- R. Revathi
- G. A. Sudershan
- R. Ambika
- A. Nivedita
- Arumugam Shakila
- P. Sujatha
- S. Purushothaman
- A. Muthukumaravel
- R. Bhuvana
- B. Shaji
- Y. Kalpana
- A. Vidhya
- S. K. Rajarathna
- M. Shyamala Gowri
- P. Guhan
- P. Sripriya
- R. Thamizharasi
- R. Sivasamy
- G. Perumal
- P. Paranichandiran
- M. Thangamani
- N. Kamaraj
- M. Lissa
- V. Bhuvaneswari
- T. Devi
- J. Satheesh Kumar
- Indian Journal of Science and Technology
- HuSS: International Journal of Research in Humanities and Social Sciences
- International Journal of Agricultural Sciences
- Digital Image Processing
- Fuzzy Systems
- Data Mining and Knowledge Engineering
- Automation and Autonomous Systems
- Artificial Intelligent Systems and Machine Learning
- The Asian Journal of Horticulture
- An Asian Journal of Soil Science
- Asian Journal of Bio Science
- Software Engineering
- Power Research
- Current Science
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Rajeswari, R.
- Modular Multiplicative Divisor Labeling of some Path Related Graphs
Authors
1 Department of Mathematics, Sathyabama University, Chennai 600119, IN
Source
Indian Journal of Science and Technology, Vol 7, No 12 (2014), Pagination: 1967-1972Abstract
A graph G (V,E) with |V| = n is said to have modular multiplicative divisor labeling if there exist a bijection f: V(G) → {1, 2, …,} and the induced function f*: E(G) → {0, 1, 2, …, n - 1} where f(uv) = f(u)f(v) (mod n) such that n divides the sum of all edge labels of G. We prove that the path Pn , and the graph Pa, b (a graph which connects two vertices by means of "b" internally disjoint paths of length "a" each), shadow graph of a path and the cartesian product Pn × P1, (n is not a multiple of 6) admits modular multiplicative divisor labeling. Also we discuss the upper bound for the number of edges in a modular multiplicative divisor graphs. AMS Subject Classification: 05C78Keywords
Graph Labeling, Path, Graph Pa,b, Shadow Graph D2(G), the Cartesian Product Pn × P1- An Analysis of Organisational Role Stress Among Employees of IT Companies in Bangalore
Authors
1 Sri Sarada College for Women (Autonomous), Salem, Tamilnadu, IN
2 Acharya First Grade College for Women, Gauribidanur, Karnataka, IN
Source
HuSS: International Journal of Research in Humanities and Social Sciences, Vol 1, No 2 (2014), Pagination: 106-110Abstract
Long-term productivity of a company relies on its diligent human resources. But the diligence beyond a limit pressurises the performer. So, strainful careers though lucrative are not without their negative outcomes such as, unpleasant state of mind, physical and emotional imbalance and threat to the well being of the performers. Hence, an analysis has been made in this paper to identify the role stress [1] and the sources/causes of the same among employees working in the IT companies in Bangalore city. The study has divulged the fact that the role stress [1] acquainted by the employees is not identical but diverse, which affirms the findings of Srivastav [1].Keywords
IT Companies, Organisational Role Stress, Role Stress, Stress, Work Stress.References
- Srivastav A.K., Heterogeneity of role stress, research and practice in human resource management, vol. 18(1), pp. 16-27, 2010. Available: www.rphrm.curtin.edu.au
- Pareek U., Organisational role stress, L.D. Goodstein, J.W. Pfeiffer (Eds.), The 1983 Annual, San Diego, CA: University Associates, pp. 115-123, 1983.
- Beehr T.A., Work-role stress and attitude towards co-workers-group and organisation management, vol. 6(2) pp. 201-210, 1981, DOI: 10.1177/105960118100600206.
- Ahmed S., Bharadwaj A., Narula S., "A study of stress among executives", J Pers Clin Stud, vol. 1(2), pp. 47-50, 1985.
