IJCSIS Papers by Yenumula Reddy
Abstract — Most of the fingerprint matching systems use the minutiae-based algorithms with a matc... more Abstract — Most of the fingerprint matching systems use the minutiae-based algorithms with a matching of ridge patterns. These fingerprint matching systems consider ridge activity in the vicinity of minutiae points, which has poorly recorded/captured exemplary prints (information). The MapReduce technique is enough to identify a required fingerprint from the database. In the MapReduce process, minutiae of the latent fingerprint data used as keys to the reference fingerprint database. The latent prints are analyzed using Bezier ridge descriptors to enhance the matching of partial latent against reference fingerprints. We implemented the MapReduce process to select a required document from a stream of documents using MapReduce package. MapReduce model uses parallel processing to generate results. However, it does not have the capability of using Graphics processing units (GPU) to execute faster than CPU-based system. In this research, we proposed a Python based Anaconda Accelerate system that uses GPU architecture to respond faster than MapReduce.
Keywords: fingerprint, minutiae points, MapReduce, Bezier ridge, GPU-based architecture;
International Journal of Computer Science and Information Security (IJCSIS), Vol. 13, No. 10, October 2015
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
Papers by Yenumula Reddy
… 2011, The Fifth International Conference on …, 2011
Abstract: Cooperation in wireless sensor networks to detect the malicious node without any infras... more Abstract: Cooperation in wireless sensor networks to detect the malicious node without any infrastructure is a recent trend in research. The current models need more storage, computation, security tools, and communication requirements. They fail in wireless sensor ...
The copyright release is a transfer of publication rights, which allows IARIA and its partners to... more The copyright release is a transfer of publication rights, which allows IARIA and its partners to drive the dissemination of the published material. This allows IARIA to give articles increased visibility via distribution, inclusion in libraries, and arrangements for submission to indexes. I, the undersigned, declare that the article is original, and that I represent the authors of this article in the copyright release matters. If this work has been done as work-for-hire, I have obtained all necessary clearances to execute a copyright release. I hereby irrevocably transfer exclusive copyright for this material to IARIA. I give IARIA permission or reproduce the work in any media format such as, but not limited to, print, digital, or electronic. I give IARIA permission to distribute the materials without restriction to any institutions or individuals. I give IARIA permission to submit the work for inclusion in article repositories as IARIA sees fit. I, the undersigned, declare that to the best of my knowledge, the article is does not contain libelous or otherwise unlawful contents or invading the right of privacy or infringing on a proprietary right.
Hidden terminal problem is one of the well-known problems when a node is visible from the access ... more Hidden terminal problem is one of the well-known problems when a node is visible from the access point but cannot communicate through it. The problem occurs in ad hoc networks as well as cognitive networks. The clear solution is not discussed in cognitive networks. In this paper, we proposed a method to solve the hidden terminal problem through cloud computing. The idea is that the cloud can store the status of cognitive network, compute, reorganize, and make available the current state of cognitive networks for future decisions. Further, we discussed the role of cloud computing in hidden terminal problems and a solution using the blackboard technology. The simulations were presented to cognitive radio network cloud and discussed the packet transfer and handshaking. The proposed cognitive network model using cloud technologies eliminates the overheads of request to send and clear to send. Further, implementation of cognitive networks through cloud technologies minimizes the problem ...
a series of events related to data analytics, special mechanisms and features of applying princip... more a series of events related to data analytics, special mechanisms and features of applying principles of data analytics, application oriented analytics, and target-area analytics. Processing of terabytes to petabytes of data, or incorporating non-structural data and multi-structured data sources and types require advanced analytics and data science mechanisms for both raw and partially-processed information. Despite considerable advancements on high performance, large storage, and high computation power, there are challenges in identifying, clustering, classifying, and interpreting of a large spectrum of information. The event was very competitive in its selection process and very well perceived by the international scientific and industrial communities. As such, it has attracted excellent contributions and active participation from all over the world. We were very pleased to receive a large amount of top quality contributions. The conference had the following tracks: Fundamentals ...
