2.Conference Paper (10)

Permanent URI for this collectionhttps://dspace.psgrkcw.com/handle/123456789/4215

Browse

Search Results

Now showing 1 - 10 of 10
  • Item
    ENSEMBLE LEARNING FOR IDENTIFYING MUSCULAR DYSTROPHY DISEASES USING CODON BIAS PATTERN
    (Springer Link, 2017-03-17) Sathyavikasini, K; Vijaya, M S
    Hereditary traits are anticipated by the mutations in the gene sequences. Identifying a disease based on mutations is an essential and challenging task in the determination of genetic disorders such as Muscular dystrophy. Silent mutation is a single nucleotide variant does not result in changes in the encoded protein but appear in the variation of codon usage pattern that results in disease. A new ensemble learning-based computational model is proposed using the synonymous codon usage for identifying the muscular dystrophy disease. The feature vector is designed by calculating the Relative Synonymous Codon Usage (RSCU) values from the mutated gene sequences and a model is built by adopting codon usage bias pattern. This paper addresses the problem by formulating it as multi-classification trained with feature vectors of fifty-nine RSCU frequency values from the mutated gene sequences. Finally, a model is built based on ensemble learning LibD3C algorithm to recognize muscular dystrophy disease classification. Experiments showed that the accuracy of the classifier shows 90%, which proves that ensemble-based learning, is effective for predicting muscular dystrophy disease.
  • Item
    EFFECT OF COBALT SUBSTITUTION ON STRUCTURAL AND MAGNETIC PROPERTIES OF MAGNESIUM FERRITE NANOPARTICLES
    (Springer Link, 2017-05-04) Balavijayalakshmi, J; Sudha, T
    Cobalt substituted magnesium ferrite (Mg(1−x)CoxFe2O4, where x = 0.2, 0.4, 0.6 and 0.8) nanoparticles are prepared by co-precipitation method and samples are annealed at 600 °C. The synthesized nanoparticles are characterized using FT-IR spectral analysis, X-ray diffraction (XRD) analysis, Scanning Electron Microscopy (SEM) analysis, Transmission Electron Microscopy (TEM ) analysis and Vibrating Sample Magnetometer (VSM) analysis. The FT-IR spectra show main absorption bands are shifted to higher values as the concentration of cobalt increases. The average nano-crystallite sizes are found to be in the range 7–9 nm. The SEM micrographs show uniformly distributed granular like structure. TEM indicate the presence of rectangular shaped nanoparticles. The magnetic properties of these samples are studied using Vibrating Sample Magnetometer (VSM). As the magnetic properties are enhanced due to the cobalt substitution the synthesized samples can be used as a gas sensor.
  • Item
    IMPACT OF ANNEALING ON STRUCTURAL AND MAGNETIC PROPERTIES OF MANGANESE CO-DOPED MAGNESIUM-COBALT FERRITE NANOPARTICLES
    (Springer Link, 2017-05-04) Balavijayalakshmi, J; Annie Josphine, C
    Manganese co-doped magnesium-cobalt ferrite nanoparticles (Mg0.4Co0.4Mn0.2Fe2O4) are synthesized by co-precipitation method and are annealed at 130, 600 and 900 °C. The synthesized nanoparticles are characterized using X-ray diffraction (XRD) analysis, FT-IR spectral analysis, Scanning Electron Microscopy (SEM) analysis, Transmission Electron Microscopy (TEM ) analysis and Vibrating Sample Magnetometer (VSM ) analysis. The crystallite size is found to be 17 and 19.6 nm for the samples annealed at 600 and 900 °C respectively. The crystallite size and lattice constant increases as the samples are annealed at higher temperatures. FT-IR analysis confirms the characteristic absorption bands at 590 and 546 cm−1 for tetrahedral sites and 416 cm−1 for octahedral sites. SEM analysis shows uniformly distributed spherical shaped nanoparticles. The microstructure and particle size are analyzed by TEM analysis. The saturation magnetization, remanent magnetization and coercivity increases due to the inclusion of manganese and as the annealing temperature increases. These samples can be used for gas sensing applications.
