- IoT and GPS-based Vehicle Safety Systems
- IoT-based Smart Home Systems
- Fuzzy Systems and Optimization
- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Smart Agriculture and AI
- Agricultural risk and resilience
- Context-Aware Activity Recognition Systems
- Tactile and Sensory Interactions
- Agricultural Economics and Practices
- Blockchain Technology Applications and Security
- Nonlinear Differential Equations Analysis
- Hand Gesture Recognition Systems
- Fire Detection and Safety Systems
- Internet Traffic Analysis and Secure E-voting
- Internet of Things and AI
- Anomaly Detection Techniques and Applications
- Welding Techniques and Residual Stresses
- Fractional Differential Equations Solutions
- Non-Destructive Testing Techniques
- Network Packet Processing and Optimization
- Identification and Quantification in Food
- Artificial Intelligence in Healthcare
- BIM and Construction Integration
- Software Testing and Debugging Techniques
Sri Sai University
2024-2025
Periyar University
2008-2020
Hindustan Institute of Technology and Science
2012-2019
Anna University, Chennai
2011-2017
Today, in the current global scenario, Women were facing lot of challenges. We can hear news women harassments than their achievements. There are many existing apps and devices for security via smart phones. Though phones have increased rapidly, it is not possible to phone all time our hand make a call or click on it, so here we introduced new technique watches. When child wearing this `watch me' exposed sexual vulnerable attack, sensor present detects heart beat rate person which will be...
Agriculture is the backbone of Indian economy, with more than half country's people relying on it for subsistence. Crop production predicted using machine learning techniques based parameters such as rainfall, crop, and meteorological conditions. The most popular powerful supervised algorithm, Random Forest, can do both classification regression tasks. They are used in crop selection to reduce yield output losses, regardless distracting environment. Weather, climate, other related...
Wireless communication has become a basic utility in personal and business life such that it becomes fundamental of our lives this uses the radio spectrum for data transfer. There are issues using further, they are, capacity, efficiency, availability security. The defects Wi-Fi technology given birth to concept Li-Fi (Light Fidelity) technology. can be defined as light based Wi-Fi. This mainly serves purpose transmitting retrofitting LED Bulbs high durability reliability.This emerged by...
As per the Data Compiled by Ministry of Indian Railways, there are nearly 5413 people who lost their lives in Railway accidents from 2015-2020, most which due to careless and rushed boarding & de-boarding. Thus, a proposed model called "RFID enabled Rescuer" is introduced minimize these railway accidents. The Internet Things (IoT) system consists Radio Frequency Identification (RFID) tag, that detects passenger ZOR (Zone Risk - Door Edge) turn triggers RFID reader fixed compartment....
The main objective of the democracy is "vote" by which people can elect candidates for forming an efficient government to satisfy their needs and requests such that standard living be improved. In developing countries like "INDIA" election commission follows manual voting mechanism done electronic machine. This machine placed in poll booth centre monitored higher officials. due some illegal activities polling are misused people's vote right has been denied. seldom occurs rural areas as well...
Abstract In this paper, we study the numerical solution of hybrid fuzzy differential equations by using Adams–Bashforth, Adams–Moulton and predictor-corrector methods. Predictor-corrector is obtained combining Adams–Bashforth addition, state convergence stability proposed Examples are presented to illustrate computational aspects these Keywords: systemsfuzzy equationsAdams–Bashforth methodAdams–Moulton methodpredictor-corrector method 2000 AMS Subject Classification : 34A12 65L05...
Trash Collection and management in residential locality is the basic considerations referred to Smart Cities. The concept of trash collection India quite tedious. For efficient collection, we use Internet Things (IOT) which acts as a backbone Technology. Surveillance systems can be used improve Quality Service collection. "This paper proposes an advanced system with smart bins that alerts authorised collector by sending alert messages for Cities." incorporates data sharing model using cloud...
Intelligence applications are being developed that make machines more sophisticated in their way of learning and to decisions. Accident is a specific, unpredicted external action happens unexpectedly with no apparent or deliberate cause but marked effects. With the increasing number bike riders accidents happening each year our paper focuses on methods can be implemented ensure safety while driving. Distraction driver's attention major these accidents. Nowadays wearing helmet has been made...
This paper focuses on designing an Intrusion Detection System(IDS), which detects the family of attack in a dataset. An IDS various types malicious traffic and computer usage cannot be detected by conventional firewall. In this proposed work, data is extracted from UNSW_NB15 To identify cluster centers, k means algorithm used. A new one dimensional distance based feature used to represent each sample. Following this, ensemble classifier classify data. Our would five families viz., Normal,...
