Milton Joe M.,St Jeromes College |
Ramakrishan B.,Sthindu College
Journal of Emerging Technologies in Web Intelligence | Year: 2014
Online Social Network (ONS) is the easiest platform to connect with one another. There are many Online Social Networking websites exist to bring up the reliable communication among the users. Facebook, Orkut, Google+, Twitter, MySpace, etc are some of the Online Social Networking websites. All the social networking websites provide the interface formally known as profile, to share their willingness with others. The users of these websites could share their feelings, photos, text file and even whatever the user wishes to provide. All the Online Social Networking websites bring the friends, family members and relatives together to share their desires in a fast track manner, however still it lacks in security module. The shared photos and information are freely open access to all the users of social networking websites. When the photos are freely available, the unauthorized users can easily access the photos of others and download it. Once the photo is downloaded, that image can be misused widely such as creation of fake profile and the photo can be sold to other nuisance websites. This kind of data hacking activities in online social networks even leads the life to death. In this paper, data hacking in online social network is considered and a novel mechanism is presented to prevent the data hacking. © 2014 Academy Publisher.
Thanammal K.K.,Sthindu College
International Journal of Bio-Science and Bio-Technology | Year: 2015
This paper proposes an automatic lung lobe segmentation method in a supervised way. The lung image is given as input and the lung image is segmented using iterative threshold method. Then fissure information is enhanced using log supportive filter. Then Fissure locations are extracted using Vector training and matching process. Finally the lung lobes are segmented and marked as individual lobes. The main modules of this proposed method are Iterative threshold based lung segmentation, Fissure enhancement, fissure detection and Lung lobe segmentation. This proposed method can be used to find the missing fissures and unclear fissures also. This proposed method is working based on training of fissure information and detection is done according to the trained vectors. The proposed method segments the lung lobes with high performance and high speed. © 2015 SERSC.
Thanammal K.K.,Sthindu College
Biosciences Biotechnology Research Asia | Year: 2014
Detection of edge is a terminology in image processing and computer vision particularly in the areas of feature detection and extraction to refer to the algorithms which aims at identifying points in a digital image at which the image brightness changes sharply or more formally has discontinuities. Edge is a basic feature of image. The image edges include rich information that is very significant for obtaining the image characteristics by object recognition. Edge detection refers to the process of identifying and locating sharp discontinuities in an image. So, edge detection is a vital step in image analysis and it is the key of solving many complex problems. This paper, describes edge detection algorithms for image segmentation using various computing approaches which have got great fruits. Experimental results prove that Canny operator is better than Prewitt and Sobel for the selected image. Subjective and Objective methods are used to evaluate the different edge operators. The performance of Canny, Sobel and Prewitt Edge Detection are evaluated for detection of edges in digital images.
Deva Jayanthi D.,Womens Christian College |
Maniyan C.G.,Environmental Assessment Division |
Perumal S.,Sthindu College
Radiation Physics and Chemistry | Year: 2011
Radiation exposure and effective dose received through two routes of exposure, viz. external and internal, via inhalation, by residents of 10 villages belonging to Natural High Background Radiation Areas (NHBRA) of coastal regions of Kanyakumari District and Tamil Nadu in India were studied. While the indoor gamma radiation levels were monitored using Thermo Luminescent Dosimeters (TLDs), the indoor radon and thoron gas concentrations were measured using twin chamber dosimeters employing Solid State Nuclear Track Detectors (SSNTDs, LR-115-II). The average total annual effective dose was estimated and found to be varying from 2.59 to 8.76 mSv. © 2011 Elsevier Ltd.
Ramakrishnan B.,Sthindu College |
Selvi M.,Sthindu College |
Nishanth R.B.,Velammal Engineering College
Wireless Networks | Year: 2015
To move packets among the vehicles mobility pattern of vehicles in a vehicular network performs an imperative factor for creating competent routing protocol. To reproduce the movement features of vehicles in VANET is the main purpose of the mobility model. Manhattan mobility model is conversed by a lot of researchers. Merely very limited research study is prepared on highway and freeway mobility models. In this document Cluster scheme, different routing protocols are used to the freeway mobility based vehicular architecture. The Ns2.34 simulation effect illustrates the effort of cluster scheme over different protocols and standard 802.11p. The competence of the routing protocols in the vehicular communication by means of freeway movement pattern is estimated by different network parameters. © 2015 Springer Science+Business Media New York
Raj K.J.,Sthindu College
Ecology, Environment and Conservation | Year: 2012
The paper reviews the studies and reports on climate change and its effect on biodiversity and subsequent economic loss. Copyright © EM International.
