- N. Kavitha
- S. Kopperundevi
- K. Manju
- M. Lavanya
- G. Aishwarya
- V. Vaithiyanathan
- S. Saravanan
- M. Anil Kumar
- Adyasa Pani
- D. Suresh
- M. Seenuvasan
- J. Jaishree
- K. Sathiyakumari
- A. Sabia Kumari
- K. S. Sangamithirai
- M. Sudha
- N. Jeevitha
- D. Sangeetha
- K. Kayel Vizhi
- Lakshmi Sharma
- R. Meera
- P. Janaki
- Sanjan S. Malagi
- Rachana Radhakrishnan
- R. Monisha
- S. Arpitha
- A. Kavya
- G. Likitha
- S. Likitha
- P. Maltesh
- B. Nethravathi
- Biometrics and Bioinformatics
- Indian Journal of Science and Technology
- Research Journal of Engineering and Technology
- Software Engineering
- Digital Image Processing
- Automation and Autonomous Systems
- HuSS: International Journal of Research in Humanities and Social Sciences
- International Journal of Advanced Networking and Applications
- Networking and Communication Engineering
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Keerthana, S.
- Blood Leakage Monitoring System for the Applications in Haemodialysis Therapy by using IEEE 802.15.4 Standard
Authors
Source
Biometrics and Bioinformatics, Vol 8, No 7 (2016), Pagination: 194-196Abstract
The purpose of this paper is to design, fabricate, and characterize of a bracelet monitoring device for blood leakage detection during the haemodialysis treatment. The design includes a photo interrupter, a Bluetooth 4 wireless module, power, and alert components. The validation results show that it only needs a very small amount of blood (0.01 ml), and takes 1.6 s to detect a blood leakage. Furthermore, the lifetime of the battery on this device is longer than the currently available commercial products. It can continuously give out an alert for 18-h long and continuously monitor up to 41 h. In addition, the transmission range of Bluetooth wireless signal can be extended to 23 m. As long as the patients wear this bracelet blood leakage detector during the haemodialysis therapy and affix the absorbent material onto the junction of fistula, any blood leakage can be detected. As the absorbent material is placed at the light sensing position of the photo interrupter, which causes the received light intensity to change during blood leakage. Once a blood leakage occurs, the absorbent material absorbs the blood due to the capillary action and triggers the alarm system. A warning light will also be activated, and a leakage occurrence is transmitted to the healthcare stations alarming healthcare workers via the Bluetooth wireless. The healthcare workers can take appropriate action immediately to prevent any risks to the patients during haemodialysis therapy. The proposed blood leakage monitoring system can improve the current medical approach for the haemodialysis therapy.
Keywords
Haemodialysis, Blood Leakage Detection, Photo Interrupter, Bluetooth 4.0.- Secure Aware Communication using Novel End To End (ETE) Cipher Algorithm
Authors
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 Information and Communication Technology, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
This article aims to bring a novel method in cipher algorithm for secure aware communication. This paper proposes a unique scheme and ensures higher security during encryption and decryption process. The Key (ki) is generated for every Plain text pi. Plain text and key are converted to their equivalent ASCII values, by which the scrambled Cipher text (ci) is generated by implementing some of the concepts of the substitution techniques. During Decryption, the corresponding (ki) are used to recover the Plain text pi. It makes sure the need to send the full length key along with the cipher text for decryption process. The suggested method assures the greater security during transmission. There is a practical hindrance in guessing the Number of rounds (N) and the number of bits n shifted, by Cryptanalyst. This method will be more suitable for analyzing the discover key (ki) values from attempting Brute Force technique.Keywords
Ciper Algorithms, Cryptanalyst, Decryption, Encryption, Secure Communication- Dynamic and Stability Criteria for a Continuous Bioaccumulation of Reactive Red C2G 29 Dye using Penicillium chrysogenum MTCC 6477
Authors
1 Department of Biotechnology, Madha Engineering College, Chennai, IN
Source
Research Journal of Engineering and Technology, Vol 2, No 3 (2011), Pagination: 167-171Abstract
