R. Palanisamy
SRM University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by R. Palanisamy.
Indonesian Journal of Electrical Engineering and Computer Science | 2018
R. Palanisamy; K. Vijayakumar
Received Nov 21, 2017 Revised Jan 29, 2018 Accepted Feb 17, 2018 For continuous target following under complex scene, an objective following calculation in light of multi-shading joint likelihood investigation model was introduced. The calculation embraced shading histogram to speak to the actual factual trademark with Camshaft standard and completed exploratory research in such angles as multichannel joint shading highlights measurements, projection delineate weighted preparing, the following window size and position ascertaining, calculation handling component of course. It utilised red, green, blue, tint, luminance channel shading as the objective watched attributes, and planned the computation technique given the likelihood measurement to recognise any shading focus from the compound scene. It likewise settled the counting method for following window size and position which adjusted the multi-shading model. Utilizing weighting projection outline strategy, the foundation obstruction around the objective potential territory was dispensed with. Finally, more reasonable joining judgment and the calculation cycle tenets were advanced. After the test accreditation, the ongoing execution and recognition proportion introduce a decent outcome.
Indonesian Journal of Electrical Engineering and Computer Science | 2018
D. Selvabharathi; R. Palanisamy; K. Selvakumar; V. Kalyanasundaram; D. Karthikeyan; Amal Nair; Kriti Karnavat; Annanya Sharma
Received Jan 19, 2018 Revised Apr 28, 2018 Accepted Jun 14, 2018 Nowadays, Aspect-Oriented Programming (AOP) paradigm is getting more popularity in the field of software development. But testing an AspectOriented Software System (AOSS) is not well matured. Therefore, many researchers have been focusing on testing an AOSS. Moreover, the literature indicates that very few papers have devoted to literature survey but still there is need to study in depth of various testing techniques used for AOSS. Therefore, in this paper, a comprehensive study of existing various testing techniques for AOSS have been conducted and present a comparative analysis result of various testing techniques based on various parameters.Received Apr 8, 2018 Revised Jun 9, 2018 Accepted Jun 23, 2018 This paper proposes an effective technique to solve Distribution System Expansion Planning (DSEP) problem by using the artificial neural network. The proposed technique will be formulated by using mean-variance analysis (MVA) approach in the form of mixed-integer quadratic programming problem. It consists of two layers neural network which combine Hopfield network and Boltzmann machine (BM) in upper and lower layer respectively named as Modified BM. The originality of the proposed technique is it will delete the unit of the second layer, which is not selected in the first layer in its execution. Then, the second layer is restructured using the selected units. Due to this feature, the proposed technique will improve time consuming and accuracy of solution. Referring to the case study demonstrated in this paper, the significance outputs obtained are the improvement in computational time and accuracy of solution provided. As the solution provided various of options, the proposed technique will help decision makers in solving DSEP problem. As a result, the performance of strategic investment planning in DSEP certainly enhanced.Internet Protocol version 6 (IPv6) is a next-generation internet protocol that is devised to replace its predecessor, the IPv4. With the benefit of ample address space, flexible header extensions and its many specific features, IPv6 is the future of the Internet and Internetworking. A significant advantage of IPv6 is its capabilities in the domain of security and mobility, where it scores in comparison with its predecessor. One of the many features specific to IPv6, such as the mandatory IPsec messaging or address auto-configuration, is the Neighbor Discovery Protocol (NDP). Even though the concept of security is more pronounced in the IPv6 protocols, there still exist loopholes. These loopholes when exploited target the foundation of the Internetworking. The extensive applications of NDP make it even more necessary to identify and address these gaps to ensure network security. Hence, this paper investigates such loopholes in the applications of NDP in creating a network and analyzes the process of the denial-of-service attacks that endanger the safety of an established network. Also, the paper proposes a new method to mitigate Denial-of-Service (DoS) in network mobility of IPv6 networks. This proposed approach is a hybrid of existing solutions and is capable of overcoming the significant disadvantages of these methods. Also, the paper discusses the comparative analysis among the various existing solutions and illustrates the effect of the proposed method in MIPv6 security.Received Jun 1, 2018 Revised Jul 10, 2018 Accepted Jul 25, 2018 Big Data is a new technology and architecture. It can work on a very large volume of a variety of data with high-velocity, discovery, and/or analysis. Big Data is about the fast-growing sources of data such as web logics, Sensor networks, Social media, Internet text and documents, Internet pages, Search Index data, scientific research. Big data also formally introduces a complex range of analysis. Big data can evaluate mixed data (structured and unstructured) from multiple sources. As there are some security issues in big data which are no longer solved using the hashing techniques on large amount of data, this paper shows an idea of new approach of designing a Knox‟ified Hadoop cluster.
Indonesian Journal of Electrical Engineering and Computer Science | 2018
R. Palanisamy
Received Dec 04, 2017 Revised Jan 11, 2018 Accepted Apr 15, 2018 Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.A Weblogs contains the history of User Navigation Pattern while user accessing the websites. The user navigation pattern can be analyzed based on the previous user navigation that is stored in weblog. The weblog comprises of various entries like IP address, status code and number of bytes transferred, categories and time stamp. The user interest can be classified based on categories and attributes and it is helpful in identifying user behavior. The aim of the research is to identifying the interested user behavior and not interested user behavior based on classification. The process of identifying user interest, it consists of Modified Span Algorithm and Personalization Algorithm based on the classification algorithm user prediction can be analyzed. The research work explores to analyze user prediction behavior based on user personalization that is captured from weblogs.Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.
international conference on computational intelligence and computing research | 2014
R. Palanisamy; A. U. Mutawakkil; K. Selvakumar; D. Karthikeyan
The z source inverter is a moderately modern power converter topology that has been established in the prose to exhibit voltage-buck and voltage-boost capability. In this proposed system z source theory can be applied to two-level inverters. Two level z source inverter receiving the power supply from photovoltaic system. Output voltage of z source inverter produce twice increased of applied input supply from photovoltaic system. Switches of z source inverter controlled by sinusoidal pulse width modulation (SPWM) which operating on both shoot through and non-shoot through conditions. Amount produced voltage from z-source inverter stored in grid connected system and its simulation results are discussed.
Procedia Engineering | 2013
R. Latha; C. Bharatiraja; R. Palanisamy; sudeepbanerji; Subhransu Sekhar Dash
ieee international conference on advances in engineering science and management | 2012
C. Bharatiraja; S. Raghu; R. Palanisamy
International Review on Modelling and Simulations | 2015
K. Selvakumar; K. Vijayakumar; R. Palanisamy; D. Karthikeyan; G. Santhoshkumar
TELKOMNIKA : Indonesian Journal of Electrical Engineering | 2018
R. Palanisamy; K. Selvakumar; D. Selvabharathi; D. Karthikeyan; Udayan Nayak; Sahil Walia; Pratik Chawda
TELKOMNIKA : Indonesian Journal of Electrical Engineering | 2017
D. Karthikeyan; R. Palanisamy; K. Vijayakumar; A. Velu; D. Selvabharathi
International Journal of Parallel, Emergent and Distributed Systems | 2017
R. Palanisamy