- Pestonjee, D.M., A study of role stresses in top and middle management, 1988 May, WP1988-05-01-00825. Available: ideas.repec.org/p/iim/iimawp/wp00825.html
- Satyanarayana K., "Stressors among executives and supervisors: a comparative study in a public sector undertaking", Osmania Journal of Psychology., vol. 19(2), pp. 1-9, 1995.
- Lehal R., Singh S., "Organisational role stress among college teachers of Patiala District: a comparative study of government and private colleges", RIMT Journal of Strategic Management and Information Technology., vol. 2(1,2), pp. 24-30, 2005 Jan-Jun.
- Yasmeen H., Supriya M.V, "Organisational role stress: confirmatory factor analysis approach", Asia-Pacific Journal of Management Research and Innovation, Asia-Pacific Business review, vol. 4(2), pp. 29-33, 2008 Apr-Jun.
- Bhatt S., Pathak P., "Occupational stress among IT/ITES professionals in leading Metros in India: a case study", Asia-Pacific Journal of Management Research and Innovation, Asia-Pacific Business Review, vol. 6(3), pp. 165-177, 2010 Jul-Sep.
- Comparative Analysis of Nature Inspired Algorithms Applied to Reactive Power Planning Studies
Authors
1 Department of Electrical Engineering Sri Krishna College of Technology, Coimbatore, IN
2 Department of Electrical Engineering, Government College of Technology, Coimbatore, IN
3 Sri Krishna College of Technology, Coimbatore, IN
Source
Indian Journal of Science and Technology, Vol 8, No 5 (2015), Pagination: 445-453Abstract
Reactive power optimization is one of the efficient ways of improving power system reliability and efficiency which is beneficial in power planning studies. ORPD problems are best solved using different algorithms to achieve optimization. This paper deals a comparative study of three algorithms PSO, GSA and hybrid PSOGSA algorithm. The ORPD multiobjective problem is tested over standard IEEE system. The test is performed under two conditions with and without penalty function added to the objective function. And all results obtained are summarized and best optimal solution is obtained from the hybrid PSOGSA algorithm.Keywords
ORPD (Optimal Reactive Power Dispatch) Problem, GSA (Gravitational Search algorithm), PSO (Particle swarm Optimization), Hybrid PSOGSA.- Effect of Season and Spacing on Flowering and Yield Performance of Ambrette (Abelmoschus moschatus Medic.)
Authors
1 Department of Horticulture, Annamalai University, Annamalainagar, CHIDAMBARAM (T.N.), IN
Source
International Journal of Agricultural Sciences, Vol 11, No 2 (2015), Pagination: 277-281Abstract
An investigation was undertaken to study the effect of season and spacing on flowering and yield performance of ambrette (Abelmoschus moschatus Medic.). The field experiment was conducted in two seasons viz., January to June (Season I) and July to December (Season II) with five spacing levels (T1- 60 × 30 cm ; T2 - 60 × 45 cm ; T3 - 60 × 60 cm ; T4 - 75 × 60 cm and T5 - 75 × 75 cm ). The design followed was Randomized Block Design with four replications. The observations on days taken for first flowering, days taken for 50 per cent flowering, number of pods per plant, pod yield per plant, pod yield per plot, pod yield per hectare, seed yield per plant, seed yield per plot and seed yield per hectare were recorded and analysed stastically. The results showed that the seeds sown during July to December (Season II) with a spacing of 60 × 60 cm recorded the highest values for all the yield characters in ambrette.Keywords
Ambrette, Season, Spacing, Flowering, Pod Yield, Seed Yield.- Radial Basis Function Neural Network for Image Steganalysis in Computer Forensics
Authors
1 School of Computing Sciences, Vels University, Chennai, IN
2 Udaya School of Engineering, Kanyakumari – 629 204, Tamil Nadu, IN
3 Mother Therasa University, Kodaikanal, IN
Source
Digital Image Processing, Vol 4, No 18 (2012), Pagination: 984-988Abstract
The covert communication based on steganography is a challenging technology for governments. Using this most powerful technique terrorists and spies communicate with each other to exchange their plan which is not detected by law enforcement. In order to avoid the misusage of steganographic technique, the government needs to find out some powerful techniques to detect the existence of the hidden data in the digital media. This leads to the concept of steganalysis that is used in many fields such as digital forensics, medical imaging, and journalism. Apart from all modern sciences and technologies, Artificial Neural Network (ANN) plays a vital role in capturing and representing both linear and non-linear relationships. ANN is an intelligent system which enables machines to solve problems like human by extracting and storing the knowledge. Hence to incorporate intelligent method for steganalysis, this paper implements Artificial Neural Network to overcome the drawbacks of the conventional methods. The most powerful Radial basis function algorithm is proposed in this paper since it is more suitable for non-linear data. This paper concentrates on detecting the hidden information for digital forensics application.Keywords
