P. Arulmozhivarman

ORCID: 0000-0001-8586-1739
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Cooperative Communication and Network Coding
  • Advanced MIMO Systems Optimization
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Advanced Photonic Communication Systems
  • Optical Network Technologies
  • Advanced Wireless Network Optimization
  • Advanced Control Systems Design
  • Air Quality Monitoring and Forecasting
  • Adaptive optics and wavefront sensing
  • Advanced Control Systems Optimization
  • Advanced Optical Network Technologies
  • Speech and Audio Processing
  • Energy Load and Power Forecasting
  • Air Quality and Health Impacts
  • Blind Source Separation Techniques
  • Retinal Imaging and Analysis
  • Fault Detection and Control Systems
  • Glaucoma and retinal disorders
  • Full-Duplex Wireless Communications
  • Optical Systems and Laser Technology
  • Optical Coherence Tomography Applications
  • Stock Market Forecasting Methods
  • Music and Audio Processing

Vellore Institute of Technology University
2014-2023

SASTRA University
2012

National Institute of Technology Tiruchirappalli
2005-2006

Maulana Azad National Institute of Technology
2005

Abstract We describe a system for the automated diagnosis of diabetic retinopathy and glaucoma using fundus optical coherence tomography (OCT) images. Automatic screening will help doctors to quickly identify condition patient in more accurate way. The macular abnormalities caused due can be detected by applying morphological operations, filters thresholds on images patient. Early detection is done estimating Retinal Nerve Fiber Layer (RNFL) thickness from OCT RNFL estimation involves use...

10.1186/1476-511x-11-73 article EN cc-by Lipids in Health and Disease 2012-06-13

In this paper, we have reviewed the recent trends in developing Smart Helmet system. The smart helmet system is used to prevent accidents motor bikes and identify bike on time for wellness of human being. Also, analyzed paper mining industry safeguarding miners from hazardous events mine alert gas emissions inside it. research also helps understand evolved over period currently by using emerging technology like Internet Things (IoT). This work addresses intelligent which inform rider about...

10.1109/iciict1.2019.8741415 article EN 2019-04-01

10.5370/jeet.2013.8.3.559 article EN Journal of Electrical Engineering and Technology 2013-05-01

With the growing internet technology, science and requirement of concealing defense research work, there is a need for highly secured information exchange, which essence steganography. Classic secret could be undermined or even faked thereby, creating menace to core secrecy. Steganography camouflages hidden into an unsuspicious digital file i.e. image, video audio, thereby covering existence it. Using modified LSB substitution readjustment procedure mean square error has been reduced. Pixel...

10.1016/j.proeng.2012.01.831 article EN Procedia Engineering 2012-01-01

It is always important to monitor the quality of air that we inhale protect ourselves from respiratory diseases. In this paper, present different regression models forecast index (AQI) in particular areas interest. Support vector (SVR) and linear like multiple consisting gradient descent, stochastic mini-batch descent were implemented. these models, dependent on pollutant concentrations NO <inf xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</inf>...

10.1109/icoei.2017.8300926 article EN 2017 International Conference on Trends in Electronics and Informatics (ICEI) 2017-05-01

10.1016/j.istr.2013.01.001 article EN Journal of Information Security and Applications 2013-03-13

The motion of a UAV is greatly influenced by its interaction with different kinds surfaces in proximity. In this paper, we address the aerodynamic challenge termed as `The ground effect' faced UAV, mathematical modelling dynamic response. An AR Drone 2.0 has been used to collect variations parameters such roll and pitch at heights above smooth surface. data thus obtained analyzed on MATLAB R2013a models have created correct them for more stable take-off, landing near flights. controller...

10.1109/icecce.2014.7086619 article EN 2014-11-01

Detection of glaucoma has become critical, as it arisen the subsequent essential driver visual impairment, around world. At present, most algorithms in use rely on pre-trained deep neural networks to produce best results. However, high computational time and complexity need a large database, make glaucoma-detection arduous difficult. Keeping these mind, this paper proposes new convolutional network architecture, particular, ProspectNet, which demonstrated accomplish better accuracy with...

