Refine your search
Co-Authors
Journals
- International Journal of Knowledge Based Computer System
- Nature Environment and Pollution Technology
- Indian Journal of Science and Technology
- ICTACT Journal on Image and Video Processing
- ICTACT Journal on Communication Technology
- AIRCC's International Journal of Computer Science and Information Technology
- International Journal of Advanced Networking and Applications
- Journal of Network and Information Security
- ICTACT Journal on Soft Computing
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Murugan, D.
- Foetal State Determination Using Support Vector Machine and Firefly Optimisation
Abstract Views :178 |
PDF Views:0
Authors
V. Subha
1,
D. Murugan
1
Affiliations
1 Department of Computer Science & Engineering, Manonmaniam Sundaranar University, Tirunelveli, Tamil Nadu, IN
1 Department of Computer Science & Engineering, Manonmaniam Sundaranar University, Tirunelveli, Tamil Nadu, IN
Source
International Journal of Knowledge Based Computer System, Vol 2, No 2 (2014), Pagination: 7-12Abstract
In recent days, it has been found that vast amount of data is available in medical field that aid the doctors in disease diagnosis. Data mining techniques have been applied to extract knowledge from these medical data so that disease prediction becomes easy. In this paper, cardiotocogram (CTG) data is classified using support vector machine (SVM). An optimised feature subset is produced using Firefly Algorithm (FFA) with SVM evaluation. The results show that the performance of classification is improved with the optimal reduced feature set than with full feature set.Keywords
SVM Classifier, Cardiotocography, Firefly Algorithm, Feature Selection.- A Comparative Economic Analysis of Organic and Inorganic Manure Consumption in Agricultural Production with Special Reference to Pondicherry Union Territory
Abstract Views :280 |
PDF Views:0
Authors
S. Venkatasan
1,
D. Murugan
1
Affiliations
1 Department of Economics, Annamalai University, Annamalai Nagar, Tamil Nadu, IN
1 Department of Economics, Annamalai University, Annamalai Nagar, Tamil Nadu, IN
Source
Nature Environment and Pollution Technology, Vol 12, No 1 (2013), Pagination: 131-134Abstract
Green revolution has resulted in over application of inorganic inputs such as fertilizer and plant protection chemicals. The post green revolution period has threatened the sustainability of Indian agriculture and raised a serious concern about receding groundwater level, loss of soil fertility, low diversity of production system and increasing cost of production. In view of these concerns, the modern-day agriculture gave birth to organic farming. The present study makes a comparative economic analysis of organic farming and inorganic farming under different sizes of land holdings in Pondicherry Union Territory. Since the organic manure consumption in agriculture results in increase in agriculture production, all the farms in the study region may use organic manure which may lead to reduction in the cost of production, and the same may be disseminated to the farmers through NGOs and other extension activities.Keywords
Agricultural Production, Organic and Inorganic, Manure, Organic Farming, Economic Analysis.- A Novel Multiple Unsupervised Algorithm for Land Use/Land Cover Classification
Abstract Views :208 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, S. A. Engineering College, Chennai - 600077, Tamil Nadu, IN
2 R. M. D Engineering College, Kavaraipettai - 601206, IN
3 Department of Computer Science and Engineering, M. S. University, Tirunelveli - 627012,Tamil Nadu, IN
4 Department of Geography, University of Madras, Chennai - 600005, Tamil Nadu, IN
1 Department of Computer Science and Engineering, S. A. Engineering College, Chennai - 600077, Tamil Nadu, IN
2 R. M. D Engineering College, Kavaraipettai - 601206, IN
3 Department of Computer Science and Engineering, M. S. University, Tirunelveli - 627012,Tamil Nadu, IN
4 Department of Geography, University of Madras, Chennai - 600005, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 42 (2016), Pagination:Abstract
