Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Dhayalan, D.
- Robust Aircraft Recognition using High Resolution Reconstructed Images
Abstract Views :152 |
PDF Views:0
Authors
Affiliations
1 Department of MCA, Vel Tech High Tech Engineering College, Chennai - 600062, Tamil Nadu, IN
2 Department of CSE, Jaya Engineering College, Chennai - 602024, Tamil Nadu, IN
1 Department of MCA, Vel Tech High Tech Engineering College, Chennai - 600062, Tamil Nadu, IN
2 Department of CSE, Jaya Engineering College, Chennai - 602024, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 3 (2016), Pagination:Abstract
Background: Aircraft Recognition with high resolution space borne images is a challenging task.It is different from other natural object recognition. The ground image of aircraft is complex and disturbing. The target image has to be detected in a cluttered background. Methods: The proposed technique takes into account multiple features such as circular Frequency filter (CF-filter), fuselage symmetry and angle between fuselage axis and wing for candidate selection. Normalized Tree cut algorithm isused for Segmentation of image done and aircraft alignment done using Histogram Oriented Gradient (HOG). Automatic jigsaw puzzle solution is implemented for aircraft reconstruction of pieces. Findings: In the candidate selection stage because of cluttered background the aircraft is not identified. Here the multiple identification techniques such ascircular frequency filter (CF-filter), fuselage symmetry and angle between fuselage axis and wing are considered. Applications: The above said techniques were dealt earlier as independent features. Because of proposed multiple feature consideration accuracy in candidate identification is enhanced.Keywords
Aircraft Recognition, Jigsaw Puzzle Algorithm, Histogram Oriented Gradient- Artificial Instructions for Human Brain
Abstract Views :176 |
PDF Views:0
Authors
Affiliations
1 Department of MCA, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600 062, Tamil Nadu, IN
1 Department of MCA, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600 062, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 11 (2016), Pagination:Abstract
Objectives: This paper discusses about the importance of the effective intelligence among human and artificial devices. Nowadays more and more human activities will be carried by artificial agents and devices, which overcome our Imagination. Methods: This paper gives a theoretical application to develop the personality of mentally challenged person by feeding Artificial Instructions into their brain by using the fMRI (functional Magnetic Resonance Imaging) concept in the reverse manner which is used in the mind reading system. Findings: The instructions will get fed into the brain by means of computer system and then it passes to the Temporal lobes of the human brain.Temporal lobes were used to speak, make decision, think and analyse. The instructions will get decoded into brain instruction by the different signals of the fMRI. Applications/Improvements: This work may bring changes in the life of mentally challenged ones and accidental victims.Keywords
Artificial Instructions, fMRI Technology, Functional Imaging, Human Brain- Vision Check Up for Disabled Persons by using Mobile Interaction
Abstract Views :140 |
PDF Views:0
Authors
Affiliations
1 Department of MCA, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600062, Tamil Nadu, IN
1 Department of MCA, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600062, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 16 (2016), Pagination:Abstract
Objective: In this paper, we deliver a concept based on image and video processing designs on behalf of eyesight else vision find out. Methods: The inducement of the study is for disabled people, without their hands. The vision checkup method is by using the mobile phone interaction. It utilizes the detected face location and vision detection is based on mobile phones for controlling eyelids state (close or open). Findings: This vision checkup method is used to show the improvement of accuracy of detection. In this mobile application, the light effect and the spaces among the disabled person eyes is tracking. The correctness of vision detection will be given by the usage of mobile devices. In existing, phone-based vision test for patients who wants to track their eyesight in their place itself, this type of gadgets could help to track people who are having defects in their eye before they lost more vision, and take the treatment in proposed this same tool could help the disabled persons also by using image processing of vision detection in eyelids state (close or open) detection. Improvements: The drawbacks are reduced in this proposed system. Finally, it provides the 99% of result for the complete detection of accurateness.Keywords
Detection Accuracy, Eye Blink, Eye Checkup, Mobile Interaction, Vision Detection- TPA for Privacy-Preserving Using Safe Cloud Storage
Abstract Views :97 |
PDF Views:0
Authors
D. Dhayalan
1,
M. Lavanya
1
Affiliations
1 Department of Computer Application, Veltech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, IN
