Jayamatha Engineering College

Aralvaimozhi, India

Jayamatha Engineering College

Aralvaimozhi, India
Time filter
Source Type

Uma R.,Jayamatha Engineering College | Muneeswaran K.,Mepco Schlenk Engineering College, Sivakasi
Cybernetics and Systems | Year: 2017

Information extraction relevant to the user queries is the challenging task in the ontology environment due to data varieties such as image, video, and text. The utilization of appropriate semantic entities enables the content-based search on annotated text. Recently, the automatic extraction of textual content in the audio-visual content is an advanced research area in a multimedia (MM) environment. The annotation of the video includes several tags and comments. This paper proposes the Collaborative Tagging (CT) model based on the Block Acquiring Page Segmentation (BAPS) method to retrieve the tag-based information. The information extraction in this model includes the Ontology-Based Information Extraction (OBIE) based on the single ontology utilization. The semantic annotation phase in the proposed work inserts the metadata with limited machine-readable terms. The insertion process is split into two major processes such as database uploading to server and extraction of images/web pages based on the results of semantic phase. Novel weight-based novel clustering algorithms are introduced to extract knowledge from MM contents. The ranking based on the weight value in the semantic annotation phase supports the image/web page retrieval process effectively. The comparative analysis of the proposed BAPS-CT with the existing information retrieval (IR) models regarding the average precision rate, time cost, and storage space rate assures the effectiveness of BAPS-CT in OMIR. © 2017 Taylor & Francis Group, LLC

Uma R.,Jayamatha Engineering College | Muneeswaran K.,Mepco Schlenk Engineering College, Sivakasi
Journal of Multiple-Valued Logic and Soft Computing | Year: 2017

Processing the normal text is quite easier and the information can be efficiently retrieved. There are various algorithms have been already proposed for normal text retrieval. Whereas retrieving the geospatial information are very complex due to nature of the data. It needs supplementary processes to be performed. Since geospatial data contains complex information like location and direction. To effectively handle the geospatial queries, a novel Semantic and Feature Aggregated Information Retrieval is proposed in this paper. Preliminary, there are four steps need to be perform, they are Clustering, Indexing, Retrieval and Ranking. Also, Context based Query Weighting (CQW) approach is proposed to cluster the documents present in the corpus and indexing is based on multilevel hashing. Feature Probability and Density (FPD) technique is utilized to retrieve the document which matches the user query information. The Semantic Density (SD) technique is used to rank the retrieved documents. The experimental results shows that the proposed SFAIR technique provides better results than the existing technique. © 2017 Old City Publishing, Inc.

Brindha T.,Noorul Islam University | Shaji R.S.,Noorul Islam University | Rajesh G.P.,Jayamatha Engineering College
International Journal of Engineering and Technology | Year: 2013

Cloud computing is a most alluring technology that facilitates conducive, on-demand network access based on the requirement of users with nominal effort on management and interaction among cloud providers. The cloud storage serves as a dependable platform for long term storage needs which enables the users to move the data to the cloud in a rapid and secure manner. It assists activities and government agencies considerably decrease their economic overhead of data organization, as they can store their data endorsement vaguely to third-party cloud storage sources than preserving the data centers on their personal. Cloud storage allows users to accumulate their data at a remote location and have the on-demand high superiority cloud requests without the burden of restricted hardware and software organization. Along with the widespread benefits on cloud computing, however, security issues with cloud data storage are arising in terms of confidentiality, integrity and reliability. Although the profits are obvious, such a service is also turning down user's corporeal control of their outsourced data, which unavoidably facades novel security dangers towards the accuracy of the data in cloud. This paper provides a comprehensive survey of major security issues that exists in cloud data storage. We also conduct extensive empirical studies and analysis of different techniques which provides security fortification for outsourced data in cloud computing environment.

Manju M.,Jayamatha Engineering College
International Journal of Security and its Applications | Year: 2014

With the fast improvement of multimedia technologies and the rising attractiveness of the internet, information or data hiding methods have become more and more extensively applied to achieve authentication. Data hiding methods are ways of embedding additional messages into host signals by modifying their original contents without introducing perceptual changes. The main aim of the paper is to present a survey on traditional data hiding techniques which are mainly based on reducing the embedding distortions. © 2014 SERSC.

Manju M.,Jayamatha Engineering College
Journal of Theoretical and Applied Information Technology | Year: 2014

The huge number of fingerprints collected by the Federal Bureau of Investigation (FBI) has created an enormous problem in storage and transmission. Increase of online communication and transactions, has led to the requirement of security and privacy measures to be inbuilt in fingerprint recognition system. There are several solutions already in use to protect confidential information and to authenticate people electronically. When biometrics is used, it often deals with a discussion concerning privacy and integrity. This paper proposes a new methodology for effectively avoiding the replay attack during transmission of minutiae data. The minutiae information is split in to two parts and the first part is encrypted using pseudorandom permutation and then the remaining part of the minutiae information is embedded into the resultant permuted sequence using a low distortion based digital watermarking transform technique. To prove the integrity of the transmitted data, the receiver performs the same operation as that of the sender and compares the obtained data with the received data. Thus this algorithm gives solution to the replay attack which is found most common in all ATM based applications. © 2005 - 2014 JATIT & LLS. All rights reserved.

