S. Narasimha Murthy
YOU?
Author Swipe
View article: RIMMS: Runtime Integrated Memory Management System for Heterogeneous Computing
RIMMS: Runtime Integrated Memory Management System for Heterogeneous Computing Open
Efficient memory management in heterogeneous systems is increasingly challenging due to diverse compute architectures (e.g., CPU, GPU, and FPGA) and dynamic task mappings not known at compile time. Existing approaches often require program…
View article: RIMMS: Runtime Integrated Memory Management System for Heterogeneous Computing
RIMMS: Runtime Integrated Memory Management System for Heterogeneous Computing Open
Efficient memory management in heterogeneous systems is increasingly challenging due to diverse compute architectures (e.g., CPU, GPU, FPGA) and dynamic task mappings not known at compile time. Existing approaches often require programmers…
View article: Polymer Coated Polymeric (PCP) microneedles for sampling of drugs and biomarkers from tissues
Polymer Coated Polymeric (PCP) microneedles for sampling of drugs and biomarkers from tissues Open
The Polymer Coated Polymeric (PCP) microneedles were fabricated using PVP K30 in the core and ethyl cellulose in the coating. The PCP microneedles do not disintegrate in the tissue upon insertion and rather stays intact and allows diffusio…
View article: Solution and Stability of a Cubic Type Functional Equation: Using Direct and Fixed Point Methods
Solution and Stability of a Cubic Type Functional Equation: Using Direct and Fixed Point Methods Open
In this concept, we investigate the generalized Ulam-Hyers-Rassias stability for the new type of cubic functional equation of the formby using direct and fixed point alternative.
View article: HYBRID STEGANOGRAPHY USING INDEX CHANNEL AND 2-3-3 HASH METHODS
HYBRID STEGANOGRAPHY USING INDEX CHANNEL AND 2-3-3 HASH METHODS Open
This paper proposes a hybrid steganogrphy method where 2 data hiding methods are used to hide the secret image inside the cover image.First half of secret image is embedded using hash 2-3-3 method and second half of the secret image is emb…