Durai S.,Rmd Engineering College |
Parthasarathy R.,Rmd Engineering College
Journal of Computational and Theoretical Nanoscience | Year: 2017
System-on-chip (SoC) face major problem due to vulnerability of hack. The hacker target the cryptographic IP block in the architecture of SoC. However, PUF test wrapper provides the security for individual IP core. The individual IP core protection plays major problem in PUF test. We propose a novel method to protect the IP core with QFT-PUF authentication mechanism. QFT-PUF implement in PSOC-FPGA. The mechanism reduces the area and memory in architecture. The proposed method of key generation and their handling process drive from Quantum Fourier Transform. From the validation of QFT-PUF, Fault Acceptance Rate (FAR) increases then the Fault Rejection Rate (FRR). © 2017 American Scientific Publishers.
Padma P.,Sri Sai Ram Engineering College |
Srinivasan S.,RMD Engineering College
Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016 | Year: 2017
The study focuses on presenting a review on the various biometric authentication mechanisms in the cloud computing environment. Cloud Computing is used to deliver computing Services over the internet and is used to store data in cloud servers. Due to the sharing of services, privacy and data security have become a major area of concern in cloud computing. The cloud service providers store and maintain client data across data centers which provides threats of data leaks. It is found that several mechanisms have emphasized on data security and in the ensuing process have ignored privacy. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data residing in cloud and there have been instances when the password based authentication has been manipulated to gain access into the cloud data. Multifactor authentication is a methodology that uses two or more authentication techniques along with the password but it still does not provide fool-proof data security. Since the conventional methods such as passwords do not serve the purpose of data security, research works focused on biometric traits were as a means of user authentication in cloud services. The biometric authentication is broadly classified into physical based biometric authentication and behavioral based biometric authentication. This paper presents an overview of those methods and analyzes their merits and demerits. The study has been structured to analyze the prevailing biometric authentication mechanisms to gain insights in developing a new authentication model that is more efficient than the existing methods.
Rajan J.R.,Jerusalem College of Engineering |
Chilambu Chelvan C.,RMD Engineering College
Proceedings of the 2013 International Conference on Green Computing, Communication and Conservation of Energy, ICGCE 2013 | Year: 2013
With the huge growth in the volume of data today, there is an enhanced need to extract meaningful information from the data. Data mining contributes towards this and finds its application across various diverse domains such as in information technology, retail, stock markets, banking, and healthcare among others. The increase in population coupled with the growth in diseases has necessitated the inclusion of data mining in medical diagnosis to extract the underlying pattern. Of these, cancer is one of the widespread diseases that claim over 7 million lives every year and lung cancer accounts for 18% of these mortalities. Earlier researches and case studies indicate that the survival rate of the patients suffering from cancer is higher when the disease is diagnosed at an early stage. Lung cancer, a disease highly dependent on historical data for early diagnosis, has influenced researchers to pursue the data mining techniques for the pre-diagnosis process. The five year survival rate increases to 70% with the early detection at stage 1, when the tumor has not yet spread. Existing medical techniques like X-Ray, Computed Tomography (CT) scan, sputum cytology analysis and other imaging techniques not only require complex equipment and high cost but is also proven to be efficient only in stage 4, when the tumor has metastasized to other parts of the body. The proposed system involves the development of a data mining tool that will help in the classification of patients into the category that could potentially test positive for lung cancer in stage 1. Based on the pre-diagnosis results from the tool, the doctor can perform the diagnosis for the confirmation of tumor in the patient and initiate the treatment at an early stage thereby increasing the survival rate. © 2013 IEEE.
Thamizharasan S.,Surya Group of Institutions |
Baskaran J.,Adhiparasakthi Engineering College |
Ramkumar S.,RMD Engineering College |
Jeevananthan S.,Pondicherry Engineering College
International Journal of Electrical Power and Energy Systems | Year: 2013
This paper attempts to construct a new hybrid multilevel dc-link inverter (MLDCLI) topology with a focus to synthesize a higher quality sinusoidal output voltage. The idea emphasizes the need to reduce the switch count considerably and thereby claim its superiority over the existing multilevel inverter (MLI) configurations. The structure incorporates a new module along with a differently used H-bridge that facilitates the increase in levels with much lower switch counts. The proposed dual bridge MLDCLI (DBMLDCLI) is evaluated using phase disposition (PD) multi-carrier pulse width modulation (MC-PWM) strategy in a filed programmable gate array (FPGA) platform. The MATLAB/System generator based simulation results validated through FPGA based prototype for a typical output level exhibit the drastic enhancement in the quality of output voltage. The total harmonic distortion (THD) obtained using a harmonic spectrum reveals the mitigation of the frequency components of output voltage other than the fundamental and paves the way to open a new avenue for nurturing innovative applications in this domain. © 2012 Elsevier Ltd. All rights reserved.
