scispace - formally typeset
Search or ask a question
Institution

Kongu Engineering College

About: Kongu Engineering College is a based out in . It is known for research contribution in the topics: Computer science & Cluster analysis. The organization has 2001 authors who have published 1978 publications receiving 16923 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This method is compared with the other state‐of‐the‐art methods on the same lung image from open‐access dataset and the multi‐evaluation parameters are used to evaluate the proposed method.
Abstract: The automatic detection and location of the tumor regions in lung images is more important to provide timely medical treatments to patients in order to save their lives. In this article, machine learning‐based lung tumor detection, classification and segmentation algorithm is proposed. The tumor classification phase first smooth the source lung computed tomography image using adaptive median filter and then discrete time complex wavelet transform (DT‐CWT) is applied on this smoothed lung image to decompose the entire image into a number of sub‐bands. Along with the decomposed sub‐bands, DWT, pattern, and co‐occurrence features are computed and classified using co‐active adaptive neuro fuzzy inference system (CANFIS). The tumor segmentation phase uses morphological functions on this classified abnormal lung image to locate the tumor regions. The multi‐evaluation parameters are used to evaluate the proposed method. This method is compared with the other state‐of‐the‐art methods on the same lung image from open‐access dataset.

7 citations

Proceedings ArticleDOI
17 Apr 2013
TL;DR: The proposed authentication methods can be used for recording the medical data in a central database and for accessing medical records in various settings and an algorithm for visual cryptography and steganography is built using MATLAB platform.
Abstract: Medical information is extremely high sensitive in nature. Tampering by a third party may result in identity theft and incorrect diagnosis. Hence, it is important to secure the transfer of medical information from the patient to the remote system where the specialist. The proposed work decomposes this problem into two sub-problems and proposes security solutions to each of them: (1) to secure the link between the patient and the device, and (2) to secure the link between the device and the network. Biometric identification is extremely an effective authentication. Thus we push the limits of the network security to the edge by authenticating the user using their biometric information; authenticating the device to the network at the physical layer and strengthening the security of the wireless link using steganography. The proposed authentication methods can be used for recording the medical data in a central database and for accessing medical records in various settings. An algorithm for visual cryptography and steganography is built using MATLAB platform. The proposed work considers iris images for authentication it was taken from CASIA Iris Image Database V4.0.

7 citations

Journal ArticleDOI
TL;DR: An osteoporosis prediction system that effectively determines its possibility of occurrence based on essential factors such as smoking habits and calcium level so that the people at high risk can be referred to access the DEXA scanner.

7 citations

Journal ArticleDOI
TL;DR: In this article, an axisymmetrical hemispherical asperity in contact with a rigid flat is considered in the present analysis for the unloading case by including the strain hardening effect.
Abstract: Identifying the exact state transition, i.e., end of elastic-plastic regime or the start of fully plastic regime, in asperity level contacts during loading and unloading process requires much attention to prevent the failure of components. The present work extends the Shankar and Mayuram model (SM Model) work for the unloading case. An axisymmetrical hemispherical asperity in contact with a rigid flat is considered in the present analysis for the unloading case by including the strain hardening effect. The unloading is done accurately at the end of elastic-plastic state on the lines of SM model empirical expressions for various Y/E ratios, also with different Et /E ratios. New empirical expressions are formulated based on the extensive analysis to determine the residual interference ratio. The results are generalized at the end of the elastic-plastic state for different levels of Y/E ratios by including the strain hardening effect.

7 citations

Journal ArticleDOI
TL;DR: In this article, the multi-response optimization for abrasive waterjet machining (AWJM) of glass fiber reinforced plastics (GFRP) was performed. And the experiments were conducted with AWJM factors like pre...
Abstract: This work aims to perform the multi-response optimization for abrasive waterjet machining (AWJM) of glass fiber reinforced plastics (GFRP). The experiments were conducted with AWJM factors like pre...

7 citations


Authors
Network Information
Related Institutions (5)
Anna University
19.9K papers, 312.6K citations

89% related

VIT University
24.4K papers, 261.8K citations

89% related

National Institute of Technology, Rourkela
10.7K papers, 150.1K citations

88% related

SRM University
11.7K papers, 103.7K citations

88% related

Thapar University
8.5K papers, 130.3K citations

87% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202221
2021572
2020234
2019121
2018143
2017136