- R. Ravikumar
- R. Sugumar
- T. S. Karthick
- G. Raja
- R. Nakkeeran
- K. V. V. S. Gupta
- G. N. Satapathi
- P. Srihari
- T. Shankar
- Tony James
- R. Mageshvaran
- G. Pragathi
- M. Azhagiri
- Rakesh Achar
- Sheik Faritha Begum
- K. P. Kaliyamurthie
- J. S. Adeline Johnsana
- S. Kishore Verma
- T. Gopi Raju
- M. Gayatri Ramya
- S. Kathirvel
- Sanjay Kumar Gupta
- G. Harish
- M. S. Ganesha Prasad
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Rajesh, A.
- Awareness and Adoption of Value Added Services Offered by the Banks in Coimbatore District
Authors
1 School of Management Studies, Bannari Amman Institute of Technology, Anna University, Sathyamangalam (T.N.), IN
Source
International Journal of Commerce & Business Management, Vol 7, No 2 (2014), Pagination: 338-342Abstract
The value added services not only helps a bank to reduce costs but also helps it to retain its valuable customers. As far as customers are concerned, this facility enables the customer to bank anywhere, at any time and in any condition. Creation of Value Added Service facilities involve very huge investment; in order to improve the operational efficiency of these facilities the banks should encourage the usage of value added services among the customers. In this context a study was undertaken to understand the awareness and adoption of Value Added Service among the customers by analysing data collected from 80 sample respondents through personal interview method using Percentage analysis, RBQ, Chi-square test and Probit analysis. The results of the study revealed that majority of customers, who aware of value added services were young, graduated and most of them were self-employed. Education, monthly income and occupational status were positively influenced the awareness level of value added services. Time saving and comport in using the technology was the important factors influenced the adoption of value added services.Keywords
Adoption, Awareness, RBQ, Value Added Services.References
- Adeogun, O.A., Ajana, A.M., Ayinla, O.A., Yarhere, M.T. and Adeogun, M.O. (2008). Application of logit model in adoption decision : A study of hybrid clarias in Lagos state, Nigeria. American-Eurasian J. Agric. & Environ. Sci., 4(4) : 468-472.
- Chinnadurai, M. (2006). Promotional strategies of cellular services: A customer perspective. Indian J. Mktg., 14(12) : 29-38.
- Madhu, V. (2003). The new world of banking a paradigm shift. J. Mgmt. Res., 3(3) : 139.
- Ravi, V., Mahilcarr and Sagar, N.V. (2005). Profiling of internet banking users in India using intelligent techniques. J. Services Res., 6(2) : 61-72.
- Samson P. Katengeza, Julius J. Okello and Edouard R. Mensah (2011). Factors influencing awareness and use of electronic - based market information services for farming business in malawi. Internat. J. Econ. & Res., 2(4) : 43-58.
- Thyagarajan, M. (2009). Customer's perception towards customer services with value added services in private sector banks in Coimbatore City - A Case Study. J. Cotemporary Research in Mgmt., 69-81.
- Uppal, R.K. (2010). Customer perception of E-Banking services by Indian Banks some survey evidence. TheIcfai J. Bank Mgmt., 7(1) : 63-78.
