Refine your search
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Vennila, G.
- Optimum Detecting of Contour Let-based Image Watermarks in a Noisy Environment
Abstract Views :359 |
PDF Views:64
Authors
Affiliations
1 Department of Computer Science and Engineering, Jayaram College of Engineering and Technology, Trichy, Tamil Nadu, IN
1 Department of Computer Science and Engineering, Jayaram College of Engineering and Technology, Trichy, Tamil Nadu, IN
Source
Indian Journal of Innovations and Developments, Vol 1, No 6 (2012), Pagination: 406-411Abstract
The objective of this paper is to analyze the unsteady magneto hydrodynamic flow of a viscous incompressible fluid past an infinite hot vertical porous plate in presence of constant suction and periodic variation of plate temperature. The governing equations of the flow field are solved employing multiparameter perturbation technique assuming Eckert number as perturbation parameter. The effects of magnetic parameter M, Grashof number for heat transfer Gr, Eckert number Ec, Prandtl number Pr, frequency parameter ω, etc. on velocity, temperature, skin friction and heat flux are discussed with the help of figures and tables. It is observed that a growing magnetic parameter enhances the velocity of the flow field near the plate and there after the effect reverses due to the magnetic pull of the Lorentz force on the flow field. The Grash of number/permeability parameter/Eckert number has an accelerating effect on the velocity of the flow field. A growing Prandtl number / Reynolds number has a retarding effect on the temperature of the flow field at all points. The permeability parameter enhances the ski n friction and decreases the magnitude of heat flux at the wall. On the other hand, the magnetic parameter enhances the skin friction as well as the magnitude of heat flux at the wall.Keywords
Contourlet Transform, Maximum Likelihood Detector, Multiplicative Image WatermarkingReferences
- Akhaee MA, Sahraeian SME, Sankur B and Marvasti F (2009) Robust scaling-based image water marking using maximum-likelihood decoder with optimum strength factor. IEEE Trans. Multimedia. 11(5), 822–833.
- Demanet L and Ying L (2007) Wave atoms and sparsity of oscillatory patterns. Appl. Comput. Harmon. Anal, 23,368.
- Do MN and Vetterli M (2005) The contour let transform: An efficient directional multi resolution image representation. IEEE Trans. Image Process. 14(12), 2091–2106.
- Hsu CT and Wu JL (1998) Multiresolution water marking for digital images. IEEE Trans. Circuit Syst. 45(8) 1097–1101.
- Jayalakshmi M, Merchant SN, and Desai UB (2006) Digital watermarking in contour let domain. In Proc. 18th Int. Conf. Pattern Recognition. 3, 861–864.
- Maor A and Merhav N (2005) On joint information embedding and lossy compression in the presence of a stationary memoriless attack v channel. IEEE Trans. Inf. Theory, 51(9), 3166–3175.
- Moulin P and O’Sullivan JA (2003) Informationtheoretic analysis of information hiding. IEEE Trans. Inf. Theory. 49(3), 563–593.
- Wang Z and Bovik AC (2004) Image quality assessment: From error visibility to structural similarity, IEEE Trans. Image Process. 13(4), 600–612.
- A Survey on Query Processing in Mobile Database
Abstract Views :279 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, AMET University, Chennai, IN
1 Department of Information Technology, AMET University, Chennai, IN
Source
Indian Journal of Science and Technology, Vol 7, No S6 (2014), Pagination: 32-34Abstract
A mobile computing device connected through wireless network then it is called as mobile database. The main objective of this paper proposes a survey on mobile database requirements, architecture of Mobile database Query processing, and its various challenges. Data-driven application is best method of enabling access to any kind of information retrieval from anywhere at any time. In Database query processing linear search, index based search algorithms are mainly used. This survey shows various existing algorithm used in mobile database query processing like CNFS, Flooding algorithm and their issues.Keywords
Architecture, CNFS, Database, Data-driven, Query Processing- Ontology based Semantic Web Technologies in E-learning Environment using Protégé
Abstract Views :193 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, AMET University, Chennai, IN
1 Department of Information Technology, AMET University, Chennai, IN
Source
Indian Journal of Science and Technology, Vol 7, No S6 (2014), Pagination: 64-67Abstract
The rapid advanced development of mobile phone usage has been increased very sharply. A semantic web is major concept about creation of Meta data. Most of the web page oriented application like HTML and XML uses the concept of Meta data. This paper proposes class concept hierarchy method for implementing and retrieving information about e-learning domain through PROTÉGÉ tools and also shows RDFS and OWL based samples method implementation for e-learning domains in these tools. It produced the result like number of course material prepared by tutor, total number of student registration and number of exam, quiz, assignment conducted by particular tutor using SPARQL query language.Keywords
No Keywords- Hash based Technique to Identify the Selfish Node in Mobile Ad-hoc Network
Abstract Views :195 |
PDF Views:0
Authors
G. Vennila
1,
D. Arivazhagan
1
Affiliations
1 Department of Information Technology, AMET University, Chennai - 603112, IN
1 Department of Information Technology, AMET University, Chennai - 603112, IN
Source
Indian Journal of Science and Technology, Vol 8, No 14 (2015), Pagination:Abstract
Mobile Ad-hoc NETwork (MANET) is a collection of mobile nodes that communicate with other node without any defined network. The node which decline to share its resource with other nodes is a selfish node. The main idea of selfish node is to drop the data packets and preserve the resource for its own use. The co-operation between the nodes is not guaranteed when the node behaves as selfish nodes. Most of the existing techniques use cryptographic algorithm such as Message Authentication Code (MAC), Rivest Shamir Adelman (RSA) etc, in identifying the selfish node. All of those techniques are take more time to find out the selfish node behavior. This paper applies hash function to identify the misbehaving node. The Hash function is a technique used in the Route Reply (RREP) to authenticate the message, which works in an efficient way. The result shows the better performance in terms of packet delivery ratio up to 70% and time delay has been reduced up to 80% compared to the existing Dynamic Source Routing (DSR) protocol.Keywords
Hash Function, Mobile Ad-hoc Network, Rrep, Rreq, Selfish Node.- GIS Based Groundwater Quality Assessment of Vattamalaikarai Basin, Tamil Nadu, India
Abstract Views :149 |
PDF Views:2
Authors
Affiliations
1 Deptt. of Civil Engineering, K. S. Rangasamy College of Technology, Tiruchengode-637 215, T. N., IN
2 Department of Civil Engineering, Government College of Engineering, Salem-636 011, T.N., IN
3 Department of Geology, Anna University, Chennai-600 025, T.N., IN
1 Deptt. of Civil Engineering, K. S. Rangasamy College of Technology, Tiruchengode-637 215, T. N., IN
2 Department of Civil Engineering, Government College of Engineering, Salem-636 011, T.N., IN
3 Department of Geology, Anna University, Chennai-600 025, T.N., IN