- S. Koteeswaran
- P. Visu
- R. Geetha
- Madhumitha Suresh
- T. Jothimani
- G. Suresh
- S. Sakthivel
- Resmi R. Nair
- S. Koteeswaran
- S. Malini
- A. Valarmathi
- S. Raj Anand
- E. Kamalanaban
- T. Senthilmurugan
- N. Pughazendi
- S. Meenalosini
- J. Janet
- R. Padmamala
- V. Prema
- M. J. Carmel Mary Belinda
- R. Kavitha
- S. Kotteswaran
- M. Kavitha
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kannan, E.
- Enhancing JS– MR Based Data Visualisation using YARN
Authors
1 Department of CSE, Vel Tech University, Chennai-62. TamilNadu, India, IN
Source
Indian Journal of Science and Technology, Vol 8, No 11 (2015), Pagination:Abstract
Hadoop is an advanced framework with separated File storage system to organize these data’s in distributed environment.Hadoop is a form of cluster with which is subjected to wide range of visualized data. Job sequence is one of the most peculiar sequences often handled by the scheduler in order to split and merge the job and its probable environment in organizing and utilizing the data. Once the scheduler assigns the job to its sequence and then it is visualized in terms of tracking, reordering and distributing those data in any distributed environment. Here the major focus of the research is concentrated on enormous amount of data to distinguish its pattern and way of organizing those data’s. The major scope is switched in the context of analyzing the data distribution using next generation yarn structure of HADOOP. The experimental results show that the problem addressed here has a vast advantage over the existing visualization techniques.Keywords
Data Visualisation, Hadoop, Job Sequence, Scheduler, Yarn, Big Data.- A Hybrid Key Management Approach for Secure Communication in Wireless Sensor Networks
Authors
1 Department of Computer Science and Engineering, S.A. Engineering College, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Chennai - 600062, IN
2 School of Computing and Information Technology, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Chennai, IN
Source
Indian Journal of Science and Technology, Vol 8, No 15 (2015), Pagination:Abstract
Wireless Sensor Networks(WSN) used in a variety of applications are usually unattended in nature and are highly susceptible to attacks such as eavesdropping, hardware tampering and false messages. For secure communication among the nodes, Secret key cryptography is used since it provides high security with low computing power. Existing key management schemes does not guarantee the level of security and network performance. To handle such problems, random seed distribution with transitory cluster key, a hybrid approach is used which is the integration of both random key distribution and the transitory master key. The security analysis shows that our approach provides enhanced resilience and better connectivity by establishing secure channels among the communicating nodes in a hierarchical clustered wireless sensor network. It over persuades the state-of-the-art protocols by providing always the best security features.Keywords
Key Management, Secure Communication, Transitory Master Key, Wireless Sensor Network(WSN)- Impact of Dark Chocolate on Mood Behaviour of Young Women
Authors
1 PSG College of Arts and Science, Coimbatore, IN
2 Coimbatore, IN
Source
Indian Journal of Health and Wellbeing, Vol 3, No 1 (2012), Pagination: 230-238Abstract
Chocolate has been a household word for over a couple of centuries and has been considered as a favourite treat for people of all ages. It has got a lot of medicinal properties as well which have come forth to the world owing to studies by researchers across the world. To observe how controlled doses of dark chocolate influence mood behavior in young women. The study was conducted in two prominent Indian cities namely Coimbatore and Bangalore. The study population includes women in the age group of 20 to 35years.Sixty(n = 60)young women were screened for study by using initial screening schedule. Of these 22 (n = 22) young women met inclusion criteria were consented to participate in the study. The personal data was obtained from the subjects and then they were administered with Profile of Mood States Questionnaire (POMS) before after the supplementation of dark chocolate.The data analyzed using Chi Square test revealed that there is a significant difference on Fatigue - Inertia (χ = 26. 52**), Vigor -Activity (χ = 9. 97** ), Tension - Anxiety (χ = 26. 49**), Depression - Dejection (χ = 29.45*8), Anger - Hostility (χ = 40. 2**), Conftision - Bewilderment (χ = 15. 45**) after the supplementation of dark chocolate for a period of 5 days. The dark Chocolate had a positive impact on mood behaviour of the subjects.Keywords
Mood Behavior, Dark Chocolate, Young Women.- Streaming the Media Files on Heterogeneous Wireless Networks (HWN's)
Authors
1 Vel Tech Dr.RR & Dr.SR Technical University, Avadi, Chennai-62, IN
Source
Wireless Communication, Vol 4, No 12 (2012), Pagination: 674-679Abstract
