Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2020 ( 36 )

2019 ( 233 )

2018 ( 274 )

2017 ( 292 )

Custom range...

Search Results: 1 - 10 of 223927 matches for " R. Seetharaman "
All listed articles are free for downloading (OA Articles)
Page 1 /223927
Display every page Item
An Innovative Low Cost EM Pollution Measurement System  [PDF]
R. Sittalatchoumy, R. Seetharaman
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.78176
Abstract: Mobile phones and other electronic devices are emitting radiations that will provide harmful effects to the human health. In order to measure the radiation, an innovative low cost measurement system is proposed in this paper. The ideology is to simplify the circuit’s value by converting a voltage detecting circuit to a field detecting circuit by finding an optimum resistance on trial and error basis. The requirement for a trial and error technique is to not allow too high or too low resistance which can be either short or open, resulting provides more damage to the circuit.
Power Analysis of Sensor Node Using Simulation Tool  [PDF]
R. Sittalatchoumy, R. Kanthavel, R. Seetharaman
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.713348
Abstract: Power consumption of sensor node is analyzed in this paper. In order to analyze the energy consumption, the node model is simulated using Proteus Software tool. The proposed sensor nodes power characteristics are measured by using different combinations of microprocessors and sensors. Using this, the energy consumption of the node is calculated. This is a cost-effective method and provides appropriate power model for specific applications.
Rice flat sedge a new weed host of Curvularia tuberculata
Indian Phytopathology , 2012,
Near-Lossless Compression Based on a Full Range Gaussian Markov Random Field Model for 2D Monochrome Images  [PDF]
K. Seetharaman, V. Rekha
Journal of Signal and Information Processing (JSIP) , 2013, DOI: 10.4236/jsip.2013.41002

This paper proposes a Full Range Gaussian Markov Random Field (FRGMRF) model for monochrome image compression, where images are assumed to be Gaussian Markov Random Field. The parameters of the model are estimated based on Bayesian approach. The advantage of the proposed model is that it adapts itself according to the nature of the data (image) because it has infinite structure with a finite number of parameters, and so completely avoids the problem of order determination. The proposed model is fitted to reconstruct the image with the use of estimated parameters and seed values. The residual image is computed from the original and the reconstructed images. The proposed FRGMRF model is redefined as an error model to compress the residual image to obtain better quality of the reconstructed image. The parameters of the error model are estimated by employing the Metropolis-Hastings (M-H) algorithm. Then, the error model is fitted to reconstruct the compressed residual image. The Arithmetic coding is employed on seed values, average of the residuals and the model coefficients of both the input and residual images to achieve higher compression ratio. Different types of textured and structured images are considered for experiment to illustrate the efficiency of the proposed model. The results obtained by the FRGMRF model are compared to the JPEG2000. The proposed approach yields higher compression ratio than the JPEG whereas it produces Peak Signal to Noise Ratio (PSNR) with little higher than the JPEG, which is negligible.

Regression Testing in Developer Environment for Absence of Code Coverage  [PDF]
M. Thillaikarasi, K. Seetharaman
Journal of Software Engineering and Applications (JSEA) , 2014, DOI: 10.4236/jsea.2014.78057

The techniques of test case prioritization schedule the execution order of test cases to attain respective target, such as enhanced level of forecasting the fault. The requirement of the prioritization can be viewed as the en-route for deriving an order of relation on a given set of test cases which results from regression testing. Alteration of programs between the versions can cause more test cases which may respond differently to following versions of software. In this, a fixed approach to prioritizing test cases avoids the preceding drawbacks. The JUnit test case prioritization techniques operating in the absence of coverage information, differs from existing dynamic coverage-based test case prioritization techniques. Further, the prioritization test cases relying on coverage information were projected from fixed structures relatively other than gathered instrumentation and execution.