Spectrum is a scarce resource. The cognitive radio environments utilize the spectrum efficiently ... more Spectrum is a scarce resource. The cognitive radio environments utilize the spectrum efficiently through the dynamic spectrum access approach. Game theory, genetic algorithms, neural network, marketing, and economic models became the catalysts to boost the dynamic spectrum access for efficient utilization of the spectrum. Combinations of these models may sometimes help better in the allocation of unused spectrum (spectrum holes) for cognitive users (secondary users). The paper introduced the electronic commerce model to identify a quality channel preferred by the secondary user. The rating of the spectrum (channel) was modeled with a combination of Sporas formula and fuzzy reputation model proposed by Carbo, Molina and Davila. The proposed model helps to select the quality channel to cognitive user. Further, the cooperative game theory was introduced to gain the better channel by the cognitive user. The channel selection also tested with automated collaborative filtering and case-ba...
User access limitations are very valuable in Hadoop distributed file systems to access sensitive ... more User access limitations are very valuable in Hadoop distributed file systems to access sensitive and personal data. Even though the user has access to the database, the access limit check is very relevant at the time of MapReduce to control the user and to receive only permissible data. Data nodes do not enforce any access control on its access to the data blocks (read or write). Therefore, Kerberos ticket granting model for user login and user access permissions to MapReduce jobs do not limit the unauthorized data to obtain from the access granted database. In addition, to secure the data during processing, the authentication and authorization of data is required. The problems broadly include a) who will access the data, b) how it will be encrypted, and c) stability of data processing while the data are continuously growing. The current study includes the security mechanisms currently available in Hadoop systems, requirements of access control mechanisms, and change of access contr...
Trust is an important factor in transferring data from the source to destination in wireless sens... more Trust is an important factor in transferring data from the source to destination in wireless sensor networks. If any sensor node fails to transfer the data, the Dynamic Source Protocol calculates the alternate path. Currently, the Dynamic Source Protocol does not have any built-in functionality to calculate an alternate path if the path has a malicious node. Intruder detection system can detect the malicious node. However, intruder detection system is very expensive for wireless sensor networks and there is no guarantee in detecting a malicious node. In the current research, a trust-based approach is recommended to minimize the overheads of intruder detection system and detect the abnormal behavior nodes. The proposed model uses the repeated games to detect faulty (malicious) nodes through the cooperative effort in the sensor network and judges the trust of successive nodes. Further, the research includes the trust model with reliable neighbors and query-based trust calculation. Sim...
a series of events on fundamentals in supporting data analytics, special mechanisms and features ... more a series of events on fundamentals in supporting data analytics, special mechanisms and features of applying principles of data analytics, application-oriented analytics, and target-area analytics. Processing of terabytes to petabytes of data, or incorporating non-structural data and multi-structured data sources and types require advanced analytics and data science mechanisms for both raw and partially-processed information. Despite considerable advancements on high performance, large storage, and high computation power, there are challenges in identifying, clustering, classifying, and interpreting of a large spectrum of information. The conference had the following tracks: Resiliency and Sustainability through Analytics Application-oriented analytics Mechanisms and Features Target analytics Big Data Similar to previous editions, this event attracted excellent contributions and active participation from all over the world. We were very pleased to receive top quality contr...
Fourth International Conference on Information Technology (ITNG'07), 2007
... YBReddy§, N.Gajendar#, Portia Taylor$, and Damian Madden§ Dept of math and Computer Science, ... more ... YBReddy§, N.Gajendar#, Portia Taylor$, and Damian Madden§ Dept of math and Computer Science, Grambling State University, LA 71245 Email: § [email protected] # ngdar@gram. edu $ [email protected] Abstract ... [12] Melanie Mitchell, An Introduction to Genetic ...
SENSORCOMM 2011, The Fifth …, 2011
Abstract: Secure data transfer (SDT) in wireless networks is required with minimum overhead. The ... more Abstract: Secure data transfer (SDT) in wireless networks is required with minimum overhead. The SDT was done historically through cryptography, authentication, and probability based approaches. Collaborative approach for trust-based packet transfer is ...
