Āvadi, India
Āvadi, India
Time filter
Source Type

Sathyasri B.,VELTECH | Ganesh E.N.,Saveetha Engineering College | Senthil Kumar P.,SKR Engineering College
Asian Journal of Information Technology | Year: 2016

Nature is of course a great and immense source of inspiration for solving hard and complex problems in computer science since it exhibits extremely diverse, dynamic, robust, complex and fascinating phenomenon. It always finds the optimal solution to solve its problem maintaining perfect balance among its components. This is the thrust behind fauna-inspired computing. Fauna inspired computing technique called Monkey Tree Search (MTS) is a meta-heuristic search model. It's usage in solving complex problems in Wireless Mesh Networks (WMNs) embrace the broadcast benefits of a wireless medium in a more flexible manner. Exploiting the broadcast properties and the path diversity of wireless meshes to implement an efficient multipath routing is a challenging factor. With Multiple radios, node's capacity can be improved by transmitting simultaneously using orthogonal channels. Capitalizing and taking advantage over these properties requires efficient channel estimation and assignment to radios technique with effective route discovery mechanism. To address these challenges in this study we have proposed a Fauna inspired computing model that uses a "Probabilistic and Randomly Computed Channel Assignment Algorithm (PRC-CA)" to achieve efficient multipath routing in a multi-radio multi-channel WMN in an interference constrained topology. This approach utilizes adaptive random network coding to analyze conflict and non-conflict channels. It does a meta-heuristic search on all possible non-conflict channels and segments it with respect to the channel capacity for efficient route discovery. All possible routing path information is then processed using PRC-CA with right scheduling and fairness index maintaining Quality of Service. Proposed PRC-CA enables nodes to organize their data transmissions in different time slots with no contention. It dynamically reconfigures the channel assignment as a consequence of a change in the traffic matrix. Simulation results show that PRC-CA converges to a stable state In finite time. Each node gets fair end-to-end throughput across multiple-channels allocating distinct non-overlapping channels to each set of communicating radios increasing network connectivity. Performance evaluation results of Fauna inspired PRC-CA shows promising gains compared to other traditional and existing methods. © Medwell Journals, 2016.

Karthikeyan R.,Veltech | Sivaperumal S.,Vel HIGHTECH SRS Engineering College
International Conference on Circuits, Systems and Signals - Proceedings | Year: 2010

The most essential automation is saving human life, saving their belongings, protecting their properties and making arrangements in a systematic way for automation. This paper deals with the design of a real time Human Limb which acts according to the design configurations of the prescribed datas as per the sensor calibrated. This research proposes to overcome current limitations using three axis optimal inertial sensors combined with an Embedded Controller on which the filter algorithm as well as analog to digital converter is implemented for correcting drift and angular motion through all orientations. The mechanical design will have miniature or hybrid stepper motors with associated mechanical elements to move the limbs on all the axis like up/down ,roll, elevation and azimuth.

Anand S.,VELTECH | Anand S.,Anna University | Saravanababu C.,JSS University | Lakshmi B.S.,VELTECH | Muthusamy V.S.,VELTECH
Asian Journal of Pharmaceutical and Clinical Research | Year: 2016

Objective: Aloe-emodin glycosides (AEG) isolated from Cassia fistula stimulates glucose transport and glycogen storage through a phosphatidylinositol 3 kinase (PI3K)-dependent mechanism in L6 myotubes and inhibits adipocytes differentiation in 3T3L1 adipocytes was previously reported. This study intended to investigate the insulin mimetic effect of AEG by in vivo method. Methods: Male Wistar albino rats were randomly allocated into two groups and fed for a period of 3-week. The high-fat diet group animals were injected with a low dose (35 mg/kg) of streptozotocin to induce Type-2 diabetes. The diabetic rats were then treated with low dose: 10 mg/kg and high dose: 30 mg/kg for a period of 21-day. A dose-dependent decrease in fasting blood glucose, cholesterol, and triglycerides levels on treatment with AEG. The carbohydrate metabolism in diabetic rats appeared to improve due to regulation in hepatic enzymes such as hexokinase, glucose-6-phosphatase, and fructose 1,6-bisphosphatase with a concomitant increase in glycogen content. Results: AEG decreased lipid peroxidation and improved the antioxidant (enzymatic and nonenzymatic) levels in the liver of diabetic rats. Treatment with AEG (30 mg/kg) augmented the phosphorylation of insulin downstream regulators such as insulin receptor beta, insulin receptor substrate 1, PI3K, glucose transporter 4, glycogen synthase kinase 3 beta, and peroxisome proliferator activator receptor gamma in the skeletal muscle tissue of the Type-2 diabetic rats compared to vehicle-treated diabetic rats. Conclusion: The present results suggested that AEG could serve as an interesting candidate in the drug development for the management of diabetes. © 2016, Innovare Academics Sciences Pvt. Ltd. All rights reserved.

