Papers by Dr RAJESHWARI J

International Journal of Innovative Research in Computer and Communication Engineering, 2025
Image Processing is a vital segment of present day advancements since human depends such a great ... more Image Processing is a vital segment of present day advancements since human depends such a great amount on the visual data than many other data. The big challenge to researchers, engineers and specialists is to rapidly separate the significant data from the raw image data. Proposed strategy for vehicles statistic in complex urban movement scenes to determine insufficiencies of conventional checking strategies, which are profoundly computationally costly and turned out to be unsuccessful with expanding unpredictability in urban rush hour traffic situations. The special feature of the proposed system is it will give more accuracy in normal video and blurred video. This system first applies the deconvolution deblurring techniques on video frames improve the quality of the image and then vehicle counting process is invoked which apply background subtraction and segmentation technique to detect the vehicles. Test results of this system based on real-world urban traffic videos show that the accuracy rate of the proposed approach is very high.

Numerous applications have been developed using Blockchain in recent years as its popularity has ... more Numerous applications have been developed using Blockchain in recent years as its popularity has grown. Any application that uses Blockchain technology as part of its architectural model guarantees the integrity of its data. Using a decentralized Blockchain system to verify drugs, companies, and brands can prevent counterfeiting while reducing costs at the same time. This paper presents a secure Blockchain-based model to counterfeit fake products in the market. A key is generated for each product, which is stored in the Blockchain. This key will also be fed into a QR code which will be attached to each product. This model uses a QR code-based approach to verify the truthfulness of the product by searching the Blockchain. As the Blockchain is immutable in nature, the data cannot be breached or modified. Also designed is an accompanying web-based application to implement this approach and discusses the software implementation process where the application scans the product code and confirms whether the given product is fake or not.

Numerous applications have been developed using Blockchain in recent years as its popularity has ... more Numerous applications have been developed using Blockchain in recent years as its popularity has grown. Any application that uses Blockchain technology as part of its architectural model guarantees the integrity of its data. Using a decentralized Blockchain system to verify drugs, companies, and brands can prevent counterfeiting while reducing costs at the same time. This paper presents a secure Blockchain-based model to counterfeit fake products in the market. A key is generated for each product, which is stored in the Blockchain. This key will also be fed into a QR code which will be attached to each product. This model uses a QR code-based approach to verify the truthfulness of the product by searching the Blockchain. As the Blockchain is immutable in nature, the data cannot be breached or modified. Also designed is an accompanying web-based application to implement this approach and discusses the software implementation process where the application scans the product code and confirms whether the given product is fake or not.

In the past few years, green computing has been widely accepted and implemented, especially in ar... more In the past few years, green computing has been widely accepted and implemented, especially in areas like social computing, mobile computing, AI-driven agent systems, and the Internet of Things (IoT). This work draws inspiration from these factors and seeks to delve into the constantly changing landscape of vulnerabilities associated with IoT devices. The paper presents an in-depth survey that thoroughly covers multiple features of the IoT domain. This paper specifically focuses on categorizing the attacks that exploit different vulnerabilities in IoT ecosystems. We delve into a classification system that clarifies the complex landscape of these attacks. After that, we shift our focus to techniques for assessing IoT vulnerabilities, offering valuable perspectives on how to evaluate and mitigate the related risks. The paper concludes by highlighting the emerging challenges in the IoT domain and its long-term viability, offering valuable insights for individuals to explore research opportunities in this dynamic and promising area.

Numerous applications have been developed using Blockchain in recent years as its popularity has ... more Numerous applications have been developed using Blockchain in recent years as its popularity has grown. Any application that uses Blockchain technology as part of its architectural model guarantees the integrity of its data. Using a decentralized Blockchain system to verify drugs, companies, and brands can prevent counterfeiting while reducing costs at the same time. This paper presents a secure Blockchain-based model to counterfeit fake products in the market. A key is generated for each product, which is stored in the Blockchain. This key will also be fed into a QR code which will be attached to each product. This model uses a QR code-based approach to verify the truthfulness of the product by searching the Blockchain. As the Blockchain is immutable in nature, the data cannot be breached or modified. Also designed is an accompanying web-based application to implement this approach and discusses the software implementation process where the application scans the product code and confirms whether the given product is fake or not.
Uploads
Papers by Dr RAJESHWARI J