Mohamed Sathik M.,Sadakathullah Appa College |
Sujatha S.S.,Sthindu College
2011 International Conference on Computer, Communication and Electrical Technology, ICCCET 2011 | Year: 2011
Digital watermarking is an effective and popular technique for discouraging illegal copying and distribution of copyrighted digital image information, which in turn provides an alternative solution for image authentication. This paper proposes an innovative watermarking scheme in which some pixels are randomly selected from original image, so that all of them have a valid 3x3 neighborhoods. A binary sequence is constructed from those pixels by comparing them against average values of their neighborhoods. The binary sequence is then converted into a watermark pattern in the form of a Toeplitz matrix to improve security of watermarking process and is then embedded within the host image. The operation of embedding and extraction of watermark is done in high frequency domain of Discrete Wavelet Transform. The performance of the proposed algorithm is evaluated against some of the incidental image processing attacks. Finally computer simulations of the proposed method are compared with the recent algorithm that had been proposed in . © 2011 IEEE.
Sujatha S.S.,Sthindu College |
Mohamed Sathik M.,Sadakathullah Appa College
2010 IEEE International Conference on Communication Control and Computing Technologies, ICCCCT 2010 | Year: 2010
The central idea of this paper is to propose an innovative watermarking scheme for digital image authentication which withstands common image processing attacks. Some pixels are randomly selected from original image, so that all of them have a valid 3x3 neighborhoods. A binary sequence is constructed from those pixels by comparing them against average values of neighborhoods. The binary sequence is then converted into a watermark pattern in the form of a Hankel matrix to improve security of watermarking process and is then embedded within the host image. The operation of embedding and extraction of watermark is done in high frequency domain of Discrete Wavelet Transform since small modifications in this domain are not perceived by human eyes. This watermarking scheme deals with the extraction of the watermark information in the absence of original image, hence the blind scheme was obtained. ©2010 IEEE.
Mohamed Sathik M.M.,Sadakathullah Appa College |
Kalai Selvi A.K.,Sthindu College
2010 2nd International Conference on Computing, Communication and Networking Technologies, ICCCNT 2010 | Year: 2010
In recent years, there has been increasing trend for multimedia applications to use delegate service providers for content distributions. These delegate services have brought new challenges to the protection of multimedia content confidentiality. Encryption can be used to hide information from unauthorized individuals, either in transit or in storage. This technique transforms the content into unintelligible and unviewable format. This paper proposes data encryption and decryption process using secret sharing scheme. According to this process there are two levels of encryption. The first level, generates the random polynomial of degree (t-1) , where t is a threshold value. The second level, evaluates the mean value of the polynomial's coefficients. The mean value is added with the ASCII value of the plain text to get the cipher text. Next the secret value of the polynomial for participant's ID values is generated. This secret is shared among 'n' participants. Each one gets their share. The participants reconstruct the polynomial from the shares. Then the cipher text is decrypted to get the original plain text. The comparison of the proposed method with Samier Secret Sharing method reveals that the size of the share is smaller and the protection level is high. ©2010 IEEE.
Jenila G.J.,Sthindu College |
Nair C.R.K.,Sthindu College
Asian Journal of Microbiology, Biotechnology and Environmental Sciences | Year: 2012
The Present study was carried out for the analysis of microbes in different body parts of Tilapia (Oreochromis mossambicus) during the period of January 2008 to April 2008. Mullai river orginates from Kallemalai and it joins with the Tamaraparani river. The river gets water in the rainy season and becomes dry in the summer season. The predominant species of fish in the riverine system is Tilapia (Oreochromis mossambicus). It has its maximum production of four tones/year with regards to the present study that the total heterotrophic bacterial population of the fish affects the major production. The bacterial population was high in the operculum and fins that is Pseudomonas species (25x105cfu/mL) and E-coli species (15×105cfu/mL). In the fin the maximum count noticed is the Pseudomonas species (40x105cfu/mL) and E-coli (20×105cfu/mL). The bacteria populated more in fins and operculum due to the presence of bacteria in water. © Global Science Publications.