Karthikeyan M.,Vel Tech Dr.RR & Dr.SR Technical University | Henry J.,Vel Tech Dr.RR & Dr.SR Technical University | Rajan K.,Veltech
International Journal of Applied Engineering Research | Year: 2015

Blind navigator to navigate the blind and visually impaired people with embedded based system is proposed in this paper. Blind Navigator would detect an object or obstacle and guide the blind with the use of audio instructions and vibrations. The main concept behind the system is to operate when the disabled is in need. The embedded system is dedicated to specific tasks, which can optimize a embedded designed system to reduce the size and cost of the product and increase its reliability and performance. The blind navigator mainly uses camera and Infrared sensor (IR sensor). A microcontroller (or MCU) is a computer-on-a-chip used to control electronic devices. A typical microcontroller contains all the memory and interfaces needed for a simple application. The APR sound system is used for audio instruction and relay controlled vibration motor is used for vibration. The importance of our system is, it is used for both indoor and outdoor navigation. © Research India Publications.

Manimaraboopathy M.,VelTech | Sathish Kumar G.A.,Sri Venkateswara College of Engineering | Natarajan S.,VelTech | Anto Bennet M.,VelTech
Journal of Chemical and Pharmaceutical Sciences | Year: 2015

An efficient hardware solution to perform table lookup is the content addressable memory (CAM). A CAM can be used as a co-processor for the network processing unit to offload the table lookup tasks. Besides the networking equipment, CAMs are also attractive for other key applications such as translation look-aside buffers in virtual memory systems. Ternary content addressable memories (TCAMs) are hardware-based parallel lookup tables with bit-level masking capability. A special logic unit, named Multiple Match Resolver (MMR), is required to resolve the best candidate if more than one words indicate a "match". In the early development of TCAM, the capacity was small, with only a few hundred to several thousand words. The design of MMR was relatively easy, and could be realized using static digital logics. They are attractive for applications such as packet forwarding and classification in network routers. Despite the attractive features of TCAMs, high power consumption is one of the most critical challenges faced by TCAM designers. This work proposes circuit techniques for reducing TCAM power consumption. The main contribution of this work is divided in two parts: (i) reduction in match line (ML) sensing energy, and (ii) static-power reduction techniques. The ML sensing energy is reduced by employing (i) positive-feedback ML sense amplifiers (MLSAs), (ii) low-capacitance comparison logic, and (iii) low-power MLsegmentation techniques. Here this technique was used in CAM memory which is combined with RAM memory to enhance the performance level while searching data from memory. The focus of this work is not on the TCAM memory cell design, but rather, it is on the low-power circuit techniques for multiple match resolution and detection in TCAM. Both digital techniques and mixed-signal techniques are presented and analyzed in details.

Anto Bennet M.,Veltech | Srinath R.,Veltech | Maragathavalli P.,Veltech | Subhashini B.,Veltech
Journal of Theoretical and Applied Information Technology | Year: 2014

Ringing artifacts that appear as spurious signal near sharp transitions in a signal appear as ghosts (or) near edges. Two techniques called LPF and ASLPF is used. LPF is used for only just identifying the artifacts present in the video image. ASLPF (Adaptive Spatial Low Pass Filter) is used to identify the artifacts whether it is present in horizontal (or) vertical position (or) near edges. DCT is applied to each and every pixel in the block; the spatial domain is converted into frequency domain. But now a technique called Adaptive Spatial Low Pass Filter (ASLPF) is used to identify the artifacts and remove it completely. Video is converted into frames and each frame is compressed for removing the artifacts. Finally the reduction of artifacts is shown in PSNR. © 2005 - 2014 JATIT and LLS. All rights reserved.