- Success of Marigold Farming: an Intervention by NAIP-Value Chain on Flowers for Domestic and Export Markets
Authors
1 School of Management Studies, Bannari Amman Institute of Technology, Anna University, SATHYAMANGALAM (T.N.), IN
Source
International Journal of Commerce & Business Management, Vol 8, No 1 (2015), Pagination: 112-116Abstract
Marigold gained popularity amongst farmer and flower dealers on account of its easy culture, wide adaptability, attractive colour, shape, size and good keeping quality. Lack of technical know-how of scientific flower cultivation among the growers and high level of postharvest losses, lack of awareness on market opportunities, lack of timely and precise price information were the major missing links in the marigold value chain in India. To address all those missing links in the marigold value chain Tamil Nadu Agricultural University (TNAU), proposed a project entitled 'Value chain on flowers for domestic and export markets' to the NAIP, with the aim of contributing to the promotion of the nation's floriculture industry. The project period is September 2008 to June 2012 and it is operated in the Department of Floriculture and Landscaping. R. Rangasamy one of the farmer in the project area, marigold is the major source of income for his family and his livelihood depends mainly on the marigold farming. Since, he is having ten years of experience in marigold farming he says that over the year the yield marigold was reduced to 4-5 tonnes per acre due to indiscriminate use of pesticide, fungicides and fertilizer. Before NAIP intervention he received very low price (Rs. 2-3 per kg.) due to exploiting nature of market channel. After NAIP intervention the farmer undergone different training programs related to production, post-harvest and marketing aspects and adopted most of the technologies recommended by the NAIP scientist. Because of the adoption of advanced technologies he got the yield of 10-13 tonnes per acre. The farmer received daily price information through the cell phone that was disseminated by the NAIP scientists based on which he is able to get correct price from the buyer in the market. The farmer was entered into the contract farming with AVT natural Pvt. Ltd. who buys the marigold for xanthophylls extraction. Under this arrangement the farmer gets assured price of Rs. 6 per kg. of marigold, timely inputs and consultancy services from the company. Now the farmer was reaping the benefit of Rs. 2-3 per kg. as net profit from the Marigold farming due to intervention of NAIP.Keywords
NAIP, Value Chain, Technology Adoption, Contract Farming.- Empowering Security and Performance of TPA Pertinent in Single Cloud to Multi-Cloud
Authors
1 Department of Computer Science, C. Abdul Hakeem College of Engineering and Technology, Melvisharam, Vellore District, Tamil Nadu, IN
2 Department of Information Technology, C. Abdul Hakeem College of Engineering and Technology, Melvisharam, Vellore District, Tamil Nadu, IN
Source
Wireless Communication, Vol 6, No 6 (2014), Pagination: 256-260Abstract
The use of cloud computing has increased rapidly in many organizations and it also deployed in technologies like 3G, 4G and pervasive applications. Ensuring the security of cloud computing is a major factor in the cloud computing environment as users often store sensitive information with cloud storage providers (CSP), but these providers may be untrusted. Even though a TPA audits the users data with correctness and integrity, dealing with single cloud providers is predicted to become less popular with service availability failure, possibility of malicious insiders and Byzantine faults in the single cloud. A movement towards Multi-Clouds or in other words inter-clouds or clouds- of- clouds has emerged recently; hence we need to protect the user data in Multi-Clouds with greater security in the form of public batch auditing and dynamic certification to perform continuous monitoring from single to Multi-Clouds, by this, it is to implement Cipher text – Policy Attribute Based Encryption(CP-ABE)[6] to achieve secure data sharing and also provides forward and data sharing and also provides forward and backward security in cloud computing to improve the security and performance with many number of users using the single to multi cloud environment.
Keywords
TPA (Third Party Auditor), CSP (Cloud Service Provider), CP-ABE (Cipher Text Policy Attribute based Encryption), TPACA (Third Party Auditor Certificate Authority).- Detection of Node Replication Attacks in Mobile Sensor Networks
Authors
1 St.Peter's University, Chennai, IN
2 C. Abdul Hakeem College of Engineering and Technology, Vellore, IN
Source
Wireless Communication, Vol 6, No 4 (2014), Pagination: 131-133Abstract
Wireless sensor networks are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, the attacker can re-program it and replicate the node in a large number of replicas, thus easily taking over the network. The detection of node replication attacks in a wire- less sensor network is therefore a fundamental problem. Compared to the extensive exploration on the defense against node replication attacks in static networks, only a few solutions in mobile networks have been presented. Moreover, while most of the existing schemes in static networks rely on the witness-finding strategy, which cannot be applied to mobile networks, the velocity-exceeding strategy used in existing schemes in mobile networks incurs efficiency and security problems. In this paper Localized algorithms are proposed to resist node replication attacks in mobile sensor networks. The Merits of proposed algorithms are, it can effectively detect the node replication in localized manner. These algorithms are, also avoid network-wide synchronization and network-wide revocation.Keywords
