Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this paper, the thermal behavior of coal ash and aluminium powder along with coal is recorded in DTA and X-Ray Diffraction meter. But the results showed that coal ash is having granular and regular structure and the particles have a size range from 5 to 8 μm.
Abstract: Coal is an important fuel used in boiler furnaces. There are problems like unburnt coal and solid wastes like ash contain arsenic, selenium, chromium and cadmium while using it. In order to avoid all such difficulties, aluminium metal powder in various grain sizes mixed with pulverized coal and burned. aluminium metal powder is one of the pyrotechnics having higher calorific value and low ignition temperature. The thermal behavior of aluminium powder along with coal is recorded in DTA. The collected ashes were tested in Scanning Electron Microscope and X-Ray Diffraction meter. The SEM results show that coal ash is having granular and regular structure. All the particles have a size range from 5 to 8 μm. On the other hand, the aluminium coal mixture ash shows a fibrous matrix and the particles are irregular. In XRD graph, the peaks in the graph show orientation of atoms in particular plane and angle. The coal ash has a lot of peaks, but the maximum count value reaches only to 340.97. However the value of counts reaches a maximum of 1,539.06 for aluminium ash. This denotes high atom orientation in a single lattice plane.
7 citations
••
01 Jan 2020TL;DR: In the proposed system, the image is preprocessed using median filtering and Viola Jones face detection algorithm for extracting the faces and the features are extracted by using Local Binary Pattern analysis and the Max pooling is used to reduce the complexity level.
Abstract: Automobile Industry shares numerous accidents in our daily routine. Increasing rate of road accidents are due to driver distraction such as fatigue and lack of sleep. This work is intended solely for the implementation of fatigue and drowsiness detection system using the deep neural network in FPGA. In the proposed system, the image is preprocessed using median filtering and Viola Jones face detection algorithm for extracting the faces. Further, the features are extracted by using Local Binary Pattern analysis and the Max pooling is used to reduce the complexity level. These deep learning steps are followed by performing SVM classifier to define the status of the subject as drowsy or not. The system uses a camera to capture the real time image frames in addition with offline images of the system. The developed Vision-based driver fatigue and drowsiness detection system is a convenient technique for real time monitoring of driver’s vigilance.
7 citations
••
TL;DR: The four stages were suggested to preserve the security measures in packet-based data transmission that are conceived in MANET and the proposed Distinct Network Yarning (DISNEY) routing protocol for SDN controlled MANET overcomes the congestion communication on MANET routing.
7 citations
••
16 Aug 2005TL;DR: This paper analyses the performance of texture classification techniques using (i) multi resolution Markov random field (MRMRF) features and a combination of wavelet statistical features (WSFs) and wavelet co-occurrence features (WCFs) with two different texture datasets.
Abstract: Texture analysis plays an important role in many tasks, ranging from remote sensing to medical imaging and query by content in large image data bases. The main difficulty of texture analysis in the past was the lack of adequate tools to characterize different scales of textures effectively. The development in multi-resolution analysis such as Gabor and wavelet transform help to overcome this difficulty. This paper analyses the performance of texture classification techniques using (i) multi resolution Markov random field (MRMRF) features and (ii) a combination of wavelet statistical features (WSFs) and wavelet co-occurrence features (WCFs) with two different texture datasets.
7 citations
••
TL;DR: The proposed work identifies and resolves the black hole attack and provides security to the routing protocol by using a secured energy-optimized expanding ring search (ERS) algorithm, which reduces the energy consumption and improves the network lifetime.
7 citations
Authors
Showing all 1307 results
Name | H-index | Papers | Citations |
---|---|---|---|
Karthikeyan Krishnamoorthy | 48 | 105 | 7414 |
Venkatachalam Rajendran | 39 | 251 | 5335 |
R. Velmurugan | 30 | 155 | 2543 |
Kulvir Singh | 30 | 206 | 3762 |
N. Selvakumar | 24 | 79 | 2035 |
Kadarkaraithangam Jeyasubramanian | 22 | 84 | 2897 |
Mariappan Premanathan | 21 | 39 | 2082 |
Ranji Vaidyanathan | 19 | 77 | 1646 |
N. Rajesh Jesudoss Hynes | 19 | 75 | 931 |
Ganesh Ramakrishnan | 19 | 170 | 1806 |
Henry Selvaraj | 18 | 116 | 1247 |
Vimal Kumar Mariappan | 17 | 35 | 781 |
B. Dhinesh | 16 | 21 | 1071 |
Chandrabose Aravindan | 16 | 73 | 685 |
S. Arivazhagan | 15 | 105 | 1991 |