Statistical Tests of Hypothesis Based Color Image Retrieval  [PDF]
K. Seetharaman, S. Selvaraj
Journal of Data Analysis and Information Processing (JDAIP) , 2016, DOI: 10.4236/jdaip.2016.42008
Abstract: This paper proposes a novel method based on statistical tests of hypotheses, such as F-ratio and Welch’s t-tests. The input query image is examined whether it is a textured or structured. If it is structured, the shapes are segregated into various regions according to its nature; otherwise, it is treated as textured image and considered the entire image as it is for the experiment. The aforesaid tests are applied regions-wise. First, the F-ratio test is applied, if the images pass the test, then it is proceeded to test the spectrum of energy, i.e. means of the two images. If the images pass both tests, then it is concluded that the two images are the same or similar. Otherwise, they differ. Since the proposed system is distribution-based, it is invariant for rotation and scaling. Also, the system facilitates the user to fix the number of images to be retrieved, because the user can fix the level of significance according to their requirements. These are the main advantages of the proposed system.
Impact of experimentation in thermodynamic studies of some metallic and oxidic systems
Aune R.E.,Fredriksson P.,Seetharaman S.
Journal of Mining and Metallurgy, Section B : Metallurgy , 2002, DOI: 10.2298/jmmb0204213a
Abstract: The importance of experimentation as an ingredient to CALPHAD assessments is brought out in the present paper and is illustrated in the case of a number of metallic and oxidic systems. Two types of experimental techniques have been used in the present laboratory for thermodynamic studies, and the details are presented. The results obtained together with the assessed phase diagram in the case of a few selected systems are presented. It was shown that careful experimentation has brought new features in the case of carbide systems involving Mn, and a new 4-phase equilibrium in the case of Ni-W-O system. New data with regard to the thermodynamic activities of FeO-containing slag systems and sulphide capacities of multicomponent slags, obtained by gas equilibration method, are also presented. A thermodynamic software, THERMOSLAG based on the experimental data has been found to be extremely useful by the steel industries is also discussed.
A Cluster Based QoS-Aware Service Discovery Architecture Using Swarm Intelligence  [PDF]
E. Christopher Siddarth, K. Seetharaman
Communications and Network (CN) , 2013, DOI: 10.4236/cn.2013.52018

The existing mobile service discovery approaches do not completely address the issues of service selection and the robustness faced to mobility. The infrastructure of mobile service must be QoS-aware plus context-aware (i.e.) aware of the user’s required-QoS and the QoS offered by the other networks in user’s context. In this paper, we propose a cluster based QoS-aware service discovery architecture using swarm intelligence. Initially, in this architecture, the client sends a service request together with its required QoS parameters like power, distance, CPU speed etc. to its source cluster head. Swarm intelligence is used to establish the intra and inter cluster shortest path routing. Each cluster head searches the QoS aware server with matching QoS constraints by means of a service table and a server table. The QoS aware server is selected to process the service request and to send the reply back to the client. By simulation results, we show that the proposed architecture can attain a good success rate with reduced delay and energy consumption, since it satisfies the QoS constraints.

Approximate analytical solution of non-linear reaction diffusion equation in fluidized bed biofilm reactor  [PDF]
Seetharaman Usha, Shanmugarajan Anitha, Lakshmanan Rajendran
Natural Science (NS) , 2012, DOI: 10.4236/ns.2012.412127
Abstract: A mathematical model for the fluidized bed biofilm reactor (FBBR) is discussed. An approximate analytical solution of concentration of phenol is obtained using modified Adomian decomposition method (MADM). The main objective is to propose an analytical method of solution, which do not require small parameters and avoid linearization and physically unrealistic assumptions. Theoretical results obtained can be used to predict the biofilm density of a single bioparticle. Satisfactory agreement is obtained in the comparison of approximate analytical solution and numerical simulation.
FPGA Implementation of Non-Linear Cryptography  [PDF]
Thammampatti Natarajan Prabakar, Balasubramanian Lakshmi, Gopalakrishnan Seetharaman
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.78109
Abstract: The paper focuses on the design and Field Programmable Gate Array (FPGA) implementation of embedded system for time based dual encryption scheme with Delay Compulsion Function (DCF) and also illustrates the application of DCF in time based cryptography. Further, the strength of the time based FPGA encryption algorithm with and without using DCF is analyzed using a Nios II processor. This proposed scheme enhances the security of vital data against Brute force attack by incorporating a temporal key distribution where two different keys encrypt the data simultaneously, one being the regular key and the other being the time. The time is included using a dynamically varying number of shifts thereby allowing the system to wait for the duration and this forms the second dimension of the key. Presently, available encryption systems suffer from Brute Force attack in which all the key combinations are tried in order to find the correct key. In such a case, the time taken for breaking the key depends on the speed of the system used for cryptanalysis. The proposed system adds complexity by using dynamically varying sequence of operations, by including the time as a second dimension of the key besides minimizing the possibility of Brute Force attack and increasing the time required for cryptanalysis irrespective of the system capability. As the proposed system needs concurrent execution and real time processing, the system is implemented using Altera Stratix II FPGA and the results are presented.
Page 1 /223927
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.