Objectives: To classify the satellite images into different land use/land cover classes such as water, building, cropland, forest, etc, to monitor the environmental impacts. Method: In this paper, images are grouped into various clusters using a novel SVD trace function clustering algorithm. The clustered samples are used as a training set in a novel unsupervised Ensemble Minimization Learning algorithm (EML) for classification. The main aim of using EML is to classify the forest, vegetative land patterns, build up area in rural and urban areas with the use of best accuracy rate. Finding: Our proposed methods provides 90.56% classification rate with low error rate. This EML applies multinomial probit model and ensembles simulated data set and improves the learning of nonlinear relationships between the classified attributes. Multinomial probit model is used to bring all the related possible segmented values to fall into one single category, thus increasing the classification accuracy. Our proposed methods experimented with three different real data sets. The experimental results indicate that our proposed unsupervised model outperforms than the previous techniques. Application: It could be using for land use/land cover change detection, under water object identification, coastal area monitoring, etc. Improvement: In future it could be apply in video data and could be improve the classification accuracy also.Keywords
Ensemble Minimization Learning algorithm, Land use/Land Cover Classification, Multinominal Probit Model, SVD Trace Function, Unsupervised Algorithm.- Pixel Pattern Based Steganography on Images
Abstract Views :149 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, IN
2 Infosys Limited, IN
1 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, IN
2 Infosys Limited, IN
Source
ICTACT Journal on Image and Video Processing, Vol 5, No 3 (2015), Pagination: 991-997Abstract
One of the drawback of most of the existing steganography methods is that it alters the bits used for storing color information. Some of the examples include LSB or MSB based steganography. There are also various existing methods like Dynamic RGB Intensity Based Steganography Scheme, Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm etc that can be used to find out the steganography method used and break it. Another drawback of the existing methods is that it adds noise to the image which makes the image look dull or grainy making it suspicious for a person about existence of a hidden message within the image. To overcome these shortcomings we have come up with a pixel pattern based steganography which involved hiding the message within in image by using the existing RGB values whenever possible at pixel level or with minimum changes. Along with the image a key will also be used to decrypt the message stored at pixel levels. For further protection, both the message stored as well as the key file will be in encrypted format which can have same or different keys or decryption. Hence we call it as a RGB pixel pattern based steganography.Keywords
Data Protection, Steganography, Stegoimage, Cover Image, LSB, MSB, RGB.- Steganodb - A Secure Database Using Steganography
Abstract Views :170 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Manonmanium Sundarnar University, IN
2 Infosys Limited, Technopark Campus, IN
1 Department of Computer Science and Engineering, Manonmanium Sundarnar University, IN
2 Infosys Limited, Technopark Campus, IN
Source
ICTACT Journal on Communication Technology, Vol 4, No 3 (2013), Pagination: 785-789Abstract
The safety of data and communications for both organizations and personal purposes which at the same time is easy to maintain and having less overhead on system resources is a very important issue. This paper presents a new/alternate secure Database system based on steganography for data hiding. The system provides integrity more confidentiality, and authentication during access or editing of confidential data. The proposed DB system uses steganography technique to store a database of records. The system allows a user to create basic tables and records which are hidden from others inside an image. In this paper propose an architecture which can be used by application developers to retrieve data from the created database in an easy manner. The proposed method is highly useful for use as an embedded DB also in mobile computing as it can store small amount of data easily.Keywords
Data Protection, Secure Database, Steganography, StegoDB.- Performance Evaluation of Face Recognition Using Gabor Filter, Log Gabor filter and Discrete Wavelet Transform
Abstract Views :243 |
PDF Views:177
Authors
D. Murugan
1,
S. Arumugam
2,
K. RajalakshmiDepartment of CSE, Francis Xavier Engineering College
3,
T. I. Manish
1
Affiliations
1 Department of CSE, Manonmaniam Sundaranar University, IN
2 Nandha College of Engineering and Technology, Erode, IN
3 Department of CSE, Francis Xavier Engineering College, IN
1 Department of CSE, Manonmaniam Sundaranar University, IN
