- R. Sathish
- K. Natarajan
- Syed Akram
- J. J. Lohith
- B. R. Shambhavi
- M. Indiramma
- S. Sujatha
- R. Anita
- P. Selvan
- K. Rajakumar
- A. Krishnamoorthi
- P. Parthiban
- J. Vaideeswaran
- S. Ravichandran
- L. Matsyagiri
- V. Balamurugan
- K. Senthamarai Kannan
- M. Mohanapriya
- A. Sheik Abdullah
- P. Karthikeyan
- M. Venkatesh
- M. Sundarapandian
- S. Venkataraman
- R. Xavierarulappa
- M. Boopathi
- R. Parkavi
- Research Journal of Pharmacology and Pharmacodynamics
- Journal of Engineering Education Transformations
- Indian Journal of Science and Technology
- Digital Image Processing
- Nature Environment and Pollution Technology
- Asian Journal of Pharmaceutical Analysis
- ICTACT Journal on Image and Video Processing
- Asian Journal of Research in Chemistry
- Software Engineering
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Selvakumar, S.
- Antidiabetic Activity of Swietenia mahagoni Seed Powder in Alloxan Induced Diabetic Mice
Authors
1 Department of Pharmacology, Ultra College of Pharmacy, Madurai, IN
2 Department of Pharmaceutical Biotechnology, Ultra College of Pharmacy, Madurai, IN
3 Department of Pharmacology, Madurai Medical College, Madurai, IN
Source
Research Journal of Pharmacology and Pharmacodynamics, Vol 2, No 4 (2010), Pagination: 296-299Abstract
Swietenia mahagoni (Meliaceae) is an evergreen hard wood timber species widely distributed in India and has ethno medicinal uses in malaria, diabetes, anemia, diarrhoea, fever, and dysentery. In this present study antidiabetic effect of Swietenia mahagoni seeds were evaluated in alloxan induced diabetic mice. Blood and urine Glucose levels, food and water consumptions and histopathological studies were determined. In diabetic mice, Swietenia mahagoni seeds significantly reduced the elevated blood glucose level by 43.92% at 500mg/kg and 42.47% at 250mg/kg compared to vehicle treated diabetic mice, without increase in urine glucose, food and water intake. The experimental data indicated that Swietenia mahagoni demonstrated significant antidiabetic action in alloxan induced diabetic mice and could be a potential orally active drug for diabetes mellitus.Keywords
Antidiabetic, Indian Mahogany, Alloxan, Diabetic Mice, Swietenia.References
- Amit R, Shailendra S. Limonoids. Overview of significant bioactive triterpenes distributed in plants kingdom. Bio Pharm Bull 2006; 29: 191-201.
- Abdelgaleil SAM et al. D-seco limonoids from the leaves of Swietenia mahogany. Phytochemistry. 2006; 67: 452-458.
- Tripathy.K.D, Essential of medicinal pharmacology. Jaypee brother's Medical Publishers (P) Ltd, New Delhi, 2003; 5th ed , pp. 235-253.
- Badole S et al. Antihyperglycemic activity of aqueous extract of leaves of Cocculus hirsutus (L.) Diels in Alloxan - induced diabetic mice. Ind J pharmacol. 2006; 38: 49-53.
- Srinivasan K, Ramarao P. Animal models in type 2 diabetes research, an overview. Ind. J Med Res 2007; 125: 451-472.
- Bacsal K et al. The effect of Swietenia mahogani (mahogany) seed extract on indomethacin-induced gastric ulcers in female Sprague-Dawley rats. Acta Medica Philippina. 1997; 33: 127-139.
- Elliott JJ, Dewchand H and Altmann DM. Streptozotocin-induced diabetes in mice lacking α,β,T cells. Clin Exp immunology. 1997; 109: 116-120.
- Antia BS, Okokon JE and Okon PA. Hypoglycemic activity of aqueous leaf extract of Persea americana Mill. Ind J pharmacol. 2005; 37(5): 325-326.
