A
Atul Negi
Researcher at University of Hyderabad
Publications - 86
Citations - 1075
Atul Negi is an academic researcher from University of Hyderabad. The author has contributed to research in topics: Principal component analysis & Image segmentation. The author has an hindex of 16, co-authored 80 publications receiving 923 citations. Previous affiliations of Atul Negi include University UCINF.
Papers
More filters
Proceedings ArticleDOI
An OCR system for Telugu
TL;DR: This work presents an efficient and practical approach to Telugu OCR which limits the number of templates to be recognized to just 370, avoiding issues of classifier design for thousands of shapes or very complex glyph segmentation.
Proceedings ArticleDOI
Principle application and vision in Internet of Things (IoT)
TL;DR: The concept of application for internet of things is introduced and with the discussion of social and governance issues that arise as the future vision of internet ofThings are discussed.
Proceedings ArticleDOI
A survey of distance/similarity measures for categorical data
TL;DR: This paper forms a taxonomy of various distance or similarity measures used in conjunction with data whose attributes are categorical, and categorizes the existing measures into two broad classes, namely, Context-free and Context-sensitive measures for categorical data.
Proceedings ArticleDOI
Applying Machine Learning Techniques to Improve Linux Process Scheduling
Atul Negi,K.P. Kishore +1 more
TL;DR: This work uses Machine Learning (ML) techniques to learn the CPU time-slice utilization behavior of known programs in a Linux system and finds that predictive scheduling could reduce TaT in the range of 1.4% to 5.8%.
Journal ArticleDOI
Communication and Data Trust for Wireless Sensor Networks Using D–S Theory
TL;DR: This work proposes a trust mechanism, which evaluates communication trust and data trust for wireless sensor networks, and presents arguments and simulation results to show the effectiveness of the proposed algorithm against packet forwarding/modification attacks, bad mouthing attacks, collusion attacks, and on–off attacks.