Artificial Neural Network, Covert Communication, Radial Basis Function (RBF), Steganography, Steganalysis.- Development of Fuzzy Logic for Concurrency Control in Computer Aided Design Database
Authors
1 VELS University, Chennai-600117, IN
2 Udaya School of Engineering, Kanyakumari-629204, IN
3 Mother Teresa Women's University, 624101, IN
Source
Fuzzy Systems, Vol 4, No 8 (2012), Pagination: 310-313Abstract
Concurrency control is the action of synchronizing operations issued by concurrently executing programs on a shared database. Concurrency control (CC) is the key concept for proper transactions on objects to avoid any loss of data or to ensure proper updating of data in the database. This paper presents the development of Fuzzy Logic for concurrency management while modeling Bolted connection drawing using Autodesk inventor 2008. While implementing concurrency control, this work ensures that adjacent shapes in the drawing cannot be accessed by more than one person. The Fuzzy Logic learns the objects and the nature of transactions to be done based a threshold value. Learning stops once all the objects are exposed to Fuzzy Logic. We have attempted to use Fuzzy Logic for storing lock information when multi users are working on same Bolted connection drawing.Keywords
Concurrency Control, Fuzzy Logic, Bolted Connection, Transaction Locks, Computer Aided Design Database.- Implementation of Hamilton Rating Scale Depression Data Using Back Propagation Network and Echo STAE Neural Network (BPAESNN) Methods
Authors
1 Department of Computer Science, Vels University, Chennai, IN
2 PET Engineering College, Vallioor-627117, IN
3 Mother Teresa Womens University, Kodaikanal, IN
Source
Data Mining and Knowledge Engineering, Vol 5, No 9 (2013), Pagination: 345-349Abstract
Depression is a serious and widespread public health challenge. This paper propose neural network algorithm for faster learning of psychological depression data. Implementation of neural networks methods for depression data mining using back propagation algorithm (BPA) and Echo state neural network (ESNN) are presented. Experimental data were collected with 21 input variables and one output for working with artificial neural network (ANN). Using the data collected, the training patterns and test patterns are obtained. The input patterns are pre-processed and presented to the input layer of ANN In order to find the optimum number of nodes required in the hidden layer of an ANN, a method has been proposed, based on the change in the mean squared error dynamically, during the successive sets of iterations. The output of BPA is given as input to ESNN. The network trained with transformed vectors is seen to require the least computational effort. The work proves to be an efficient system for diagnosis of depression.Keywords
Hamilton Rating Scale (HRS) Depression Data, BPA, ESNN.- Implementation of Wavelet Transform and Back Propagation Neural Network for Identification of Microcalcification in Breast
Authors
1 VELS University, Pallavaram, Chennai-600117, IN
2 PET Engineering College, Vallioor-627117, IN
3 Mother Teresa Women's University, Kodaikanal-624102, IN
Source
Data Mining and Knowledge Engineering, Vol 5, No 9 (2013), Pagination: 361-365Abstract
Wavelet decomposition has been applied to mammogram image to obtain four different coefficients for 5 levels of decompositions. The coefficients are: low frequency coefficients (A), vertical high frequency coefficients (V), horizontal high frequency coefficients (H), and diagonal high frequency coefficients (D). The features of the mammography image are obtained using the wavelet transform selecting the different levels of decompositions. The proposed method presents a new classification approach to microcalcification (MC) detection in mammograms using wavelet and back propagation algorithm (BPA) Neural Network. These features obtained from wavelet are representation of MC as well as other information of the image. Daubauchi wavelet has been used to decompose image to 5 levels. Statistical features are extracted from the wavelet coefficients. Training the BPA with features and testing the BPA to identify the presence of MC has been done. The percentage identification is above 96.2%. The performance of the proposed method based on the quality of the mammogram image.Keywords
Mammogram, Microcalcification, Wavelet Transform, Back Propagation Neural Network.- Implementation of Echo State Neural Network and Radial Basis Function Network for Intrusion Detection
Authors