2 Nandha College of Engineering and Technology, Erode, IN
3 Department of CSE, Francis Xavier Engineering College, IN
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 2, No 1 (2010), Pagination: 125-133Abstract
The face recognition problem is made difficult by the great variability in head rotation and tilt, lighting intensity and angle, facial expression, aging, partial occlusion (e.g. Wearing Hats, scarves, glasses etc.), etc. The Eigenfaces algorithm has long been a mainstay in the field of face recognition and the face space has high dimension. Principal components from the face space are used for face recognition to reduce dimensionality. A multiscale representation for face recognition is done to preserve the discriminant information prior to dimensionality reduction. In this paper, three multiscale representation techniques Gabor filter; Log Gabor filter and Discrete Wavelet Transform are applied prior to dimensionality reduction. PCA is then applied on the above techniques to find the face recognition accuracy rate and to compare the results of the three methods with PCA method. The approximation coefficients in discrete wavelet transform is extracted and it is used to compute the face recognition accuracy instead of using all the coefficients.Keywords
Eigenfaces, Face Space, Gabor Filter, Principal Components, Multiscale, Log Gabor Filter.- Comparative Study of Spatial Domain Image Steganography Techniques
Abstract Views :144 |
PDF Views:3
Authors
Affiliations
1 Department of Computer Science and Engineering, Manonmanium Sundarnar University, Tirunelveli, IN
2 Infosys Limited, Technopark, Karyavattom Campus, IN
1 Department of Computer Science and Engineering, Manonmanium Sundarnar University, Tirunelveli, IN
2 Infosys Limited, Technopark, Karyavattom Campus, IN
Source
International Journal of Advanced Networking and Applications, Vol 7, No 2 (2015), Pagination: 2650-2657Abstract
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique's efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.Keywords
Cover Image, Embedding, LSB, MSB, RGB, Steganography, Stego-Image.- A Comparative Analysis on Various Noise Reduction Techniques Tested for Medical Images
Abstract Views :285 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science & Engineering, Manonmaniam Sundaranar University, Tirunelveli, Tamil Nadu, IN
2 Department of Computer Science & Engineering, Adi Shankara Institute of Engineering & Technology, Ernakulam, Kerala, IN
1 Department of Computer Science & Engineering, Manonmaniam Sundaranar University, Tirunelveli, Tamil Nadu, IN
2 Department of Computer Science & Engineering, Adi Shankara Institute of Engineering & Technology, Ernakulam, Kerala, IN
Source
Journal of Network and Information Security, Vol 6, No 1 (2018), Pagination: 18-23Abstract
Noise removing in the medical image is still a challenging task in the research field especially for the imaging devices like mammogram and ultra-sound. Even though advance scanning technology has been invented, these conventional devices play a vital role in scanning the mammogram breast cancer and fetus images. During the image acquisition itself, these images will get corrupted by the physical interference which appears as a noise in an image and affects its visual quality. In this paper we have applied the various traditional and conventional mean based noise removal techniques for the impulse noise corrupted mammogram breast image and standard benchmark. From this comparative analysis we have found that alpha-trimmed mean filters gives the better result than the other filters in terms of PSNR, SSIM and visual quality.Keywords
Impulse Noise, Wiener Filter, Noise Reduction, Arithmetic Mean Filter, Medical Image.References
- C. Kadam, and S. B. Borse, “A comparative study of image denoising techniques for medical images,” International Research Journal of Engineering and Technology, vol. 4, no. 6, pp. 369-372, 2017.
- A. Velayudham, and R. Kanthavel, “A survey on medical image denoising techniques,” International Journal of Advanced Research in Electronics and Communication Engineering, vol. 2, no. 3, p. 272, 2013.
- M. K. Jhariya, and N. Sahayam, “A literature survey on image denoising & compression.” International Journal for Innovative Research in Multidisciplinary Field, vol. 2, no. 10, pp. 665-667, Oct. 2016.
- M. Elad, and M. Aharon, “Performance and analysis for non linear filtering algorithm for under water images,” International Journal of Computer Science and Information Security, vol. 58, no. 6, pp. 27-30, November 2012.