Bennet M.A.,VELTECH | Krishna R.K.,VELTECH | Babu G.S.,VELTECH | Jayavignesh B.S.,VELTECH
IC-GET 2015 - Proceedings of 2015 Online International Conference on Green Engineering and Technologies | Year: 2015

The proposed forensic algorithm to discriminate between original and forged regions in JPEG images, under the hypothesis that the tampered image presents a double JPEG compression, either aligned (A-DJPG) or nonaligned (NA-DJPG). Unlike previous approaches, the proposed algorithm does not need to manually select a suspect region in order to test the presence or the absence of double compression artifacts. Based on an improved and unified statistical model characterizing the artifacts that appear in the presence of both A-DJPG or NA-DJPG, the proposed algorithm automatically computes a likelihood map indicating the probability for each 8 × 8 discrete cosine transform block of being doubly compressed. The validity of the proposed approach has been assessed by evaluating the performance of a detector based on thresholding the likelihood map, considering different forensic scenarios. The effectiveness of the proposed method is also confirmed by tests carried on realistic tampered images. An interesting property of the proposed Bayesian approach is that it can be easily extended to work with traces left by other kinds of processing. © 2015 IEEE.

Manikandan S.,Veltech | Indiramma P.,Veltech | Rajesh J.,Veltech
Disaster Advances | Year: 2015

This paper presents the results of our studies concerning the implementation and exploitation of Geographical Information System (GIS) dedicated to the support and assistance of decisions requested by drought management. In this study on diverting of surplus water through canals, ponds and check dams in the study area was carried out. The remote sensing data and GIS data was used to identify the drought prone villages in Sivaganga taluk and to generate present landuse, drainage pattern as well as slope and contour. This analysis was carried out for diverting surplus water through proposed canal and pond. The results of the study indicate that if the surplus water from the ponds and streams are diverted to the drought villages in Sivaganga taluk, it will definitely improve the agricultural production due to availability of water in the ponds. The improvements in agricultural production will help to improve the economical condition of the farmers in the region.

Bennet M.A.,VELTECH | Sankaranarayanan S.,VELTECH | Babu G.S.,VELTECH
Journal of Chemical and Pharmaceutical Sciences | Year: 2015

To remove artifacts, two post processing techniques that carry out optimization in the Fourier domain are developed. Decompressed iris images obtained from two public iris image databases are evaluated by visual comparison, two objective image quality assessment metrics, and eight iris recognition methods. To improve the efficiency, sensitivity and reduce the complexity. In existing system use the Principal component analysis will work with different parameters in the image in sequence manner and independent component analysis will work with different parameters in the image in same time, but the output is not reliable for a large set of images, in neural network, for each and every time, the large set of feature for image database get loaded for training process, it will increase the time complexity of the whole system. In this proposed system we use the ICA (Independent Component analysis) and Gabor filter to improve the sensitivity, specificity and reducing time complexity in the existing system. The concept of Gabor filter will analysis the input image in several phases and pick a better one through 500 iterations. A new approach for personal identification based on iris recognition is presented in this paper. The core of this paper details the steps of iris recognition, including image processing, feature extraction and classifier design. This paper is implemented using MATLAB.

Bennet M.A.,VELTECH | Babu G.S.,VELTECH | Natarajan S.,VELTECH
Journal of Chemical and Pharmaceutical Sciences | Year: 2015

The paper presents the enhancement of data protection system for secret communication through common network based on reversible data concealment in encrypted images with reserve room approach. The Blue plane will be chosen for hiding the secret text data. The image is then separated into number of blocks locally and lifting wavelet will be used to detect approximation and detailed coefficients. The approximation part is then encrypted using chaos encryption method. The proposed encryption technique uses the key to encrypt an image and not only enhances the safety of secret carrier information by making the information inaccessible to any intruder having a random method. After image encryption, the data hider will conceal the secret data into the detailed coefficients which are reserved before encryption. Although encryption achieves certain security effects, they make the secret messages unreadable and unnatural or meaningless. This system is still enhanced with encrypt messages using a symmetric key method. This is the reason a new security approach called reversible data hiding arises. The data hiding technique uses the adaptive LSB replacement algorithm for concealing the secret message bits into the encrypted image. In the data extraction module, the secret data will be extracted by using relevant key for choosing the encrypted pixels to extract the data. By using the decryption keys, the image and extracted text data will be extracted. Finally the performance of this proposal in encryption and data hiding will be analyzed based on image and data recovery.

Loading Veltech collaborators
Loading Veltech collaborators