The combined effects of initial sucrose and initial Reactive Red C2G 29 dye concentrations on the specific growth rate and dye bioaccumulation efficiency of Penicillium chrysogenum MTCC 6477 was determined at pH 5.0. The highest growth rate of 0.115 h-1 was obtained at an initial sucrose concentration of 15 g/L in absence of dye. For each constant sucrose concentration chosen between 5 and 15 g/L with an increase in initial dye concentration up to 500 mg/L under pH 5.0 resulted in a decrease in percentage uptake of dye and more over all dye concentration tested inhibited the growth of Penicillium chrysogenum. On the other hand at each constant dye concentration studied, both the specific growth rate and uptake yield enhanced with raising sucrose concentration up to15 g/L with pH 5.0, the maximum uptake yield of 96.67 % was observed in 15g/L sucrose and 50 mg/L dye containing growth medium at pH 5.0. To check the stability of this bioaccumulation process a continuous bioaccumulation system was developed and it shows monotonic damping oscillation where the dye uptake concentration approaches equilibrium.Keywords
Penicillium chrysogenum, Mycelium, Bioaccumulation, Stability, Reactive Red.- Online Review Mining for Forecasting Sales
Authors
1 Department of BCA, PSGR Krishnammal College for Women, Coimbatore
2 Department of BCA, PSGR Krishnammal College for Women, Coimbatore, IN
Source
Software Engineering, Vol 9, No 1 (2017), Pagination: 10-12Abstract
The growing popularity of online product review forums invites people to express opinions and sentiments toward the products .It gives the knowledge about the product as well as sentiment of people towards the product. These online reviews are very important for forecasting the sales performance of product. In this paper, we discuss the online review mining techniques in movie domain. Sentiment PLSA which is responsible for finding hidden sentiment factors in the reviews and ARSA model used to predict sales performance. An Autoregressive Sentiment and Quality Aware model (ARSQA) also in consideration for to build the quality for predicting sales performance. We propose clustering and classification based algorithm for sentiment analysis.
Keywords
Online Review Mining, Text Mining, Reviews, S-PLSA, ARSA, Clustering, Classification.- A Brief Study of Image Processing and Techniques
Authors
1 PSGR Krishnammal College for Women, Coimbatore, IN
2 PSGR Krishnammal College for Women, Coimbatore, IN
Source
Digital Image Processing, Vol 9, No 1 (2017), Pagination: 11-13Abstract
The development of digital image processing is closely tied to the development of the digital computers. Because of its nature, digital image requires lot of storage space and their processing needs so much computational power that progress in the field of digital image processing had been highly dependent on the development of modern digital computer which came only in 1940s. This paper is a complete review of various image processing techniques and large number of related application in diverse disciplines, including medical, biometrics, moving object tracking, vehicle detection & monitoring, document analysis and retrieval, outdoor surveillance, remote sensing and Traffic queue detection algorithm for processing various real time image processing challenges. Techniques discussed segmentation, edge detection and corner detection also application areas and their future scope are explained. The intension of this paper is useful to researchers and practitioners interested in real time image processing.
Keywords
Image Processing, Segmentation, Edge Detection, Corner Detection, SBGFRLS and etc.- Transreceiving Zigbee Communication and Preventing Gremlin in Ships
Authors
1 Department of Electronics and Communication Engineering, Sri Guru Institute of Technology, Coimbatore, Tamilnadu, IN
Source
Automation and Autonomous Systems, Vol 10, No 2 (2018), Pagination: 33-36Abstract
Ticket checking process in ships has become very difficult. Ships are one of the areas which have a strong potential to benefit from Radio Frequency Identification (RFID) and Zigbee. The most common loopholes experienced in ships are tracking the passengers in ships and getting information. Sometimes passengers do not buy tickets but travels and some passengers gets ticket for short distances and travel for the long distances. So for providing a better and secure system to the passengers, we have proposed a design of passenger tracing and handling system using smart RFID tags and zigbee. The proposed designed system has a prototype at two locations having both check-in and check-out processes. A more secured algorithm is used for generating tags that are given to the passengers as a ticket with the details of passenger which is also stored in a computer as well. Here, GPS is to continuously track the passenger. RFID readers in the check-out areas facilitate to track the passenger with the help of GPS. . The passenger’s real time position is tracked and information is stored using Zigbee. The same ID can be used while departing at check-out gate. The system provided ensures less consumption of time, security.
