Quaid E Millath Government College for Women

Chennai, India

Quaid E Millath Government College for Women

Chennai, India
SEARCH FILTERS
Time filter
Source Type

Sheshasaayee A.,Quaid E Millath Government College for Women | Jasmine C.,Quaid E Millath Government College for Women
Advances in Intelligent Systems and Computing | Year: 2017

Skeletal maturity is evaluated visually by the comparison of hand radiographs against a standardized reference image atlas. Content-Based Image Retrieval (CBIR) yields a robust solution without the delineation and measurement of bones. This research work comprises of five major phases: Pre-processing, texture feature extraction, Relevance Score (RS) computation, bone age assessment and similarity matching. In the pre-processing phase, noise in the image samples is eliminated by making use of Kernel Fisher Discriminant Analysis (KFDA). Texture Feature extraction is performed using Hybrid Local binary Patterns (HLBP), Epiphysis— Metaphysis Region of interest (ROI) (EMROI) feature extraction is introduced for the pre-processed image. With the aim of evaluating the bone age the Tanner-Whitehouse scheme was utilized to inspect 20 bones. For the computation of the similarity matching between query and input image samples, Discriminative Dictionary Learning (DDL) is introduced in the research work; it shows that DDL performs better when compared to other state-of the-art approaches. © Springer Science+Business Media Singapore 2017.


Sheshasaayee A.,Quaid E Millath Government College for Women | Sumathy D.,Quaid E Millath Government College for Women
Advances in Intelligent Systems and Computing | Year: 2017

Authentication of user in online banking is a major issue in recent days where transactions are carried out using insecure Internet channel. The modern communication medium is very much exposed to various threats. One time password (OTP) is used to prove one’s identity over the wireless channel. The OTP sent to user’s registered mobile number as SMS is most commonly used technique for user authentication. OTP SMS sent normally as plain text is vulnerable to various attacks along the communication channel. To solve this problem, this research aims to provide a technique to transform the OTP using a lightweight cryptography and hide the cipher text using text steganography and send the stego text as SMS to user mobile. Personal Identification Number (PIN) supplied by the bank during registration is used for ciphering. The user needs to know the PIN to read the OTP. The user can proceed with the business transaction, only after this authentication. This process provides end-to-end-encryption of the OTP SMS. © Springer Science+Business Media Singapore 2017.


Sheshasaayee A.,Quaid E Millath Government College for Women | Megala R.,Quaid E Millath Government College for Women
Advances in Intelligent Systems and Computing | Year: 2016

Cloud computing has become a promising technology in many organizations. A huge amount of applications is accessed through Cloud at anytime and anywhere. Hence provisioning the resources at the right time is a challenging task in Cloud computing environment. The Cloud consumers utilize resources using Virtual machines based on a “Pay-as-you-go” basis. For this, the two types of resource provisioning plans were offered by the Cloud providers, namely On-Demand plan and Reservation plan. In common, the reservation scheme has low cost than On-Demand plan. Cloud computing environment provides different types of resource provisioning approaches for minimizing total cost. The good resource provisioning approach should avoid disintegration of resources, lack of resources, disputation of resources, over provisioning and under provisioning. This paper mainly focuses on giving an overview of Cloud computing, resource provisioning and descriptive analysis of various resource provisioning algorithms and techniques. © Springer India 2016.


Sheshasaayee A.,Quaid E Millath Government College for Women | Jose R.,Quaid E Millath Government College for Women
Advances in Intelligent Systems and Computing | Year: 2016

Maintainability of the software is well-thought-out as one of the vital quality that software should possess according to ISO standards. Software Maintainability Assessment (SMA) of aspect oriented software has been a focus of research for some time. Statistical and machine learning approaches have been used for assessing the maintainability of software. Fuzzy logic acts as an alternative approach to SMA of aspect oriented systems. Fuzzy logic has emerged as an important tool for use in a variety of applications that range from control system engineering to the design of automated intelligence systems. Fuzzy logic has the ability to deal with uncertainty and multivalued data and does not rely on historic data. This characteristic of data free model building enhances the prospect from using fuzzy logic for software metrics. The paper presents a fuzzy logic based algorithm for SMA of aspect oriented systems. © Springer India 2016.


Sheshasaayee A.,Quaid E Millath Government College for Women | Angela Deepa V.R.,Quaid E Millath Government College for Women
Advances in Intelligent Systems and Computing | Year: 2016

Construction of powerful computer systems to understand the human languages or natural languages to capture information about various domains demands morphologically featured modeled architected appropriately in a core way. Morphological analysis is a crucial step that plays a predominant role in the field of natural language processing. It includes the study of structure, formation, functional units of the words, identification of morphemes to endeavor the formulation of the rules of the language. Since natural language processing applications like machine translation systems, speech recognition, information retrieval rely on large text data to analyze using linguistic expertise is not viable. To overcome this issue morphological analysis using unsupervised settings is incorporated. It is an alternative procedure that works independently to uncover the morphological structure of the languages. This paper gives a theoretical model to analysis morphologically the structure of the Tamil language in an unsupervised way. © Springer India 2016.


