Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Srinath, M. V.
- Energy Efficient Throughput Maximization for Wireless Networks Using Piece Wise Linear Approximation
Abstract Views :282 |
PDF Views:0
Authors
Affiliations
1 Sathyabama University, Chennai-600119, IN
2 Right Resource Solution, Chennai-600034, IN
3 Saveetha Engineering College, Chennai-602105, IN
1 Sathyabama University, Chennai-600119, IN
2 Right Resource Solution, Chennai-600034, IN
3 Saveetha Engineering College, Chennai-602105, IN
Source
Indian Journal of Science and Technology, Vol 8, No 7 (2015), Pagination: 683-688Abstract
The amount of power requirement is a main issue in wireless network nodes. We recommend a new piece-wise linear approximation to convert nonlinearities into linear restrictions. In this paper, we considered the energy required for the battery, which is most important. We proposed that this issue can be overcome by a mixed-integer nonlinear program (MINLP). To make our concept as energy efficient, we characterize its scientific expressions, then suggest a new piece-wise linear approximation which will give prime solution. This method allows converting the nonlinearities into linear constraints. In this paper both network throughput and energy requirement were optimized through a multi criteria framework which is optimized, i.e., by optimizing the network output by reducing the maximum power consumption. In telecommunication the source coding, channel coding, and finally the, line coding are at the transmitting point to generate the baseband signal. In some systems they use modulation to multiplex these signal to generate many baseband signals. During the active wireless link for communication, the energy consumption is in the form of two thins 1. Energy required for the purpose of broad casting and the other is energy required for the instruments involved during the communication. The utilization of power depends upon the whether the link is active or not. From the above consideration our work is vary from the existing work in the same area. The energy used by the LCD for the existing is always used and hence the usage of power for one node is more when compared to proposed system.Keywords
Piece-Wise Linear Approximation, MINLP, Energy Efficiency, Energy Consumption, Network Through Put, PIC Microcontroller.- Memory Constrained Load Shared Minimum Execution Time Grid Task Scheduling Algorithm in a Heterogeneous Environment
Abstract Views :189 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, A. V. C. College (Autonomous), Mannampandal, Mayiladuthurai - 609305, Tamil Nad, IN
2 Department of MCA, Sengamala Thayaar Educational Trust Women’s College, Mannargudi, Thiruvarur - 61400, Tamil Nadu, IN
1 Department of Computer Science, A. V. C. College (Autonomous), Mannampandal, Mayiladuthurai - 609305, Tamil Nad, IN
2 Department of MCA, Sengamala Thayaar Educational Trust Women’s College, Mannargudi, Thiruvarur - 61400, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 15 (2015), Pagination:Abstract
Objective: To increase the resource utilization and balance the load in the grid environment. Methods: Memory Constrained Load Shared Minimum Execution Time (MCLSMET) scheduling is proposed to make best use of the resource utilization in a grid environment to reduce makespan. Load balancing is achieved by rescheduling the resources based on memory requirement and execution time of the tasks. This algorithm considers memory as Quality of Service (QoS) factor. Results: The proposed algorithm has been implemented in a simulated environment and the results are compared with the Minimum Execution Time (MET) algorithms. In MCLSMET algorithm, the Maximum Completion Time, Resource Utilization is computed to compare with the existing MET scheduling Algorithm. The MET scheduling algorithm produces the makespan 34 ms whereas the proposed method reduces the makespan to 15 ms for a task. In the existing MET scheduling Algorithm produces severe load imbalance problem. In the proposed method load is shared among the available resource and the resource utilization percentage is increased. Conclusion: The Memory Constrained Load Shared Minimum Execution Time (MCLSMET) scheduling algorithm is suggested that this algorithm produces higher resource utilization, reduces the makespan and load balancing.Keywords
Grid Task Scheduling, Heterogeneous Environment and Load Balancing, Quality of Service, Resource Sharing- Developing Web Based Learning Environment Using Web Instructional Design Model
Abstract Views :204 |
PDF Views:4
Authors
Affiliations
1 Sengunthar Engineering College, IN
2 Mahendra Engineering College, IN
3 NITTTR, Chennai, IN
1 Sengunthar Engineering College, IN
2 Mahendra Engineering College, IN
3 NITTTR, Chennai, IN
Source
Data Mining and Knowledge Engineering, Vol 3, No 3 (2011), Pagination: 153-157Abstract