- S. Khera, and S. Malhotra, “Survey on medical image de noising using various filters and wavelet transform,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, no. 4, pp. 230-234, 2014.
- B. G. Lim, J. C. Woo, and Y. S. Kim, Y. S., “Non-iterative super-resolution technique combining SVA with modified geometric mean filter,” IEEE Geoscience and Remote Sensing Letters, vol. 7, no. 4, pp. 713-717, 2010.
- H. Ibrahim, N. S. P. Kong, and T. F. Ng, “Simple adaptive median filter for the removal of impulse noise from highly corrupted images,” IEEE Transactions on Consumer Electronics, vol. 54, no. 4, pp. 1920-1927, 2008.
- E. Nadernejad, “Improvement of nonlinear diffusion equation using relaxed geometric mean filter for low PSNR images,” Electronics Letters, vol. 49, no. 7, pp. 457-458, 2013.
- S. Q. Yuan, and Y. H. Tan, “Difference-type noise detector for adaptive median filter,” Electronics Letters, vol. 42, no. 8, pp.454-455, 2006.
- L. Wang, Y. K. Zou, and H. J. Zhang, “A medical image denoising arithmetic based on wiener filter parallel model of wavelet transform,” In IEEE 2nd International Congress on Image and Signal Processing, pp. 1-4, October 2009.
- G. Liu, and H. Zhong, “Non-local means filter for polarimetric SAR data despeckling based on discriminative similarity measure,” IEEE Geoscience and Remote Sensing Letters, vol. 11, no. 2, pp. 514-518, 2014.
- N. Afsham, A. Rasoulian, M. Najafi, P. Abolmaesumi, and R. Rohling, “Non-local means filter-based speckle tracking,” IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control, vol. 62, no. 8, pp. 1501-1515, 2015.
- S. S. Al-amri, and V. N. Kalyankar, “Removal salt & pepper noise from image by using adaptive median filter,” International Journal of Advanced Research in Computer Science, vol. 2, no. 2, pp. 431-434, 2011.
- A. Ramya, V. Murugan, and D. Murugan, “Non-linear directive contrast filter for mammogram images to enhance pleomorphic calcification,” International Journal of Computer Applications, vol. 163, no. 7, pp. 52-57, 2017.
- J. Kaur, M. Kaur, P. Kaur, and M. Kaur, “Comparative analysis of image denoising techniques,” International Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 6, pp. 296-298, 2012.
- A. Ramya, B. S. Saranya, D. Murugan, S. V. Kumar, N. Joseph, “Survey on image de-noising based on two- stage median filtering approach,” International Journal of Advanced Research in Computer Engineering & Technology, vol. 6, no. 9, pp. 1494-1498, September, 2017.
- M. Pathak, S. Singh, and P. Patiala, “Digital image denoising in medical metacarpal images”.
- P. Deepa, and M. Suganthi, “Performance evaluation of various denoising filters for medical image,” International Journal of Computer Science and Information Technologies, vol. 5, no. 3, pp. 4205-4209, 2014.
- R. Oten, and R. J. de Figueiredo, Adaptive alpha-trimmed mean filters under deviations from assumed noise model, IEEE Transactions on Image Processing, vol. 13, no. 5, pp. 627-639, 2004.
- Data Protection on Mobile Applications
Abstract Views :247 |
PDF Views:0
Authors
R. Rejani
1,
D. Murugan
1
Affiliations
1 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, IN
1 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, IN
Source
ICTACT Journal on Communication Technology, Vol 10, No 2 (2019), Pagination: 1979-1987Abstract
Piracy has been a huge problem to the entire IT industry. In the recent years there has been an increase in the usage of mobile based applications and many a times these applications have been illegally copied and used a lot. Apart from applications, piracy also affects video, audio producers, digital book etc. This results in huge revenue loss to the application developers and also in many cases causes the spread of viruses and backdoor programs causing hijacking of personal data. The most commonly pirated mobile apps are games and utility apps. In this paper we are proposing a new method of protecting mobile apps using steganography which will help in protecting the mobile apps against piracy.Keywords
Data Protection, Steganography, Stego Image, Cover Image, LSB, MSB, RGB.References
- Mohammad A. Haque, Ramin Irani, Kamal Nasrollahi and Thomas B. Moeslund, “Heart Beat Rate Measurement from Facial Video”, IEEE Intelligent Systems, Vol. 31, No. 3, pp. 40-48, 2016.
