oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 50 )

2018 ( 268 )

2017 ( 286 )

2016 ( 456 )

Custom range...

Search Results: 1 - 10 of 223770 matches for " R. Rangarajan "
All listed articles are free for downloading (OA Articles)
Page 1 /223770
Display every page Item
Power Aware Routing Protocol (PARP) for Wireless Sensor Networks  [PDF]
R. Prema, R. Rangarajan
Wireless Sensor Network (WSN) , 2012, DOI: 10.4236/wsn.2012.45019
Abstract: Several wireless sensor network applications ought to decide the intrinsic variance between energy efficient communication and the requirement to attain preferred quality of service (QoS) such as packet delivery ratio, delay and to reduce the power consumption of wireless sensor nodes. In order to address this challenge, we propose the Power Aware Routing Protocol (PARP), which attains application-specified communication delays at low energy cost by dynamically adapting transmission power and routing decisions. Extensive simulation results prove that the proposed PARP attains better QoS and reduced power consumption.
Cluster Based Hierarchical Routing Algorithm for Network on Chip  [PDF]
U. Saravanakumar, R. Rangarajan, R. Haripriya, R. Nithya, K. Rajasekar
Circuits and Systems (CS) , 2013, DOI: 10.4236/cs.2013.45053
Abstract:

This paper presents a new logical mechanism called as Cluster Based Hierarchical Routing (CBHR) to improve the efficiency of NoC. This algorithm comprises the following steps: 1) the network is segmented logically into clusters with same size or different sizes; 2) algorithms are assigned for internal and global routing; 3) routers working functions are modified logically to support local and global communication. The experiments have conducted for CBHR algorithm for two dimensional mesh and torus architectures. The performance of this mechanism is analyzed and compared with other deterministic and adaptive routing algorithms in terms of energy, throughput with different packet injection ratios.

