scispace - formally typeset
A

Atul Negi

Researcher at University of Hyderabad

Publications -  86
Citations -  1075

Atul Negi is an academic researcher from University of Hyderabad. The author has contributed to research in topics: Principal component analysis & Image segmentation. The author has an hindex of 16, co-authored 80 publications receiving 923 citations. Previous affiliations of Atul Negi include University UCINF.

Papers
More filters
Proceedings ArticleDOI

An OCR system for Telugu

TL;DR: This work presents an efficient and practical approach to Telugu OCR which limits the number of templates to be recognized to just 370, avoiding issues of classifier design for thousands of shapes or very complex glyph segmentation.
Proceedings ArticleDOI

Principle application and vision in Internet of Things (IoT)

TL;DR: The concept of application for internet of things is introduced and with the discussion of social and governance issues that arise as the future vision of internet ofThings are discussed.
Proceedings ArticleDOI

A survey of distance/similarity measures for categorical data

TL;DR: This paper forms a taxonomy of various distance or similarity measures used in conjunction with data whose attributes are categorical, and categorizes the existing measures into two broad classes, namely, Context-free and Context-sensitive measures for categorical data.
Proceedings ArticleDOI

Applying Machine Learning Techniques to Improve Linux Process Scheduling

TL;DR: This work uses Machine Learning (ML) techniques to learn the CPU time-slice utilization behavior of known programs in a Linux system and finds that predictive scheduling could reduce TaT in the range of 1.4% to 5.8%.
Journal ArticleDOI

Communication and Data Trust for Wireless Sensor Networks Using D–S Theory

TL;DR: This work proposes a trust mechanism, which evaluates communication trust and data trust for wireless sensor networks, and presents arguments and simulation results to show the effectiveness of the proposed algorithm against packet forwarding/modification attacks, bad mouthing attacks, collusion attacks, and on–off attacks.