Papers by s anthoniraj
FPGA Implementation of Elliptic Curve Point Multiplication over GF(2191)
Lecture Notes in Computer Science, 2009
Abstract. Hardware acceleration of cryptographic algorithms is beneficial be-cause considerable p... more Abstract. Hardware acceleration of cryptographic algorithms is beneficial be-cause considerable performance improvements can be attained compared to software implementations. Thus, hardware implementations can be used in crit-ical applications requiring high encryption or ...

Journal of Mathematics
Due to bandwidth and time limits, delivering high-quality video streaming facility offers real-ti... more Due to bandwidth and time limits, delivering high-quality video streaming facility offers real-time wireless networks, but assuring quality of experience (QoE) is rather difficult. A network host can deliver its data stream via numerous different network pathways. At the same time, using multipath data transmission, where video streaming may be supplied through Internet protocols (IPs) as well as broadband with bidirectional communication between video sources and consumers, is one way to address this difficult problem. In this work, a novel framework is developed for wireless heterogeneous networks for video streaming applications using concurrent multipath transfer (CMT). The performance of frame-level delay can be enhanced for better video quality using this proposed method. The network congestion on end-to-end path utilised in CMT is not dependent of one another, and we operate under prior assumption that receiver’s announced window does not limit the sender. The analytical resu...
Segmentation of the human spinal cord using U-Net architecture
International Journal of Medical Engineering and Informatics

Sign Language Interpreter Using Machine Learning
2021 International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA)
Communication is the key point for interaction and we humans use different languages through whic... more Communication is the key point for interaction and we humans use different languages through which we share our views and opinions. But for certain people i. e., the hearing impaired or the deaf and dumb they are not able communicate well because of their disability. According to World Health Organization (WHO) it is estimated that hearing loss affects approximately four hundred sixty-six million people globally with thirty-four millions of these being children. Sign language is one of the possibilities through which they can communicate. It is a coded language in which they use hand gestures. Communication with the rest of the world is very difficult for hearing-impaired people and hence they are isolated, in order to overcome these circumstances, we present a project that is helpful to such people. This project presents a solution with the use of Machine Learning that will identify hand gestures and translate it into speech/text and the vice versa that is it convert from speech/text to gesture. A webcam will be used to capture the region of interest i.e, recognize the hand motion as well as the gesture that the hand is indicating. Based on the recognized gestures, the recorded soundtrack will be played.

Temperature Influence on Dielectric Tunnel FET Characterization and Subthreshold Characterization
Silicon
VLSI technology is being developed to lower the size of semiconductor devices due to the increasi... more VLSI technology is being developed to lower the size of semiconductor devices due to the increasing importance of integrated circuits (ICs). Short channel effects, for example, make it difficult to operate these devices as technology continues to advance. Thus, the device’s downsizing is made possible by designing new structures and leveraging new methods of current transfer. Many researchers believe that for low-power applications, TFETs, which rely on band-to-band tunnelling for current transfer, are a viable alternative to MOSFETs. For the purposes of mixed signal applications, this study examines the TFET from the perspective of both device and circuit-level simulations. It has been suggested that the negative capacitance (NC) of ferroelectrics could be used to overcome the basic limit of MOSFETs by utilising the differential amplification of the gate voltage under certain circumstances. It’s a negative capacitance heterostructure based on these two ideas. As a result, the surrounding gate structure concept has improved the output characteristics of TFETs. By reducing channel resistance and tunnelling width, the suggested device size can be optimised. The TFET topologies discussed above are ideal for low-power switching and analogue RF applications. The proposed analytical models were tested using MATLAB and confirmed using the nanoscale device simulator Technology Computer-Aided Design (TCAD). The stacked surrounding gate TFET device, according to the data, is an interesting device contender to replace VLSI technology.

Research Journal of Applied Sciences, Engineering and Technology, 2014
Virtualization is a technology that combines or divides computing resources to present one or man... more Virtualization is a technology that combines or divides computing resources to present one or many operating environments using methodologies like hardware and software partitioning or aggregation, partial or complete machine simulation, emulation, time-sharing and others. The hackers are also making use of it for hiding their identity and to exploit the other machines. One more terminology, as port scanner for scanning the presence of hackers. It is also distorted by them in such a way for the analysis of open ports and also it provides a solution with the roll backing system and the Maize routing. So whenever the information loss occurs, the roll back mechanism is introduced and used as a secondary security. As a primary, the proposed concept of Maize Routing (MR) is used. Here we uses the Base Internet Protocol (IP) of the virtualized system as a reference and produce multiple duplicated IP's. Whenever the presence of the hacker is found, then the revealing mechanism sends a link to the virtual machine and directed to the Maize routing. Then the execution mechanism activates and diverts them in to a wrong direction. Hence the effective data security is achieved by using the mechanism of maize routing.

