Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sathiya, M.
- Vision Check Up for Disabled Persons by using Mobile Interaction
Abstract Views :140 |
PDF Views:0
Authors
Affiliations
1 Department of MCA, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600062, Tamil Nadu, IN
1 Department of MCA, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600062, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 16 (2016), Pagination:Abstract
Objective: In this paper, we deliver a concept based on image and video processing designs on behalf of eyesight else vision find out. Methods: The inducement of the study is for disabled people, without their hands. The vision checkup method is by using the mobile phone interaction. It utilizes the detected face location and vision detection is based on mobile phones for controlling eyelids state (close or open). Findings: This vision checkup method is used to show the improvement of accuracy of detection. In this mobile application, the light effect and the spaces among the disabled person eyes is tracking. The correctness of vision detection will be given by the usage of mobile devices. In existing, phone-based vision test for patients who wants to track their eyesight in their place itself, this type of gadgets could help to track people who are having defects in their eye before they lost more vision, and take the treatment in proposed this same tool could help the disabled persons also by using image processing of vision detection in eyelids state (close or open) detection. Improvements: The drawbacks are reduced in this proposed system. Finally, it provides the 99% of result for the complete detection of accurateness.Keywords
Detection Accuracy, Eye Blink, Eye Checkup, Mobile Interaction, Vision Detection- An Intelligent Resnets Resource Allocation Framework for 5G Networks
Abstract Views :93 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Hindusthan Institute of Technology, India., IN
2 Department of Information Technology, Karpagam Institute of Technology, India., IN
1 Department of Computer Science and Engineering, Hindusthan Institute of Technology, India., IN
2 Department of Information Technology, Karpagam Institute of Technology, India., IN
Source
ICTACT Journal on Communication Technology, Vol 14, No 1 (2023), Pagination: 2837-2842Abstract
This paper presents a resource allocation technique for industrial applications for 6G networks, which are characterised by the presence of many heterogeneous parameters that have an effect on the quality of data transmission. The purpose of the project is to achieve the greatest possible efficiency in the application of the resources that are presently while achieving a higher level of control over a diverse collection of sensing nodes operating within a hybrid network. The system model that has been proposed is a workable option for efficient resource allocation. The performance of the proposed method, in addition to similarities to the performance of other methods has been analysed. The proposed methods offer performance that is comparable to or better than the baseline, while simultaneously significantly reducing the SI exchange overhead and improving the system resilience to sensing intervals, some of which may be unavoidable in practise.Keywords
ResNets, Resource Allocation, 6G, IoT.References
- V. Saravanan, D. Saravanan and H.P. Sultana, “Design of Deep Learning Model for Radio Resource Allocation in 5G for Massive IoT Device”, Sustainable Energy Technologies and Assessments, Vol. 56, pp. 103054-103064, 2023.
- M. Sheng and J. Li, “Coverage Enhancement for 6G Satellite-Terrestrial Integrated Networks: Performance Metrics, Constellation Configuration and Resource Allocation”, Science China Information Sciences, Vol. 66, No. 3, pp. 1-20, 2023.
- J. Singh, J. Deepika and J. Sathyendra Bhat, “EnergyEfficient Clustering and Routing Algorithm Using Hybrid Fuzzy with Grey Wolf Optimization in Wireless Sensor Networks”, Security and Communication Networks, Vol. 2022, pp. 1-12, 2022.
- J. Huan and K. Yu, “Opportunistic Capacity based Resource Allocation for 6G Wireless Systems with Network Slicing”, Future Generation Computer Systems, Vol. 140, pp. 390- 401, 2023.
- Y. Robinson, E.G. Julie and P.E. Darney, “Enhanced Energy Proficient Encoding Algorithm for Reducing Medium Time in Wireless Networks”, Wireless Personal Communications, Vol. 131, pp. 3569-3588, 2021.
