Time filter

Source Type

Aralvaimozhi, India

Reena Daphne R.,Cape Institute of Technology | Albert Raj A.,DMI Engineering College
Procedia Engineering | Year: 2012

Drowsiness is considered as a significant risk factor that contributes to large number of accidents. Therefore a method is developed for counteracting its effects and hence a very accurate classification of drowsiness is needed so as to categorize the different states of drowsiness and thus the person can be alerted at definite instants. The quality of extracted features is assessed on datasets collected from various subjects irrespective of age, sex and also the start and stop of the signal monitoring time of the subjects. An optimal Fuzzy Entropy Mutual Information(FEMI) methodology is implemented into Wavelet Packet Transform(WPT) decomposition so as to extract the features and the various instants of drowsiness of the subject is obtained. The Receiver Operating Characteristics (ROC) curve shows the classification accuracy of the SVM. © 2012 Published by Elsevier Ltd. Source

Amirthasaravanan A.,Tamil University | Rodrigues P.,DMI Engineering College | Sudhesh R.,Tamil University
Asian Journal of Information Technology | Year: 2016

In recent years, web realm has Service-Oriented Architectures (SOA) as the primary standard for IT infrastructures. Indeed with the commencement of service oriented architecture, web services have gained absurd progression. Web service discovery has become progressively more substantial. Discovering the most suitable web service from huge collection of web services is very crucial for the successful implementation of the web applications. In web service discovery automation, during matching, Quality of Service (QoS) attributes are continuously need to deem. Aiming at this, Bio-inspired algorithms for semantic web services were initiated. Bio-inspired algorithm is a meta heuristics method that imitates the nature in order to unravel optimization problem and evaluates the analysis of some popular bio-inspired optimization algorithm systematically. This paper proposes a new bio inspired algorithm which is inspired from Slime Mold. Slime mold is a fungus. Slime molds are habitually observed when they form large colonies on mulch around trees or shrubs. They may initially appear as a slimy mound or crowd. Slime mold has a unique intelligence to find the pray and it's often unsighted. The character of slime mold is inspired and it solves the problem of complex and composite web services and produces optimized web services. © Medwell Journals, 2016. Source

Raj A.A.,DMI Engineering College
Eurasip Journal on Wireless Communications and Networking | Year: 2016

Multicarrier complementary-coded code division Multiple Access (MC CC-CDMA) is becoming an attractive multiple access technique for high data rate transmission in future wireless communication systems. MC CC-CDMA systems transmitting over frequency-selective channels suffer from multiple access interference (MAI) owing to non-ideal correlation properties of complementary codes (CC). MC CC-CDMA with equalization has recently gained much attention for its ability to offer an excellent performance than traditional systems in frequency-selective fading channels. In this paper, the authors present an analytical study and investigation of MC CC-CDMA downlink system using different combining schemes. The use of parallel interference cancellation (PIC) under frequency-selective Nakagami-m fading channels is also analyzed. A comparison among different combining schemes is provided to show the impact of PIC with minimum mean square error combining (MMSEC) and maximal ratio combining (MRC) on the performance of MC CC-CDMA system. The analytical and simulation results show that the combination of general combining schemes with PIC provides an efficient solution to suppress MAI in downlink MC CC-CDMA system than conventional MC-CDMA systems using Walsh codes under frequency-selective channels. © 2016, Judson and Raj. Source

Shiny Angel T.S.,SRM University | Rodrigues P.,DMI Engineering College
International Journal of Applied Engineering Research | Year: 2015

Software size estimation is a key factor to determine the amount of time and effort needed to develop software systems, and the e-learning systems are no exception. The success of any software project largely depends on effective estimation of project effort, time and cost. Estimation helps in setting realistic targets for completing the project. The basic element for estimating all is size. The software industry uses various sizing techniques they are Lines of code, Function points, feature points, use case points, object points, internet points, etc. are not effectively supported for determine the size of E-Learning system that affect all estimates. The wrong estimates lead incompleteness, loss and customer dissatisfaction. This paper presents the popular sizing techniques and their inabilities in sizing and also the necessities of new sizing approach for E-Learning system. © Research India Publications. Source

Sugitha G.,Cape Institute of Technology | Albert Raj A.,DMI Engineering College
International Journal of Applied Engineering Research | Year: 2014

In modern generation the applications of wireless adhoc networks are increasing in use. Due to the random mobility of nodes the adhoc network may be partitioned. A fault tolerant network can be achieved by avoiding the communication network disconnections. So identification of critical nodes in the network is an important problem in wireless adhoc network. This paper presents a novel critical node identification algorithm by constructing BFS tree. The metrics for evaluation has been considered are communication overhead, throughput and jitter. © Research India Publications. Source

Discover hidden collaborations