Replication Attack, Security, Wireless Sensor Networks, Localized Detection.- Investigation on Heterogeneous Power line Communication for Home Area Networking
Authors
1 Electronics and Communication Engineering Department, CCET, Pondicherry University, Puducherry, IN
2 Electronics and Communication Engineering Department, Pondicherry Engineering College, Puducherry, IN
Source
Networking and Communication Engineering, Vol 3, No 2 (2011), Pagination: 111-120Abstract
Home networking is becoming an attractive application not only for the Internet access but also for home automation. Hence applications over powerline communication (PLC) networks have drawn much interest in the communication industry, not only because of inherent convenience (no new wires), but almost all electrical devices have to connect to a power outlet eventually. At the physical layer the promising methods for improving inferior characteristics of the PLC system are orthogonal frequency division multiplexing (OFDM) and forward error correction (FEC). The performance analysis of the integrated PLC and visible light communication (VLC) systems using OFDM and turbo codes, under multipath channel conditions has been investigated. To increase the performance of the PLC networks a new hybrid protocol namely virtual slot multiple access (VSMA) has been investigated to improve the QoS for the home networks. An adaptive backoff mechanism has been proposed to enhance the performance of hybrid protocol. The proposed hybrid system has been analyzed for variable packet sizes and its performance metrics has been evaluated. The analysis has been made to choose an optimal packet size, to make the system more resistance under impulse noise and make it backward compatible with the existing technologies. The proposed hybrid scheme enhances the MAC throughput and reduces the access delay for various services as compared with the conventional protocol.Keywords
FEC, OFDM, PLC, VLC, VSMA.- Automatic Moving Object Extraction in MPEG Video
Authors
1 Dadi Institute of Engineering and Technology, IN
Source
Digital Image Processing, Vol 4, No 12 (2012), Pagination: 622-624Abstract
In this paper, we propose a moving object extraction technique for MPEG coded data directly. It is a change based motion object extraction approach, which discriminates background and moving objects by means of the higher-order statistics (HOS) performed on the inter frame differences of DC image. The DC image is partly decoded picture from the compressed video for the rapid reconstruction of image data. In order to employ an optimal threshold in moving object detection stage, the background is detected by the Moment-preserving thresholding technique for each frame. Based on the background statistic, the proportion of background variance is employed to extract the final object mask by comparison the fourth moment measure and the variance. Experimental results have demonstrated that the proposed approach worked efficiently and shown a robust result for object extraction in compressed video.
Keywords
Dc Image, Variance, Mean, Frame, Moment.- Lifetime Improvement in WSN using Flower Pollination Meta Heuristic Algorithm Based Localization Approach
Authors
1 VIT University, Vellore, IN
Source
Indian Journal of Science and Technology, Vol 9, No 37 (2016), Pagination:Abstract
Objectives: The nodes in a wireless sensor network are extremely energy limited. Often, there occurs transmission of similar sensed data from adjacent nodes of a geographical region with high sensor node density. Network lifetime of the sensor network can be improved by grouping such closely packed nodes using the node locations obtained from a localization algorithm, thereby eliminating redundant data transmission. Methods: This paper employs the Flower Pollination Algorithm (FPA) for node localization and the performance of this method is compared against alternative localization techniques, viz. Particle Swarm Optimization (PSO) and Harmony Search Algorithm (HSA). Findings: The lifetime improvement of the proposed Proximity Grouping Algorithm (PGA) method is compared with that offered by conventional Low-Energy Adaptive Clustering Hierarchy (LEACH) method. Application/Improvements: The proposed PGA method shows 35% better network lifetime improvement, based on the residual energy of the network.Keywords
Flower Pollination Algorithm (FPA), Flower Pollination, Localization, Meta Heuristic, Network Lifetime.- Investigation of an Improved Adaptive Power Saving Technique for IEEE 802.11ac Systems
Authors
1 School of Electronics Engineering, VIT University, Vellore – 14, IN
Source
Indian Journal of Science and Technology, Vol 9, No 37 (2016), Pagination:Abstract
Background/Objectives: Recent advances in IEEE 802.11ac based wireless networks have made them potential enough to be used for Voice over Wireless Local Area Networks (VoWLAN). The main requirement in the design of such network is to minimize the energy consumption to maximize the network lifetime of user equipment’s. Methods/Statistical Analysis: For such energy conservation, the IEEE 802.11ac networks make use of power saving protocols, where the wireless radio is turned on and off periodically. In this paper, a group based adaptive power saving mechanism is suggested that dynamically utilize the contention and transmission opportunity parameters of user equipment. Findings: The design of the power saving is unique as the grouping is based on the current power level of user equipment’s, type of service, channel status and the number of services to a user equipment. Application/Improvements: Simulation results shows that proposed grouping technique provides an improvement of 46.25% and 47.29% in terms of energy consumption and delay, respectively compared the existing power saving protocol for delay sensitive and VoWLAN applications.Keywords
