are reduced in size. The cut-down features are utilized in conjunction with an advanced learning approach for the purposes of training and evaluating the tumor categorization. Alongside the conventional approach, the accuracy, inaccuracy, sensitivity, and specificity of the methodology under consideration are all assessed. The approach offers an accuracy rate greater than 90%, with an error rate of less than 2% for every kind of cancer. Last but not least, the specificity and sensitivity of each kind are higher than 90% and 50%, respectively. The usage of a genetic algorithm to support the approach is more efficient than using the other ways since the method that the genetic algorithm utilizes has greater accuracy as well as higher specificity. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. Implementation of Area optimized Low power Multiplication and Accumulation
- Author
-
ANNAM KARTHIK, Vallabhuni Vijay, Sonagiri China Venkateswarlu, and Sandeep Paritala
- Subjects
General Computer Science ,Mechanics of Materials ,Electrical and Electronic Engineering ,Civil and Structural Engineering - Abstract
There is number of computations involved at every stage in Digital Signal Processing (DSP). At every stage of computation we have addition and multiplication of the terms derived from previous and presents stages. The general computation incorporates the use of normal multiplication and addition, but the circuitry of normal multiplication and addition is lethargic i.e., it consumes more space on chip, consumes more power and the speed of computation is also low.These drawbacks can be avoided by switching to proposed method called Multiplication and Accumulation (MAC). Aim of this project is to develop an Area optimized Low power digital circuit for MAC (Multiply and Accumulate) operation. We develop the Verilog Hardware Description Language code for the various implementations of the MAC (Multiply and Accumulate) that is we try to avoid using multipliers and prefer to use the combinational circuits like multiplexers. These Verilog HDL codes will be simulated to check the functionality. Once we get the expected results we go for the implementation of the digital circuits. We analyze all the MAC digital circuits to find out the best digital circuit which consumes minimum area and power. The importance of MAC in FPGA designs is explained by some filter designs. We also give some suggestions on the system level solutions based on the MAC.
- Published
- 2019
5. Performance on Speech Enhancement Objective Quality Measures Using Hybrid Wavelet Thresholding
- Author
-
ANNAM KARTHIK and Sonagiri China Venkateswarlu
- Subjects
Environmental Engineering ,General Engineering ,Computer Science Applications - Abstract
The quality of being easily understandable of the speech signals are very importantin communication and other speech related systems. In order to improve these two in thespeech signal, Speech improvement sets of computer instructions and devices are used so that itmay be better fully used by other speech processing setsof computer instructions. Most of the speech communication that requires atleast one microphone and the desired speech signal is usually contaminated by backgroundnoise and echo. As a result, the speech sign must be "cleaned" with advanced sign preparing devices before it is played out, transmitted, or put away. In this venture it has been investigated the required things and degree of upgrades in the field of discourse improvement utilizing discourse de-noising sets of PC directions announced in books with the fundamental intend to concentrate on the utilization of the window shape limits/rules in STSA based Speech Improvement process in which the sign destroyed by commotion is into edges and each part/segment is Windowed and the Windowed Speech pieces/parts zone connected to the Speech Improvement set of PC guidelines and the Improved Speech sign is modified in its time area. In general, the Speech Improvement methods make use theHamming Window for this purpose. In this work an attempt has been made to study the effect of Window shape on the Speech. The Modified Improved thresholding is proposed by Asser Ghanbari and Mohammad Reza Karami and can be used like a hard thresholding limit with respect to the wavelet coefficients through and through worth progressively conspicuous than limit esteem and resembles an exponential capacity for the wavelet coefficients supreme worth not as much as edge esteem and is characterized.
- Published
- 2019
6. Efficient carry select 16-bit square root adder with complementary metal-oxide semiconductor implementation
- Author
-
Pavitha Uppinakere Sathyanarayan, Mamtha Mohan, Sandeep Kakde, and Annam Karthik
- Subjects
Cadence ,Control and Optimization ,Binary to excess 1 converter transmission gate ,Computer Networks and Communications ,Hardware and Architecture ,Signal Processing ,Carry select adder ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Electrical and Electronic Engineering ,Pass transistors logic ,Information Systems - Abstract
The adder is the maximum usually used mathematics block in programs inclusive of central processing unit (CPU) and virtual sign processing. As a result, it is important to expand a space-saving, low-strength, high-overall performance adder circuit. The hassle is diagnosed to layout mathematics sub structures with minimized strength dissipation, low area, and minimal time postpone of common-sense circuits. In conventional carry select adder (CSA), the time required to generate the sum output is less than other basic adder circuits but the principal difficulty is the location because the variety of transistors used to put in force the CSA circuit is fairly more. So, the area increases because of which the overall power consumption of the circuit will be more. If it's far viable to lessen the variety of transistors used withinside the structure of CSA adder, then, the strength intake of the circuit may be decreased or even the reaction time will improve. By lowering the area of the adder circuit, the suggested solution intends to reduce power consumption and latency.
- Published
- 2022
7. GUI based execution of discourse upgrade system
- Author
-
ANNAM KARTHIK
- Subjects
Environmental Engineering ,General Engineering ,Computer Science Applications - Abstract
Discourse, being a key method for correspondence, has been inserted in different applications. In numerous unavoidable circumstances, we are rendered vulnerable attempting to conclude the understandability of the discourse and this is the place Speech improving strategy i.e. evacuation of undesirable foundation commotion, comes into picture. In this paper, an endeavor has been made towards contemplating Speech Enhancement methods, for example, Spectral Subtraction, Minimum Mean Square Error (MMSE), Kalman and Wiener channel. In view of our perceptions and investigation of different execution parameters, we finish up which of the strategies is most reasonable for discourse improvement. The usage of the code for different channels is finished utilizing.
- Published
- 2020
- Full Text
- View/download PDF
8. Wavelet Region implanting watermark upgrades the security framework in Digital Speech Watermarking
- Author
-
S. China Venkateswarlu, Annam Karthik, and Naluguru Udaya Kumar
- Subjects
Security framework ,Wavelet ,Computer science ,business.industry ,Data_MISCELLANEOUS ,Computer vision ,Watermark ,Artificial intelligence ,business ,Digital watermarking - Abstract
The progressions in innovation helped us to use biometric characteristics to verify the people without having them physically. To limit unapproved people and to encourage approved people different human characteristics are used. Face, unique marks, retina, iris, and DNA are some of the biometrics which is used most often to identify people. For additional security in-person authentication and identification systems, a combination of this biometrics can be utilized. Voice can also be used as a biometric similar to other biometrics. Special equipment and computer systems are required to separate this biometrics. This work helps to enhance security by upgrading the modules and embedding the watermark in the speech signal, in-person verification systems. Speakers are validated based on the watermark present in the speech signal. Energy calculations are performed for detail coefficients to select the coefficients where the watermark has to be implanted. The coefficients with less energy are selected for watermark embedding. Inverse discrete transform is applied on approximation and detail coefficients to produce the watermarked speech. The exhibition of the work is assessed by utilizing the subjective and objective measurements such as peak signal to noise ratio, bit error rate, and perceptual evaluation of speech quality. Peak signal to noise ratio is calculated between unique watermark and separated watermark and, unique and watermarked speech. An arrangement of speech articulations of the speaker during the training stage is used to develop the models for the person authentication system. During testing, structures are removed after original and watermarked speech articulations and are used towards calculate the correctness of the system.
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.