Senthildevi K.A.,Gobi Arts and Science College
2015 International Conference on Communication and Signal Processing, ICCSP 2015 | Year: 2015
Audio mining is a speaker independent speech processing technique and is related to data mining. Keyword spotting plays an important role in audio mining. Keyword spotting is retrieval of all instances of a given keyword in spoken utterances. It is well suited to data mining tasks that process large amount of speech such as telephone routing and to audio document indexing. Feature extraction is the first step for all speech processing tasks. This Paper presents an approach for keyword spotting in isolated Tamil utterances using Multidimensional Mel Frequency Cepstral Coefficient feature vectors and DTW algorithm. The accuracy of keyword spotting is measured with 12D, 26D and 39D MFCC feature vectors for month names in Tamil language and the performances of the mu1tidimensional MFCCs are compared. The code is developed in the MATLAB environment and performs the identification satisfactorily. © 2015 IEEE.
Kumar G.D.,Gobi Arts and Science College |
Sethuram M.,VSB Engineering College
Optik | Year: 2016
A new organic charge transfer complex, dimethylammonium 4-nitrobenzoate was crystallized by slow evaporation solution technique at room temperature. The stoichiometric ratio of the title complex was confirmed by elemental analysis. The crystal structure of the complex was determined by single crystal X-ray diffraction analysis to be monoclinic crystal system with space group C2/c. The cell parameters are a = 40.123 (3) Å, b = 8.9533 (7) Å, c = 11.8240 (9) Å, β = 93.774° (4) and V = 4238.4 (6) Å3. The UV-visible absorption and transmittance spectra show the absorptions at 324 and 380 nm and the lower cut-off wavelength at 450 nm, respectively. The various functional groups were confirmed by Fourier Transform Infra-red (FTIR) spectrum. The thermal stability of the complex was studied by using thermogravimetric and differential thermal (TG-DTA) analyses and the compound was found to be stable up to 170 °C. Kurtz - Perry powder technique was used to find out NLO property of the grown crystal. The softness of complex was confirmed by Vicker's microhardness test. © 2015 Elsevier GmbH. All rights reserved.
Balasubramaniam C.P.,Karpagam University |
Thigarasu V.,Gobi Arts and Science College
Research Journal of Applied Sciences, Engineering and Technology | Year: 2015
The Supply chain can describe the activities that are involved in the chain, or the companies, or the different functions. In literature there are a lot of models describing the Supply chain from different perspectives. Currently supply chains performance measurement systems suffer from being too inward looking, ignoring external environmental factors that might affect the overall supply chain performance when setting new targets. The most efficient Supply chain is the one that has the lowest possible cost and at the same time meet the customer's expectations on service like delivery precision and lead-time. In this study decision based technique C4.5 is improved using correlation coefficient of Kendall for effective classification. The correlation coefficient of Kendall is adapted to improve the system. The C4.5 not only produce discrete attributes, but also continuous ones can be handled, handling incomplete training data with missing values and it is prune during the construction of trees to avoid over-fitting. The accuracy is calculated by sensitivity and specificity for the proposed and existing technique for the textile synthesis dataset. Obtained results will prove the efficiency of this proposed technique based on its accuracy. © Maxwell Scientific Organization, 2015.
Mallika N.M.,Sri Vasavi College SFW |
Srinivasan B.,Gobi Arts and Science College
International Journal of Control Theory and Applications | Year: 2016
The development of Cloud Computing (CC) services is catching up speed due to which the rate at which the organizations do the outsourcing of their computational services or carry on their sale of their non-active computational assets. Security is a highlighted concern in cloud and distributed cloud systems. Limited control over the data may incur various security issues and threats which include data leakage, insecure interface, sharing of resources, data corruption, and data availability. During the occurrence of data corruption, the application's QoS requirement cannot have continuous support. In order to provide a clear vision and solving of these problems, this article attempts to identify the chief security issues and data corruption solutions in the field of cloud computing. Data replication is another issue in distributed systems. For the purpose of security, propose a Multilevel Differential Evolution Threshold (MDET) based secret sharing scheme of security for cloud computing, yielding an overview of the status of security currently present in this evolving technology. In MDET enhance the security of secret key in a distributed cloud environment. In the proposed work split secret into multiple shares and store them in different locations using MDET secret sharing scheme. Solve data corruption problem, Multi-Stage Stochastic Integer Programming (MSSIP) is adapted with the intuitive concept of Quality of Service (QoS) to conduct data replication. MDET secret sharing scheme create replicas of secret shares and distribute them among multiple resource providers to ensure availability. An experimentation result shows that the proposed MDET based secret sharing scheme, in addition to identifying the related vulnerabilities and threats along with feasible solutions when compared to existing state of art methods. © International Science Press.
Parvathi R.,Vellalar College for Women |
Malathi C.,Gobi Arts and Science College |
Akram M.,University of Punjab |
Atanassov K.T.,Bulgarian Academy of Science
Fuzzy Optimization and Decision Making | Year: 2013
Linear regression analysis in an intuitionistic fuzzy environment using intuitionistic fuzzy linear models with symmetric triangular intuitionistic fuzzy number (STriIFN) coefficients is introduced. The goal of this regression is to find the coefficients of a proposed model for all given input-output data sets. The coefficients of an intuitionistic fuzzy regression (IFR) model are found by solving a linear programming problem (LPP). The objective function of the LPP is to minimize the total fuzziness of the IFR model which is related to the width of IF coefficients. An illustrative example is also presented to depict the solution procedure of the IFR problem by using STriIFNs. © 2012 Springer Science+Business Media New York.
