Aralvaimozhi, India
Aralvaimozhi, India

Time filter

Source Type

Subiramoniyan S.,Sathyabama University | Subiramoniyan S.,Jayamatha Engineering College | Jawhar S.J.,Jayamatha Engineering College
Advances in Intelligent Systems and Computing | Year: 2016

Implementation of proportional-integral (PI) controller for speed control of direct current (DC) servomotor drive is an emerging trend in recent years. PI controller is a simple effective method and it needs tuning of the control parameters to improve the performance of the converters. The local treatment of the parameter tuning is no longer possible and it is thus essential to design a suitable topology for flyback converters that has to reduce the overshoot and settling time. Here an advanced PI control algorithm has been framed that optimize the PI controller parameters using ant colony optimization and cuckoo search algorithm. The PI control algorithm is implemented in FPGA to drive the DC servomotor drive. Framing the conventional system with optimized PI control algorithm shows sig- nificant reduction of overshoot and settling time and works effectively for DC servomotor drive. © Springer India 2016.

Brindha T.,Noorul Islam University | Shaji R.S.,Noorul Islam University | Rajesh G.P.,Jayamatha Engineering College
International Journal of Engineering and Technology | Year: 2013

Cloud computing is a most alluring technology that facilitates conducive, on-demand network access based on the requirement of users with nominal effort on management and interaction among cloud providers. The cloud storage serves as a dependable platform for long term storage needs which enables the users to move the data to the cloud in a rapid and secure manner. It assists activities and government agencies considerably decrease their economic overhead of data organization, as they can store their data endorsement vaguely to third-party cloud storage sources than preserving the data centers on their personal. Cloud storage allows users to accumulate their data at a remote location and have the on-demand high superiority cloud requests without the burden of restricted hardware and software organization. Along with the widespread benefits on cloud computing, however, security issues with cloud data storage are arising in terms of confidentiality, integrity and reliability. Although the profits are obvious, such a service is also turning down user's corporeal control of their outsourced data, which unavoidably facades novel security dangers towards the accuracy of the data in cloud. This paper provides a comprehensive survey of major security issues that exists in cloud data storage. We also conduct extensive empirical studies and analysis of different techniques which provides security fortification for outsourced data in cloud computing environment.

Manju M.,Jayamatha Engineering College
International Journal of Security and its Applications | Year: 2014

With the fast improvement of multimedia technologies and the rising attractiveness of the internet, information or data hiding methods have become more and more extensively applied to achieve authentication. Data hiding methods are ways of embedding additional messages into host signals by modifying their original contents without introducing perceptual changes. The main aim of the paper is to present a survey on traditional data hiding techniques which are mainly based on reducing the embedding distortions. © 2014 SERSC.

Manju M.,Jayamatha Engineering College
Journal of Theoretical and Applied Information Technology | Year: 2014

The huge number of fingerprints collected by the Federal Bureau of Investigation (FBI) has created an enormous problem in storage and transmission. Increase of online communication and transactions, has led to the requirement of security and privacy measures to be inbuilt in fingerprint recognition system. There are several solutions already in use to protect confidential information and to authenticate people electronically. When biometrics is used, it often deals with a discussion concerning privacy and integrity. This paper proposes a new methodology for effectively avoiding the replay attack during transmission of minutiae data. The minutiae information is split in to two parts and the first part is encrypted using pseudorandom permutation and then the remaining part of the minutiae information is embedded into the resultant permuted sequence using a low distortion based digital watermarking transform technique. To prove the integrity of the transmitted data, the receiver performs the same operation as that of the sender and compares the obtained data with the received data. Thus this algorithm gives solution to the replay attack which is found most common in all ATM based applications. © 2005 - 2014 JATIT & LLS. All rights reserved.

Jasper J.,Anna University | Berlin Shaheema S.,Jayamatha Engineering College
Mathematical Problems in Engineering | Year: 2014

This paper addresses a novel and efficient algorithm for solving optimization problem in image processing applications. Image enhancement (IE) is one of the complex optimization problems in image processing. The main goal of this paper is to enhance color images such that the eminence of the image is more suitable than the original image from the perceptual viewpoint of human. Traditional methods require prior knowledge of the image to be enhanced, whereas the aim of the proposed biogeography based optimization (BBO) enhanced with blended migration operator (BMO) algorithm is to maximize the objective function in order to enhance the image contrast by maximizing the parameters like edge intensity, edge information, and entropy. Experimental results are compared with the current state-of-the-art approaches and indicate the superiority of the proposed technique in terms of subjective and objective evaluation. © 2014 J. Jasper et al.