- Gorray KC et al. Baskin, D, Brodsky J, Fujimoto WY. Responses of pancreatic β cells to alloxan and streptozotocin in the guinea pig. Pancreas. 1986; 1: 130-138.
- Ghosh S, Suryawanshi SA. Effect of Vinca rosea extracts in treatment of alloxan diabetes in male albino rats. Ind. J. Exp. Biol. 2001; 39: 748-759.
- Role of Industry to Improve Outcome Based Education in Engineering
Authors
1 Dept. of CSE, BMSCE, Karnataka, IN
2 Dept. of CSE, BMSCE, Bangalore, Karnataka, IN
3 Dept. of ISE, BMSCE, Bangalore, Karnataka, IN
Source
Journal of Engineering Education Transformations, Vol 28, No Spl Iss (2015), Pagination: 358-361Abstract
Industry Institute Interaction has different perspective and different reasons to interact with each other. Both are mutually benefited from this interaction. Academia is the main source of knowledge for industry. In general, role of Industry is an important factor for research and outcome based education in engineering institutions. Outcome Based Education is incomplete without successful interaction between Industry and Engineering Institution. This paper present the activities under MOU'S signed between BMS college of Engineering and other IT Industries. These activities aim to achieve the different Programme Outcomes.Keywords
Outcome Based Education, Programme Outcomes, Course Outcomes, Industry Institute Interaction, Memorandum of Understanding.- Impact of Static VAR Compensator in Stability and Harmonics Mitigation for Real Time System with Cogeneration
Authors
1 TNEB, Karur, Tamilnadu, IN
2 Department of EEE, Institute of Road and Transport Technology, Erode, Tamilnadu, IN
3 Department of EEE, Erode Sengunthar Engineering College, Erode, Tamilnadu, IN
4 ABB Global Industries, Chennai, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 12 (2015), Pagination:Abstract
Main objective of the paper is to study the impact of SVC on stability and enhancing the power quality for a real time industrial system. Modified RK method is used for transient stability analysis and detailed frequency modeling is used for harmonic analysis. Real time system of 3.5 MTPA Steel plant at Raichur in Karnaraka, India with Electric Arc Furnace and Laddle Refining Furnace are considered for study. ETAP 12.6 software is used to simulate both transients and harmonic analysis. Harmonic study is performed with sinusoidal source non linear loads and Non sinusioidal source non linear loads. SVC performance when the non sinusoidal source is also verified to have the practical meaning. For Transient stability enhancement the controller tuning fault at 11V and 33KV bus is verified.Keywords
Non-sinusoidal Source, Power Quality, SVC, Transient Stability Enhancement- Lossless Visible Watermarking with Security
Authors
1 Kalasalingam University, Srivilliputhur, IN
2 Department of IT, Kalasalingam University, Srivilliputhur, IN
Source
Digital Image Processing, Vol 2, No 6 (2010), Pagination:Abstract
Watermarking is an effective and popular technique for discouraging illegal copyright and distribution of copyrighted digital image information. One of the important features of the watermarking technique is the lossless visible watermarking, which will preserve the quality of the watermark and watermarked image. In this paper, a novel method for visible watermarking with a capability of lossless image recovery is proposed. The method is based on one to one compound mapping of image pixel values for overlaying a variety of visible watermarks of arbitrary sizes on cover images. Compound mappings are proven to be reversible, which allows for lossless recovery of original images from watermarked images. Different types of visible watermarks, including opaque monochrome and translucent full color ones are embedded as application of the proposed generic approach. A two fold monotonically increasing compound mapping is created and proved to yield more distinctive visible watermarks in the watermarked images and to be proposed deals with the combination of text, image and key watermarking. To overcome the defects in quality of image and security the new approach, a lossless visible watermarking and watermark removal for lossless image recovery is proposed.