- H. Rahman and M.U. Ahmed, S. Begum and P. Funk, “Real Time Heart Rate Monitoring from Facial RGB Color Video using Webcam”, Proceedings of 29th Annual Workshop of the Swedish Artificial Intelligence Society, pp. 1-8, 2016.
- Simmi Dutta, Hiteshwar, Abhimanyu Dev Jamwal and Azhar Ud Din Guroo, “Heart Rate Detection using Independent Component Analysis and Multivariate Adaptive Regression Splines”, Imperial Journal of Interdisciplinary Research, Vol. 2, No. 10, pp. 174-178, 2016.
- M. Kumar, A. Veeraraghavan and A. Sabharwal, “Distance PPG: Robust Non-Contact Vital Signs Monitoring using A Camera”, Biomedical Optics Express, Vol. 6, No. 5, pp. 1565-1588, 2015.
- Hussain A. Jaber, A.L. Ziarjawey and Ilyas Cankaya, “Heart Rate Monitoring and PQRST Detection Based on Graphical User Interface with Matlab”, International Journal of Information and Electronics Engineering, Vol. 5, No. 4, pp. 311-317, 2015.
- J. Moreno, J. Ramos-Castro, J. Movellan, E. Parrado, G. Rodas and L. Capdevila, “Facial Video-based Photoplethysmography to Detect HRV at Rest”, International Journal of Sports Medicine, Vol. 36, No. 6, pp. 474-480, 2015.
- Larissa Carvalho, H.G.Virani and S. Kutty, “Analysis of Heart Rate Monitoring Using a Webcam”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, No. 5, pp. 1-7, 2014.
- X. Li, J. Chen, G. Zhao and M. Pietikainen, “Remote Heart Rate Measurement from Face Videos under Realistic Situations”, Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, pp. 4264-4271, 2014.
- R. Irani, K. Nasrollahi and T.B. Moeslund, “Improved Pulse Dectection from Head Motions using DCT”, Proceedings of 9th International Conference on Computer Vision Theory and Applications, pp. 124-129, 2014.
- S. Thulasi Prasad and S. Varadarajan, “Heart Rate Detection using Hilbert Transform”, International Journal of Research in Engineering and Technology, Vol. 2, No. 8, pp. 12-18, 2013.
- Gerard De Haan and Vincent Jeanne, “Robust Pulse Rate from Chrominance-Based rPPG”, IEEE Transactions on Biomedical Engineering, Vol. 60, No. 10, pp. 94-128, 2013.
- G. Balakrishnan, F. Durand and J. Guttag, “Detecting Pulse from Head Motions in Video”, Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, pp. 3430-3437, 2013.
- X. Yu, J. Huang, S. Zhang, W. Yan and D. Metaxas, “Posefree Facial Landmark Fitting Via Optimized Part Mixtures and Cascaded Deformable Shape Model”, Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, pp. 1944-1951, 2013.
- Isayiyas Nigatu Tiba and Li Li, “Image-Based Automatic Pulse Rate Monitoring System Using PC Webcam”, International Journal of Engineering Research and Technology, Vol. 2, No. 12, pp. 841-847, 2013.
- M. Soleymani, J. Lichtenauer, T. Pun and M. Pantic, “A Multimodal Database for Affect Recognition and Implicit Tagging”, IEEE Transactions on Affective Computing, Vol. 3, No. 1, pp. 42-55, 2012.
- Fuzzy Based Privacy Preserved K-Means Clustering
Abstract Views :133 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Manonmaniam Sundaranar University, IN
1 Department of Computer Science, Manonmaniam Sundaranar University, IN