1 VELS University, Pallavaram, Chennai-600117, IN
2 PET Engineering College, Vallioor-627117, IN
3 Mother Teresa Women's University, Kodaikanal-624102, IN
Source
Data Mining and Knowledge Engineering, Vol 5, No 9 (2013), Pagination: 366-373Abstract
Intrusion detection is the art of detecting computer abuse and any attempt to break into networks. As a field of research, it must continuously change and evolve to keep up with new types of attacks or adversaries and the ever-changing environment of the Internet. To make networks more secure, intrusion-detection systems (IDS) aims to recognize attacks. Artificial neural networks (ANN) based IDS were implemented and tested. The goal for using ANNs for intrusion detection is to generalize from incomplete data and able to classify data as being normal or intrusive. An ANN consists of a collection of processing elements that are highly interconnected. Given a set of inputs and a set of desired outputs, the transformation from input to output is determined by the weights associated with the inter-connections among processing elements. By modifying these interconnections, the network adapts to desired outputs. The ability of high tolerance for learning-by-example makes neural networks flexible and powerful in IDS. This paper has implemented Echo state neural network and Radial basis function applied to intrusion detection. The scope of the work includes using the available KDD database.Keywords
Radial Basis Function (RBF) Networks Echo State Neural Networks (ESNN), KDD Features, Intrusion Detection.- Malware Clearance for Secure Commitment of OS-Level Virtual Machines
Authors
1 Masters Degree Program in Computer Science Engineering, MPNMJ Engineering College, Anna University, IN
2 Computer Science Department, MPNMJ Engineering College, Anna University, IN
Source
Automation and Autonomous Systems, Vol 6, No 4 (2014), Pagination: 107-110Abstract
The number and complexity of attacks on computer systems are increasing. This growth necessitates proper defense mechanisms. Intrusion detection systems play an important role in detecting and disrupting attacks before they can compromise software. The Secom prototype can effectively eliminate malicious state changes while committing a VM with small performance degradation. The Secom prototype has a smaller number of false negatives and thus can more thoroughly clean up malware side effects. In addition, the number of false positives of the Secom prototype is also lower than that achieved by the online behavior-based approach of the commercial tools. Multivariant execution is an intrusion detection mechanism that executes several slightly different versions, called variants, of the same program in lockstep. The variants are built to have identical behavior under normal execution conditions. However, when the variants are under attack, there are detectable differences in their execution behavior. At runtime, a monitor compares the behavior of the variants at certain synchronization points and raises an alarm when a discrepancy is detected. The project presents a monitoring mechanism that does not need any kernel privileges to supervise the variants. Many sources of inconsistencies, including asynchronous signals and scheduling of multithreaded or multiprocess applications, can cause divergence in behavior of variants. These divergences cause false alarms.Keywords
False Positives, Kernel Privileges, Malicious State Changes, Multivariant Execution.- Performance Analysis of LFC of Two Area System Using Intelligent Controllers
Authors
1 Department of Electrical Engineering, GCT, Coimbatore, IN
2 Department of Electrical Engineering, Government College of Technology, Coimbatore, IN
Source
Automation and Autonomous Systems, Vol 4, No 4 (2012), Pagination: 126-129Abstract
The main aim of LFC in a power system is to maintain the system frequency at its scheduled value during normal period and whenever there is a change in load demand. Larger frequency deviation for change in load will lead to system collapse. Thus a fast and accurate controller is required to maintain the system at nominal frequency. Various Intelligent Controllers are employed for performing LFC in a power system for obtaining better dynamic performance. This paper represents the analysis of Load Frequency Control of Two Area Thermal-Thermal System using Intelligent Controllers like Fuzzy Logic Controller (FLC), Artificial Neural Network (ANN) and Adaptive Neuro- Fuzzy Inference System (ANFIS).. The performances of the controllers are examined for 2GW rated control areas interconnected by tie-lines for a step load change of 0.1p.u. Change in frequency and settling time is observed for various controllers using MATLAB SIMULINK. The results obtained shows that ANN gives faster dynamic performance than other controllers.