Keywords
Lossless Visible Watermarking, One to One Compound Mapping, Translucent Watermark, Wavelet Transform, Two Fold Monotonically Increasing, Key Watermarking.- Seasonal Variation in Physicochemical Characteristics of Water Bodies in and around Cuddalore District, Tamil Nadu
Authors
1 Department of Zoology, DDE, Annamalai University, Annamalainagar-608 002, T. N., IN
Source
Nature Environment and Pollution Technology, Vol 9, No 1 (2010), Pagination: 89-92Abstract
The present investigation has been designed to assess the water quality parameters of surface waters present in and around Cuddalore district, Tamil Nadu for a period of one year. Water samples were collected from five stations (S1-Chidambaram, S2- Veeranam, S3-Vadalur, S4-Vellar and S5-Sipcot) on 15th day of each month. The parameters analysed include pH, EC, TDS, total hardness, alkalinity, chloride, calcium, magnesium, sodium, sulphate and fluorides. The water samples collected from industrial area showed a high value in all the parameters in summer season. This indicate the extent of pollution due to addition of effluents into the water bodies. But in rainy season all the parameters in all the stations remain under permissible limit. This may be due to the dilution of surface waters with rain water.Keywords
Surface Water Quality, Water Pollution, Cuddalore District, Drinking Water Standards.- Big Data Analysis in the Internet of Things Platform
Authors
1 Computer Science and Engineering, Bharath University, Chennai - 600073,Tamil Nadu, IN
2 Computer Science and Engineering, GKM College of Engineering and Technology, Affiliated to Anna University, Chennai - 600063,Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 41 (2016), Pagination:Abstract
Objectives: The implementation of an Industry neutral architecture for an analysis on Big Data in the Internet of Things Platform. Methods/Statistical Analysis: The Outside temperature , Light and Humidity from weather station is monitered in dashboardand analyzed in ThingSpeak - Internet of Things Platform. The analysis on weather station data is performed using Matlab in ThingSpeak – Internet of Things Platform. Findings:To do a real time analysis of weather station data using ThingSpeak – Internet of Things Platform. Real time tracking of the attributes include dew point, temperature and humidity from the Arduino Sensor device which is installed on Weather Station. Application/Improvements: Internet of Things Platform broad network access allows investors/stakeholders to visualize the output of Data Presentation (Data Analytics, Data Visualization, BI reporting), easily from multiple locations and platforms, which can facilitate enterprise decision making and here we recommend solutions for the security and privacy issues in the Internet of Things Platform.Keywords
Analyzing, Big Data, Internet of Things, Internet of Things Security,ThingSpeak.- Adaptive Modulation with Customised Core Processor
Authors
1 ECE Department, SCSVMV University, Kanchipuram - 631561, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 35 (2016), Pagination:Abstract
Objectives: To develop an automatic modulation detection. Methods/Statistical Analysis: A single system having the antenna transmits and receives multiple signals. Autonomous modulation techniques avoid the multipath fading, delay and bandwidth limitation. Transmitter selects the modulation from group based on the receiver location and selected modulation gives maximum accuracy. Findings: This approach avoids the size limitation because of parallel relay terminal structure acceptance. This research work focuses on different set of modulation schemes in virtual logic channel implemented in low power consuming hardware and also be customized. Application/Improvements: Proposed work is a large number low power hardware used in more secured manner.Keywords
FL2440, GNU, Modulation/Demodulation, Node/Network Security, WSN.- Big Data Architecture for Capturing, Storing, Analyzing and Visualizing of Web Server Logs
Authors
1 Computer Science and Engineering, Bharath University, Chennai - 600073, Tamil Nadu, IN
2 Computer Science and Engineering, GKM College of Engineering and Technology, Anna University, Chennai - 600063, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 4 (2016), Pagination:Abstract
Background/Objectives: To propose an Automated model to capture, store, analyze and visualize of Big Data. Methods/ Statistical Analysis: The web server logs are captured in real time and are stored into NoSQL database. The analysis on web server logs is performed using object-oriented language plus mongodb and finally the analyzed results are visualized in the R environment. Findings: To do a real time analysis of web server logs in data center using mongodb. Tracking of client location can be done using GeoIP. This GeoIP location information can be analyzed to find out the total number of visits from different country, real time information about server status of success, failure, warning and fatal errors. Real time updates of exact location of client who access sever and real time information of server status helpful to avoid repeating failure in a system. Application/Improvements: For the future work, we have planned to integrate our automated model with stream data processing system and to compare our proposed model with existing framework.Keywords
