Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Vishnu Balan"'
Autor:
Ying Wei, Yi Chieh Huang, Haiming Tang, Nithya Sankaran, Ish Chadha, Dai Dai, Olakanmi Oluwole, Vishnu Balan, Edward Lee
Publikováno v:
2023 IEEE International Solid- State Circuits Conference (ISSCC).
Publikováno v:
ISSCC
The diversity of compute-intensive applications in modern cloud data centers has driven the explosion of GPU-accelerated cloud computing. Such applications include AI deep learning training and inference, data analytics, scientific computing, genomic
Publikováno v:
Procedia Computer Science. 50:109-114
Mobile adhoc network (MANET) is an infrastructure less wireless network and self-organized. During communication mobile adhoc network do not use any proper infrastructure so that MANET initiates request for data transfer, so MANET is vulnerable to va
Autor:
Vishnu Balan, John Meyer, Mongi Mahmoud, Jane Aguba, Chokri Zarrougui, Guillaume Alinier, Pravin Sevanesan, Anan Al Badawi, Fedrick Vincent, Kanhaiya Singh, Raouf Mraidi, Mourad Hamzaoui, Joseph Dipalac, Jayson Narido, Vernon Naidoo
Publikováno v:
Journal of Emergency Medicine, Trauma and Acute Care. 2016
Background: “Orientation” is an important phase when joining a new institution. It is the period when someone builds an understanding of their role/responsibilities in a new setting, and for colleagues to gauge someone's level of knowledge and co
Autor:
P. N. Nithya, Sabareesh Krishnan, Z. A. Sasinas Alias Haritha, P. V. Raveena, M. Vishnu Balan, K. S. Arun
Publikováno v:
2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).
Eye is the main sensing organ in human body, so it contributes much for user interface. Eye tracking has been widely used in Human Computer Interactions. Real time face image capturing along with eye gaze tracking can provide a means of user input to
Publikováno v:
Indian Journal of Science and Technology. 8
Background: The Distributed Denial of Service (DDoS) attack is one of the most recent and most vulnerable attacks that can happen to a web server to crash or stop providing survive. Many papers have been proposed to resolve this attack and have resol
Publikováno v:
Indian Journal of Science and Technology. 8
Background: Internet of Things (IoT) is the next emerging technique in which each and every thing in the world is getting connected to the internet by means of various communication techniques. By using the technique of multicasting, these things com
Publikováno v:
2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM).
In today's computer world security is the major issue. For every project most of the money spent on the security and testing than developing. Because security issue is one of the major issue for everyone to protect data. According to the security ana
Publikováno v:
2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM).
Due to raising concerns about the privacy preserving of personal information, organizations which are using the customers' records in data mining activities are rammed to take actions for protecting the individual's privacy. Preserving of sensitive a
Autor:
Yi Zeng, P. Joshi, Freeman Zhong, L. Fang, C. Chow, R. Park, D. Hsu, J. Caroselli, Cathy Ye Liu, Chintan Desai, Eric Zhang, Tzu-Wang Pan, C. You, R. Dadi, Jenn-Gang Chern, Vishnu Balan, H. Kimura
Publikováno v:
IEEE Journal of Solid-State Circuits. 40:1957-1967
In this paper, a serial link design that is capable of 4.8-6.4-Gb/s binary NRZ signaling across 40'' of FR4 copper backplane traces and two connectors is described. The transmitter features a programmable two-tap feed forward equalizer and the receiv