Keywords
Load Frequency Control (LFC), Area Control Error (ACE), Fuzzy Logic Controller (FLC), Adaptive Neuro Fuzzy based Inference System (ANFIS), Artificial Neural Network (ANN).- Comparative Study of Intelligent Techniques of Controller Design for Nonlinearities in Continuous Stirred Tank Reactor
Authors
1 Department of EEE, Erode Sengunthar Engineering College, IN
2 Department of EEE, Government College of Technology, Coimbatore, IN
Source
Automation and Autonomous Systems, Vol 3, No 11 (2011), Pagination: 542-545Abstract
In natural trend towards system nonlinearity modeling, controller design is becoming a strategic necessity as a result of increasing economic, environmental demands associated with an increasing demand for high performance as well as for more safety and reliability of dynamic systems. Continuous Stirred Tank Reactor (CSTR) is one of the common reactors in chemical plant and also it is complex nonlinear system. Due to its strong nonlinear behavior, the problem of identification and control of CSTR is always a challenging task for control systems engineer. This paper focuses the modeling and the comparison study of various intelligent techniques for dynamic controller design of CSTR. As a case study, all the proposed approaches are potentially interesting in the case of the processes with strong nonlinear dynamics.Keywords
Continuous Stirred Tank Reactor (CSTR), PID Controllers, Artificial Neural Network Modeling.- Fingerprint Recognition using Daubauchi Wavelet and Radial Basis Function Neural Network
Authors
1 Department of MCA, VELS University, Chennai–600 117, IN
2 PET Engineering College, Vallioor, 627117, IN
3 Mother Teresa Women's University, Kodaikanal-624102, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 5, No 9 (2013), Pagination: 412-415Abstract
Fingerprint is a unique facility which is present in human anatomy. The ups and downs of the curvature present in the finger among human are different. The curvature present among male and female are also different. In general, the image of a finger either a thumb or index finger is scanned by a compact fingerprint scanner with high resolution. The fingerprint scanned w412ill go through preprocessing followed by wavelet decomposition. This paper implements wavelet decomposition for extracting features of fingerprint images. Subsequently, at the 5th level decomposition, statistical features are computed from the coefficients of approximation and detail. These features are used to train the radial basis function (RBF) neural network for identifying fingerprints. Sample finger prints are taken from database from the internet resource. The fingerprints are decomposed using daubauchi wavelet 1(db1) into 5 levels. The coefficients of approximation at the 5thlevel are used for calculating statistical features. These statistical features are used for training the RBF network.Keywords
Fingerprint, Daubauchi Wavelet, Subband Wavelet Coefficients, Approximation and Details of 5 Level Decomposition, Radial Basis Function (Rbf).- Implementation of Human Walking Action GAIT Recognition Using Hidden Markov Model and Radial Basis Function Neural Network
Authors
1 Department of MCA, VELS University, Pallavaram, Chennai-600117, IN
2 PET Engineering College, Vallioor, 627117, IN
3 Mother Teresa Women's University, Kodaikanal-624101, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 5, No 9 (2013), Pagination: 416-419Abstract
This paper presents the combined implementation of radial basis function(RBF) along with hidden Markov model (HMM) for human activity recognition. Surveillance cameras are installed in the crowded area in major metropolitan cities in various countries. Sophisticated algorithms are required to identify human walking style to monitor any unwanted behavior that would lead to suspicion. This paper presents the importance of RBF to identify the human GAIT. GAIT is one of the biometrics that can be measured at a distance and useful for security surveillance and biometric applications. The attraction of using GAIT as a biometric is that it is non-intrusive and typifies the motion characteristics specific to an individual. The proposed system attempt to recognize people by modeling each individual's GAIT using HMM. The HMM is a good choice for modeling a walk cycle because it can model sequential processes. This knowledge is used to generate a lower dimensional observation vector sequence which is then used to design a continuous density HMM for each individualKeywords
GAIT, Human Walking Action, Radial Basis Function, Hidden Markov Model.- Labeling on Line Digraphs
Authors
1 Sathyabama University, Chennai – 600119, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 44 (2016), Pagination:Abstract
Objectives: In this paper, we prove that the line digraphs of Cayley digraphs admit super vertex (a,d) antimagic labeling, product anti magic and vertex magic total labeling. Also we have shown the labeling formula to get the same. Findings: If a Cayley digraph admits the above three labelings, then the line digraph of Cayley digraph also admits the same.Keywords
Antimagic, Labelings, Line Digraphs, Magic.- Influence of Season and Spacing on the Growth Performance of Ambrette (Abelmoschus moschatus Medic.)