Uma R.,Jayamatha Engineering College | Muneeswaran K.,Mepco Schlenk Engineering College, Sivakasi
Journal of Computer Science | Year: 2013

Information Retrieval (IR) is a profound technique to find information that addresses the need of query. Processing of normal text is easier and information can be retrieved efficiently. There are plenty of algorithms in hand to carry out the normal text retrieval. Whereas retrieving geospatial information is very complex and requires additional operations to be performed. Since geospatial data contain complex details than general data such as location, direction. To handle geographical queries, we proposed a Density Probabilistic Document Correlation (DPDC) approach. This approach, initially categorize the geographical features from text that satisfies the given queries. Existing text classification techniques are unsuitable for geospatial text classification due to the exclusivity of the geographical features. Depending on the DPDC approach result we predict overlap of the feature set for a document. Based on overlap and document correlation, the documents are ranked. Highly relevant documents are extracted depending on the score obtained through ranking. Documents with high score are considered the most relevant. The experimental results show that our proposed method efficiently retrieves the list of relevant documents. © 2013 Science Publications.

Uma R.,Jayamatha Engineering College | Muneeswaran K.,Mepco Schlenk Engineering College, Sivakasi
International Journal of Soft Computing | Year: 2013

The increasing growth of content volume in the internet makes the content management process challengeable to the various web search engines which in turn need increasing developments in information retrieval process. This study comprises the advantages of two methodologies namely ontology determination and synonym determination which paves a way for building up an effective web search mechanism. Further researchers developed an approach for the retrieval of information consisting of both the semantic perspective density approach and lexical resources. Those two approaches provide us with the catalog of the type of things or categories for the queries thrown on to the search engine. Retrieved documents are displayed to user based on document ranking process. Display starts with top ranked document. © Medwell Journals, 2013.

Maffina M.A.,Jayamatha Engineering College | RamPriya R.S.,Jayamatha Engineering College
2013 International Conference on Recent Trends in Information Technology, ICRTIT 2013 | Year: 2013

The main aim of this project is to provide secure communication among distributed clusters via Message Passing Interface (MPI). When a number of clusters associated to each other are increased then, it becomes a threat to security applications running on the clusters. To handle this security trouble, a MPI is built-up to protect the properties of security in an untrusted network. In the existing system, to generate the symmetric shared key, the participant provide only 1 byte size of random number so there is a chance to find out the key by the intruder. Furthermore, here only text message is passed between the clients. The proposed system is Enhanced Security for Message Passing Interface Chameleon version 2 (ES-MPICH2) in which it maintains the size of random number as 4 bytes, thus it is impossible to find out the key by the unauthorized person. This protocol is extended with features, such as secure file transfer utility and rekeying process. As well it supports to encrypt and decrypt the file upload by the user. We use secure algorithms like interpolation polynomial, AES and SHA-1 for key management, encryption/decryption and providing integrity service. After that those algorithms are integrated into Message Passing Interface Chameleon version 2 (MPICH2) that becomes ES-MPICH2. It supports a large collection of calculation and conversation area. The proposed work is based on both mathematics and cryptography concept that direct to error free message passing among the authorized users with enhanced security. © 2013 IEEE.

Nagalingam R.,Jayamatha Engineering College | Sundaram S.,Annamalai University | Retnam B.S.J.,Jayamatha Engineering College
Bulletin of Materials Science | Year: 2010

Advanced composite, fibre-reinforced polymer (FRP), has been favoured for certain aerospace, military, marine and automotive applications. Polymer nanocomposites containing layered silicates have attracted much attention. These exhibit increased modulus, decreased thermal expansion coefficient, increased solvent resistance and enhanced ionic conductivity when compared to the polymer alone. Here we have developed eight different combinations of composites FRP with nanoclay (montmorillonite) by layered manufacturing techniques (LM) and measured the mechanical properties. The measurement showed that the tensile strength, impact strength and fatigue life are greatly increased. A plausible explanation for high increase of properties has also been discussed. © Indian Academy of Sciences.

Manju M.,Jayamatha Engineering College | Kavitha V.,Anna University
International Journal of Soft Computing | Year: 2013

In this study, the accuracy of finger print recognition problem is been addressed. As per the literature the Back Propagation Network (BPN) for fingerprint recognition has resulted in inconsistent with unpredictable performance. This research has proposed the soft computing tool to images to overcome the low recognition rate and the low accuracy in fingerprint identification. Fuzzy logic is worn to eliminate the false minutiae from the fingerprint. Genetic algorithm has been incorporated to optimize the weights of neural network and the accuracy in the recognition process has been improved. The proposed method is implemented on the F VC 2004 DB1 database. The Laplacian based Pyramidal Model has strongly supported in fingerprint enhancement process which has increased the Peak Signal to Noise Ratio (PSNR) and decreased the Mean Square Error (MSE). The results have proven that the false minutiae have been eliminated by applying fuzzy rules and also the Equal Error Rate (EER) has been reduced. The increase in the recognition accuracy moreover in turn has reduced the training and the testing time. © 2013, Medwell Journals.

Loading Jayamatha Engineering College collaborators
Loading Jayamatha Engineering College collaborators