Keywords
RFID, ZIGBEE, GPS, Computer System, Ship Transportation.- Two-Dictionary Approach of Audio Watermarking with Image Embedded
Authors
Source
Digital Image Processing, Vol 10, No 8 (2018), Pagination: 150-152Abstract
An audio watermarking technique using spikegram is introduced. Here spikegram is a representation of an audio signal. Two techniques – FFT (Fast Fourier Transform) and Angular Spectrum are used to produce the spikegram. An efficient embedding technique known as two-dictionary approach is used which considers signs and phases of gammatones in the audio signal to increase the effectiveness. In addition to spikegram an image with key is embedded to further maximize the security. Proposed technique’s efficiency is improved and is shown via several simulation results executed in MATLAB. Several parameters are measured such as MSE (Mean Square Error), PSNR (Peak Signal to Noise Ratio) for both the input audio signal and the Watermarked signal to mathematically study the variations in the signals. The embedded signal and image are retrieved from Watermarked signal so as to prove the Copyrights.
Keywords
Spikegram, Gammatone Filter, Angular Spectrum, Watermarking.- Consumers' Satisfaction towards Branded Fast Food Restaurants in Erode City
Authors
1 Department of Commerce (B & I), Vellalar College for Women (Autonomous), Erode – 638012, Tamil Nadu, IN
2 Department of Commerce, Vellalar College for Women(Autonomous), Erode - 638012, Tamil Nadu, IN
Source
HuSS: International Journal of Research in Humanities and Social Sciences, Vol 6, No 2 (2019), Pagination: 80-83Abstract
The restaurant industry being the largest service sector has a significant role in Indian economy. In today’s fastest walk of the day, fast food restaurant holds a pivotal position in restaurant industry. Among the various fast food restaurants in Erode City, the perception of consumers differs between branded and non-branded fast food restaurants. The growth in population, changing culture, trends in fashion, innovation in food items have led to the growth of fast food restaurants. In this aspect, the present research probes into the level of consumers’ satisfaction towards branded fast food restaurants by employing Chi-square Test. Further, the problems faced in utilising the services of fast food restaurant is analyzed with Weighted Average Ranking. The result showed that gender, age and monthly family income have significant association with the level of satisfaction towards fast food restaurant and more number of respondents faced the problem of consuming high fat content food items.Keywords
Problems, Restaurant, Satisfaction and Service Sector.References
- Rauf AA, Butt I. Consumers perceptions of foreign fast food restaurants in an emerging market. International Journal of Leisure and Tourism Marketing. 2012; 3(1):40–70. https://doi.org/10.1504/IJLTM.2012.046445
- Canny IU. Measuring the mediating role of dining experience attributes on customer satisfaction and its impact on behavioural intentions on casual dining restaurant in Jakarta. International Journal of Innovation Management and Technology. 2014; 5(1):25–9. https://doi.org/10.7763/IJIMT.2014.V5.480
- Manikandan et al. Customer satisfaction towards Domino’s Pizza in Chennai - An empirical study. EXCEL International Journal of Multidisciplinary Management Studies. 2015; 5(6):187–92.
- Agu GA, Kalu IN, and Agaeze C. Fast food restaurant image and sustainable customer loyalty in a period of economic recession. International Journal of Social Sciences and Humanities Reviews. 2017 Aug; 7(2):1–10.
- Anitharaj MS. Global fast food retailing in India - A way ahead. IOSR Journal of Business and Management. 2018; 20(2):38–43.