Illegal fishing has become a worldwide concern resulting in drastic ecological consequences due to activities like overfishing. It is statistically shown that about 11–20 million tonnes of fish have been caught illegally on an annual basis, which amounts 14%–33% the global catch. The estimated illegal catch totaled be around $23 Billion. vessel's ability dredge, deplete and damage lowered stock 65.8% 2017 from 90% 1990 within biologically sustainable levels. To serve preservation...
Most educational institutions offer safe, efficient transportation options for both employees and students. Sometimes there can be a delay or reorganization in the facilities as result of some practical concerns. This concept, smartphone application called College Bus Locator & Tracker, is one potential remedy (CBLT). mobile app was created specifically students at to use GPS technology track their route buses real-time. Since only usersauthorized by relevant organization access private...
In recent years, there has been an increasing demand for organic foods and home products due to their health benefits eco-friendliness. However, the lack of standardization certification made it difficult consumers trust authenticity these products. This article presented here is a cloud-based application that enables purchase verify The proposed system uses cloud solution ensuring product authenticity, while infrastructure provides scalability security system. includes user-friendly...
Visually impaired people, in order to understand printed or hand written media, need the material be present Braille. They also require an understanding of Braille language. The proposed system instead uses other senses that visually challenged person possesses, such as ability listen and convert textual into audio stream. This concept starts with capturing image recognizing text using OCR/ICR. It then loads required font templates for conversion software. Subsequently hand-written documents...
Blindness is an obstacle that not even comprehendible for the non-blind. Many day-to-day activities may become challenging, complicated and require much more labor those with eye-sight problems or blindness. One of major they face understanding visual text information which are in Braille form. Not every written printed document a blind person would like to read available Braille. A cannot any handwritten documents. They feel it very difficult, while someone has them. This fundamental issue...
Speech and spoken words have always played a big role in the individual collective lives of people. Autistic is possible term for person who can not speak or communicate. Autism when finds it hard to communicate express themselves. 'Voice For The Voice less' technology which aims track every movement lips transform them into voice, could help communicationally challenged people speak, allows as normal human being. This makes use six AG-500 Articulograph sensors fixed over user. When user...
Visually challenged are majorly dependent on the Braille language for comprehensive reading of textual documents and their walking sticks they hold everyday obstruction identification. Making them virtually visible in an environment get workable a technical organisation this system innovates technology which provides audio descriptions blind surroundings. The design involves human face, object recognition make vision visually challenged. smart kit contains eye glass provided with camera, ear...
Emergency tracking is an important research aspect in todays modern era. In this current situation, the goal to provide a security system for both men and women who are sexually harassed. Women not safe while traveling alone on lonely roads deserted places. The study presented here paper reports that 24.8% of people have experienced physical and/or sexual violence at some point their lives. To overcome situation several methodology exists with integration multiple devices like IoT components...
India, the largest exporter of farm products, faces low agricultural productivity, resulting in reduced income for farmers. To boost revenue, performance improvement is crucial. Irrigation plays a vital role farming, necessitating careful management soil moisture levels. However, traditional irrigation methods often lead to water wastage. Efficient utilization land and resources essential addressing this issue. Pest attacks pose significant threat crop yield quality, making pest...
Welding is a fabrication of joining materials into one component. Defects are unavoidable during the welding process, and hence inspection welds most important task in many industries. In this work, Computer Aided Detection (CAD) system designed to detect weld defects based on image processing techniques. It non-destructive testing which uses X-ray images. The proposed mainly consists three stages; gradient formation, filtration by Gaussian pyramidal filters algorithm segmentation...
In this paper, we study the numerical solution of fuzzy differential equations by using hybrid Euler method and predictor-corrector method. These methods are used to increase accuracy computing speed. Also examples presented illustrate computational aspects above methods.
Content-based text classification system can automatically categories the document into predefined limited classes. But e-mail is a challenging process in modern internet environment. The documents are lightly signified great dimensional features space, creating learning process, and generalization (abstraction) problematic. Spam unsolicited mail, bulk of spam mails sent by spammers who use vast programs to cover their characteristics send every day with no money. mail directs various...
In this paper, we study the existence and uniqueness of solutions for a class fuzzy Volterra integral equations with infinite delay by using method successive approximations.