Brijesh Kumar
YOU?
Author Swipe
View article: GLOBAL HISTOGRAM STRETCHING FOR LOW LIGHT IMAGE ENHANCEMENT WITH LOW LIGHT NETWORKS
GLOBAL HISTOGRAM STRETCHING FOR LOW LIGHT IMAGE ENHANCEMENT WITH LOW LIGHT NETWORKS Open
Images captured under low- light conditions frequently suffer from poor visibility due to inadequate lighting. Low- light image improvement is a image processing fashion aimed at converting low- light images into visually natural, normal- …
View article: Deepfake Video Detection Using Deep Learning
Deepfake Video Detection Using Deep Learning Open
- In today’s digital landscape, the rapid advancement of deepfake technology has raised serious concerns due to its ability to generate highly convincing fake videos. These synthetic media artifacts are widely used to spread misinformation…
View article: AI – Based Integrated Women Safety System Real -Time Monitoring, Mobile Application and Physical Emergency Unit
AI – Based Integrated Women Safety System Real -Time Monitoring, Mobile Application and Physical Emergency Unit Open
- This AI-based Women's Safety System is a comprehensive, real-time solution integrating AI surveillance, mobile application, and IoT-enabled SOS hardware to enhance women’s security in both urban and rural areas. The AI surveillance modul…
View article: Foreign object debris detection in lane images using deep learning methodology
Foreign object debris detection in lane images using deep learning methodology Open
Background Foreign object debris (FOD) is an unwanted substance that damages vehicular systems, most commonly the wheels of vehicles. In airport runways, these foreign objects can damage the wheels or internal systems of planes, potentiall…
View article: IoT Based Farm Automation for Enhanced Crop Management
IoT Based Farm Automation for Enhanced Crop Management Open
View article: A novel image cryptosystem for biomedical images and secured storage by randomized chaotic encryption scheme
A novel image cryptosystem for biomedical images and secured storage by randomized chaotic encryption scheme Open
View article: IoT Based Farm Automation for Enhanced Crop Management
IoT Based Farm Automation for Enhanced Crop Management Open
View article: Symmetric Kullback Leibler divergence-based design of experiments with estimation of unspecified values
Symmetric Kullback Leibler divergence-based design of experiments with estimation of unspecified values Open
View article: Yield from the MIDAS-Oral Hub Project- Ontologies, Workflows and Annotation Tool
Yield from the MIDAS-Oral Hub Project- Ontologies, Workflows and Annotation Tool Open
View article: Vrikshayurveda - A Capital for Conservative Agronomy
Vrikshayurveda - A Capital for Conservative Agronomy Open
Nature conservation has changed from an idealistic philosophy to a serious technology understanding of the nature of plant conservation is very much need of the hour that has elaborately mentioned in the literatures of Ayurveda. The interr…
View article: The Optimal Rate Memory Tradeoff in Multi-Access Coded Caching: Large Cache Size
The Optimal Rate Memory Tradeoff in Multi-Access Coded Caching: Large Cache Size Open
International audience
View article: Cryptography in Hierarchical Coded Caching: System Model and Cost Analysis
Cryptography in Hierarchical Coded Caching: System Model and Cost Analysis Open
The idea behind network caching is to reduce network traffic during peak hours via transmitting frequently-requested content items to end users during off-peak hours. However, due to limited cache sizes and unpredictable access patterns, t…
View article: The Exact Rate Memory Tradeoff for Small Caches with Coded Placement
The Exact Rate Memory Tradeoff for Small Caches with Coded Placement Open
The idea of coded caching was introduced by Maddah-Ali and Niesen who demonstrated the advantages of coding in caching problems. To capture the essence of the problem, they introduced the $(N, K)$ canonical cache network in which $K$ users…
View article: The Exact Rate Memory Tradeoff for Large Caches with Coded Placement
The Exact Rate Memory Tradeoff for Large Caches with Coded Placement Open
The idea of coded caching for content distribution networks was introduced by Maddah-Ali and Niesen, who considered the canonical $(N, K)$ cache network in which a server with $N$ files satisfy the demands of $K$ users (equipped with indep…
View article: Fundamental Limits of Coded Caching: The Memory Rate Pair (K-1-1/K,\n 1/(K-1))
Fundamental Limits of Coded Caching: The Memory Rate Pair (K-1-1/K,\n 1/(K-1)) Open
Maddah-Ali and Niesen, in a seminal paper, introduced the notion of coded\ncaching. The exact nature of the fundamental limits in this context has\nremained elusive even as several approximate characterizations have been found.\nA new opti…
View article: Fundamental Limits of Coded Caching: The Memory Rate Pair (K-1-1/K, 1/(K-1))
Fundamental Limits of Coded Caching: The Memory Rate Pair (K-1-1/K, 1/(K-1)) Open
Maddah-Ali and Niesen, in a seminal paper, introduced the notion of coded caching. The exact nature of the fundamental limits in this context has remained elusive even as several approximate characterizations have been found. A new optimal…