Analyzing, Big Data, Capturing, Storing, Visualizing, Web Server Logs- Development and Validation of Analytical Method for Simultaneous Estimation of Ornidazole and Cefixime Trihydrate Tablet Osage Forms by UV Spectroscopy
Authors
1 Swami Vivekananda Institute of Pharmaceutical Sciences, Vangapally (V), Yadagirigutta (M), Nalgonda (Dt), Telangana–508 286, IN
2 P.S.V. College of Pharmaceutical Science and Research, Orappam Village, Bargur (Tk), Krishnagri (Dt), Tamilnadu–635108, IN
Source
Asian Journal of Pharmaceutical Analysis, Vol 6, No 4 (2016), Pagination: 246-252Abstract
A simple, specific, accurate, precise and economic Simultaneous spectrophotometric method in UV region have been developed for the determination of Ornidazole and Cefixime in bulk and pharmaceutical tablet formulations. The optimum conditions for the analysis of the drug were established. Linearity was found over the concentration range of 5-30 μg/ml for Ornidazole and 2-20 μg/ml for Cefixime. The Simultaneous UV method has been successfully applied for the analysis of drugs in tablet formulation. The results of the tablet analysis were in the range of 99.57 to 100.2 % for Ornidazole and 99.25 to 100.8 % for Cefixime, which indicated repeatability of the method. The percentage recoveries were found be 100.3 % for both the drugs indicated that the Simultaneous UV method is precise and reproducible. The Ruggdness Interday variation were found be in mean of 100.25 for Ornidazole and 99.85 for Cefixime. The Ruggedness Intraday Variation were found be in mean of 100.2 for Ornidazole and 100.18 for Cefixime.Keywords
Ornidazole, Cefixime, UV-Visible Spectroscopy, Simultaneous Method.- Computation of Image Similarity with Time Series
Authors
1 Department of Computer Science and Engineering, Sri Vidya College of Engineering and Technology, Tamil Nadu, IN
2 Department of Statistics, Manonmaniam Sundaranar University, Tamil Nadu, IN
Source
ICTACT Journal on Image and Video Processing, Vol 2, No 2 (2011), Pagination: 334-339Abstract
Searching for similar sequence in large database is an important task in temporal data mining. Similarity search is concerned with efficiently locating subsequences or whole sequences in large archives of sequences. It is useful in typical data mining applications and it can be easily extended to image retrieval. In this work, time series similarity analysis that involves dimensionality reduction and clustering is adapted on digital images to find similarity between them. The dimensionality reduced time series is represented as clusters by the use of K-Means clustering and the similarity distance between two images is found by finding the distance between the signatures of their clusters. To quantify the extent of similarity between two sequences, Earth Mover’s Distance (EMD) is used. From the experiments on different sets of images, it is found that this technique is well suited for measuring the subjective similarity between two images.Keywords
Similarity Search, Vector Quantization, Similarity Measures, Clustering, EMD.- Securing Cloud Data in Transit using Data Masking Technique in Cloud Enabled Multi Tenant Software Service
Authors
1 Department of CSE, Karpagam University, Coimbatore - 641021, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 20 (2016), Pagination:Abstract
Background/Objectives: The paper discusses about the data security issues in the cloud computing environment. It employs data masking to hide sensitive data from cloud services thereby ensuring reliability and trust in the cloud environment. Methods/Statistical Analysis: Data access in the cloud environment can be categorized into three such as at rest, at transit ,in use. The main aim of this paper is integrate security in data masking techniques. We employ the existing mechanisms to the cloud environment to secure the data with virtual machine masking and platform masking. Findings: The masked data is transmitted to the processing environment. The services in cloud utilize this masked data for processing. It is comparatively secured when compared to the conventional technique. This mechanism increases the trust worthiness and can be masked dynamically or statistically in application or database based service environments. Application/Improvements: The main application of this research is to serve people with secured cloud, thereby overcoming the data security issues.Keywords