- R. Indhumathi and A. Pandey, “Design of Task Scheduling and Fault Tolerance Mechanism Based on GWO Algorithm for Attaining Better QoS in Cloud System”, Wireless Personal Communications, Vol. 95, pp. 1-19, 2022.
- P. Qin and S. Geng, “Content Service Oriented Resource Allocation for Space-Air-Ground Integrated 6G Networks: A Three-Sided Cyclic Matching Approach”, IEEE Internet of Things Journal, Vol. 10, No. 1, pp. 828-839, 2022.
- S.U. Jamil, “Resource Allocation and Task Off-Loading for 6G Enabled Smart Edge Environments”, IEEE Access, Vol. 10, pp. 93542-93563, 2022.
- T. Karthikeyan, K. Praghash and K.H. Reddy, “Binary Flower Pollination (BFP) Approach to Handle the Dynamic Networking Conditions to Deliver Uninterrupted Connectivity”, Wireless Personal Communications, Vol. 121, No. 4, pp. 3383-3402, 2021.
- T.Q. Duong and H. Shin, “Quantum-Inspired Machine Learning for 6G: Fundamentals, Security, Resource Allocations, Challenges, and Future Research Directions”, IEEE Open Journal of Vehicular Technology, Vol. 3, pp. 375-387, 2022.
- F.D.O. Torres, D.L. Cardoso and R.C. Oliveira, “Radio Resource Allocation in a 6G D-OMA Network with Imperfect SIC: A Framework Aided by a Bi-Objective Hyper-Heuristic”, Engineering Applications of Artificial Intelligence, Vol. 119, pp. 105830-105843, 2023.
- D.H. Tran and B. Ottersten, “Satellite-and Cache-Assisted UAV: A Joint Cache Placement, Resource Allocation, and Trajectory Optimization for 6G Aerial Networks”, IEEE Open Journal of Vehicular Technology, Vol. 3, pp. 40-54, 2022.
- H.B. Salameh and A. Al-Ajlouni, “Energy-Efficient Power-Controlled Resource Allocation for MIMO-based Cognitive-enaBled B5G/6G Indoor-Flying Networks”, IEEE Access, Vol. 10, pp. 106828-106840, 2022.
- T.K. Rodrigues and N. Kato, “Network Slicing with Centralized and Distributed Reinforcement Learning for Combined Satellite/Ground Networks in a 6G Environment”, IEEE Wireless Communications, Vol. 29, No. 1, pp. 104-110, 2022.
- Fuzzy Based Optimization for Improving the Trust Score in Manets
Abstract Views :97 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Karpagam Institute of Technology, India., IN
2 Department of Information Technology, Karpagam Institute of Technology, India., IN
3 Department of Information Technology, Sri Ramakrishna Engineering College, India., IN
4 Department of Computer Science and Engineering, Sona College of Technology, India., IN
1 Department of Computer Science and Engineering, Karpagam Institute of Technology, India., IN
2 Department of Information Technology, Karpagam Institute of Technology, India., IN
3 Department of Information Technology, Sri Ramakrishna Engineering College, India., IN
4 Department of Computer Science and Engineering, Sona College of Technology, India., IN
Source
ICTACT Journal on Communication Technology, Vol 14, No 1 (2023), Pagination: 2854-2860Abstract
In this paper, research develop a method for identifying abnormal behavior based on two inputs: the trustworthiness of the user, as well as the reliability of the recommendations that they make. Specifically, research look at the reliability of the user recommendations. The next thing that needs to be done is to calculate the node general trust value in order to determine if there has been any kind of malicious attack. This will show whether or not the node has been compromised in any way. It is conceivable that this could lessen the amount of power that is needed for the communication that takes place between different networks. Additionally, it demonstrates that the model is better able to utilize the evaluation results of the common neighbor nodes to synthesize the confidence value when fewer nodes are deployed in the network. This is demonstrated by the fact that fewer nodes are deployed in the network. The reliability of the trust assessment improves while the number of trusts for which recommendations are made decreases.Keywords
Fuzzy Optimization, Trust, Score, MANETs, Direct TrustReferences
- R. Sabitha, V. Anusuya and V. Saravanan, “Network Based Detection of IoT Attack Using AIS-IDS Model”, Wireless Personal Communications, Vol. 98, pp. 1-24, 2022.