International Conference on Information Technology: New Generations, 2009
Power control at the MAC layer in multi-hop transmissions and interference limited link rates of ... more Power control at the MAC layer in multi-hop transmissions and interference limited link rates of cognitive wireless networks is an important task in cross- layer design. This paper examines the per-node optimal transmission power such that the resulting power consumption may help provide better service in transmission. We examined optimal transmission of power using game theory and analyze the conflicting
2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), 2018
several customers access the data in a cloud environment. Security of such data for storing, proc... more several customers access the data in a cloud environment. Security of such data for storing, processing, retrieving, and updating in the cloud environment is critical. If the data is sensitive, access level for every step takes primary responsibility of cloud provider. Currently, the communication of internet-enabled devices (IED) is processing big data and require cloud environment due to their limited storage, processing, and energy capabilities (battery). Encryption is the primary security for transmitting the data from IED's to the cloud, but there is no access control for the data stored in the cloud. Kerberos, a third party authentication protocol, builds on symmetric key (cryptography basis) to allow the nodes for non-secure information, but it does not provide the access control on stored data and other management of the data in the cloud. Because of the current status of the cloud access facilities, this paper builds an event-based access control model for the variety o...
The International Journal of Computer Science and Information Security (IJCSIS) is a peer reviewe... more The International Journal of Computer Science and Information Security (IJCSIS) is a peer reviewed, high-impact online open access journal that publishes research which contribute new results and theoretical ideas in all areas of Computer Science & Information Security. The editorial board is pleased to present the October 2015 issue which consists of 22 high quality papers. The primary objective is to disseminate new knowledge and technology for the benefit of all, ranging from academic research and professional communities to industry professionals. It especially provides a platform for high-caliber researchers, practitioners and PhD students to publish completed research and latest development in these areas. We are glad to see variety of articles focusing on the major topics of innovation and computer science; IT security, Mobile computing, Cryptography, Software engineering, Wireless sensor networks etc. This scholarly resource endeavors to provide international audiences with ...
Big data conventionally coins large volume of data that continuously increases in a real-time bas... more Big data conventionally coins large volume of data that continuously increases in a real-time basis and difficult to store, retrieve, and process in traditional database techniques. But it is necessary to know that big data is unstructured and does not follow the conventional storage retrieval methods. The challenges are to store in a cloud, process, and develop meaningful form so that it is useful to the businesses, government, and customers. This paper discusses the current challenges to store, retrieve, process, and implement security requirements, and possible solutions. We further provide the security model in a dynamic cloud environment to store, process and retrieve the data.
2009 Sixth International …, 2009
Page 1. Cross-Layer Design Approach for Wireless Networks to Improve the Performance Nikema J. Sm... more Page 1. Cross-Layer Design Approach for Wireless Networks to Improve the Performance Nikema J. Smith, Yenumula B. Reddy, and Nandigam Gajendar Grambling State University, Grambling, Louisiana 71245 Abstract Future ...
Journal of Crustacean Biology, 2012
Up until now, the genus Parvulobathynella Schminke, 1973, had eight species in the world. Of thes... more Up until now, the genus Parvulobathynella Schminke, 1973, had eight species in the world. Of these, three species each are known from South America and Africa, and two from peninsular India. Parvulobathynella macrodentata n. sp. is described herein from the phreatic zone of southeastern India. Interestingly, the new species has striking mandibular affinity with the Brazilian Odontobathynella amazonica Delamare Deboutteville and Serban, 1979. So the mandibular criteria of Parvulobathynella are suitably amended to accommodate the new species and the interrelationships of Parvulobathynella and Odontobathynella, briefly discussed. The paper also provides an updated key to the world species of Parvulobathynella in addition to some ecological notes on the new species.
Uploads
IJCSIS Papers by Yenumula Reddy
Keywords: fingerprint, minutiae points, MapReduce, Bezier ridge, GPU-based architecture;
International Journal of Computer Science and Information Security (IJCSIS), Vol. 13, No. 10, October 2015
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
Papers by Yenumula Reddy
Keywords: fingerprint, minutiae points, MapReduce, Bezier ridge, GPU-based architecture;
International Journal of Computer Science and Information Security (IJCSIS), Vol. 13, No. 10, October 2015
https://sites.google.com/site/ijcsis/
ISSN 1947-5500