scispace - formally typeset
R

R. Karthik

Researcher at VIT University

Publications -  11
Citations -  45

R. Karthik is an academic researcher from VIT University. The author has contributed to research in topics: Feature extraction & Support vector machine. The author has an hindex of 3, co-authored 11 publications receiving 26 citations.

Papers
More filters
Posted Content

Implementation of Neural Network and feature extraction to classify ECG signals

TL;DR: An efficient approach for distinguishing ECG signals based on certain diseases by implementing Pan Tompkins algorithm and neural networks and a new approach towards signal classification using the existing neural networks classifiers is presented.
Proceedings ArticleDOI

A text-independent speaker verification model: A comparative analysis

TL;DR: In this paper, the authors explore various methods available in each block in the process of speaker recognition with the objective to identify best of techniques that could be used to get precise results.
Book ChapterDOI

Efficient License Plate Recognition System with Smarter Interpretation Through IoT

TL;DR: A novel algorithm is proposed to tackle the mentioned issues through a unique edge detection algorithm which drastically increases the probability of tracing a vehicle over having manual database attached to each camera for identification purpose.
Book ChapterDOI

Implementation of Neural Network and Feature Extraction to Classify ECG Signals

TL;DR: In this article, Pan Tompkins algorithm is used for feature extraction on electrocardiography (ECG) signals, while neural networks help in detection and classification of the signal into four cardiac diseases: Sleep Apnea, Arrhythmia, Supraventricular Arrhythmmia and Long-Term Atrial Fibrillation (AF) and normal heart beat.
Proceedings ArticleDOI

High capacity, secure (n, n/8) multi secret image sharing scheme with security key

TL;DR: A novel algorithm to increase the sharing capacity by using (n, n/8) multi secret sharing scheme with increased security by generating unique security key which makes the secret image invulnerable to the hackers.