Due to the technological advancement and phenomenal development in all the fields of education, research, inventions, innovations there is a rapid growth in web based information society. Software products developed using software process models have become successful as they adopt standard software engineering methodology. But today’s Information technology product development is undergoing a rapid shift that prevents applying traditional software engineering methodology to web engineering methodology since most of the applications are web based. Through internet is becoming the world wide class room, the accessibility to information becomes reality at any point of time. Web-Based Learning Environment (WBLE) becomes a crucial resource for learners and educational institutions. Web-based learning environment must take into consideration that education has triggered a shift from the teacher-centered paradigm to the learner-centered paradigm. The primary causes of web system failure are a flawed design and development process, and poor management of development efforts. All these have been recognized to be one of the main reasons for the low acceptance of disciplined development in the Web. For developing the software products we have solid endorsed process model, but we still struggle to build and maintain large complex web sites and applications because web developers don’t have a disciplined development process and sound methodology. The process model used for developing software cannot be adopted for developing Web-Based application because the requirements of software development and web development are not same, and the existing software process model themselves have pitfalls. Any instructional design model may be considered as equivalent to software process model. Since the phases involved in these models are similar. A fusion of these models is considered for evolving a comprehensive model for developing WBLE. As a result, a conceptual model that exploits the potential of Instructional design model and software engineering process model has been evolved for developing WBLE. This paper aims at evolving a comprehensive model for developing Web-Based Learning Environment by taking into account the above stated pitfall.Keywords
Pedagogical Principles, Software Engineering, Web Engineering, Web-Based System Development, Web Design, Web Development.- A Comprehensive Survey on Fingerprint Recognition Systems
Abstract Views :172 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Bharathiar University, Coimbatore - 641 046, Tamil Nadu, IN
2 Department of MCA, STET Women’s College, Mannargudi - 614 016, Tamil Nadu, IN
1 Department of Computer Science, Bharathiar University, Coimbatore - 641 046, Tamil Nadu, IN
2 Department of MCA, STET Women’s College, Mannargudi - 614 016, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
Matching finger prints is the most popular biometric technique used for providing authentication. Fingerprint recognition systems scans for raw image, performs little preprocessing, features are extracted as vectors and stored in fingerprint databases. A review on various aspects of fingerprint recognition systems is presented in this paper. The paper briefs various types of fingerprint patterns, followed by minutiae based approach. Fingerprint ridges called minutiae are able to capture the invariant and discriminatory information present in the fingerprint images. Pattern recognition based approach is also studied followed by wavelet based approaches. The challenges and issues relating to fingerprint recognition system are critically reviewed in this paper. It is important for fingerprint recognition system to use good quality, noise free fingerprint image as input to achieve high accuracy. Various fingerprint image enhancement techniques were also analyzed and discussed in this paper.Keywords
Authentication, Biometrics, Fingerprint, Minutiae, Recognition, Wavelet- Intrusion Detection Systems, Tools and Techniques – An Overview
Abstract Views :146 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Sri Krishna Engineering College, Chennai – 601301, Tamil Nadu, IN
2 Department of Master of Computer Applications, Sengamala Thayaar Educational Trust Women’s College, Thiruvarur – 614001, Tamil Nadu, IN
3 Department of Master of Computer Applications, C. Abdul Hakeem College of Engineering and Techology, Melvisharam – 632509, Tamil, Nadu, IN
1 Department of Computer Science and Engineering, Sri Krishna Engineering College, Chennai – 601301, Tamil Nadu, IN
2 Department of Master of Computer Applications, Sengamala Thayaar Educational Trust Women’s College, Thiruvarur – 614001, Tamil Nadu, IN
3 Department of Master of Computer Applications, C. Abdul Hakeem College of Engineering and Techology, Melvisharam – 632509, Tamil, Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
