Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Arulselvi, S.
- E-Waste: a Lingering Concern of the Century
Abstract Views :493 |
PDF Views:99
Authors
Affiliations
1 Department of Electronics and Communication Engineering, Bharath University, Selaiyur, Chennai- 600 073, Tamil Nadu, IN
1 Department of Electronics and Communication Engineering, Bharath University, Selaiyur, Chennai- 600 073, Tamil Nadu, IN
Source
Indian Journal of Innovations and Developments, Vol 2, No 2 (2013), Pagination: 821-823Abstract
E-Waste has found to have adverse effects on the health of human beings. The article describes the harmful effects of E-Waste on the environment and living beings and how it is being dealt with. It also describes E-Waste recycling; the existing laws to regulate E-Waste and the issues faced by the developing nations.Keywords
E-waste (Electronic Waste), WEEE (Waste Electrical and Electronic Equipment)References
- Cairns, C.N (2005). E-Waste and the consumer: improving options to reduce, reuse and recycle”, 2005 IEEE International Symposium on Electronics and the Environment.
- Rakesh Johri, Energy Resources Institute (2008). E-Waste: Implications, Regulations and Management in India and current global best practices. TERI Press 2008.
- The Indian Express, April 26, 2012.
- http://envfor.nic.in/downloads/rules-and-regulations/1035e_eng.pdf
- www.google.co.in
- Automobile Automation
Abstract Views :449 |
PDF Views:79
Authors
Affiliations
1 Department of Electronics and Communication Engineering, Bharath University, Selaiyur, Chennai - 600 073, Tamil nadu, IN
2 Professor & HOD, Department of Electronics and Communication Engineering, Bharath University, Selaiyur, Chennai - 600 073, Tamil nadu, IN
3 Department of Electronics and Communication Engineering, Bharath University, Selaiyur, Chennai - 600 073, IN
1 Department of Electronics and Communication Engineering, Bharath University, Selaiyur, Chennai - 600 073, Tamil nadu, IN
2 Professor & HOD, Department of Electronics and Communication Engineering, Bharath University, Selaiyur, Chennai - 600 073, Tamil nadu, IN
3 Department of Electronics and Communication Engineering, Bharath University, Selaiyur, Chennai - 600 073, IN
Source
Indian Journal of Innovations and Developments, Vol 1, No 9 (2012), Pagination: 710-714Abstract
India is the world's largest market for automobiles. Latest new models with improved fuel efficiency and power ratings keep hitting the market off and on. Sadly, the security aspects of automobiles remains neglected. This fallibility inspired to devise a foolproof yet cost - effective security system to safeguard automobile against theft. Nowadays some of the automobiles come with remote controllers. However, no such facility is provided for normal automobiles. Such automobiles controllers are not available even in kit form. For long time, the need for car automation and auto control under various traffic and visibility conditions has been felt. Now the same have become possible through micro controller based intelligent system, which can do every thing the same as human being does. Automated machines are becoming more intelligent aided by micro electronics, sensors, microcontrollers and programmable software. In this project PIC microcontroller 16F877A as well as AT89C2051 are acting as a primary controller and the word "Intelligent Controller" will never be spelled out with out this kind of controllers .According that this project is not only mimics the entire thing that the normal human being has done but also it is acting as an intelligent controller. This automobile automation processor has enhanced features and can be easily customized to meet individual requirements as it is programmable. Its main features are the alarming system which enables to know, at the earliest when any unknown person opens the door of the car. These system responses automatically to the atmospheric conditions, actuating automatic wiper control and dipper light control. The entire process is interfaced with personal computer through RS232 to exploit the full features of automobile automation.Keywords
Atmospheric Conditions, Actuating Automatic Wiper Control And Dipper Light ControlReferences
- Muhammad Ali Mazidi & Janice Gillispie Mazidi (2000). The 8051 Microcontroller and Embedded System”, Pearson Education.
- Raj Kamal (2003) Embedded systems - Architecture, Programming and Design”, Tata McGraw-Hill.
- John B. Peatman (1997) Design with PIC Microcontroller, Hardcover.
- Janathan. W. Valvano (2001) Embedded Micro Computer System, Real time Interfacing, Thomson Learning.
- Wayne Wolf (2001) Computer Components-Principles of Embedded Computing System design”, Morgan Kaufmann.
- Prasad, KVKK. (2004). Embedded / Real –Time Systems: Concepts, Design and Programming”, Dream tech Press.