Cloud Environment, Cloud Service Provider, Data Masking.- Comparing the Efficacy of Decision Tree and its Variants using Medical Data
Authors
1 Department of Information Technology, Thiagarajar College of Engineering, Madurai – 625015, Tamil Nadu, IN
2 Department of Computer Science and Engineering, G.K.M. College of Engineering and Technology, Chennai – 600063, Tamil Nadu, IN
3 Department of Medicine, Theni Government Medical College and Hospital, Theni – 625531, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 10, No 18 (2017), Pagination:Abstract
The objective of this research work focus towards the identification of best variant between decision tree algorithm such as Weighted Decision Trees (WDT), C4.5 Decision Trees and C5.0. Methods: Decision tree has a number of variants such as ID3, Weight based decision tree, C4.5 and C5.0 algorithms. This research work focus towards the predictive performance analysis of weight based decision tree with information gain as the splitting criterion. The algorithm proceeds iteratively with the assignment of weights over the training instances to determine the best among the data attributes. Thereby, the attribute with best weight values can be significantly determined by an improvement over its accuracy. Results: The experimental results proves that among the variants of decision trees the algorithm corresponding to C4.5 provides the highest accuracy of about 71.42% and R2 value of about 0.265 respectively and for real world data the accuracy is about 48.69%. The effectiveness of the decision tree algorithm can be still improved by adopting certain feature selection techniques with the combination of decision tree algorithm. Conclusion: The determined results show that Decision tree algorithm suits well for medical data problems. The efficiency of the algorithm can still be improved by applying Decision Trees for various real world data problems such as Diabetes, Cancer classification with feature selection paradigms. But still a larger set of real world data has to be investigated.Keywords
C4.5 Decision Tree Algorithm, Data Classification, Heart Disease, Predictive Analysis, Weighted Decision Tree,- Spectrophotometric Determination of Meloxicam in Bulk Drug and Pharmaceutical Formulations
Authors
1 Department of Pharmaceutical Analysis, K.M. College of Pharmacy, Uthangudi, Madurai-625107, IN
2 Department of Pharmaceutical Chemistry, K.M. College of Pharmacy, Uthangudi, Madurai-625107, IN
Source
Asian Journal of Research in Chemistry, Vol 2, No 4 (2009), Pagination: 467-468Abstract
A simple, rapid, economical and sensitive visible spectrophotometric method for the estimation of Meloxicam has been developed based on the formation of ion-pair of Meloxicam with dye bromocresol green in acidic medium, which was extracted into chloroform. It has absorption maxima at 415 nm. Beer’s law limit was found to be 10-50 mcg/ml. The molar absorptivity was found to be 2.17×103 (mole-1cm-1) and sandell’s sensitivity was 0.1612 (μg/cm2/0.001 absorbance unit). The correlation coefficient (r) was found to be 0.9999. The limit of detection (LOD) and limit of quantification (LOQ) was found to be 0.88 and 2.69 mcg/ml respectively of Meloxicam. The result of estimation in marketed formulations was found to be 99.86±0.32 and 97.93±0.32. The proposed method was applied successfully for the determination of Meloxicam in tablets with average recovery of 99.62±0.88 and 100.4±0.768. The method was then validated statistically as per ICH guidelines, which yielded good results concerning range, linearity, precision and accuracy.Keywords
Meloxicam, Bromo Cresol Green, Spectrophotometry.- The Effect of “Smart” Information on Cryptography
Authors
1 Department of ECE, SCSVMV, IN
Source
Software Engineering, Vol 10, No 2 (2018), Pagination: 23-26Abstract
Cryptography gives the maximum security for information sharing in modern communication world. The neural networks improve the performance of smart information sharing. In the e-voting technology demonstration, prove the best smart information that is cryptography. Three hypnotically approaches are (1) that Lamport clocks no longer adjust performance (2) Bandwidth stayed constant across successive generations of UNIVACs (3) mean popularity of kernels is not as important as a methodology’s reliable user- kernel boundary when optimizing average latency. The Quality of service based on the security, loss, exact and reliable information sharing. The algorithm used for securing the smart information Security improvement based the several types of cryptography. The algorithm for the deployment of SCSI disks for execution. Smart information is message, voice and video. This paper focusing to find the optimal real time algorithm, that construction will give the best quality of services. The novel experiments shows the output of smart information sharing.