Organization’s crucial data are highly endangered due to several security attacks and threats. Intrusion is one among such type of threat. Intrusions are efforts that attempt to elude normal security mechanisms of computer system. Intrusion detection is the process of monitoring and analyzing the events arising in a computer network to identify security breaches. Intrusion Detection System is the most important tool in maintaining network’s security. This paper provides an overview of Intrusion Detection System and helps reader gain some fundamental concepts and methodologies used by IDS. This paper also provides discussion about types of IDS, approaches and types of attacks in the network and intensive literature survey. Finally, comparison of several IDS methods with merits and demerits are also presented in the paper.Keywords
Attacks, DoS, IDS, Intrusion, Misuse Detection, Network Security- Classification of Cervical Cancer Cells in Pap Smear Screening Test
Abstract Views :179 |
PDF Views:2
Authors
Affiliations
1 Department of Centre for Information Technology and Engineering, Manonmaniam Sundaranar University, IN
2 Department of Computer Application, Sengamala Thayaar Educational Trust Women’s College, IN
1 Department of Centre for Information Technology and Engineering, Manonmaniam Sundaranar University, IN
2 Department of Computer Application, Sengamala Thayaar Educational Trust Women’s College, IN
Source
ICTACT Journal on Image and Video Processing, Vol 6, No 4 (2016), Pagination: 1234-1238Abstract
Cervical cancer is second topmost cancers among women but also, it was a curable one. Regular smear test can discover the sign of precancerous cell and treated the patient according to the result. However sometimes the detection errors can be occurred by smear thickness, cell overlapping or by un-wanted particles in the smear and cytotechnologists faulty diagnosis. Therefore the reason automatic cancer detection was developed. This was help to increase cancer cell mindfulness, diagnosis accuracy with low cost. This detection process consists of some techniques of the image preprocessing that is segmentation and effective texture feature extraction with SVM classification. Then the Final Classification Results of this proposed technique was compared to the previous classification techniques of KNN and ANN and the result would be very useful to cytotechnologists for their further analysis.Keywords
Cancer, Cervical Cancer, Classification.- Computer Aided Diagnosis for Detection and Stage Identification of Cervical Cancer by Using Pap Smear Screening Test Images
Abstract Views :174 |
PDF Views:3
Authors
Affiliations
1 Department of Centre for Information Technology and Engineering, Manonmaniam Sundaranar University, IN
2 Department of Computer Application, Sengamala Thayaar Educational Trust Women’s College, IN
3 Department of Computer Science and Engineering, PSN College of Engineering and Technology, IN
1 Department of Centre for Information Technology and Engineering, Manonmaniam Sundaranar University, IN
2 Department of Computer Application, Sengamala Thayaar Educational Trust Women’s College, IN
3 Department of Computer Science and Engineering, PSN College of Engineering and Technology, IN
Source
ICTACT Journal on Image and Video Processing, Vol 6, No 4 (2016), Pagination: 1244-1251Abstract
The majority of the women of the world were affected by the disease of cervical cancer. As a result of this disease, their death rate was increase as hasty level. Hence so many number of research people was focused this notion as their research interest and also they have done so many number of solutions for finding this cancer by using some image processing technique and achieved a good results only in advanced and high cost techniques of LBC, biopsy or Colposcopy test Images. Therefore the reason, the authors have chosen this problem and also did not only to find whether the patient is affected by a cancer or not. In addition to the patient was affected by this cancer means and also to identify which severity stage of this disease the patient could be live. Then this work has done in based on the images of low cost pap smear screening test by using various image processing techniques with the help of Computerized Image Processing Software Interactive Data Language (IDL-Image Processing Language). Thus the final reports would be very useful to the pathologists for further analysis.Keywords
Cancer, Cervical Cancer, Nuclei Segmentation, Feature Identification, Classification.- An Efficient Web Personalization Approach to Discover User Interested Directories
Abstract Views :152 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Shree Motilal Kanhaiyalal Fomra Institute of Technology, IN
2 Department of Computer Applications, Sengamala Thayaar Educational Trust Women’s College, IN
1 Department of Computer Science and Engineering, Shree Motilal Kanhaiyalal Fomra Institute of Technology, IN
2 Department of Computer Applications, Sengamala Thayaar Educational Trust Women’s College, IN