- N. Khandelwal and S. Gupta, “A Review: Trust based Secure IoT Architecture in Mobile Ad-hoc Network”, Proceedings of International Conference on Applied Artificial Intelligence and Computing, pp. 1464-1472, 2022.
- V. Thirunavukkarasu, and P. Prakasam, “Cluster and Angular based Energy Proficient Trusted Routing Protocol for Mobile Ad-Hoc Network”,Peer-to-Peer Networking and Applications, Vol. 15, No. 5, pp. 2240-2252, 2022.
- J. Singh and S. Sakthivel, “Energy-Efficient Clustering and Routing Algorithm Using Hybrid Fuzzy with Grey Wolf Optimization in Wireless Sensor Networks”, Security and Communication Networks, Vol. 2022, pp. 1-13, 2022.
- Y. Wang and L.C. Kho, “Towards Strengthening the Resilience of IoV Networks-A Trust Management Perspective”, Future Internet, Vol. 14, No. 7, pp. 202-215, 2022.
- J. Kuriakose and A.K. Bairwa, “EMBN-MANET: A Method to Eliminating Malicious Beacon Nodes in Ultra-Wideband (UWB) based Mobile Ad-Hoc Network”, Ad Hoc Networks, Vol. 140, pp. 103063-103076, 2023.
- S. Ayed and L. Chaari, “Blockchain and Trust-Based Clustering Scheme for the IoV”, Ad Hoc Networks, Vol. 140, pp. 103093-103108, 2023.
- Y.H. Robinson, V. Saravanan and P.E. Darney, “Enhanced Energy Proficient Encoding Algorithm for Reducing Medium Time in Wireless Networks”, Wireless Personal Communications, Vol. 119, pp. 3569-3588, 2021.
- N. El Ioini and C. Pahl, “Trust Management for Service Migration in Multi-Access Edge Computing Environments”, Computer Communications, Vol. 194, pp. 167-179, 2022.
- M. Kandasamy and A.S. Kumar, “QoS Design using Mmwave Backhaul Solution for Utilising Underutilised 5G Bandwidth In GHz Transmission”, Proceedings of International Conference on Artificial Intelligence and Smart Energy, pp. 1615-1620, 2023.
- N.M.M. Hiraide and N. Yoshida, “Trust Management in Growing Decentralized Networks”, Journal of Computations and Modelling, Vol. 12, No. 3, pp. 1-12, 2022.
- J. Kundu and S. Pal, “Trust-Based Efficient Computational Scheme for MANET in Clustering Environment”, Proceedings of International Conference on Mathematical Modeling and Computational Science, pp. 305-314, 2022.
