Nandha Educational Institutions

Erode, India

Nandha Educational Institutions

Erode, India
SEARCH FILTERS
Time filter
Source Type

Arumugam S.,Nandha Educational Institutions
Journal of Computer Science | Year: 2012

Problem statement: Biometric is a unique, measurable physiological or behavioral characteristic of a person and finds extensive applications in authentication and authorization. Fingerprint, palm print, iris, voice, are some of the most widely used biometric for personal identification. To reduce the error rates and enhance the usability of biometric system, multimodal biometric systems are used where more than one biometric characteristic are used. Approach: In this study it is proposed to investigate the performance of multimodal biometrics using palm print and fingerprint. Features are extracted using Discrete Cosine Transform (DCT) and attributes selected using Information Gain (IG). Results and Conclusion: The proposed technique shows an average improvement of 8.52% compared to using palmprint technique alone. The processing time does not increase for verification compared to palm print techniques. © 2012 Science Publications.


Sampath V.R.,Nandha Educational Institutions
Fibres and Textiles in Eastern Europe | Year: 2013

In this study, the physical and dimensional properties of single jersey fabrics made from cotton / elastomeric core spun yarn were investigated. The main purpose of this paper was to investigate the suitability of cotton - spandex core spun yarn for circular knitting as an alternative for bare spandex feeding and the effect of stitch length variables on knitted fabric geometric quality attributes such as wale density, course density, stitch density and areal density under different states of relaxation. The results clearly indicate that the resulting yarn is highly suitable for circular knitting and change in stitch length values does not have any significant impact on wale density values. At the same time, the remaining geometric properties of the samples were found to be inversely proportional to the stitch length values uniformly at all the states of relaxation. Along with this, the ability of the samples to reach the dimensional equilibrium state after repeated cycles of washing and drying was also studied. It is evident from the results that all the three samples produced with ascending stitch length orders attained a perfect state of dimensional stability before five cycles of washing and drying, and also the sample knitted with the smallest stitch length value reached its equilibrium state in a quick time.


Arumugam S.,Nandha Educational Institutions
Journal of Theoretical and Applied Information Technology | Year: 2013

The biometric authentication is an effective alternative for traditional authentication techniques. Because biometric data cannot be easily restored or revoked, it is significant that biometric templates used in biometric applications must be built and stored in a secure way, such that attackers could not be able to falsify biometric data easily even when the templates are negotiated. Researches in this area prove that multi-modal biometric systems perform better than single mode. The fundamental idea of multi-modal biometrics is the integration of the different biometric data. This paper presents a multi-modality system, which integrates a function of fingerprint features and face features. The template matching is done using agglomerative multi-clustering process. Presented Multi-Modality System (MMS) considers fingerprint features including pores, incipient ridges, dots, and ridge edge protrusions and face features including eyebrows, eyes, mouth, nose, ears and face border for matching with template. It consists two feature enrollment modules for acquiring the fingerprints and faces into the system and two feature extractors for obtaining the feature sets of fingerprint and face biometrics. The final identification is then performed using a agglomerative multi-clustering process (AMP) which is fast and effective. We evaluate the effectiveness of our system using real fingerprints and face images from publicly available sources. Experimental results demonstrate that Multi-Modality System proposed here have higher security and matching performance compared to Single-Modality System. © 2005 - 2013 JATIT & LLS. All rights reserved.


Siva C.,Nandha Engineering College | Arumugam S.,Nandha Educational Institutions
ARPN Journal of Engineering and Applied Sciences | Year: 2015

Prefix-hijacking attack offers malicious parties to gain access to untraceable IP addresses in Intenet. Border gateway protocol (BGP) is the dominant inter domain routing protocol used in Internet. In this paper, to defend against Prefix Hijacking Attack on border gateway protocol (BGP), we propose to design a route reliability ranking (RRR) algorithm. The algorithm is used to authenticate the validation of a routing update based on the common facts of the autonomous systems (AS's) in the network. After RRR, an incentive based route selection mechanism is performed to identify the suspicious candidates and avoid routes propagated by them. By simulation results, we show that the proposed algorithm is efficient defensive technique for prefix hijacking attack in Internet. © 2006-2015 Asian Research Publishing Network (ARPN).


Siva C.,Nandha Engineering College | Arumugam S.,Nandha educational institutions
International Review on Computers and Software | Year: 2013

This paper deals with the Fast Reroute technique which is the extension of the Route Reliability Testing (RRT) algorithm. The main issues of the BGP are link failure and untrustworthiness of the link and many more. In a network when the actual link fails the data will not be sent to its destination and which results in congestion and also increases the load of the network. To deal with these issues, in this paper we propose a Fast ReRoute (FRR) Technique in BGP, which helps when the primary link fails by finding an alternate link for the data. The main advantage of this of this proposal is while finding the alternate link the lowest post failure, traffic load across all the links into the account and also it is possible to decrease the data packet loss. By simulation results, we show that the proposed rerouting technique reduces the packet loss and increases the throughput. © 2013 Praise Worthy Prize S.r.l. - All rights reserved.

Loading Nandha Educational Institutions collaborators
Loading Nandha Educational Institutions collaborators