Heterogeneous wireless network with multi-home clients combine various wireless technologies and provide universal access. Nowadays these wireless networks which is accessed by portable devices with multiple interfaces to access Internet. Recently previous work has mainly focused on reducing access delay and power consumption for data broadcast in wireless network. In this paper, we propose a new data broadcast mechanism with network coding in heterogeneous wireless networks. Our mechanism adaptively clusters the mobile hosts in fewer cells to minimize the bandwidth consumption. In addition, we adaptively code the data according to the data temporarily stored in each mobile host with a distributed manner. Our mechanism allows each delivered message to be coded from only a subset of data to further reduce the number of required messages. We formulate the cell selection and broadcast coding problem with integer programming and prove that the problem is NP-hard. We design a distributed algorithm based on LaGrange and relaxation. Our algorithm needs no server to record the location, queried, and stored information of receivers. Moreover, our algorithm is adaptive to the dynamic group membership, mobility, queried, and stored data of receivers.Keywords
Cell Selection Problem (Cop), Broadcast Coding Problem (Bop), Data Broadcast Mechanism, Bandwidth Consumption and Streaming.- A New Random 2ACK Technique for Detection of Selfish Nodes in a Mobile Ad-Hoc Network
Authors
1 Department of CSE, Vel Tech Dr.RR & Dr.SR Technical University, Chennai, IN
2 Dept of ECE, Vel Tech Engineering College, Chennai, IN
Source
Wireless Communication, Vol 3, No 16 (2011), Pagination: 1160-1164Abstract
A mobile ad hoc network (MANET) is a temporary infrastructure less network, formed by a set of mobile hosts. It dynamically establishes its own network without relying on any central administration. In a MANET each device is free to move independently in any direction, and will therefore change its links to other devices frequently. Mobile ad hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, performing network functions consumes energy and other resources. To save its energy a node may behave selfishly and uses the forwarding service of other nodes without correctly forwarding packets for them. These nodes must be identified and excluded from the cooperative part of the network, as they only consume resources and don’t contribute to the infrastructure. In MANET’s routing misbehavior can severely degrade the performance at the routing layer. Specifically, nodes may participate in the route discovery and maintenance process but refuse to forward data packets. Some solutions have been recently proposed to detect and mitigate such selfish nodes, but almost all these solutions rely on the watchdog technique in their monitoring components, which suffers from many problems. This paper proposes a new approach to mitigate some of the above problems. A misbehavior detection system aims at removing the MANET vulnerability. In this approach a system is built to detect misbehaving nodes in mobile ad hoc networks.
Keywords
Mobile Ad Hoc Networks, Routing Misbehavior, Selfishness, Network Security.- Simulation Analysis and Performance of AODV and AOMDV in Mobile Ad Hoc Network
Authors
1 Department of Computer Applications, PABCET, Tiruchirappalli, IN
2 Veltech Dr.R.R & Dr.S.R Technical University, Chennai, IN
3 Department of Computer Applications, Anna University of Technology, Tiruchirappalli, IN
Source
Wireless Communication, Vol 3, No 7 (2011), Pagination: 490-493Abstract
A Mobile Ad-hoc Network (MANET) is a dynamic wireless network that can be formed without the need for any pre-existing infrastructure in which each node can act as a router. The suitability of multi-path AOMDV routing protocol in such a network was accessed in mobility biased MANET and compared with the performance of its single-path counterpart AODV. A predefined network topology was created and NS-2 simulation was performed at different mobility based scenarios. The performance of AODV and AOMDV was evaluated using responses such as throughput, packet loss and end-to-end delay. The results indicated that AODV exhibited higher throughput and lower end-to-end delay. In the case of AOMDV, the more frequent route discovery might have hampered the available bandwidth and exhibited poor performance. The only positive aspect of AOMDV was its performance with lower packet loss. The routing overhead associated with multi-path routing is found to be the major concern in multipath based routing protocols.Keywords
MANET, AODV, AOMDV, Performance Metrics.- Energy Efficiency for Localization Accuracy by Beacon Movement Detection in Wireless Sensor Networks
Authors
1 Department of CSE, Vel Tech. Dr. RR & Dr. SR Technical University, Chennai, IN
2 Vel Tech. Dr. RR & Dr. SR Technical University, Chennai, IN
3 Department of CSE, SV University,Tirupati, IN
Source
Wireless Communication, Vol 3, No 6 (2011), Pagination: 420-426Abstract
Wireless sensor networks (WSNs) greatly extend our ability to monitor and control the physical world, as they have become the mark of pervasive technology. One of the main design issues for a sensor network is conservation of the energy available at each sensor node. We split the lifetime of the sensor network into equal periods of time known as rounds. Base stations are relocated at the start of a round. Energy efficient organization is forecasting the position of Mean Square Error for every node in the location. Localization is an important issue in wireless sensor networks as maintaining the location of information is indispensable in applications such as routing, target tracking. Beacons (known-location nodes) are one key approach to achieving localization in wireless networks. In this paper we propose a Beacon Movement Detection Schemes such as Location based, Neighbor based, Energy Saving Scheme, Modeling of Broadcasting Scheme, RSS-based localization and DV-hop using the distance vector exchange so that all nodes in the network get distances, in hops, to the landmarks and reliability factor information for wireless sensor networks during simulations, we evaluate the proposed schemes and examine their capability to improve the localization accuracy in events of beacon movement which improves localization.Keywords
