Skip to main content

Showing 1–8 of 8 results for author: Rao, S P

  1. arXiv:2401.05121  [pdf, other

    cs.ET cs.LG

    Photonics for Sustainable Computing

    Authors: Farbin Fayza, Satyavolu Papa Rao, Darius Bunandar, Udit Gupta, Ajay Joshi

    Abstract: Photonic integrated circuits are finding use in a variety of applications including optical transceivers, LIDAR, bio-sensing, photonic quantum computing, and Machine Learning (ML). In particular, with the exponentially increasing sizes of ML models, photonics-based accelerators are getting special attention as a sustainable solution because they can perform ML inferences with multiple orders of ma… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

  2. arXiv:2207.10511  [pdf, other

    cs.HC cs.AI cs.RO

    A cost effective eye movement tracker based wheel chair control algorithm for people with paraplegia

    Authors: Skanda Upadhyaya, Shravan Bhat, Siddhanth P. Rao, V Ashwin, Krishnan Chemmangat

    Abstract: Spinal cord injuries can often lead to quadriplegia in patients limiting their mobility. Wheelchairs could be a good proposition for patients, but most of them operate either manually or with the help of electric motors operated with a joystick. This, however, requires the use of hands, making it unsuitable for quadriplegic patients. Controlling eye movement, on the other hand, is retained even by… ▽ More

    Submitted 21 July, 2022; originally announced July 2022.

    Comments: 5 pages, 6 figures

    ACM Class: I.4.8; I.2.9

  3. arXiv:2005.05110  [pdf, other

    cs.CR cs.NI

    Threat modeling framework for mobile communication systems

    Authors: Siddharth Prakash Rao, Silke Holtmanns, Tuomas Aura

    Abstract: Due to the complex nature of mobile communication systems, most of the security efforts in its domain are isolated and scattered across underlying technologies. This has resulted in an obscure view of the overall security. In this work, we attempt to fix this problem by proposing a domain-specific threat modeling framework. By gleaning from a diverse and large body of security literature, we syste… ▽ More

    Submitted 11 May, 2020; originally announced May 2020.

  4. arXiv:1912.04669  [pdf, other

    cs.CR

    Client-side Vulnerabilities in Commercial VPNs

    Authors: Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura

    Abstract: Internet users increasingly rely on commercial virtual private network (VPN) services to protect their security and privacy. The VPN services route the client's traffic over an encrypted tunnel to a VPN gateway in the cloud. Thus, they hide the client's real IP address from online services, and they also shield the user's connections from perceived threats in the access networks. In this paper, we… ▽ More

    Submitted 10 December, 2019; originally announced December 2019.

    Comments: A refined version of this draft, with the same title, has been published in the 24th Nordic Conference on Secure IT Systems (NordSec 19). It is accessible here: https://link.springer.com/chapter/10.1007/978-3-030-35055-0_7

  5. arXiv:1802.06214  [pdf

    cs.CV

    A New De-blurring Technique for License Plate Images with Robust Length Estimation

    Authors: P. S. Prashanth Rao, Rajesh Kumar Muthu

    Abstract: Recognizing a license plate clearly while seeing a surveillance camera snapshot is often important in cases where the troublemaker vehicle(s) have to be identified. In many real world situations, these images are blurred due to fast motion of the vehicle and cannot be recognized by the human eye. For this kind of blurring, the kernel involved can be said to be a linear uniform convolution describe… ▽ More

    Submitted 17 February, 2018; originally announced February 2018.

    Comments: Accepted and Published in 2017 IEEE International Conference on Intelligent Computing and Control (I2C2),23 Jun - 24 Jun 2017, India

  6. arXiv:1706.03744  [pdf, other

    cs.CR cs.CV

    Portable Trust: biometric-based authentication and blockchain storage for self-sovereign identity systems

    Authors: J. S. Hammudoglu, J. Sparreboom, J. I. Rauhamaa, J. K. Faber, L. C. Guerchi, I. P. Samiotis, S. P. Rao, J. A. Pouwelse

    Abstract: We devised a mobile biometric-based authentication system only relying on local processing. Our Android open source solution explores the capability of current smartphones to acquire, process and match fingerprints using only its built-in hardware. Our architecture is specifically designed to run completely locally and autonomously, not requiring any cloud service, server, or permissioned access t… ▽ More

    Submitted 12 June, 2017; originally announced June 2017.

    Comments: Delft University of Technology student project report

  7. arXiv:1610.04459  [pdf

    cs.CY cs.NI

    Studying the Indian mobile Internet networks: Chota recharge and the chota Internet

    Authors: Siddharth Prakash Rao, Kiran Mohan Kumar

    Abstract: Uniform and affordable Internet is emerging as one of the fundamental civil rights in developing countries. However in India, the connectivity is far from uniform across the regions, where the disparity is evident in the infrastructure, the cost of access and telecommunication services to provide Internet facilities among different economic classes. In spite of having a large mobile user base, the… ▽ More

    Submitted 14 October, 2016; originally announced October 2016.

  8. arXiv:1412.7424  [pdf

    cs.CR

    Turning Bitcoins into the Best-coins

    Authors: Siddharth Prakash Rao

    Abstract: In this paper we discuss Bitcoin, the leader among the existing cryptocurrencies, to analyse its trends, success factors, current challenges and probable solutions to make it even better. In the introduction section, we discuss the history and working mechanism of Bitcoin. In the background section, we develop the ideas that evolved in the process of making a stable cryptocurrency. We also analyze… ▽ More

    Submitted 23 December, 2014; originally announced December 2014.