Keywords
Neural Networks, Cryptography, Ethernet, Wireless, Architectures.References
- Clark, D., Morrison, R. T., and Garcia- Molina, H. Analyzing Lamport clocks using real-time models. Journal of Atomic, “Fuzzy” Archetypes 43 (Dec. 2005), 20–24.
- Clarke, E. Knowledge-based, efficient models for information retrieval systems. In Proceedings of SIGCOMM (Sept. 1991).
- Codd, E., Hennessy, J., Sasaki, N., and Kubiatowicz, J. Towards the technical uni- fication of information retrieval systems and RAID. In Proceedings of the Symposium on Signed Archetypes (Nov. 1995).
- Cook, S. An understanding of local-area net- works. Tech. Rep. 2189, UCSD, Apr. 1993.
- Daubechies, I. The impact of stochastic algo- rithms on cryptography. In Proceedings of the WWW Conference (Dec. 1999).
- Feigenbaum, E., Thompson, G., and Ka- han, W. Deconstructing RAID. Journal of Real-Time, Psychoacoustic Epistemologies 702 (Apr. 2001), 46–57.
- Floyd, S., Ritchie, D., and Gupta, a. To wards the appropriate unification of Scheme and public private key pairs. In Proceedings of the Conference on Permutable, Collaborative Mod- els (Dec. 1996).
- Hopcroft, J., and Lee, Y. Deconstructing replication. In Proceedings of the WWW Con- ference (Sept. 2001).
- Jones, C. Erasure coding no longer considered harmful. In Proceedings of SIGCOMM (Mar.1999).
- Kubiatowicz, J., Gopalakrishnan, Z., and Ramakrishnan, E. Decoupling sensor networks from fiberoptic cables in systems. Jour- nal of Collaborative Technology 75 (June 1997), 79–87.
- Leary, T. Deconstructing agents. In Proceed- ings of MOBICOM (Apr. 1992).
- Li, D. Evolutionary programming considered harmful. In Proceedings of NSDI (Aug. 2002).
- Li, T. Semantic communication. Journal of Constant-Time, Game-Theoretic, Symbiotic Theory (Apr. 2003), 70–98.
- Perlis, A., and Williams, C. The relation- ship between the Internet and checksums. In Proceedings of NDSS (May 2003).
- Raman, B., and Wilkinson, J. Comparing information retrieval systems and local-area networks. In Proceedings of SIGGRAPH (Dec.2003).
- Selvakumar, .S.Ravi, Adaptive Modulation IN Reconfigurable Platform, Journal of Theoretical and Applied Information Technology. Vol 68, PP 108-114, Oct 2014.
- S. Selvakumar, .S.Ravi, DPSK and QAM Modulation Detection analyzed with BER Estimation, IEEE International Conference on Current Trends in Engineering and Technology, July 2014
- S.Selvakumar,.J.Vaideeswaran, Adaptive Modulation with customized core processor, Indian Journal of Science and Technology Vol9(35), PP1-5, Sep 2016.