In virtual platforms, disaster management yields to the platform oriented service which is precis... more In virtual platforms, disaster management yields to the platform oriented service which is precisely taught using virtual machines. Due to user, execution comes under various verities and simplified structure becomes a complex task. The automated system called backing technique method is introduced, in which proficient performance administration and simplified constitution are guaranteed. But, in the proposed technique, the concept of backing method is presented with additional features, which, persuades the structure so that intricacy diminution is made feasible. Analysis shows that malfunction of Exe, Win-x, kernel, and host can be detrimental for an individual virtual machine. On the basis of this, a new algorithm is developed called backing algorithm which is one of the finest in its concert. The backing algorithm is intelligent to afford continuous monitoring and can accomplish failure reporting proficiently. In addition to backing algorithm concept, we extensively build virtual machine solution provider (VMSP) to sustain this system by frequent monitoring using virtual machine monitor (VMM). These results are provided, backing algorithm with VMM gives that the competent precaution technique when the crash or system boot failure occurs and also it provides the best alert solution for data recovery process at the time of failure.
Computer vision has been in high demand due to the Coronavirus pandemic to improve healthcare sec... more Computer vision has been in high demand due to the Coronavirus pandemic to improve healthcare sector. During this time detecting small objects is a tougher task, as it uses both classification and detection using video illustration. This Object Detection demonstrated a superior feature ie, Mask Detection compared to other object detection models. This Face mask detection using YOLOv3 performed well. This Face mask detection measures performance at the same time with strong GPU and works with less computation power We add dataset which consists of both people wearing face masks and without facemask, The model is trained by this dataset consisting of face mask and no face mask. Real time video can also be used to verify whether the person is wearing mask or not. This Face Mask Detection model attained good output with 96% classification.

Face Mask Detection with Computer Vision Deep Learning
2021 International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA)
Computer vision has been in high demand due to the Coronavirus pandemic to improve healthcare sec... more Computer vision has been in high demand due to the Coronavirus pandemic to improve healthcare sector. During this time detecting small objects is a tougher task, as it uses both classification and detection using video illustration. This Object Detection demonstrated a superior feature ie, Mask Detection compared to other object detection models. This Face mask detection using YOLOv3 performed well. This Face mask detection measures performance at the same time with strong GPU and works with less computation power We add dataset which consists of both people wearing face masks and without facemask, The model is trained by this dataset consisting of face mask and no face mask. Real time video can also be used to verify whether the person is wearing mask or not. This Face Mask Detection model attained good output with 96% classification.
Article history: Received 12 October 2014 Received in revised form 26 December 2014 Accepted 1 Ja... more Article history: Received 12 October 2014 Received in revised form 26 December 2014 Accepted 1 January 2015 Available online 25 February 2015
Development of keyless biometric authenticated vehicles ignition system

Weed Detection Model Using the Generative Adversarial Network and Deep Convolutional Neural Network
Journal of Mobile Multimedia
Agriculture crop demand is increasing day by day because of population. Crop production can be in... more Agriculture crop demand is increasing day by day because of population. Crop production can be increased by removing weeds in the agriculture field. However, weed detection is a complicated problem in the agriculture field. The main objective of this paper is to improve the accuracy of weed detection by combining generative adversarial networks and convolutional neural networks. We have implemented deep learning models, namely Generative Adversarial Network and Deep Convolutional Neural Network (GAN-DCNN), AlexNet, VGG16, ResNet50, and Google Net perform the detection of the weed. A generative Adversarial Network generates the weed image, and Deep Convolutional Neural Network detects the weed in the image. GAN-DCNN method outperforms than existing weed detection method. Simulation results confirm that the proposed GAN-DCNN has improved performance with a maximum weed detection rate of 87.12 and 96.34 accuracies.