Jasper J.,Anna University | Berlin Shaheema S.,Jayamatha Engineering College
Mathematical Problems in Engineering | Year: 2014

This paper addresses a novel and efficient algorithm for solving optimization problem in image processing applications. Image enhancement (IE) is one of the complex optimization problems in image processing. The main goal of this paper is to enhance color images such that the eminence of the image is more suitable than the original image from the perceptual viewpoint of human. Traditional methods require prior knowledge of the image to be enhanced, whereas the aim of the proposed biogeography based optimization (BBO) enhanced with blended migration operator (BMO) algorithm is to maximize the objective function in order to enhance the image contrast by maximizing the parameters like edge intensity, edge information, and entropy. Experimental results are compared with the current state-of-the-art approaches and indicate the superiority of the proposed technique in terms of subjective and objective evaluation. © 2014 J. Jasper et al.

Uma R.,Jayamatha Engineering College | Muneeswaran K.,Mepco Schlenk Engineering College, Sivakasi
Journal of Computer Science | Year: 2013

Information Retrieval (IR) is a profound technique to find information that addresses the need of query. Processing of normal text is easier and information can be retrieved efficiently. There are plenty of algorithms in hand to carry out the normal text retrieval. Whereas retrieving geospatial information is very complex and requires additional operations to be performed. Since geospatial data contain complex details than general data such as location, direction. To handle geographical queries, we proposed a Density Probabilistic Document Correlation (DPDC) approach. This approach, initially categorize the geographical features from text that satisfies the given queries. Existing text classification techniques are unsuitable for geospatial text classification due to the exclusivity of the geographical features. Depending on the DPDC approach result we predict overlap of the feature set for a document. Based on overlap and document correlation, the documents are ranked. Highly relevant documents are extracted depending on the score obtained through ranking. Documents with high score are considered the most relevant. The experimental results show that our proposed method efficiently retrieves the list of relevant documents. © 2013 Science Publications.

Maffina M.A.,Jayamatha Engineering College | RamPriya R.S.,Jayamatha Engineering College
2013 International Conference on Recent Trends in Information Technology, ICRTIT 2013 | Year: 2013

The main aim of this project is to provide secure communication among distributed clusters via Message Passing Interface (MPI). When a number of clusters associated to each other are increased then, it becomes a threat to security applications running on the clusters. To handle this security trouble, a MPI is built-up to protect the properties of security in an untrusted network. In the existing system, to generate the symmetric shared key, the participant provide only 1 byte size of random number so there is a chance to find out the key by the intruder. Furthermore, here only text message is passed between the clients. The proposed system is Enhanced Security for Message Passing Interface Chameleon version 2 (ES-MPICH2) in which it maintains the size of random number as 4 bytes, thus it is impossible to find out the key by the unauthorized person. This protocol is extended with features, such as secure file transfer utility and rekeying process. As well it supports to encrypt and decrypt the file upload by the user. We use secure algorithms like interpolation polynomial, AES and SHA-1 for key management, encryption/decryption and providing integrity service. After that those algorithms are integrated into Message Passing Interface Chameleon version 2 (MPICH2) that becomes ES-MPICH2. It supports a large collection of calculation and conversation area. The proposed work is based on both mathematics and cryptography concept that direct to error free message passing among the authorized users with enhanced security. © 2013 IEEE.

Nagalingam R.,Jayamatha Engineering College | Sundaram S.,Annamalai University | Retnam B.S.J.,Jayamatha Engineering College
Bulletin of Materials Science | Year: 2010

Advanced composite, fibre-reinforced polymer (FRP), has been favoured for certain aerospace, military, marine and automotive applications. Polymer nanocomposites containing layered silicates have attracted much attention. These exhibit increased modulus, decreased thermal expansion coefficient, increased solvent resistance and enhanced ionic conductivity when compared to the polymer alone. Here we have developed eight different combinations of composites FRP with nanoclay (montmorillonite) by layered manufacturing techniques (LM) and measured the mechanical properties. The measurement showed that the tensile strength, impact strength and fatigue life are greatly increased. A plausible explanation for high increase of properties has also been discussed. © Indian Academy of Sciences.

Manju M.,Jayamatha Engineering College | Kavitha V.,Anna University
International Journal of Soft Computing | Year: 2013

In this study, the accuracy of finger print recognition problem is been addressed. As per the literature the Back Propagation Network (BPN) for fingerprint recognition has resulted in inconsistent with unpredictable performance. This research has proposed the soft computing tool to images to overcome the low recognition rate and the low accuracy in fingerprint identification. Fuzzy logic is worn to eliminate the false minutiae from the fingerprint. Genetic algorithm has been incorporated to optimize the weights of neural network and the accuracy in the recognition process has been improved. The proposed method is implemented on the F VC 2004 DB1 database. The Laplacian based Pyramidal Model has strongly supported in fingerprint enhancement process which has increased the Peak Signal to Noise Ratio (PSNR) and decreased the Mean Square Error (MSE). The results have proven that the false minutiae have been eliminated by applying fuzzy rules and also the Equal Error Rate (EER) has been reduced. The increase in the recognition accuracy moreover in turn has reduced the training and the testing time. © 2013, Medwell Journals.

Loading Jayamatha Engineering College collaborators
Loading Jayamatha Engineering College collaborators