IEEE 802.11ac, Medium Access Control, VoWLAN, Wireless Networks.- A Concept for Minimizing False Alarms and Security Compromise by Coupled Dynamic Learning of System with Fuzzy Logics
Authors
1 Department of CSE, St Peters University, Chennai - 600054, Tamil Nadu, IN
2 Department of CSE, C. Abdul Hakeem College of Engineering and Technology, Anna University, Melvisharam, Vellore - 632509, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 37 (2016), Pagination:Abstract
Objectives: To develop a novel method of Intrusion Detection System (IDS) by coupled dynamic learning of system with Fuzzy logics for minimizing false alarms and security compromise of a system connected with internet. Method: When Intrusion Detection System (IDS) raise alarm based on assigned rules, there would be a possibility for too many false alarms. The degree of intrusion and subsequent alert are often depending on different situations. These situations are not unique for all systems hence; a global knowledge based filter rules fail to minimize false alarms. In this paper, a concept was proposed to solve this hazy and unclear cutoff rules derived from global knowledge, by self-learning and turning activity of system, towards the security issues from the analytical outcomes of behavioral patterns of network system. Findings: The use of fuzzy logic helps to smooth the sharp separation of normal and abnormal behaviors in network activity which adds further strength in minimizing false alarms and security compromise. This concept is illustrated and demonstrated using some familiar network behaviors for easy understanding of logics and mechanism of the proposed IDS model. Application/Improvements: This intelligence associated with fuzzy logic may be extended with more and more parameters for better efficiency in Intrusion Detection System (IDS).Keywords
Anomaly Detection, Behavior Analysis, Fuzzy Logic, Fuzzy Score, Fuzzy Decision Module Intrusion-Detection System.- A Review of Heterogeneous Resource Allocation in LTE-A based Femtocell Networks with CQI Feedback
Authors
1 School of Electronics Engineering, VIT University, Vellore - 632014, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 36 (2016), Pagination:Abstract
Background/Objectives: The Long-Term Evolution- Advanced (LTE-A) based heterogeneous networks focus on the Femto based cell deployment. These Femto cells will benefit the customers and service providers in term of network coverage and spectral efficiency. In such networks, optimal means of resource allocations is the major concern. Methods/Statistical Analysis: This paper reviews a detail study of resource allocation in Femto cell based LTE-A networks. In addition, a resource allocation strategy is suggested by means of Heterogeneous Channel Quality Index (CQI) based Scheduling Techniques (HCBST). It makes use of an indexed adaptive modulation and coding technique by referring the various CQI parameters. Findings: The HCBST algorithm is implemented by analyzing various scheduling technique at Femto and Marco base stations. The proposed resource allocation strategy is implemented by means of two scenarios, namely, Femto without node mobility and Femto with node mobility. Application/Improvements: The proposed HCBST system with modified largest weight delay first with CQI at Macro cell and Exponential with CQI at Femto cell (ML-EXP-CQI) based scheduling display 1.1879% and 2.85% better in term of throughput and spectral efficiency, respectively, as compared to existing scheduling algorithm..Keywords
Femto Cell Networks, HCBST, Long-Term Evolution- Advanced, ML-EXP-CQI, Scheduling.- Comparative Study of Clustering Methods over Ill- Structured Datasets using Validity Indices
Authors
1 Department of Computer Science and Engineering, Bharath University, Chennai, Tamil Nadu, IN
2 Department of Computer Science and Engineering, C. Abdul Hakeem College of Engineering and Technology, Vellore – 638052, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 12 (2016), Pagination:Abstract
Objective: This paper discusses and compares the various clustering methods over Ill-structured datasets and the primary objective is to find the best clustering method and to fix the optimal number of clusters. Methods: The dataset used in this experiment has derived from the measures of sensors used in an urban waste water treatment plant. In this paper, clustering methods like hierarchical, K means and PAM have been compared and internal cluster validity indices like connectivity, Dunn index, and silhouette index have been used to validate the clusters and the optimization of clustering is expressed in terms of number of clusters. At the end, experiment is done by varying the number of clusters and optimal scores are calculated. Findings: Optimal score and optimal rank list are generated which reveals that the hierarchical clustering is the optimal clustering method. The optimum value of connectivity index should be minimum, silhouette should be maximum, dunn should be maximum. So by interpreting the results, the optimal number of clusters for the experimental dataset have been concluded as K=2 and the optimal method for clustering the given dataset is hierarchical. Applications: The experiment has been done over the dataset derived from the measures of sensors used in a urban waste water treatment plant.Keywords