In data administration resource sharing has a crucial liability. At the same time we should be co... more In data administration resource sharing has a crucial liability. At the same time we should be conscious about the enslavement factors. In addition virtual platforms can be demoralized as part of gaining the information about a system. As a result the corruption of files can cause crash status of the system. Traditional systems are followers of this observable fact. It yield to the reality that present mechanisms are not proficient to cover all the dependency factors so that the demand of an innovative structure is important. As a result here we initiate a new system named resource sharing. It can be considered as a customized system that can enhance the needs of end users. Resource sharing can have link establishment between various internal and external systems. The medium of correlation can be an independent factor here. For an internal system it can make use of virtual platform, where as for the external it can make use both the virtual and physical connection establishments. The privacy of a user is considered with higher priority and bound them during the usage. Since the usage is in personalized manner, it would be capable of boosting overall performance of the system. For every system security is a major issue. Data security is ensured in such a way that supervision governance .The main advantage here is it can recover the data from distant location during the disaster of the local system. The whole mechanism is governed by the shell sheltered algorithm. Effective usage of the system can result better performance, security and simplified computation module so that terminologies becomes simpler.

E3S Web of Conferences
In Mobile Ad Hoc Networks (MANETs), power control is necessary in order to reduce power consumpti... more In Mobile Ad Hoc Networks (MANETs), power control is necessary in order to reduce power consumption rates, avoid collisions within packets, increase spatial throughput of the system and to reduce contention among flows. The MANET nodes which are outside the transmission range are energy constraint and they consume more power for packet transmission. In this paper, we propose to develop a power adjustment algorithm to provide higher throughput and consume less power in the Mobile Ad hoc Networks. An optimal transmission power is calculated at the receiver based upon the data payload length and the interference amount. This power is given to the transmitter which increments or decrements the power with respect to the number of neighboring nodes. The adjusted power is retransmitted to the receiver so that the power level can be adjusted between the transmitter and receiver. Since the optimal transmission power is determined based upon the interference amount the possibility of collisio...

E3S Web of Conferences
Mobile Ad Hoc Network (MANET) is an Emergency transportable Ad-Hoc network, which is a significan... more Mobile Ad Hoc Network (MANET) is an Emergency transportable Ad-Hoc network, which is a significant module of the Internet of Effects and has been extensively practiced in smart transportation systems in new existences. In this proposed system using Web-based Multi-Layer protocols for Emergency Data Transmission (WMLP), Dynamic multi-priority message order management method it is used to reduce the data transmission delay in entire networks. To fulfill the real-time limitations of emergency data, we proposed WMLP, a novel Networks web-like transmission mechanism for emergency data. We create a spiderweb-like perfect to limit the exact area. Source nodes send out demand terminus nodes send confirmed host in this controlled area to develop well-organized broadcast paths. The dynamic multi-priority file administration method it is managed some of packets level by level. In this protocols mining, necessary packs and giving the first importance emergency messages are function and consider...

International Journal of Information and Communication Technology
In virtual platforms, disaster management yields to the platform oriented service which is precis... more In virtual platforms, disaster management yields to the platform oriented service which is precisely taught using virtual machines. Due to user, execution comes under various verities and simplified structure becomes a complex task. The automated system called backing technique method is introduced, in which proficient performance administration and simplified constitution are guaranteed. But, in the proposed technique, the concept of backing method is presented with additional features, which, persuades the structure so that intricacy diminution is made feasible. Analysis shows that malfunction of Exe, Win-x, kernel, and host can be detrimental for an individual virtual machine. On the basis of this, a new algorithm is developed called backing algorithm which is one of the finest in its concert. The backing algorithm is intelligent to afford continuous monitoring and can accomplish failure reporting proficiently. In addition to backing algorithm concept, we extensively build virtual machine solution provider (VMSP) to sustain this system by frequent monitoring using virtual machine monitor (VMM). These results are provided, backing algorithm with VMM gives that the competent precaution technique when the crash or system boot failure occurs and also it provides the best alert solution for data recovery process at the time of failure.
Conference Presentations by s anthoniraj

Communication is the key point for interaction and we humans use different languages through whic... more Communication is the key point for interaction and we humans use different languages through which we share our views and opinions. But for certain people i.e., the hearing impaired or the deaf and dumb they are not able communicate well because of their disability. According to World Health Organization (WHO) it is estimated that hearing loss affects approximately four hundred sixtysix million people globally with thirty-four millions of these being children. Sign language is one of the possibilities through which they can communicate. It is a coded language in which they use hand gestures. Communication with the rest of the world is very difficult for hearing-impaired people and hence they are isolated, in order to overcome these circumstances, we present a project that is helpful to such people. This project presents a solution with the use of Machine Learning that will identify hand gestures and translate it into speech/text and the vice versa that is it convert from speech/text to gesture. A webcam will be used to capture the region of interest i.e, recognize the hand motion as well as the gesture that the hand is indicating. Based on the recognized gestures, the recorded soundtrack will be played.
Uploads
Papers by s anthoniraj
Conference Presentations by s anthoniraj