Authors
1 Department of Horticulture, Annamalai University, Annamalai Nagar, Chidambaram (T.N.), IN
Source
The Asian Journal of Horticulture, Vol 10, No 1 (2015), Pagination: 71-75Abstract
An investigation was undertaken to study the influence of season and spacing on the growth performance of ambrette (Abelmoschus moschatus Medic.). The field experiment was conducted in two seasons viz., January to June (season I) and July to December (season II) with five spacing levels (T1– 60 cm × 30 cm ; T2 – 60 cm × 45 cm ; T3 – 60 cm × 60 cm ; T4 – 75 cm × 60 cm; T5 – 75 cm × 75 cm). The design followed was Randomized Block Design with four replications. The observations regarding plant height, number of branches, stem girth, internodal length, number of leaves and leaf area were recorded and analysed statistically. The results revealed that the seeds sown during July to December (season II) with a spacing of 60 cm × 60 cm recorded the highest values for the above growth characters in ambrette.
Keywords
Ambrette, Season, Spacing, Plant Density.- Assessment of Soil Organic Carbon (SOC) Stock in Different Agro-Climatic Zones of Tamil Nadu
Authors
1 Tamil Nadu Agricultural University, Coimbatore (T.N.), IN
Source
An Asian Journal of Soil Science, Vol 7, No 1 (2012), Pagination: 23-26Abstract
Soil map prepared on 1:50,000 scale for natural resources information system (NRIS) employing satellite data (IRS-1C/1D-PAN sharpened LISS-III image) was used to estimate SOC stock upto 50 cm depth in different agroclimatic zones of Tamil Nadu. Among different agroclimatic zones of Tamil Nadu, hilly zone registered the highest SOC stock followed by north eastern, southern, western, cauvery delta, north western and high rainfall zone. SOC density was higher in high rainfall and hilly zone than other agroclimatic zones of Tamil Nadu. Among low rainfall regions, cauvery delta zone recorded higher SOC density.Keywords
SOC Stock, Soil Map, Agroclimatic Zones.- Bacterial Pathogens from Wound Infection and their Susceptibility against different Antibiotics
Authors
1 Department of Microbiology, Kandaswamy Kandar’s College, Velur, Namakkal (T.N.), IN
Source
Asian Journal of Bio Science, Vol 3, No 2 (2008), Pagination: 327-329Abstract
The present study pertains the isolation of aerobic microorganisms from wound infection and to study its antibiogram. From the collected 20 wound samples 10 isolates were identified. Pseudomonas aeruginosa (24%) was the predominant isolate followed by Staphylococcus aureus (20%) and Escherichia coli (20%). Antobiogram study reveals that all the isolates were sensitive to Ciprofloxacin and Sporidoxin.Keywords
Wound Pathogenic Bacteria, Antibiogram Endogenous and Exogenous.- Smartphone Based Applications for Measuring Vital Signs:A Survey
Authors
1 Department of Computer Applications, Bharathiar University, Tamilnadu, IN
Source
Software Engineering, Vol 10, No 4 (2018), Pagination: 78-80Abstract
Measuring vital signs is essential to know the health condition of a person. Traditionally, these vital signs are measured using electrocardiogram (ECG), photoplethysmography (PPG), pulse oximeter which is more costly. Nowadays, smartphones play a vital role in healthcare services. Measurement of vital signs using smartphone becomes easier and affordable to all common people. This paper presents a comparative review of various techniques by using smartphone devices to measure vital signs directly by the patients.
