C. Nagaraju

Orcid: 0000-0003-1617-6011

According to our database1, C. Nagaraju authored at least 16 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Spotting congenital heart diseases using palm print based on faster R-CNN and spatial method.
Int. J. Medical Eng. Informatics, 2024

2023
Generation of Random Fields for Image Segmentation Techniques: A Review.
Int. J. Image Graph., March, 2023

Machine learning approach to detect congenital heart diseases using palmar dermatoglyphics.
Int. J. Medical Eng. Informatics, 2023

FONN: Federated Optimization with Nys-Newton.
Proceedings of the IEEE Region 10 Conference, 2023

Handling Data Heterogeneity in Federated Learning with Global Data Distribution.
Proceedings of the 3rd International Conference on Image Processing and Vision Engineering, 2023

A data parallel approach for distributed neural networks to achieve faster convergence.
Proceedings of the Sixteenth International Conference on Machine Vision, 2023

2021
Support vector neural network based fuzzy hybrid filter for impulse noise identification and removal from gray-scale image.
J. King Saud Univ. Comput. Inf. Sci., 2021

2019
T2FCS filter: Type 2 fuzzy and cuckoo search-based filter design for image restoration.
J. Vis. Commun. Image Represent., 2019

Hash based manifold learning technique to generating random fields for image segmentation.
Clust. Comput., 2019

FFBF: cluster-based Fuzzy Firefly Bayes Filter for noise identification and removal from grayscale images.
Clust. Comput., 2019

2016
Generation of Random Fields for Image Segmentation Using Manifold Learning Technique.
Int. J. Pattern Recognit. Artif. Intell., 2016

Inspired Pseudo Biotic DNA Based Cryptographic Mechanism Against Adaptive Cryptographic Attacks.
Int. J. Netw. Secur., 2016

IPHDBCM: Inspired Pseudo Hybrid DNA Based Cryptographic Mechanism to Prevent Against Collabrative Black Hole Attack in Wireless Ad hoc Networks.
Int. J. Inf. Secur. Priv., 2016

2015
Evaluation of LBP-Based Facial Emotions Recognition Techniques to Make Consistent Decisions.
Int. J. Pattern Recognit. Artif. Intell., 2015

A Secure Routing Protocol against Heterogeneous Attacks in Wireless Adhoc Networks.
Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, 2015

Light-Weighted DNA-Based Cryptographic Mechanism Against Chosen Cipher Text Attacks.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015


  Loading...