Energy Efficient Organization, Localization, RSS-Based Localization Scheme, Energy Saving Scheme, DV-Hop, Signal Strength.- Re-Pro Routing Protocol with Performance Comparison of Mobile Ad hoc Network Protocols
Authors
1 Vel Tech DR.RR & DR.SR Technical University, Avadi, Chennai, IN
2 Department of CSE, Vel tech DR.RR & DR.SR Technical University, Avadi, Chennai, IN
Source
Wireless Communication, Vol 3, No 6 (2011), Pagination: 435-439Abstract
In this paper, we present new protocol design scenario like Re - Pro Routing Protocol (RPRP) for Broadcasting in wireless mobile Ad-hoc Network and a comparative performance for Mobile Ad hoc Networks protocols like as Ad-hoc On-Demand Distance Vector Routing protocol focusing on the effects of changes such as the increasing number of receivers or sources and increasing the number of nodes. Although some simulation results of MANET protocols have been published before, these protocols have not been compared in isolation. A systematic performance evaluation of these protocols is done by performing certain simulations under NS2.Keywords
MANET, Reactive Routing Protocol, Proactive Routing Protocol, Broadcasting.- A Narrative Loom to Secured Strewn Assorted Milieu in Network Architecture
Authors
1 Department of Computer Science and Engineering, Veltech Dr.RR & Dr.SR Technical University, Chennai, IN
2 Panimalar Engineering College, Chennai, IN
Source
Networking and Communication Engineering, Vol 3, No 15 (2011), Pagination: 995-998Abstract
Service oriented steganography is a framework based on, on which a logical transparent steganographic layer development. In this paper the works on steganography and its approach is studied and divided on Work Breakdown Structure into simple rational services allotted to network infrastructure. Service oriented architecture is also described which service oriented architecture communicates each and everything through a common language to desired compositions. It also reuses, outsource, maintain and make simple and available all the system attributes. In addition to this a related ADL model in the form of framework is also developed to describe and clarify the above proposed approach of steganographic algorithms which can be supported by different services on the network. This service based steganography system implements encoding service to hide a secret image inside a cover image automated by cover image selection service and decoding service which performs the extraction process.Keywords
Service Oriented Architecture, Slightest Momentus Crub Inclusion, Application Programming Interfaces, Granular and Distributed Service Oriented Systems.- Computer Aided Diagnosis using Alarm Pixel Generation and Region Growing Method
Authors
1 Veltech Dr.RR. & Dr.SR Technical University, Chennai, IN
2 Dean of Computing, Veltech Dr.RR. & Dr.SR Technical University, Chennai, IN
3 Dean & Professor, Veltech Dr.RR. & Dr.SR Technical University, Chennai, IN
Source
Digital Image Processing, Vol 4, No 12 (2012), Pagination: 673-677Abstract
Breast cancer is one of the most dangerous diseases that cause innumerable fatal in the female society. Early detection is the only way to reduce the mortality. Due to variety of factors sometimes manual reading of mammogram results in misdiagnosis. So that the diagnosis rate varies from 65% to 85%. Various Computer Aided Detection techniques have been proposed for the past 20 years. Even then the detection rate is still not high. The proposed method consists of the following steps Preprocessing, Segmentation, Feature extraction and Classification. Noise, Artifact and Pectoral region are removed in preprocessing step. Contrast enhancement, alarm region generation and Region growing method is used to segment the mass region. Segmented features are extracted using Gray Level Co-occurrence Matrix. Extracted features are classified using Support Vector Machine. Performance of the proposed system is evaluated using partest method. Proposed algorithm shows 95.2% sensitivity and 94.4% Specificity. The proposed algorithm is fully automatic and will be helpful in assisting the radiologists to detect the malignancy efficiently.Keywords
Mammogram, Computer Aided Detection, Adaptive Histogram, Segmentation, Feature Extraction, Support Vector Machine.- Efficient Calculation of Maximum Likelihood Estimation for Authorship Attribution Using Lexical and Syntactic Features
Authors
1 University of Madras, Chennai, IN
2 Department of CSE, Veltech Dr. RR & Dr. SR Technical University, Chennai, IN
3 Veltech Dr. RR & Dr. SR Technical University, Chennai, IN
Source
Data Mining and Knowledge Engineering, Vol 3, No 6 (2011), Pagination: 383-386Abstract