Keywords
Vital Signs Measurement, Smartphone.- Diagnosis of Inter-Turn Fault in the Transformer Winding using Wavelet Based AI Approaches
Authors
1 Lecturer, Dept. of Electrical Engg., Alagappa Chettiar Engg. College, Karaikudi, Tamil Nadu, IN
2 Associate Prof. Dept. of Electrical Engg., Thiagarajar College of Engg., Madurai - 625 215, Tamil Nadu, IN
Source
Power Research, Vol 5, No 1 (2009), Pagination: 17-26Abstract
In this paper, Wavelet based ANFIS for finding the inter-turn fault of a transformer is proposed. The detector uniquely responds to the winding inter-turn fault with remarkably high sensitivity. Discrimination of different percentages of winding affected by inter-turn fault is provided via ANFIS having an eight dimensional input vector. This input vector is obtained from features extracted from DWT of inter-turn faulty current, leaving the transformer phase winding. Training data for ANFIS are generated via a simulation of transformer with inter-turn fault using MATLAB. The proposed algorithm using ANFIS gives more satisfactory performance than ANN and GABPN with selected statistical data of decomposed levels of faulty current.Keywords
Winding Inter-Turn Fault, ANN, ANFIS, DWT, GABPN.- Semantic data model for knowledge representation and dissemination of cultural heritage site, Poompuhar
Authors
1 Department of Computer Applications, Bharathiar University, Coimbatore 641 046, India, IN
Source
Current Science, Vol 123, No 10 (2022), Pagination: 1237-1245Abstract
Among the ancient cities and ports of Tamil Nadu, India, Poompuhar is a historical and coastal port that emerged with the increasing maritime trade of the early Chola kingdom. The ancient trade town and the busy port of Poompuhar symbolize the Tamil culture and civilization up to 200 ce. The city was destroyed and washed away by big shore waves during ad 500. The submerged parts and scattered destruction remains have been identified in onshore and offshore excavations around the coastal lines of the Bay of Bengal in Tamil Nadu. Information on the port city can be found in various sources, such as archaeological evidence, historical references, coastal erosion data and Sangam Tamil literature. Here, a methodology is presented for a semantic representation of Poompuhar port city, integrating heterogeneous data to create a knowledge base by mapping and associating related entities. The knowledge base has been created using CIDOC CRM to represent Poompuhar events digitally. The experimental results of the ontology are verified exploring the submergence of Poompuhar use cases for onshore and offshore excavations through a knowledge graphKeywords
Archaeological explorations, cultural heritage, knowledge graph, ontology, semantic data.References
- Bruseker, G., Carboni, N. and Guillem, A., Cultural heritage data management: the role of formal ontology and CIDOC CRM. Quanti. Meth. Hum. Soc. Sci., 2017, 93–131.
- Gaur, A. S. and Sundaresh, Underwater exploration off Poompuhar and possible causes of its Submergence. Puratattva, 1998, 28, 84–90.
- Puliyur Kesigan, S. V. S., மண�ேமகைல �ல�ம் உைர�ம், Manimekalai Source and Text (Tamil), Saran Books, Chennai, 2021, p. 368.
- Mouromtsev, D., Haase, P., Cherny, E., Pavlov, D., Andreev, A. and Spiridonova, A., Towards the Russian linked culture cloud: data enrichment and publishing. Lect. Notes Comput. Sci., 2015, 9088, 637–651.
- Varagnolo, D., Melo, D. and Rodrigues, I. P., A tool to explore the population of a CIDOC-CRM ontology. Proc. Comput. Sci., 2021, 192, 158–167.
- Sundaresh, J. S., Gaur, A. S., Chandramohan, P. and Jena, B. K., Submergence of Poompuhar – study based on underwater explora-tions and coastal processes, INCHOE, 2004, pp. 820–832.
- Ramasamy, S. M., Kumanan, C., Saravanavel, J. and Gunasekaran, S., Coordinates and chronology of the ancient port city of Poompu-har, South India. Curr. Sci., 2017, 112, 1112–1115.