- A Robust Digital Image Watermarking Technique Based on DWT and Fastica
Abstract Views :163 |
PDF Views:2
Authors
Affiliations
1 Department of Instrumentation Engineering, Annamalai University, IN
1 Department of Instrumentation Engineering, Annamalai University, IN
Source
Digital Image Processing, Vol 4, No 2 (2012), Pagination: 100-105Abstract
With the increasing use of internet and effortless copying, copyright protection for multimedia data has become an important issue. Digital watermarking has emerged as a tool for protecting the multimedia data from copyright infringement. Many literatures have reported about frequency transform based watermarking techniques for data security, since they are robust against image processing attacks. In this paper, an attempt is made to develop a watermarking scheme based on discrete wavelet transform (DWT) and extraction using fast independent component analysis (FastICA) algorithm. A perceptual model is applied with stochastic approach for watermark embedding. This is based on computation of noise visibility function (NVF) which has local image properties where the strength of watermarking is controlled. ICA, an intelligent detection algorithm, which is based on blind source separation technique, is implemented for extraction without the use of previous knowledge of the original image. The features of FastICA are quick convergence, easy to implement and suitable for watermark applications. Robustness of the proposed scheme is validated by implementing common image processing attacks. Peak signal to noise ratio (PSNR) and similarity measure (SM) values are calculated to evaluate the performance of the proposed work.Keywords
Discrete Wavelet Transform Independent Component Analysis and Noise Visibility Function.- Applications of Digital Image Watermarking Using RDWT and ICA
Abstract Views :168 |
PDF Views:1
Authors
Affiliations
1 Department of Instrumentation Engineering, Annamalai University, Chidambaram, Tamil Nadu, IN
1 Department of Instrumentation Engineering, Annamalai University, Chidambaram, Tamil Nadu, IN
Source
Digital Image Processing, Vol 3, No 2 (2011), Pagination: 80-84Abstract
With the rapid development of a network multimediaenvironment,digital data can be distributed much faster and easier. To maintain a duplicate of any digital data is easier than before, the enforcement of digital copyright protection is an important issue. In recent years, watermarking has become an emerging area and many watermarking schemes have been proposed for copyright protection. Many literatures have reported about Discrete Wavelet Transform (DWT) and Wavelet Packet Transform (WPT) watermarking techniques for data security. However, DWT based watermarking schemes are found to be less robust against image processing attacksand the shift variance of WPT causes inaccurate extraction. In this paper, an attempt is made to develop a watermarking scheme based on Redundant Discrete Wavelet Transform (RDWT) and extraction using Independent Component analysis(ICA). Various ICA like FastICA, Radical ICA, Pearson ICA, Jade ICA, Maximum Likelihood ICA, Mean Field ICA and Kernel ICA are proposed and implemented for extraction. The results reveal that FastICA produces better Similarity Measure and Mutual Information over other ICA methods. To ascertain the effectiveness of proposed technique (RDWT with FastICA), it is implemented for various applications like Medical, Fingerprint and Satellite images. The results are presented and discussed.Keywords
Copyright Protection, Digital Watermarking, Independent Component Analysis, Redundant Discrete Wavelet Transform.- Wavelet Based Face Recognition Using Statistical Modeling
Abstract Views :200 |
PDF Views:3
Authors
Affiliations
1 Department of Instrumentation Engineering, Annamalai University, Annamalai Nagar, IN
1 Department of Instrumentation Engineering, Annamalai University, Annamalai Nagar, IN
Source
Digital Image Processing, Vol 2, No 8 (2010), Pagination: 250-255Abstract
Face recognition is one of the challenging applications of image processing. Robust face recognition algorithm should posses the ability to recognize identity despite many variations in pose, lighting and appearance. Nowadays, Principal Component Analysis (PCA) has been widely adopted as the potential face recognition algorithm. However, it has limitations like poor discriminatory power and large computational load. In view of these limitations, this paper proposes a new approach in using PCA on wavelet sub bands. In the proposed method, wavelet transform is used to decompose an image into different frequency sub bands, and a mid-range frequency sub band is used for PCA representation. In comparison with the conventional use of PCA, the proposed method gives better recognition rate and discriminatory power. Further, the proposed method reduces the computational load significantly even when the image database is large. This paper details the design and implementation of the proposed method, and presents encouraging experimental results with standard Face Database.Keywords
Human Face Recognition, Principal Component Analysis, Sub Band, Wavelet Transform.- RDWT Based Digital Image Watermarking and Extraction Using ICA
Abstract Views :134 |
PDF Views:2
Authors
Affiliations
1 Dept. of Instrumentation Engineering, Annamalai University, Chidambaram, Tamil Nadu, IN
1 Dept. of Instrumentation Engineering, Annamalai University, Chidambaram, Tamil Nadu, IN
Source
Digital Image Processing, Vol 2, No 3 (2010), Pagination: 111-118Abstract
In recent years, watermarking has become an attractive field in the areas like copyright protection, image authentication. Many literatures have reported about Discrete Wavelet Transform (DWT) watermarking techniques for data security. However, DWT based watermarking schemes are found to be less robust against image processing attacks and the shift variance of Wavelet Packet Transform (WPT) causes inaccurate extraction. In this paper, an attempt is made to develop a watermarking scheme based on RDWT and extraction using Independent Component Analysis (ICA). Various ICA like Fast ICA, Radical ICA, Pearson ICA, Jade ICA, Maximum Likelihood ICA, Mean Field ICA and Kernel ICA are proposed and implemented for extraction. Simulation results show that the proposed scheme produces high Peak Signal to Noise Ratio (PSNR) values over other transform techniques like DWT and WPT. Also results reveal that Fast ICA produces better similarity measure and Mutual Information over other ICA methods.Keywords