- Content Modelling Intelligence System Based on Automatic Text Summarization
Authors
1 Department of Information Science & Engineering, JSS ACADEMY OF TECHNICAL EDUCATION, Bangalore-560060, IN
Source
International Journal of Advanced Networking and Applications, Vol 11, No 6 (2020), Pagination: 4458-4467Abstract
Nowadays, within the period of having huge information, literary information is rapidly developing and is accessible in numerous diverse languages. Often due to time limitations, we are not able to devour all the information that is accessible. With the fast-paced world, it is troublesome to peruse all the textual content. Therefore, the necessity for content summarization comes to the spotlight. It is in this manner we are able to summarize the content so that it gets easier to ingest the data, keeping up the substance, and understanding the data. A few content summarization approaches have been presented in the past for a long time for English and some other European languages but there are startlingly few methods that can be found for the local languages of India. This paper presents a study of extractive content summarization methods for multiple Indian and international languages like Hindi, Kannada, Telugu, Marathi, German, French, etc. This paper proposes a system of Optical Character Recognition (OCR) which extracts the content from the uploaded picture. The main motive of the OCR is the creation of editable records from documents that already exist or picture files. The Optical Character Recognition also works on sentence discovery to protect a document’s structure. The paper also presents a strategy for programmed sentence extraction utilizing the Text-rank algorithm. This approach relegates scores to the sentences by weighting the highlights like term frequency, word events, and noun weight and expressions. The outcome of this work demonstrates that our approach gives more accuracy and also provides text-to-speech with the interpretation of one language to another while maintaining coherence and accomplishes superior results when compared with existing methods.Keywords
Natural Language Processing, Optical-Character Recognition, Summarization, Text-Rank Algorithm, Text-to-Speech.References
- Dr. D V Ashoka, Sanjay B Ankali, “Detection Architecture of Application Layer DDoS Attack for Internet”, International Journal of Advanced Networking and Applications (2011).
- Dr. Annapurna P Patil, Shivam Dalmia, Syed Abu Ayub Ansari, Tanay Aul, Varun Bhatnagar, “Automatic Text Summarizer “, International Conference on Advances in Computing, Communications and Informatics, IEEE (2014).
- Narendra Andhale, L.A.Bewoor, “ An Overview of Text Summarization Techniques ” ICACCI (2016).
- Prakhar Sethi, Sameer Sonawane, Saumitra Khanwalker, R. B. Keskar, “Automatic Text Summarization of News Articles “, International Conference on Big Data, IoT and Data Science (BID) Vishwakarma Institute of Technology, Pune, Dec 20-22 IEEE (2017).
- Prachi Shah, Nikitha P. Desai “A Survey of Automatic Text Summarization Techniques for Indian and Foreign Languages “, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) (2016).
- ZHANG Pei-Ying, LI Cun-he, “Automatic text summarization based on sentence clustering and extraction “, Institute of Electrical and Electronics Engineers IEEE (2009).
- R. Chetan and D. V. Ashoka, “Data mining-based network intrusion detection system: A database centric approach”, 2012 International Conference on Computer Communication and Informatics, Coimbatore, pp. 1-6, doi: 10.1109/ICCCI.2012.6158816 (2012)
- D. Jasmine Guna Sundari, D. Sundar, “A Study of Various Text Mining Techniques” International Journal of Advanced Networking and Applications (IJANA) Volume: 08, Issue: 05 Pages: 82-85 Special Issue, pp:8285(2017).
- Teddy Montoro, Abdul Muis Sobri, Wendi Usino, “Optical Character Recognition (OCR) Performance in Server-based Mobile Environment “, International Conference on Advanced Computer Science Applications and Technologies (2013).
- Dr T. Santha, M .Abhayadev “Content Based Image Retrieval Public and Private Search Engines”, Special Issue Published in Int. Jnl. Of Advanced Networking and Applications (IJANA) pp:98-102(2015)
- Akash Shekar, Jeevanantham.P, “Question and Answer Extraction Using NLP”, Special Issue Published in Int. Jnl. Of Advanced Networking and Applications (IJANA)197-199
- Study on Implementation of Smart City Using IOT
Authors
1 Department of Information Science and Engineering, JSS Academy Of Technical Education, Bangalore, Karnataka, IN