- Rajendran, C. P., Rajendran, K., Srinivasalu, S., Andrade, V., Aravazhi, P. and Sanwal, J., Geoarchaeological evidence of a Chola-period tsunami from an ancient port at Kaveripattinam on the southeastern coast of India. Geoarchaeology, 2011, 26(6), 867–887.
- Sankar, S., Ravichandran, V., Venkatarao, D. and Badrinarayanan, S., Mapping of spatial and temporal variation of shoreline in Poompu-har using a comprehensive approach. J. Ind. Soc. Remote Sensing, 2014, 43, 1292–1296.
- Ramasamy, S. M. and Saravanavel, J., Remote sensing revealed geomorphic anomalies and recent earth movements in Cauvery Delta, Tamil Nadu, India. J. Indian Soc. Remote Sensing, 2020, 48, 1809–1827.
- Doerr, M., Kritsotaki, A. and Stead, S., Which period is it? A meth-odology to create thesauri of historical periods. Comput. Appl. Quant. Method. Arch., 2004, 70–75.
- Doerr, M., Kritsotaki, A. and Stead, S., Thesauri of historical periods: a proposal for standardization. Museology, 2004, 41(42), 82–96.
- Doerr, M., Ore, C.-E. and Stead, S., The CIDOC conceptual refer-ence model – a new standard for knowledge sharing. In Proceedings Tutorials, Posters, Panels and Industrial Contributions at the 26th In-ternational Conference on Conceptual Modeling – ER 2007, Auckland, New Zealand, CRPIT, 2007, vol. 83, pp. 51–56.
- Kräutli, F. and Valleriani, M., CorpusTracer: a CIDOC database for tracing knowledge networks. Dig. Scholar. Huma., 2017, 33, 336–346.
- Ramasamy, S. M., Saravanavel, J., Kathiresan, P., Kumanan, C. and Rajasekhar, D., Detection of submerged harbour using GEBCO and MBES data, in the offshore region of ancient port city Poom-puhar, South India. Curr. Sci., 2020, 119, 526–534.
- Moraitou, E., Aliprantis, J., Christodoulou, Y., Teneketzis, A. and Caridakis, G., Semantic bridging of cultural heritage disciplines and tasks. Heritage, 2019, 2(1), 611–630.
- Zaveri, A., Rula, A., Maurino, A., Pietrobon, R., Lehmann, J. and Auer, S., Quality assessment for linked data: a survey. Semantic Web, 2015, 7(1), 63–93.
- Special Interest Group, C., version 7.1.1, CIDOC CRM, Cidoc-crm.org, 14 November 2021.
- Lissa, M., Bhuvaneswari, V. and Devi, T., Semantic framework and methodology for cultural heritage data integration for e-walk-through. In ICT for Competitive Strategies: Proceedings, Taylor and Francis, CRS Press, 2020, p. 9.
- Panyalertsinpaisarn, Kongpop, Study on the Sanchi Stupa Ruins. In Conference: Presentation to the Master’s Degree in Buddhist Studies. Nalanda University, Bihar, India, School of Buddhist Studies, Philoso-phy and Comparative Religions, 2020, doi:10.13140/RG.2.2.25413. 06889.
- Carboni, N. and Luca, L., Towards a conceptual foundation for documenting tangible and intangible elements of a cultural object. Dig. Appl. Archaeol. Cult. Heritage, 2016, 3.
- Doerr, M., Ontologies for cultural heritage. In Handbook on Ontolo-gies, The Indian Archaeological Society, 2009, pp. 463–486.
- Ramasamy, S. M., Kumanan, C. J., Saravanavel, J., Selvakumar, R. and Rao, R., Geomatics-based appraisal on the seismic status of South India. Int. J. Geoinformat., 2009, 5(4), 9–16.
- Muthusamy, R., Kaveripoompattinam (Poompuhar): history through the ages, Blogger.com, 13 January 2017.
- Ramasamy, S. M., Remote sensing and active tectonics of South India. Int. J. Remote Sensing, 2006, 27(20), 4397–4431.