Paulraj D.,Rmd Engineering College |
Swamynathan S.,Anna University |
Madhaiyan M.,TeleData Technology Solutions Ltd
Enterprise Information Systems | Year: 2012
Web Service composition has become indispensable as a single web service cannot satisfy complex functional requirements. Composition of services has received much interest to support business-to-business (B2B) or enterprise application integration. An important component of the service composition is the discovery of relevant services. In Semantic Web Services (SWS), service discovery is generally achieved by using service profile of Ontology Web Languages for Services (OWL-S). The profile of the service is a derived and concise description but not a functional part of the service. The information contained in the service profile is sufficient for atomic service discovery, but it is not sufficient for the discovery of composite semantic web services (CSWS). The purpose of this article is two-fold: first to prove that the process model is a better choice than the service profile for service discovery. Second, to facilitate the composition of inter-organisational CSWS by proposing a new composition method which uses process ontology. The proposed service composition approach uses an algorithm which performs a fine grained match at the level of atomic process rather than at the level of the entire service in a composite semantic web service. Many works carried out in this area have proposed solutions only for the composition of atomic services and this article proposes a solution for the composition of composite semantic web services. © 2012 Copyright Taylor and Francis Group, LLC.
Vigilson Prem M.,Rmd Engineering College |
Swamynathan S.,Anna University
WSEAS Transactions on Information Science and Applications | Year: 2011
Addressing health disorders at the early stage during mass casualty is one of the important issues to be thrown light nowadays. If mass casualty occurs in remote locations where proper health care equipments or analysis of medical information is not available, a special team must be appointed to monitor and control it. When an emergency occurs, especially in mass casualty incidents, lots of victims need medical attention. It is obvious that the faster and accurate the acquisition and analysis of data, the more effective the answer could be given. That is, the needs will be attended as early as possible and the affected population could be reduced. The common point in all cases is the analysis of information. Around it lies, the importance of responding to the emergency. Mobile agents play a vital role in communication between different remote locations. If the special team needs information from these locations or the remotely located medical officers needs information from the special team, mobile agents are useful. This paper discusses the use of mobile agent technology as an enabler of open distributed e-Health applications. More precisely, it describes the experiences based on this technology: concerning emergency scenarios.
Balaji L.,Anna University |
Thyagharajan K.K.,RMD Engineering College
International Journal of Automation and Computing | Year: 2014
Design of video encoders involves implementation of fast mode decision (FMD) algorithm to reduce computation complexity while maintaining the performance of the coding. Although H.264/scalable video coding (SVC) achieves high scalability and coding efficiency, it also has high complexity in implementing its exhaustive computation. In this paper, a novel algorithm is proposed to reduce the redundant candidate modes by making use of the correlation among layers. A desired mode list is created based on the probability to be the best mode for each block in base layer and a candidate mode selection in the enhancement layer by the correlations of modes among reference frame and current frame. Our algorithm is implemented in joint scalable video model (JSVM) 9.19.15 reference software and the performance is evaluated based on the average encoding time, peak signal to noise ration (PSNR) and bit rate. The experimental results show 41.89% improvement in encoding time with minimal loss of 0.02 dB in PSNR and 0.05% increase in bit rate. © 2014, Institute of Automation, Chinese Academy of Sciences and Springer-Verlag Berlin Heidelberg.
Srilakshmi Ch.,Rmd Engineering College
2014 International Conference on Science Engineering and Management Research, ICSEMR 2014 | Year: 2014
A fundamental challenge in the design of Wireless Sensor Network (WSN) is to enhance the network lifetime. This paper proposes a genetic replacement algorithm to enhance the lifetime of a wireless sensor network when some of the sensor nodes shut down. The algorithm is based on the grade diffusion algorithm combined with the genetic algorithm. The algorithm results in fewer replacements of sensor nodes and more reused routing paths. In the simulation, the results show that the proposed algorithm increases the number of active nodes, reduces the rate of data loss and reduces the rate of energy consumption. © 2014 IEEE.
Balaramesh P.,RMK Engineering College |
Venkatesh P.,Pachaiyappas College |
Rekha S.,RMD Engineering College
Surface Engineering | Year: 2014
In this study, the effect of imidazole and benzotriazole as primary stabilisers in saccharose and xylitol based copper electroless baths were studied. Copper methane sulphate was used as the complexing agent instead of copper sulphate and para formaldehyde was used as the reducing agent in the bath. The surface morphologies of copper deposits were characterised by SEM, AFM and XRD studies. The electrochemical characteristics were studied by cyclic voltametry to understand the role of the stabilisers in electroless deposition. In the saccharose bath, the imidazole and benzotriazole acted as inhibitors and best deposition was obtained at pH of 12·75. Benzotriazole afforded smoother and shiner deposits than imidazole. In xylitol bath, the stabilizers acted as accelerators and optimum deposition occurred at a pH of 13·25. © 2014 Institute of Materials, Minerals and Mining.
Sindhuja B.,RMD Engineering College
International Conference on Control, Instrumentation, Energy and Communication, CIEC 2014 | Year: 2014
Energy resources in our modern fast paced technoworld is fast depleting. Hence a renewable energy source is much required at the moment. Thus researching new and innovative systems in renewable energy sector is an indispensable prerequisite. This paper attempts to propose a model for generating clean energy by harnessing the power of wind in moving trains. The scope of this paper concentrates on a new approach to harvest wind power by installing a conical shaped ducted turbines on the roof of the trains which are coupled to a generating unit. Another auxiliary system is also installed that sucks in air through a tunnel like shroud and compresses it. The compressed air is stored in pressure conduits or an agitation tank that maintains the turbine speed at the desirable rate during fluctuations in train speed or wind potential at the inlet turbine. To complement this approach, CFD simulated results are used to investigate the design profile of the proposed model. The conclusion thus obtained proves the efficiency of the system to harness large scale power in a sustainable manner. © 2014 IEEE.