  • Thumbnail Image
    Item
    MULTI-LABEL CLASSIFICATION: PROBLEM TRANSFORMATION METHODS IN TAMIL PHONEME CLASSIFICATION
    (Elsevier, 2017) Pushpa, M; Karpagavalli, S
    Most of the supervised learning task has been carried out using single label classification and solved as binary or multiclass classification problems. The hierarchical relationship among the classes leads to Multi- Label (ML) classification which is learning from a set of instances that are associated with a set of labels. In Tamil language, phonemes fall into different categories according to place and manner of articulation. This motivates the application of multi-label classification methods to classify Tamil phonemes. Experiments are carried out using Binary Relevance (BR) and Label Powerset (LP) and BR’s improvement Classifier Chains (CC) methods with different base classifiers and the results are analysed.
  • Item
    SHOT CHANGE DETECTION ON NEWS VIDEOS USING COLOR HISTOGRAM AND EDGE BASED APPROACHES
    (IEEE Xplore, 2017-03-30) Brindha, M; Amsaveni, R
    Nowadays, video contents are stored in huge files or it is televised in continuous streams but the users need to retrieve only a particular part of topic or shots from video. So we need to split it in to short video segments with respect to appropriate retrieval units automatically and efficiently. In this research work, based on shot changes two different approaches are to detect shot boundaries. First approach is edge-based segmentation of shot change detection and second approach is color based histograms. These approaches are very suitable for detecting shot changes in large size news videos quickly in effective manner. The NDTV and TV9 news videos are used to detect shot changes with various time periods. The detected shots like anchor shot and non-anchor shot are stored in database. The experimental result shows that edge-based shot change detection performs well in detecting shot frames from given news videos.
  • Item
    SECURING DATA TRANSMISSION IN MANET USING AN IMPROVED COOPERATIVE BAIT DETECTION APPROACH
    (IEEE Xplore, 2017-03-30) Nachammai, M; Radha, N
    Mobile Ad hoc Network often called as MANET, which does not have any particular infrastructure, in which each mobile devices are connected wirelessly and can move freely in any direction without having any restrictions in the network. Malicious nodes present in this network can easily launch highly vulnerable attacks like collaborative Black hole attack and Gray hole attack due to its dynamically changing topology. These attacks affect the routing process within MANET. Hence, Security is the primary concern for finding these nodes. But, to prevent or detect malicious nodes that causes Gray hole or a collaborative black hole attack is a challenge. In this scheme, the malicious nodes and its behaviours are detected using reverse tracing technique by sending RREQ and RREP. However security for transmitting data is not considered by CBDS. In order to have secure transmission after the malicious node detection, our proposed system uses an improved Cooperative Bait Detection approach which incorporates CBDS with message security schemes. Finally this approach is compared with the existing system by using performance metrics like End-to-End Delay, Packet Delivery Ratio (PDR), Throughput and Routing Overhead.
  • Item
    A VOICE ACTIVITY DETECTOR USING SVM AND NAÏVE BAYES CLASSIFICATION ALGORITHM
    (IEEE, 2017-07) Sheela Selvakumari, N A; Radha, V
    Voice or Speech Pathology analysis performs a significant role in the recent record of medical experts. The need for research is the recognition and classifications of tone of pathological voices are believed as a challenging work in the field of speech analysis still now. Commonly Patients are in a position to identify a change in voice parameters, such as hoarseness; however the voice pathologies can result from a wide spectral range of causes, like common cold to a malicious tumor. Medical experts like otolaryngologists were discovering a genuine quantity and range of speech pathologies from the Patients conversation. Unluckily, the current classification rate of voice pathology by the human experts is merely about 60-70%. Thus tone of voice or speech pathologies can be found by the endoscopy techniques and strategies like laryngostroboscopy or medical micro laryngoscopy, which distress the individual to a great scope which is expensive also. The primary objective of the research work is to assist this speech pathology finding process with computer structured diagnostic tools. This speech pathology diagnosis system works predicated on the support of the medical clinic based mostly professional otolaryngologists, by determining and figuring out the chance of the pathology automatically without the endoscopy which escalates the detection of speech pathology at the initial stage. In this research work, the conversation signal is examined by the acoustic guidelines and variables like transmission energy, pitch, Silence removal, Windowing, Mel consistency and occurrence Cepstrum, and Jitter. At the final end, the classification strategy i.e Support Vector Machine is employed to classify the standard and pathology speech, predicated on the features extracted in the last phase. Predicated on the results & conversation and dialogue pointed out below, thus the Speech pathology recognition system successfully categorized and labelled the normal tone of voice and the pathol...