- A Deep Learning Based Algorithm for Improving Efficiency In Multimedia Applications
Abstract Views :95 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Soundarya Institute of Management and Science, India., IN
2 Department of Information Technology, Karpagam Institute of Technology, India., IN
3 Department of Electronics and Communication Engineering, East West College of Engineering, India., IN
1 Department of Computer Science, Soundarya Institute of Management and Science, India., IN
2 Department of Information Technology, Karpagam Institute of Technology, India., IN
3 Department of Electronics and Communication Engineering, East West College of Engineering, India., IN
Source
ICTACT Journal on Image and Video Processing, Vol 13, No 3 (2023), Pagination: 2921-2927Abstract
Most of the time, these classifiers are trained using general-purpose datasets with a lot of classes. Therefore, the performance of these classifiers may not be as good as it could be. Both choosing classifiers based on registrations and dividing them into groups based on the subjects they cover are possible solutions that could lead to better classifier performance. This makes it clear that a classifier division and selection strategy needs for the proposed optimization to work. With the help of this method, the proposed model for feature extraction can choose an appropriate classifier while taking subscription constraints into account. There are subscriptions with the best values of n, and the results of using only n-class classifiers from one domain and ignoring classes from other domains are also given. These are in the same place as the effects of only using n-class classifiers from a certain domain. In this article, these are talked about in the same context as what happens when you only use n-class classifiers from a certain domain. For high-performance use of SAE-based systems, you need to use a classifier selection technique. This method is also needed for the investigation of multimedia events that need the method. To establish the effectiveness of the multimedia event-based system as well as its dependability, we are making use of traditional evaluation methods such as throughput and accuracy. These measures include the following: When compared to the efficiency of the system when using a classifier with a single class, the efficiency of the system diminishes as the number of classes per classifier increases. This is the case regardless of the other measures. This is the situation about both the throughput and the precision of the operation.Keywords
Multimedia Data, Stacked Auto Encoder, Deep Learning, Classifier.References
- V. Saravanan and M. Rizvana, “Dual Mode Mpeg Steganography Scheme for Mobile and Fixed Devices”, International Journal of Engineering Research and Development, Vol. 6, pp. 23-27, 2013.
- V. Saravanan and C. Chandrasekar, “Qos-Continuous Live Media Streaming in Mobile Environment using VBR and Edge Network”, International Journal of Computer Applications, Vol. 53, No. 6, pp. 1-12, 2012.
- A.N. Reddy and J.C. Wyllie, “I/O Issues in a Multimedia System”, Computer, Vol. 27, No. 3, pp. 69-74, 1994.
- H. Babbar and S. Rani, “A Genetic Load Balancing Algorithm to Improve the QoS Metrics for Software Defined Networking for Multimedia Applications”, Multimedia Tools and Applications, Vol. 81, No. 17, pp. 9111-9129, 2022.
- M.K. Gupta and P. Chandra, “Effects of Similarity/Distance Metrics on K-Means Algorithm with Respect to its Applications in IoT and Multimedia: A Review”, Multimedia Tools and Applications, Vol. 81, No. 26, pp. 37007-37032, 2022.
- X. Zhang, “Intelligent Recommendation Algorithm of Multimedia English Distance Education Resources based on User Model”, Journal of Mathematics, Vol. 2022, pp. 1-8, 2022.
- Z. Lv and A. Alamri, “Deep Learning-based Smart Predictive Evaluation for Interactive Multimedia-Enabled Smart Healthcare”, ACM Transactions on Multimedia Computing, Communications, and Applications, Vol. 18, No. 1, pp. 1-20, 2022.
- A.A. Khan and S. Karim, “IPM-Model: AI and Metaheuristic-Enabled Face Recognition using Image Partial Matching for Multimedia Forensics Investigation with Genetic Algorithm”, Multimedia Tools and Applications, Vol. 81, No. 17, pp. 23533-23549, 2022.
- C. Peng, “An Application of English Reading Mobile Teaching Model based on K-Means Algorithm”, Mobile Information Systems, Vol. 2022, pp. 1-14, 2022.
- A. Hafsa, “Real-Time Video Security System using Chaos-Improved Advanced Encryption Standard (IAES)”, Multimedia Tools and Applications, Vol. 56, pp. 1-24, 2022.
- M.A.R. Khan, V.J. Tharini and M.B. Alazzam, “Optimizing Hybrid Metaheuristic Algorithm with Cluster Head to Improve Performance Metrics on the IoT”, Theoretical Computer Science, Vol. 927, pp. 87-97, 2022.