Parvathi R.,Vellalar College for Women |
Malathi C.,Gobi Arts and Science College
AIP Conference Proceedings | Year: 2012
This paper introduces Symmetric Triangular Intuitionistic Fuzzy Numbers (STriFNs) and also proposes a new type of intuitionistic fuzzy arithmetic operations on STriIFNs. A special ranking function for ordering STriIFNs has been introduced. A solution methodology for Intuitionistic Fuzzy Linear Programming Problems (IFLPPs) with STriIFNs as parameters has been proposed by using Intuitionistic Fuzzy Simplex Method and the arithmetic operations on STriIFNs. Finally, an illustrative numerical example is presented to demonstrate the proposed approach. © 2012 American Institute of Physics.
Janarthanam S.,Gobi Arts and Science College |
Ramalingam M.,Gobi Arts and Science College |
Narendran P.,Gobi Arts and Science College
Proceedings of 2010 International Conference on Communication and Computational Intelligence, INCOCCI-2010 | Year: 2010
The Texture analysis is primarily concerned with the evaluation of characteristics where it materializes the channel deformation of image and its response. Wavelet is very useful for texture analysis and is widely adopted in the image segmentation. The channels are characterized by a bank of the spatial frequency domain. This paper deals with multi-channel filtering with Local Frequency using unsupervised segmentation algorithm on texture. It proposes a systematic filter selection scheme which is based on reconstruction of the input image from the filtered images. The image indexing and retrieval are conducted on textured images and natural images. Texture features are obtained by subjecting each selected filtered image to a nonlinear transformation and computing a measurement of energy in a window around each pixel. It incorporates a set of texture features under a segmentation work, based on the active contour without edges model with level set representation and a connected filtering strategy. The appearance of a surface texture is highly dependent on illumination. Surface texture classification methods require multiple training images captured under a variety of illumination conditions for each class if the surfaces are of uniform, smooth and the illumination is sufficiently far from the texture The performed result shows that it can be used for segmentation of multiple-textured images which allows the comparison between the segmented images versus its ground truth image. © 2010 Kongu Engineering College.
Arul Jothi A.,Gobi Arts and Science College |
Srinivasan B.,Gobi Arts and Science College
International Journal of Applied Engineering Research | Year: 2015
In recent times, Body Area Networks (BANs) are rising as one of the major research topics, predominantly in the field of individual health monitoring. In view of the fact that health data are secretive and sensitive details, the security of data transmission inside a BAN turns out to be a significant issue that needs instantaneous attention. Here, a novel signcryption scheme based on Elliptic Curve Cryptography (ECC) for body area network security is proposed. Initially the BANs are the flexibility with which patients can share, expand and adjust the system in accordance with sensors, data and functionality. The initial step is to build up an interoperable platform with open interfaces, which looks after common management tasks. Moreover, interoperability is defined through semantics. In order to considerably enhance the semantic interoperability between sensor networks and applications the Fuzzy Ontology (FO) based approach is used. The patient‘s database is based on this interoperability because third parties to formulate system modules that can be joined together with the platform without difficulty. Then the ECC based security mechanism is makes an appropriate tradeoff between security and elasticity. It integrates digital signatures and encryption, and gives confidentiality, unforgeability, authenticity and collusion resistance. Theoretically it proves that ECC is efficient and feasible. And also its security level is analyzed in practical BANs. © Research India Publications.
Senthilkumar B.,Bharathiar University |
Kalai Selvan R.,Bharathiar University |
Vinothbabu P.,Gobi Arts and Science College |
Perelshtein I.,Bar - Ilan University |
Gedanken A.,Bar - Ilan University
Materials Chemistry and Physics | Year: 2011
Submicron-sized NiFe2O4 particles were synthesized by the molten salt method at 900 °C using binary melts of a NaCl and KCl mixture that acts as a flux. The X-ray diffraction pattern confirmed the single phase, high crystalline and cubic structure of NiFe2O4 with a Fd3m space group. The FT-IR spectra reveal the stretching vibration of octahedral complexes of Fe3+-O2- through the observed band around 552.3 cm-1. The SEM and TEM image had indicated the formation of submicron-sized NiFe2O4 particles. The ferrimagnetic behavior and high saturation magnetization of 44 emu g-1 was elucidated by VSM. The maximum electrical conductivity of 1.42 × 10 -4 S cm-1 was observed at 873 K. The NiFe 2O4 showed a pseudocapacitive property in 1 M of a LiClO4 electrolyte and exhibited a specific capacitance of 18.5 F g-1 at 10 mV s-1. The hydrogen evolution reaction was also studied for NiFe2O4 in 1 M of a H2SO 4 solution. © 2011 Elsevier B.V. All rights reserved.
Sathishkumar K.,Gobi Arts and Science College |
Balamurugan E.,Bannari Amman Institute of Technology |
Narendran P.,Gobi Arts and Science College
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2013
The gene microarray data are arranged based on the pattern of gene expression using various clustering algorithms and the dynamic natures of biological processes are generally unnoticed by the traditional clustering algorithms. To overcome the problems in gene expression analysis, novel algorithms for finding the coregulated clusters, dimensionality reduction and clustering have been proposed. The coregulated clusters are determined using biclustering algorithm, so it is called as coregulated biclusters. The coregulated biclusters are two or more genes which contain similarity features. The dimensionality reduction of microarray gene expression data is carried out using Locality Sensitive Discriminant Analysis (LSDA). To maintain bond between the neighborhoods in locality, LSDA is used and an efficient meta heuristic optimization algorithm called Artificial Bee Colony (ABC) using Fuzzy C Means clustering is used for clustering the gene expression based on the pattern. The experimental results shows that proposed algorithm achieve a higher clustering accuracy and takes lesser less clustering time when compared with existing algorithms. © 2013 Springer International Publishing.