- FPGA Enactment of Adapted Progressive Encryption Technique
Authors
1 Department of ECE, SCSVMV, IN
Source
Digital Image Processing, Vol 11, No 4 (2019), Pagination: 61-65Abstract
There is a requirement for profoundly verified system and subsequently this task utilizes the verified correspondence between various hubs with the assistance of cryptographic innovation between FPGAs. This venture is huge to upgrade the security of information and code language connected for composing messages in a secret way. This proposed system focuses on the Modified Advanced Encryption Standard (MAES) to increase the speed and to reduce the hardware complexity. Advanced Encryption Standard (AES) is the most efficient public key encryption system that can be used to create faster and efficient cryptographic keys. Hypothetical examination and exploratory outcomes demonstrate that this system gives rapid just as less trades over unbound system. Standard symmetric encryption calculations give better security to the interactive media information. Be that as it may, applying symmetric key encryption calculation on progressively complex media information, may confront the issue of computational overhead. To defeat that issue, examine the AES and change it to decrease the figuring of calculation and for improving the encryption execution as far as throughput, inactivity. This change is finished by Permutation step. Altered AES calculation is a quick lightweight encryption calculation for security of information and exceedingly reasonable for the pictures and plaintext exchange than the AES calculation. With the guide of reenactment results security level and speed of the framework is expanded with equipment intricacy being decreased.
Keywords
Modified-AES, Cryptography, FPGA and Advanced Encryption Algorithm.References
- Alok Choudhary, David Nguyen and Joseph Zambreno “Exploring Area/Delay Tradeoffs in an AES FPGA Implementation” Department of Electrical and Computer Engineering Northwestern.
- Ahmed Kareem Shibee and Salim Ali Abaas “A New Approach for Video Encryption Based on Modified AES Algorithm” in International Journal of Contemporary Research in Engg. and Tech. vol 17, Issue 3, Ver. VI-2015.
- Ahmed. W, H. Mahmood, and U. Siddique “The Efficient Implementation of S8 AES Algorithm” WCE 2011, July 6 - 8, 2011
- David Zier, Khoa Vu “FPGA Implementation AES for CCM Mode Encryption Using Xilinx Spartan-II” Advanced Cryptography, May 2003
- Dr.B. R. Gladman “Input and Output Block Conventions”, The NIST Advanced Encryption Standard (AES). version 2.2, 6th June 1999
- Kishore. V, Naresh Kumar. B and Vasudeva Reddy. T “Image Security Using Modified Advanced Encryption Standard Algorithm (MAES)” Inter Journal of Engineering Research and Development, Volume .4, 2012.
- Kaijie Wu, Piyush Mishra, Ramesh Karri and Yongkook Kim “Concurrent Error Detection Schemes for Fault-Based Side-Channel Cryptanalysis of Symmetric Block Ciphers” IEEE CAD of integrated circuits and systems, VOL. 21, NO. 12, 2002.
- Paul D. Yacoumis Supervisor: Dr. Robert Clarke “On The Security of the Advanced Encryption Standard” November 2005.
- Shize Guo, Xinjie Zhao and Zhijie Jerry Shi “Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack against the AES and Its Application to Microcontroller Implementations” in IEEE, 2014.
- Yi Wang and Yajun Ha “FPGA-Based 40.9-Gbits/s Masked AES with Area Optimization for Storage Area Network” IEEE. Circuits and systems.VOL.60, NO.1, 2013.
- J. P. Choi and V. W. S. Chan, “Optimum power and beam allocation based on traffic demands and channel conditions over satellite down- links,” IEEE Trans. Wireless Commun., vol. 4, no. 6, pp. 2983–2993, Nov. 2005.
- M. Schubert and H. Boche, “Solution of the multi user downlink beam-forming problem with individual sinr constraints,” IEEE Trans. Veh. Technol., vol. 53, no. 1, pp. 18–28, Jan. 2004.