View article: An Efficient Medical Image Fusion Technique based on IT2FLDS
An Efficient Medical Image Fusion Technique based on IT2FLDS Open
Multiple modal medical image fusion is an essential method for medical imaging technologies.In these Multi-modal medical image fusion usually are Positron Emission Tomography(PET)) and Single-photon Emission Computer Tomography(SPECT), Mag…
View article: Linear Network Coding: Effects of Varying the Message Dimension on the Set of Characteristics
Linear Network Coding: Effects of Varying the Message Dimension on the Set of Characteristics Open
It is known a vector linear solution may exist if and only if the characteristic of the finite field belongs to a certain set of primes. But, can increasing the message dimension make a network vector linearly solvable over a larger set of…
View article: On the Dependence of Linear Coding Rates on the Characteristic of the Finite Field
On the Dependence of Linear Coding Rates on the Characteristic of the Finite Field Open
It is known that for any finite/co-finite set of primes there exists a network which has a rate $1$ solution if and only if the characteristic of the finite field belongs to the given set. We generalize this result to show that for any pos…
View article: Generalized Fano and non-Fano networks
Generalized Fano and non-Fano networks Open
It is known that the Fano network has a vector linear solution if and only if the characteristic of the finite field is $2$; and the non-Fano network has a vector linear solution if and only if the characteristic of the finite field is not…
View article: On fractional linear network coding solution of multiple-unicast networks
On fractional linear network coding solution of multiple-unicast networks Open
It is known that there exists a multiple-unicast network which has a rate $1$ linear network coding solution if and only if the characteristic of the finite field belongs to a given finite or co-finite set of primes. In this paper, we show…
View article: Sum-networks: Dependency on characteristic of the finite field under linear network coding
Sum-networks: Dependency on characteristic of the finite field under linear network coding Open
Sum-networks are networks where all the terminals demand the sum of the symbols generated at the sources. It has been shown that for any finite set/co-finite set of prime numbers, there exists a sum-network which has a vector linear soluti…
View article: On Fractional Linear Network Coding Solution of Multiple-Unicast\n Networks
On Fractional Linear Network Coding Solution of Multiple-Unicast\n Networks Open
It is known that there exists a multiple-unicast network which has a rate $1$\nlinear network coding solution if and only if the characteristic of the finite\nfield belongs to a given finite or co-finite set of primes. In this paper, we\ns…
View article: Novel VLSI Architectures for Image Segmentation and Edge Detection Algorithm
Novel VLSI Architectures for Image Segmentation and Edge Detection Algorithm Open
Field programmable gate arrays (FPGA) are the devices which can be easily employed for image and video processing applications.FPGA implementation is always faster than any other digital signal processor due to its parallel image processin…
View article: A Cross-layer Contention Based Synchronous MAC Protocol for Transmission Delay Reduction in Multi-Hop WSNs
A Cross-layer Contention Based Synchronous MAC Protocol for Transmission Delay Reduction in Multi-Hop WSNs Open
Recently designed cross-layer contention based synchronous MAC protocols like the PRMAC protocol, for wireless sensor networks (WSNs) enable a node to schedule multi-hop transmission of multiple data packets in a cycle. However, these syst…
View article: A Cross-layer Contention Based Synchronous MAC Protocol for Transmission\n Delay Reduction in Multi-Hop WSNs
A Cross-layer Contention Based Synchronous MAC Protocol for Transmission\n Delay Reduction in Multi-Hop WSNs Open
Recently designed cross-layer contention based synchronous MAC protocols like\nthe PRMAC protocol, for wireless sensor networks (WSNs) enable a node to\nschedule multi-hop transmission of multiple data packets in a cycle. However,\nthese s…
View article: On Achievability of an $(r,l)$ Fractional Linear Network Code
On Achievability of an $(r,l)$ Fractional Linear Network Code Open
It is known that there exists a network, called as the M-network, which is not scalar linearly solvable but has a vector linear solution for message dimension two. Recently, a generalization of this result has been presented where it has b…
View article: On the Message Dimensions of Vector Linearly Solvable Networks
On the Message Dimensions of Vector Linearly Solvable Networks Open
It is known that there exists a network which does not have a scalar linear solution over any finite field but has a vector linear solution when message dimension is $2$ [3]. It is not known whether this result can be generalized for an ar…