Chaotic Dark Matter
R. Rangarajan,M. Srednicki
Physics , 1992, DOI: 10.1103/PhysRevD.46.3350
Abstract: A very weakly coupled scalar field with mass $m$ and initial vacuum expectation value $V$ will provide enough mass to close the universe provided $V\simeq (3\times 10^8\gev)(100\gev/m)^{1/4}$. We discuss possible models in which such a field could arise.
Image Splicing Detection Using Inherent Lens Radial Distortion
H. R. Chennamma,Lalitha Rangarajan
International Journal of Computer Science Issues , 2010,
Abstract: Image splicing is a common form of image forgery. Such alterations may leave no visual clues of tampering. In recent works camera characteristics consistency across the image has been used to establish the authenticity and integrity of digital images. Such constant camera characteristic properties are inherent from camera manufacturing processes and are unique. The majority of digital cameras are equipped with spherical lens and this introduces radial distortions on images. This aberration is often disturbed and fails to be consistent across the image, when an image is spliced. This paper describes the detection of splicing operation on images by estimating radial distortion from different portions of the image using line-based calibration. For the first time, the detection of image splicing through the verification of consistency of lens radial distortion has been explored in this paper. The conducted experiments demonstrate the efficacy of our proposed approach for the detection of image splicing on both synthetic and real images.
Spatial synchronization and extinction of species under external forcing
R. E. Amritkar,Govindan Rangarajan
Physics , 2006, DOI: 10.1103/PhysRevLett.96.258102
Abstract: We study the interplay between synchronization and extinction of a species. Using a general model we show that under a common external forcing, the species with a quadratic saturation term in the population dynamics first undergoes spatial synchronization and then extinction, thereby avoiding the rescue effect. This is because the saturation term reduces the synchronization time scale but not the extinction time scale. The effect can be observed even when the external forcing acts only on some locations provided there is a synchronizing term in the dynamics. Absence of the quadratic saturation term can help the species to avoid extinction.
Mugshot Identification from Manipulated Facial Images
H. R. Chennamma,Lalitha Rangarajan
Computer Science , 2012,
Abstract: Editing on digital images is ubiquitous. Identification of deliberately modified facial images is a new challenge for face identification system. In this paper, we address the problem of identification of a face or person from heavily altered facial images. In this face identification problem, the input to the system is a manipulated or transformed face image and the system reports back the determined identity from a database of known individuals. Such a system can be useful in mugshot identification in which mugshot database contains two views (frontal and profile) of each criminal. We considered only frontal view from the available database for face identification and the query image is a manipulated face generated by face transformation software tool available online. We propose SIFT features for efficient face identification in this scenario. Further comparative analysis has been given with well known eigenface approach. Experiments have been conducted with real case images to evaluate the performance of both methods.
Image Splicing Detection Using Inherent Lens Radial Distortion
H. R. Chennamma,Lalitha Rangarajan
Computer Science , 2011,
Abstract: Image splicing is a common form of image forgery. Such alterations may leave no visual clues of tampering. In recent works camera characteristics consistency across the image has been used to establish the authenticity and integrity of digital images. Such constant camera characteristic properties are inherent from camera manufacturing processes and are unique. The majority of digital cameras are equipped with spherical lens and this introduces radial distortions on images. This aberration is often disturbed and fails to be consistent across the image, when an image is spliced. This paper describes the detection of splicing operation on images by estimating radial distortion from different portions of the image using line-based calibration. For the first time, the detection of image splicing through the verification of consistency of lens radial distortion has been explored in this paper. The conducted experiments demonstrate the efficacy of our proposed approach for the detection of image splicing on both synthetic and real images.
Improved Datagram Transport Protocol over Wireless Sensor Networks- TCP Fairness
Senthil Kumaran .M,Dr. R. Rangarajan
International Journal of Computer Science Issues , 2011,
Abstract: TCP connections have small bandwidth-delay product and frequent packet loss in wireless sensor networks due to route breakages and radio interference. Datagram transport protocol provides a reliable end-to-end transport protocol over wireless sensor networks. This paper deals with improvement of TCP Fairness as Fairness in wireless sensor networks plays a major role to have maximum fair share of available bandwidth among the nodes, thus energy is consumed. A distributed adaptive max-min algorithm has been proposed in order to improve the fairness in WSNs. The proposed scheme incorporates two techniques: a fixed-size window-based flow-control algorithm and a cumulative bit-vector-based selective ACK strategy. Security has got the major impact over WSNs and that has been overcome by logical Tunneling. The simulation results show the improvement in terms of fairness, throughput and delay and packet loss using Network Simulator NS-2.
Face Identification from Manipulated Facial Images using SIFT
H. R. Chennamma,Lalitha Rangarajan,Veerabhadrappa
Computer Science , 2011,
Abstract: Editing on digital images is ubiquitous. Identification of deliberately modified facial images is a new challenge for face identification system. In this paper, we address the problem of identification of a face or person from heavily altered facial images. In this face identification problem, the input to the system is a manipulated or transformed face image and the system reports back the determined identity from a database of known individuals. Such a system can be useful in mugshot identification in which mugshot database contains two views (frontal and profile) of each criminal. We considered only frontal view from the available database for face identification and the query image is a manipulated face generated by face transformation software tool available online. We propose SIFT features for efficient face identification in this scenario. Further comparative analysis has been given with well known eigenface approach. Experiments have been conducted with real case images to evaluate the performance of both methods.
PERFORMANCE ANALYSIS OF IMAGE DENOISING IN LIFTING WAVELET TRANSFORM
G.M.Rajathi,Dr.R. Rangarajan
International Journal of Engineering Science and Technology , 2012,
Abstract: Images are contaminated by noise due to several unavoidable reasons, Poor image sensors, imperfect instruments, problems with data acquisition process, transmission errors and interfering natural phenomena are its main sources. Therefore, it is necessary to detect and remove noises present in the images. Reserving the details of an image and removing the random noise as far as possible is the goal of image denoising approaches . Lifting wavelet transform (LWT)is based on the theory of lazy wavelet and completely recoverable filter banks,improving the wavelet and its performance through the lifting process under the condition of maintaining the feature of the wavelet compared with the classical constructions (DWT) is rely on the Fourier transform. In this paper we compare the image denoising performance of LWT with DWT . We demonstrated through simulations with images contaminated by white Gaussian noise that exhibits performance in both PSNR (Peak Signal-to-Noise Ratio) and visual effect.
Page 1 /223770
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.