Face Detection Using L*A*B Color Space
Muthukumar subramanyam, Abirami R, Karthi T, Swathy T
One of the most important researches in biometrics is human face detection system, which utilizes face detection from the captured images or videos.
Indian Journal of Science, 2015, 17(53), 1-8
Cervical cancer Detection Methodologies
Ravi Subban, Vinodiny S
This paper provides a survey on cervical cancer detection techniques. Our aim is to help the budding researchers doing research work in the field of cervical cancer detection. Cervical cancer plays a vital role in women’s mortality.
Indian Journal of Science, 2015, 17(53), 9-13
Allocation of a Midway Server to Reduce the Taskload of Mapreduce Phases for Bigdata applications
Rengalakshmi S, Alaudeen Basha S
The term big-data refers to the widely scattered data processing applications that handle large amounts of data. MapReduce and Apache’s Hadoop of Google are the essential software systems for big-data applications.
Indian Journal of Science, 2015, 17(53), 14-18
Detecting intruders in wireless sensor networks using extended kalman filter
Anbumozhi A, Poovarasi R, Sivasankari K
Detecting Intruders in Wireless Sensor Networks plays an important role. Security in network aggregation is not an easy task. Sensor network consist of sensor nodes whose operation can be controlled by underlying network.
Indian Journal of Science, 2015, 17(54), 23-28
Image Watermarking in Color Images Based on Discrete Cosine Transform
Ravi Subban, Jayashree M, Pavithra Kaliaperumal, Ramya Chandran
In this paper a watermarking in colour images that embeds a binary watermark into host image. In this scheme the colour images is transformed from RBG to YCbCr, YCgCr, YDbDr, YIQ, YES, YUV and LMS color spaces.
Indian Journal of Science, 2015, 17(54), 29-33
Distributed intrusion detection based on ensemble of classifier using Gaussian mixture models (GMMs)
Poovarasi R, Anbumozhi A, Sivasankari K
Detecting Intruders around Networks plays an important role. Security in network aggregation is not an easy task. Network consists of nodes whose operation can be controlled by underlying network.
Indian Journal of Science, 2015, 17(55), 34-38
Distributed Detecting and Tracking Objects in Surveillance Videos
Suresh Babumatla SV, Ravi S
Detecting and tracking objects well in a visual surveillance system is crucial for diverse of application areas including abnormal event detection, modelling trajectory patterns, human gait characterization and pose estimation, object identification and classification.
Indian Journal of Science, 2015, 17(55), 39-43
Neural Network Based Iris Identification Methods
Ravi Subban, Susitha N
Iris Identification is one of the biometrics techniques used for biometric authentication based on the physiological characteristic of a human being. This survey paper aims to cover both the historical development and current gradual progress in the iris tracking research on the research work done earlier and recent achievements.
Indian Journal of Science, 2015, 17(55), 44-48
Throughput Evaluation of Wireless Local Area Network using Distributed Multiuser Scheduling
Narmada B, Sudhapriya P
The main intention of this research is to enhance performance of wireless local area network. Collision avoidance (CA) technique is mainly used to improve the performance of the carrier sense multiple access (CSMA) method by attempting to divide the channel almost equally among all transmitting nodes within the collision domain.
Indian Journal of Science, 2015, 17(56), 49-53
To outstrip content based search in digital libraries by employing Ontology
Narmada B, Balaji T
The digital libraries are became a benchmark to educational institutions. Also private libraries are being digitized for the convenience of administrators. But the search for books and specific content are became tedious due to the huge growth of it.
Indian Journal of Science, 2015, 17(56), 54-60
A Novel Horizontal Flip Based M-Captcha for Cyber Security
Muthukumar Subramanyam, Balaji T, Muthu Alagammai P, Ragavi N
In today’s world the cyber security is at high risk. It became very difficult for the computer systems to identify whether it is interacting with the human or the machine (i.e., the computer fails in Turing test).