Clustering Methods, Ill-Structured Datasets, Optimization,Validity Indices- CATs-Clustered k-Anonymization of Time Series Data with Minimal Information Loss and Optimal Re-identification Risk
Authors
1 Department of Computer Science and Engineering, St. Peter’s University, Avadi, Chennai - 600054, Tamil Nadu, IN
2 Department of Computer and Engineering, C. Abdul Hakeem College of Engineering and Technology, Melvisharam - 632509, Tamil Nadu, IN
3 Department of Computer Science and Engineering, SCSVMV University, Kanichipuram - 631561, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 47 (2016), Pagination:Abstract
Background/Objectives: Time series is a significant type of data, widely used in diverse application such as financial, medical, and weather analyses, which in-turn contain personal privacy to a great extent. Methods/Statistical Analysis: The perquisite to protect privacy of time series data is to bolster the data holder to get involved in the above applications without any privacy threats. The k-anonymization approach of time series data has picked up consideration over late years, a key requirement of such an approach is to guarantee anonymization of time series data while minimizing the information loss caused from that approach. Findings: In this article, we implemented a novel methodology called CATs (Clustered k-Anonymization of Time Series Data) that applies the idea of clustering on time series data and ensure anonymization by gaining minimized information loss within venerable utility. The fundamental perception here is that the time series data tuples that are alike, ought to be a part of one cluster, and de-identification of these tuples is furnished. We thus formulate and proposed this approach as CATs, implemented through mishmash of WEKA and ARX anonymization tool. We have executed the solution on two benchmark time series data set available in UCR, Our experimental result strives that CATs confirms to have minimal information loss ranging from 18% to 24% reduction rate when compared with existing TSA (Time Series Anonymization) approaches. Applications/Improvements: As result of our experimentation, we express that our approach can play a remarkable role in the field of financial management, Online Medical process monitoring and management etc.Keywords
Clustering, Information Loss, k-Anonymization, Privacy Preserving Data Mining, Re-Identification Risks, Time Series Data Mining.- ICH Guideline Practice- A Validated Stability- Indicating HPLC Method for the Determination of Efavirenz in Dosage Form
Authors
1 Department of Pharmaceutical Chemistry, Telangana University, Nizamabad – 503322, IN
2 Department of Pharmaceutics, Acharya Nagarjuna University, Nagarjuna Nagar- 522 510, IN
3 Department of Pharmaceutics and Pharmaceutical Analysis, Hindu College of Pharmacy, Guntur -522002, IN
4 Department of Pharmaceutics, Shadan College of Pharmacy, Hyderabad, Andhra Pradesh -500008, IN
Source
Research Journal of Pharmaceutical Dosage Form and Technology, Vol 6, No 1 (2014), Pagination: 7-14Abstract
A simple, precise, accurate and new stability-indicating reversed-phase high-performance liquid chromatographic (RPHPLC) method was developed and validated as per International Conference on Harmonisation (ICH) of Technical Requirements for Registration of Pharmaceuticals for Human Use guidelines to determine efafirenz in tablet dosage form. The drug was successfully eluted at 6.264 min by mixture of ammonium dihydrogen phosphate buffer, acetonitrile and triethylamine (30:70:1) on C18 column (150 mm × 4.6 mm, 5 μm) at the flow of 1.5 ml/min. Drug content was determined in between 99.79% and 100.33% with standard deviation of 0.217. The validated RP-HPLC method may be successfully applied for assay, dissolution studies, bio-equivalence studies, as well as routine analysis in pharmaceutical industries.Keywords
RP-HPLC, Efavirenz, ICH.- Design and Optimization of SUAV Empennage
Authors
1 Department of Mechanical Engineering, New Horizon College of Engineering, Bangalore, IN
Source
International Journal of Engineering Research, Vol 4, No 6 (2015), Pagination: 309-314Abstract
Now a days the use of unmanned aerial vehicle (UAV) is getting common, as its size varies from small to large, which has good parameters like, light weight and good stability and can be used for surveillance, agriculture, and in defense as it can be controlled from ground or from other aircraft.
In an UAV wing is blended with fuselage which gives lift to the UAV and the tail is also used for take-off and landing which is also gives higher stability to aircraft. It is important to design an empennage structure at lower drag and for good stability characteristics.
In this present project airfoil coordinates has been generated by using JAVAFOIL, in this project NACA0010 airfoil is created, which is imported to CATIA V5 to design different empennage configurations of same wetted area and UAV empennage has been finally designed in a modeling tool CATIA V5 R19.The model is imported to Ansys through IGES file to simulate CFD analysis, where for analyzing fine meshing is taken for the whole structure of UAV and further CFD flow analysis is done through Ansys CFX software. The results for CL, CD and L/D are obtained by varying AOA with different velocity as shown in graphs (fig 13 to 18). A comparison is made for these empennages to check the aerodynamic efficiency and stability created by the different SUAV tails.