  • Item
    MITIGATING AND RESOLVING DISTRIBUTED DENIAL-OF-SERVICE ATTACKS WITH ENHANCED RANDOM ANONYMOUS PATH IDENTIFIERS
    (IEEE, 2017-10) Srileka, S; Sophia Reena, G
    A Distributed Denial of Service flooding attack in the network performed implicitly and as well as explicitly by the attacker or victim. This attempt is performed to overload the server, generate malicious traffic or interrupting the service. This issue crashes the host and the host's service will be unavailable to the legitimate users. The flexible nature of the network always suffers from DDoS flooding, spoofed source address, and packet or content forgery. Although several defense systems have been proposed by researchers, the problem remains largely unresolved and unreliable for many attacks. Very few researches are interests in using path identifiers (PID) to mitigate the DDoS flooding attacks in the network. But, the existing PIDs are static. The static PIDs are also insecure. To address the above issue, in this paper, we developed the design, implementation, and evaluation of DSPID, a framework that uses dynamic secure PIDs (DSPID) verified with every packet to avoid the DDoS flooding, forgery and spoofing attacks. The proposed system also avoids the selective flooding attack by providing anonymous node id for every node in the network. The proposed system comprises three aspects such as Detect the attack, mitigates the effects of attack and resolves the attack by tracing the source of attack. The proposed mechanism successfully identifies and authenticates the node by the DSPID and anonymous node id. And the system responds to the threat by applying a discriminative rate limit on the malicious traffic flow towards the victim, based on the severity of the attack traffic from each machine and the duration of attack persistence. The proposed system is simple but highly effective in detecting and mitigating distributed denial of service flooding, forgery and spoofing attacks. The experiments and results shows the proposed system achieved better result in terms of several QOS parameters.
  • Item
    SECURING PATIENT'S CONFIDIENTIAL INFORMATION USING ECG STEGANOGRAPHY
    (IEEE, 2017-10) Sivaranjani, B; Radha, N
    The main goal of this research work is to enhance the security of Patient's medical data. During the transmission, the data is concealed with ECG signal. The ECG signal of the human being vary from one person to person. Like other Biometric traits, ECG cannot be imitated and duplicated. Encryption is one of the best technique that guarantees the security of sensitive information. This technique not only grants the information's security but also authentication. secret sub keeping system security. digital signature, and etc. Therefore, the purpose of adopting encryption techniques is to ensure the information's integrity and confidentiality, that prevents information from tampering, forgery and counterfeiting. The encryption method used in this work will encrypt the secret data into unreadable form by creating the information inaccessible to any hacker having a random method. In this paper, Haar Wavelet Transformation is used to decompose an ECG signal to different frequency sub-bands. RSA algorithm is used to encrypt the patient information with the help of key pairs. Arnold cat map technique is used to scramble the encrypted data for more security of information. And for embedding, Singular Value Decomposition (SVD) is used for effective transformation with high security. The proposed algorithm is evaluated based on MSE, PSNR, AD, NCC, MD, NAE, BER and accuracy. The experimental results prove that the performance obtained using proposed techniques give better results than the existing techniques.
  • Item
    SECURE AND ATTACK AWARE ROUTING IN MOBILE AD HOC NETWORKS AGAINST WORMHOLE AND SINKHOLE ATTACKS
    (IEEE, 2017-10) Sasirekha, D; Radha, N
    The inherent characteristics of Mobile Ad hoc network (MANET) such as dynamic topology, limited bandwidth, limited power supply, infrastructure less network make themselves attractive for a wide spectrum of applications and vulnerable to security attacks. Sinkhole attack is the most disruptive routing layer attack. Sinkhole nodes attract all the traffic towards them to setup further active attacks such as Black hole, Gray hole and wormhole attacks. Sinkhole nodes need to be isolated from the MANET as early as possible. In this paper, an effective mechanism is proposed to prevent and detect sinkhole and wormhole attacks in MANET. The proposed work detects and punishes the attacker nodes using different techniques such as node collusion technique, which classifies a node as an attacker node only with the agreement with the neighboring nodes. When the node suspects the existence of attacker or sinkhole node in the path, it joins together with neighboring nodes to determine the sinkhole node. In the prevention of routing attacks, the proposed system introduces a route reserve method; new routes learnt are updated in the routing table of the node only after ensuring that the route does not contain the attacker nodes. The proposed system effectively modifies Ad hoc on demand Distance Vector (AODV) with the ability to detect and prevent the sinkhole and wormhole attack, so the modified protocol is named as Attack Aware Alert (A3AODV). The experiments are carried out in NS2 simulator, and the result shows the efficiency in terms of packet delivery ratio and routing overhead.