Authentication, Digital Watermarking, Independent Component Analysis, Redundant Discrete Wavelet Transform.- Higher Order Statics based Primary User Emulation Attack Detection
Abstract Views :160 |
PDF Views:0
Authors
Affiliations
1 Department of ECE, Bharath University, Chennai - 600073. Tamil Nadu, IN
1 Department of ECE, Bharath University, Chennai - 600073. Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 32 (2015), Pagination:Abstract
Cognitive radio is one of the promising technique for dynamic spectrum sharing to solve the spectrum scarcity problem. Spectrum sensing is the key process in cognitive radio for the dynamic spectrum usage. But security in sensing is still in research issues .there are many security threads in cognitive radio but the primary user emulation attack is the predominant one which will not allow the dynamic spectrum sharing in effect. This primary emulation attack is the major drawbacks in energy detector based spectrum sensing. There are various methods to detect the emulation attack like RSSI based, location based etc. But the accuracy of detection is not good because of the uncertainty in the received power due to the random behavior of the channel condition. Most of those methods assume that primary users are stationary and channel variations are not significant. But in real time this assumption is not valid one .Here in this paper we propose higher order statics based primary user attack detection is proposed which can model the features of the primary user and primary user emulator attackers very well and we are able to detect the primary user emulation attack accurately. Here various fading channel scenarios like Rayleigh, rician and nagagammi is considered between the primary user and the attackers on that the performance of the detection of primary user emulation is analyzed.- ICA Based Digital Image Watermarking Based on Redundant Discrete Wavelet Transform
Abstract Views :178 |
PDF Views:0
Authors
Affiliations
1 Department of Instrumentation Engineering, Annamalai University, IN
1 Department of Instrumentation Engineering, Annamalai University, IN
Source
ICTACT Journal on Image and Video Processing, Vol 2, No 3 (2012), Pagination: 375-381Abstract
In recent years, access to multimedia data has become much easier due to rapid growth of the internet. While this is usually considered an improvement of everyday life, it also makes unauthorized copying and distributing of multimedia data much easier, therefore presenting a field of watermarking. Many literatures have reported about Discrete Wavelet Transform watermarking techniques for data security. However, DWT based watermarking schemes are found to be less robust against image processing attacks and the shift variance of Wavelet Packet Transform causes inaccurate extraction. In this paper, an attempt is made to develop a watermarking scheme based on RDWT and extraction using Independent Component Analysis (ICA). Various ICA like Fast ICA, Radical ICA, Pearson ICA, Jade ICA, Maximum Likelihood ICA, Mean Field ICA and Kernel ICA are proposed and implemented for extraction. Simulation results reveal that Fast ICA produces better Similarity Measure and Mutual Information over other ICA methods.Keywords
Authentication, Digital Watermarking, Independent Component Analysis, Redundant Discrete Wavelet Transform.- Network Data Security Using FPGA
Abstract Views :86 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics & Communication Engineering, Bharath University, Chennai, Tamil Nadu, IN
1 Department of Electronics & Communication Engineering, Bharath University, Chennai, Tamil Nadu, IN
Source
International Journal of Scientific Engineering and Technology, Vol 2, No 5 (2013), Pagination: 454-457Abstract
This paper approaches a new and simple technique to develop the RSA algorithm using FPGA that can be used as a standard device in the secured communication system. This RSA algorithm is implemented in the FPGA with the help of VHDL. A simple nested loop addition and subtraction have been used in order to implement the RSA operation. This results in very low frequency requirement to perform this operation with consideration of high speed by reducing the gate counts with low power consumption of whole circuit, multiple key size support and low cost compared to earlier methods. The information to RSA encryption side is in the form of statement and the same will appear in the decryption side and its real time input/output also achieved effectively. The hardware design is targeted on Xilinx Spartan 3E device and it supports lower versions as well. The RSA algorithm design has made use of 951 total equivalent gate counts and achieved a clock frequency of 35.00MHz.Keywords
Cryptography, FPGA, VHDL, Security, Communication.- Underwater Robot Control Systems
Abstract Views :102 |
PDF Views:0
Authors
Affiliations
1 Deptt. of Electronics and Communication Engineering, Bharath University, Chennai, Tamil Nadu, IN
1 Deptt. of Electronics and Communication Engineering, Bharath University, Chennai, Tamil Nadu, IN
Source
International Journal of Scientific Engineering and Technology, Vol 2, No 4 (2013), Pagination: 222-224Abstract
In this Paper, we introduce three types of enhanced wireless control systems for when the Robot operates under water. The first system is Zigbee communication, second System is Light approach and third one is Magnetic Field.
In recent trends the robots are working in vast applications, if our concept adopted, it will enhance and increasing monitoring function done by the robot.