Sheshasaayee A.,Quaid E Millath Government College for Women | Margaret T.A.S.,Quaid E Millath Government College for Women
Advances in Intelligent Systems and Computing | Year: 2016

A service rented or leased from cloud resource providers follows a systematic procedure on working with the resource and returning them in the same accordance. In relevant terms it can be stated like policies that a user need to adhere in order to utilize the resources. These polices are clearly declared on an agreement to define the service level policies to the cloud users. This agreement stances or acts as a legal document between the user and the resource provider. The most important role of an SLA treaty is to provide quality assured service to its users as stated on the agreement. Quality Agreement of negotiation among the contributors helps in defining the Quality of Service necessities of critical resource based progressions. Though, the negotiation process for users is a momentous job predominantly when there are frequent SaaS providers in the Cloud souk. Consequently, this paper proposes a novel briefing on negotiation agenda where a SaaS broker is employed as a resource provider for the customers to achieve the required service efficiently when negotiating with multiple providers. Negotiation framework simplifies intelligent mutual negotiating of SLAs between a SaaS agent and multiple providers to achieve different objectives for different participants. To capitalize on revenue and mend customer’s contentment levels for the broker, the paper also proposes the design of strategies based counter generation techniques. © Springer India 2016.


Wasim Raja M.,Quaid E Millath Government College for Women | Nirmala K.,Quaid E Millath Government College for Women
International Journal of Applied Engineering Research | Year: 2016

The purpose of the research work is to develop the agile project management model for E-Learning using Agile methodologies (ELAM) have proven to be very interesting instructional strategies in Electronics and Engineering education, because they provide practical learning skills that help students understand the basis of electronics. In modern information enabled organization Web Applications development is a most important task. In recent years combination of software architecture and agile development has significant attention. This work we analyzes this combination architecture for online training courses such as C, C++ and JAVA with respect to approaches and agile methods. This work proposed the agile technique development process as an iterative method based on collaboration. © Research India Publications.


Sheshasaayee A.,Quaid E Millath Government College for Women | Jose R.,Quaid E Millath Government College for Women
Procedia Computer Science | Year: 2015

Aspect Oriented Software Development is gaining wide attention because of its key feature modularization. Aspect Oriented paradigm supports the separation of concerns that are scattered over the system which helps in achieving modularity. Aspect Oriented Software Development encompasses software engineering abstractions and complexity at new and different dimensions. So Aspect Oriented Software Development requires models to assess its external quality attributes. The quality attribute maintainability is vital, because maintenance tasks employs major chunk of the total software development cost. The quality, maintainability is indicated using metrics. This paper proposes a framework to build maintainability model for aspect oriented systems using already defined software measures. © 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license.


Poongodi G.,Quaid e Millath Government College for Women | Poongodi G.,Presidency College at Chennai | Kumar R.M.,Presidency College at Chennai | Jayavel R.,Anna University
Ceramics International | Year: 2015

Nanostructured Nd doped ZnO thin films were deposited on glass substrate by a sol-gel spin coating technique. The prepared thin films were subjected to structural, morphological, optical, photocatalytic and antibacterial studies. XRD studies confirm that all the prepared films possess hexagonal wurtzite structure. FESEM images revealed the granular morphology of the films without any crack and the crystallite size decreased with Nd doping. UV-visible transmission spectra show that the substitution of Nd in ZnO leads to band gap reduction. The influence of Nd doping on the photocatalytic activity of ZnO for the degradation of methylene blue dye was studied under visible light illumination. The decrease in grain size and light absorption over an extended visible region by Nd ion doping in ZnO film contributed equally to improve the photocatalytic activity. The optical density measurement of the films against Escherichia coli and Staphylococcus aureus bacteria showed better bactericidal activity at a higher level of Nd doping in ZnO. © 2014 Elsevier Ltd and Techna Group S.r.l.


Padmaja S.,Bharathiar University | Sheshasaayee A.,Quaid e Millath Government College for women
International Journal of Engineering and Technology | Year: 2016

The proposed work does an improved K-means clustering algorithm for identifying internet user behaviour. Web data analysis includes the transformation and interpretation of web log data find out the information, patterns and knowledge discovery. The efficiency of the algorithm is analyzed by considering certain parameters. The parameters are date, time, S_id, CS_method, C_IP, User_agent and time taken. The research done by using more than 2 years of real data set collected from two different group of institutions web server.this dataset provides a better analysis of Log data to identify internet user behaviour.

Loading Quaid E Millath Government College for Women collaborators
Loading Quaid E Millath Government College for Women collaborators