- M. Schubert and H. Boche, “Qos-based resource allocation and transceiver optimization,” Found. Trends Commun. Inf. Theory, vol. 2, no. 6, pp. 383–529, Aug. 2005.
- D. Gerlach and A. Paulraj, “Adaptive transmitting antenna array with feedback,” IEEE Signal Process. Lett., vol.1, no.10, pp.150–152,Oct. 1994.
- H. Liu and G. Xu, “Multiuser blind channel estimation and spatial channel pre-equalization,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Detroit, MI, May 1995, pp. 1756–1759.
- T. Yoo and A. Goldsmith, “On the optimality of multi-antenna broad- cast scheduling using zero forcing beam forming,” IEEE J. Sel. Areas Commun., vol. 24, no. 3, pp. 528–541, Mar. 2006.
- L. Dong, Z. Han, A. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875–1888, Mar. 2010.
- Selvakumar, .S.Ravi, Adaptive Modulation IN Reconfigurable Platform, Journal of Theoretical and Applied Information Technology. Vol 68, PP 108-114, Oct 2014.
- S. Selvakumar, .S.Ravi, DPSK and QAM Modulation Detection analyzed with BER Estimation, IEEE International Conference on Current Trends in Engineering and Technology, July 2014
- S. Selvakumar,.J. Vaideeswaran, Adaptive Modulation with customized core processor, Indian Journal of Science and Technology Vol9(35), PP1-5, Sep 2016
- A Strategic Approach in Handling Information Retrieval Course for Attaining Course Outcomes – A Case Study
Authors
1 Department of Information Technology, Thiagarajar College of Engineering, Madurai, IN
2 Department of CSE, GKM College of Engineering and Technology, Chennai, IN
Source
Journal of Engineering Education Transformations, Vol 34, No SP ICTIEE (2021), Pagination: 148-153Abstract
Background: The major challenge in engineering education is to educate and train the student’s community with pedagogical practices in order to determine the notable skills to solve more complex and fragile structured problems. Innovative pedagogical practices make the students to adhere to the complex formulations of the corresponding domain and its applications. The realm of good understanding of knowledge and its deliverables can be ascertained through pedagogical practices with a focus on learner-centric activities in the classroom teaching.
The actual target in teaching learning process is to make all the students to have a good exploration on the domain knowledge with success ratio. The learner success is considered to be the core metric with which we can judge the success of learner-centric activities with creativity and quality processes. Confirming the process in which the learners are engaged with the key ideas of the course to be taught makes the students to have practical implementations in Teaching-Learning process.
Objective: This research work focus on the assessment and evaluation of learner-centric techniques for outcome based education upon statistical evaluation. Students of third year (VI Semester) of two consecutive batches have been analyzed for the course on Information Retrieval (14ITPS0). Two set of batches 2015-19 and 2016-20 have been considered for the assessment and analysis of Active Learning Strategies (ALS). The incorporation has been processed using the strategic approach based on daily, weekly and monthly assessments focusing on student learning criteria and their responding behaviors for 2016-20 batch. Each paradigm has been measured corresponding to the course outcomes at each level. Significant statistical analysis has been made for validating the process behind the teaching learning process.
Real time case study: Considering the batch 2015-19 summary assignments, presentations has been used for the evaluation and assessment of interim assignments. The observed response from the students went well among the student’s community. All the students have been registered for the course and they too have completed the same. But, the time and success ratio in learning mechanism varied from student to student upon completion of the course. Considering the batch 2016-20 active learning strategies such as Quiz by Kahoot!, Flipped classroom activity and MOOCs course has been incorporated. Also, for MOOC’S online courses a set of two courses has been identified relevant to the subject of study such as Text Retrieval and Search engines & Text mining and Analytics. For the Research problem identification the students are allowed to choose the domain specific topics for the course on information retrieval. In this process the time and success ratio has also been observed it also varied from one student to another.