- An Enhanced Ensemble Hybrid Deep Learning Algorithm For Improving the Accuracy in Iris Segmentation
Abstract Views :81 |
PDF Views:0
Authors
Affiliations
1 1Department of Information Technology, Karpagam Institute of Technology, India., IN
2 Department of Computer Science and Engineering, Karpagam Institute of Technology, India., IN
3 DVR and Dr. HS MIC College of Technology, India., IN
4 Department of Computer Science and Engineering, PSV College of Engineering and Technology, India., IN
1 1Department of Information Technology, Karpagam Institute of Technology, India., IN
2 Department of Computer Science and Engineering, Karpagam Institute of Technology, India., IN
3 DVR and Dr. HS MIC College of Technology, India., IN
4 Department of Computer Science and Engineering, PSV College of Engineering and Technology, India., IN
Source
ICTACT Journal on Image and Video Processing, Vol 13, No 3 (2023), Pagination: 2947-2952Abstract
In recent years, there has been a meteoric rise in the application of deep neural networks for the purpose of iris segmentation. This can be attributed to the extraordinary capacity for learning possessed by the convolution kernels that are utilised by CNNs. Conventional methods have several drawbacks, some of which can be partially compensated for by using CNN-based algorithms, which increase the segmentation precision. On the other hand, the CNN-based iris segmentation approaches that are currently in use typically require a more complex network, which results in an increase in the number of parameters. This is essential to realise a higher degree of precision in the results. CNN-based techniques are effective, they can only be used for a specific application. This makes them inappropriate for general iris segmentation goals, even though they are effective.Keywords
Ensemble Model, Deep Learning, Iris Segmentation.References
- I.J. Jacob, “Capsule Network based Biometric Recognition System”, Journal of Artificial Intelligence, Vol. 1, No. 2, pp. 83-94, 2019.
- R.M. Bolle, J.H. Connell, S. Pankanti, N.K. Ratha and A.W. Senior, “Guide to Biometrics”, Springer, 2003.
- Iris Recognition, Available at: http://en.wikipedia.org/wiki/Iris_recognition, Accessed at 2022.
- Seifedine Kadry and Khaled Smaili, “A Design and Implementation of a Wireless Iris Recognition Attendance Management System”, Information Technology and Control, Vol. 36, No. 3, pp. 323-329, 2007.
- M. Vatsa, R. Singh and A. Majumdar, “Deep Learning in Biometrics”, CRC Press, 2018.
- S. Umer, A. Sardar and B.C. Dhara, “Person Identification using Fusion of Iris and Periocular Deep Features”, Neural Networks, Vol. 122, pp. 407-419, 2020.
- H. Proenca and J.C. Neves, “Deep-Prwis: Periocular Recognition without the Iris and Sclera using Deep Learning Frameworks”, IEEE Transactions on Information Forensics and Security, Vol. 13, No. 4, pp. 888-896, 2017
- N.V. Kousik and M. Saravanan, “A Review of Various Reversible Embedding Mechanisms”, International Journal of Intelligence and Sustainable Computing, Vol. 1, No. 3, pp. 233-266, 2021
- S. Karthick and P.A. Rajakumari, “Ensemble Similarity Clustering Frame work for Categorical Dataset Clustering Using Swarm Intelligence”, Proceedings of International Conference on Intelligent Computing and Applications, pp. 549-557, 2021.
- Z. Zhao and A. Kumar, “A Deep Learning based Unified Framework to Detect, Segment and Recognize Irises using Spatially Corresponding Features”, Pattern Recognition, Vol. 93, pp. 546-557, 2019.
- B. Subramanian and S. Hariprasath, “Diabetic RetinopathyFeature Extraction and Classification using Adaptive Super Pixel Algorithm”, International Journal of Engineering and Advanced Technology, Vol. 9, pp. 618-627, 2019.
- T.R. Sivapriya and V. Saravanan, “Automatic Brain MRI Mining using Support Vector Machine and Decision Tree”, CiiT International Journal of Artificial Intelligent Systems and Machine Learning, Vol. 3, No. 2, pp. 109-116, 2011.