10.6703/ijase.202303_20(1).003 article EN cc-by International Journal of Applied Science and Engineering 2023-01-01

Steganography is used to hide a secret message within cover image, thereby yielding stego image such that even the trace of presence information wiped out. The purpose steganography maintain communication between two users. has several technical challenges namely high hiding capacity and imperceptibility. In this paper we propose modern steganographic technique with Integer Wavelet transform (IWT) double key achieve capacity, security good visual quality. Here converted in wavelet...

10.1109/icccet.2011.5762459 article EN 2011-03-01

Infrared (IR) thermography is used in many fields such as environment, military, industry, etc. IR has the ability to detect problems before they occurs and especially helpful overloads, worn circuit brakes. It unique because of it measurement its accuracy. In this paper we are proposing technique flow detection pipe-lines extract effected leakage areas pipe. Therefore, using basic principal distinguish different types thermal images from concepts image processing MATLAB.

10.1109/iccsp.2016.7754411 article EN 2016-04-01

Modern day information age is enriched with the advanced network communication expertise but unfortunately at same time encounters infinite security issues when dealing secret and/or private information. The storage and transmission of become highly essential have led to a deluge research in this field. In paper, an optimistic effort has been taken combine graceful graph along integer wavelet transform (IWT) implement random image steganography for secure communication. implementation part...

10.1155/2013/464107 article EN cc-by The Scientific World JOURNAL 2013-01-01

Steganography conceals the secret information inside cover medium. There are two types of steganography techniques available practically. They spatial domain and Transform steganography. The objectives to be considered in methods high capacity, imperceptibility robustness. In this paper, a Color image transform is proposed. Reversible Integer Haar wavelet applied R, G B planes separately data embedded random manner. Random selection coefficients based on graph theory. This proposed system...

10.1109/icsipa.2013.6708029 article EN 2013-10-01

Landslides are one of the major geo hazards responsible for huge loss resources worldwide. Since time immemorial, Nilgiris, a hilly district Tamil Nadu, has been repeatedly ravaged by landslides. With an aim to develop landslide early warning systems paper develops different models assess occurrence risk based on daily rainfall forecasts and thresholds. The employs Artificial Neural Networks predict day advance intensity then assesses comparing it with data set comprises recorded intensities...

10.1109/icacci.2014.6968566 article EN 2014-09-01

In this paper, a brief overview of real time implementation next generation Robust, Tracking, Disturbance rejecting, Aggressive (RTDA) controller and Model Predictive Control (MPC) is provided. The control algorithm implemented through MATLAB. plant model used in design obtained using system identification tool integral response method. developed Simulink jMPC tool, which will be executed time. outputs are tested for various constraint values to obtain the desirable results. Hardware Loop...

10.1016/j.aej.2016.07.028 article EN cc-by-nc-nd Alexandria Engineering Journal 2016-08-24

A watermarking scheme based on SVM is implemented and analyzed for two different forms of copyright information, a 34 × 45 binary image sound signal utterance word. In this work, the generalization ability using basic linear kernel information analyzed. During extraction, trained an extra reference watermark. The perceptual legibility are taken as objective parameter analysis. embedded in positions where values pixels well within limit decided by mean surrounding pixels. found to be...

10.1109/tencon.2008.4766410 article EN 2008-11-01

The densification of serving nodes is one the potential solutions to maximize spectral efficiency per unit area. This preposterous on account conventional base stations (BS) for which site procurement costly. Long term evolution-advanced (LTE-A) defines idea heterogeneous networks (HetNets), where BSs with different coverage and capacity are utilized guarantee quality service (QoS) requirements clients. To transmission clients in holes, LTE-A also multihop relay (MHR) networks, (RSs) placed...

10.1155/2017/8086204 article EN Wireless Communications and Mobile Computing 2017-01-01

This paper aims to establish a non-linear regression model based on Mamdani fuzzy inference system and examine the performance of various metrics such as correlation, index agreement, mean absolute percentage error, error root square error. The data used in this operation is collected from Delhi Punjabibagh with pollutants spanning Nitrogen dioxide particulate matter 10μm ozone carbon monoxide considered comprehensively cover base inputs. resultant air quality then measured calculated ones...

10.1109/icoei.2017.8300944 article EN 2017 International Conference on Trends in Electronics and Informatics (ICEI) 2017-05-01
Coming Soon ...