In this paper two models for Authorship Attribution using Bayesian approach are compared. Authorship attribution deals with the ascertainment of the actual author for a particular text. When two authors, say A1 and A2, claim to be the author of a particular essay, the real author is to be found out. For solving such a problem usually maximum likelihood estimation (MLE) for the authors under dispute is computed i.e., train a probabilistic model for author A1 and another probabilistic model for author A2. Then using those, calculate the MLE. This method is known as Bayesian approach. For doing this an unknown text and two authors with a large text sample each are needed. To calculate the maximum likelihood unigram, bigram or trigram models can be chosen. Usually unigrams are chosen; number of occurrences of those unigrams are found out; their probabilities are calculated. Based on the higher probability actual author is ascertained. The above seen is the method commonly used for Authorship Attribution. In this paper another method which consider the singleton unigram words is going to be used, that is, the words that have occurred only once in the text under dispute or “the unknown text”. In this paper, vocabulary usage to ascertain the original author is concentrated upon. Also an advanced method of using further grammatical features like Syntactic features is proposed. Both singleton unigram model and unigram model are used to find out the maximum likelihood estimate.Keywords
Unigrams, Singleton Unigrams, Tokenizer, Bayesian Approach, Syntax, POS Tagger, Parser.- D2RCR-Dynamic Distributed Route Level Content based On-Body Routing in Distributed Cloud Environment
Authors
1 Department of Computer Science and Engineering, Vel Tech University, Chennai - 600062, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 3 (2016), Pagination:Abstract
Objectives: Human area network is one of the hot key research domains in the area of IEEE 802.15.6 standard. In the world of mobility, end user requires high sophistication and easy data access. This leads to heavy traffic within the gadgets. Hence to overcome these problems a novel route model is proposed. Methods/Statistical Analysis: This paper presents a route level content based store-and forward packet routing algorithm for Wireless Human Area Networks in distributed cloud environment. Findings: A prototype WHAN has been built for symbolizing on-body topology disconnections in the presence of ultra-short range wireless links (Cloud), volatile RF dilution, and humanoid motion. A route level content based store-and forward packet routing protocol is then developed for optimistic dynamic routing algorithm. Here, an Adaptive-point framework is created within the Cloud architecture, targeting to deliver reliable routing service for WHAN-inter body communication, where each HAN node functions as a mobile service node and predicts its future locations by generating Adaptive point messages, which describe the route of the node's movement. Semi-cloud module in cloud collects the Adaptive point information and makes decision for inter communication WHAN nodes. The proposed methodology reveals the globally optimized routing path in terms of message delivery and protocol constraint. The performance of the proposed model has been evaluated and experimental results reveal the improvement of routing problem in WHAN. Application/Improvements: This method is applicable in packet data transmission for the wireless cloud environment.Keywords
Cloud Computing, HAN Protocol, Mobile Computing, On-Body Communication, WHAN- Implementation of Cloud based Electronic Health Record (EHR) for Indian Healthcare Needs
Authors
1 Department of CSE, Vel Tech University, Chennai - 600062, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 3 (2016), Pagination:Abstract
Background/Objectives: EHR means the digital version of the patients medical report, in store the data in real time, it contains medication and treatment history which includes the broader view of patients care and it also contains patients medical history, diagnosis, medications, treatment plans, immunization data, allergies, radiology images, laboratory and test results. Methods/Statistical Analysis: The main intention of EHR is to have access to evidence based tools that health providers can make use to make decision and disease diagnosis about the patients care delivery. The current population of India (2014) is 1.27 billion. About 72.2% of the population lives in some 638,000 villages and the rest 27.8% in about 5,480 towns and urban agglomerations. Findings: In our proposed work we develop Electronic Health Records (EHR) to integrate with the health care providers all over India and to implement it with the cloud infrastructure. The main challenges that are addressed in this works are, handling heterogeneous data, data storage, use of data analytics tool for decision making, data privacy and the data security. Application/Improvements: This can be used to integrate the healthcare management system. Once implemented it provides remote medication, vaccination management, disease diagnosis, remote diagnosis and remote real time monitoring and personal health record.Keywords
Clinical Data, Cloud, Feature Selection, Medical Diagnosis- 2D to 3D Conversion using Key Frame Extraction
Authors
1 Department of Computer Science and Engineering, Vel Tech University, Chennai - 600062, Tamil Nadu, IN