1 Department of Computer Application, Veltech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, IN
Source
International Journal of Scientific Engineering and Technology, Vol 3, No 5 (2014), Pagination: 601-603Abstract
Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing resources. Enabling public auditability for cloudstorage is important so that users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free. Here we propose a secure cloud storage system supporting privacy-preserving public auditing.Keywords
Third Party Auditor, Integrity, Cloud Computing, Security.- Brain Finger Printing
Abstract Views :107 |
PDF Views:0
Authors
D. Dhayalan
1,
B. Mamtha
1
Affiliations
1 Department of Computer Application, VelTech MultiTech DR. Rangarajan DR. Sakunthala Engineering College, Avadi, Chennai, IN
1 Department of Computer Application, VelTech MultiTech DR. Rangarajan DR. Sakunthala Engineering College, Avadi, Chennai, IN
Source
International Journal of Scientific Engineering and Technology, Vol 3, No 5 (2014), Pagination: 604-607Abstract
Every forensic science provides scientific data & scientific conclusions for the use of non-scientist panel of judges & juries, who evaluate these on a consistent & legal basis regarding facts. The reason of this document is to describe the boundaries of the science of Brain Fingerprinting & state what falls within & outer the boundaries.Keywords
Forensic Science, Multifaceted Response Analysis, Memory and Encoding Related Multifaceted Electroencephalographic Response, Criminal Investigation, Brain Waves.- Security Enhancement on Cloud Using Multi Cloud Concepts
Abstract Views :98 |
PDF Views:0
Authors
D. Dhayalan
1,
M. Saravanan
1
Affiliations
1 Veltech Multitech Dr. Rr Dr. Sr Engineering College, IN
1 Veltech Multitech Dr. Rr Dr. Sr Engineering College, IN
Source
International Journal of Scientific Engineering and Technology, Vol 3, No 5 (2014), Pagination: 608-611Abstract
Security challenges are still among the biggest challenges or obstacles in the field of cloud computing and services. Many research activities are done in clearing those issues. In this journal we concentrated on security issues by involving multi cloud architectures and introducing a concept called database splitting which can enable security.Keywords
Cloud, Multi Cloud, Database Splitting, Partitioning, Cryptography, Encryption.- Securing Storage of Data in Cloud Computing
Abstract Views :89 |
PDF Views:0
Authors
D. Dhayalan
1,
S. Malcom
1
Affiliations
1 Department of MCA, Vel Tech Multi Tech Dr. RR and Dr. SR Engg. College, Avadi, Chennai, IN
1 Department of MCA, Vel Tech Multi Tech Dr. RR and Dr. SR Engg. College, Avadi, Chennai, IN
Source
International Journal of Scientific Engineering and Technology, Vol 3, No 5 (2014), Pagination: 612-615Abstract
In this paper, a new data encoding scheme is proposed called layered interleaving. It provides good security. Thus, this extensive security and analysis of the performance shows that the proposed scheme is highly effective and efficient against Byzantine failure, the malicious data modification attacks, and server colluding attacks.Keywords
Layered Interleaving, Byzantine Failure, Security, Recover.- Efficient Mobile Video Streaming and Sharing in Cloud Environment
Abstract Views :85 |
PDF Views:0
Authors
D. Dhayalan
1,
K. Dinesh
1
Affiliations
1 Veltech Multitech Dr. Rr Dr. Sr Engineering College, IN
1 Veltech Multitech Dr. Rr Dr. Sr Engineering College, IN
Source
International Journal of Scientific Engineering and Technology, Vol 3, No 5 (2014), Pagination: 655-657Abstract
When we consider about the video Streaming and Sharing over the Mobile network have been souring, the wireless network link capacity cannot keep up with the video traffic demand. We propose the new video streaming framework which has the two main part EMVS (Efficient Mobile Video Streaming) and EMVS (Efficient Mobile Video Sharing). This enables faster video streaming and sharing in Cloud Environment for Mobile devices.Keywords
EMVS, Mobile, Cloud, Wireless Network.- Distributed Processing of Probabilistic Top-K Inquire in Wireless Sensor Networks
Abstract Views :95 |
PDF Views:0
Authors
D. Dhayalan
1,
S. Manikandan
1
Affiliations
1 Department of MCA, Vel Tech Multi Tech Dr. RR and Dr. SR Engg. College, Avadi, Chennai, Tamilnadu, IN
1 Department of MCA, Vel Tech Multi Tech Dr. RR and Dr. SR Engg. College, Avadi, Chennai, Tamilnadu, IN
Source
International Journal of Scientific Engineering and Technology, Vol 3, No 5 (2014), Pagination: 658-660Abstract
The Top-k query processing is to evaluate the high ranked data tuples from the sensor node. Accordingly, the algorithms SSB, NSB for local Intercluster processing of the query. The data distribution that changes dynamically, the adaptive algorithm is used to decrease transmission cost and a constant round of data communication in the network.Keywords
Data Pruning, Inter-Cluster, Adaptive Algorithm, Intra-Cluster.- Towards Smarter Metropolitan Urgent Situation Response
Abstract Views :96 |
PDF Views:0
Authors
Affiliations
1 Veltech Multitech Dr. RR Dr. SR Engineering College, IN
1 Veltech Multitech Dr. RR Dr. SR Engineering College, IN