Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where V. Vaidehi is active.

Publication


Featured researches published by V. Vaidehi.


international conference on industrial and information systems | 2006

Always Best-Connected QoS integration model for the WLAN, WiMAX Heterogeneous Network

J. Jackson Juliet Roy; V. Vaidehi; S. Srikanth

This paper proposes a mechanism that supports always best-connected (ABC) quality of service (QoS) to the application in a heterogeneous network. The heterogeneous network consists of IEEE 802.11e WLAN and IEEE802.16d WiMAX access networks. The user equipment (UE) in the network is enabled with both WLAN and WiMAX access capabilities. The generic virtual link layer (GVLL) is placed above the WLAN and WMAN MAC layer in the UE, decides the best serving access network in terms of QoS support. The best access network is chosen dynamically based on the QoS parameters such as throughput, packet loss, and delay. The main focus of this work is to provide QoS for variable bit rate (VBR) multimedia services in a heterogeneous network. The simulation results show that the performance of the users in the network is improved significantly in terms of throughput, delay, call admission because of the support of heterogeneous nature


International Journal of Network Security | 2010

Secure Group Key Management Scheme for Multicast Networks

R. Srinivasan; V. Vaidehi; Rajavelu Rajaraman; S. Kanagaraj; R. Chidambaram Kalimuthu; R. Dharmaraj

This paper proposes a scheme to provide security to dynamic multicast VoIP systems efficiently. Security is usually provided by encrypting the media packets sent from a user to other users with the help of a shared key called the session encryption key. The most time consuming process in a dynamic multicast VoIP environment is the group key management. Whenever there is a change in the group membership, the key needs to be updated and the updated key has to be sent to all active members in the group. Hence, by decreasing the number of update messages required for an updated key, the performance of the system can be improved considerably, thus making the scheme more efficient. The proposed secure multicast key management scheme combines the advantages of logical-key tree structure and Chinese remainder theorem to achieve an effective scheme. This paper compares the efficiency of the proposed scheme with the existing schemes and the comparison shows that the proposed scheme performs better than the existing schemes in terms of reduction in key update messages.


international conference on recent trends in information technology | 2011

Video based automatic fall detection in indoor environment

V. Vaidehi; Kirupa Ganapathy; K. Mohan; A. Aldrin; K. Nirmal

An increase in population of elderly people living in isolated environments, leads to the need for an automated monitoring system. Fall is one of the major reasons for death of elderly people. So fall detection is an essential part of an automated indoor monitoring system. Video based automatic fall detection is robust and more reliable than other fall detection methods. Most of the available video based fall detection mechanisms are based on the extraction of motion dynamic features like velocity and intensity gradient of the person in video. These methods are computationally intensive and less accurate. This paper presents an accurate and computationally less intensive approach to detect fall, using only the static features of the person such as aspect ratio and inclination angle. Experimental results show that this method is robust in detecting all kinds of fall.


computational intelligence communication systems and networks | 2009

Solar Energy Harvesting for Wireless Sensor Networks

P. T. V. Bhuvaneswari; R. Balakumar; V. Vaidehi; P. Balamuralidhar

The commercially available sensor nodes are battery-driven devices. A number of nodes together constitute a network. As days proceed, the batteries used in the nodes lose their charge and subsequently get isolated from the network. Many energy harvesting schemes have been proposed to alleviate this problem. In this paper, a solar energy based energy harvesting scheme is proposed. This scheme works on the principle of photo-voltaic effect. A recharging circuitry is also designed, that recharges the batteries of the nodes when the charge drops below a threshold level. This leads to strengthening the lifetime of the nodes as well as the network. Compatibility and low power design are the two major salient features of the designed circuitry. The performance of the circuit is also tested with the MICAz hardware.


Procedia Computer Science | 2013

Agent Based Health Monitoring of Elderly People in Indoor Environments Using Wireless Sensor Networks

V. Vaidehi; M. Vardhini; H. Yogeshwaran; G. Inbasagar; R. Bhargavi; C. Sweetlin Hemalatha

Abstract This paper presents a design of a health care monitoring system based on wireless sensor networks (WSN) which is capable of collecting, retrieving, storing and analysing the vital signs of the patient. Vital signs such as body temperature, blood pressure, pulse rate and respiratory rate are monitored. To manage these sensors and for collecting and storing data in a database, a Multi Agent System (MAS) is used. The dynamic nature and mobility of the agents make them suitable for maintaining these sensors in the WSN. The proposed MAS consists of four agents namely Admin agent, Control agent, Query agent and Data agent. Admin agent plays the role of invoking and terminating other agents. Control agent is responsible for storing the data sensed by the sensors into the database. Data agent performs data reduction which is achieved using Epsilon approximation. The use of Data agent in the proposed scheme reduces data traffic and the requirement of secondary storage space. Query agent is responsible for providing a GUI for the doctor to view the patients vital sign details. The proposed agent based system has been implemented using Java language in JADE environment and the results are validated.


Computers & Electrical Engineering | 2001

Neural network aided Kalman filtering for multitarget tracking applications

V. Vaidehi; N. Chitra; M. Chokkalingam; C.N. Krishnan

Abstract The adaptive capability of the Kalman filtering is known to increase by incorporating a neural network into the normal Kalman filter. Current work extends this fact and proposes the neural network aided Kalman filtering scheme for tracking multitargets that are highly manoeuvring. The improvement in the tracking accuracy due to the proposed scheme is presented for various tracking scenarios.


Information Fusion | 2016

Target tracking using Interactive Multiple Model for Wireless Sensor Network

S. Vasuhi; V. Vaidehi

Identify the location and estimate the position.Tracking the target based on estimation.Applied for detecting intruders. Target tracking in a Wireless Sensor Network (WSN) environment is a challenging research problem. Interactive Multiple Model (IMM) is a popular scheme for accurate target tracking. The existing target tracking scheme used in WSN employs Kalman Filter (KF) which fails to track the target accurately due to non availability of target data at regular intervals and missing of packets. Though existing KF based tracking in WSN scheme detects the target, it fails to identify the target. To overcome these problems, this paper proposes a IMM based Target Tracking in WSN named ITTWSN that uses multiple models (velocity and acceleration) to handle both maneuvering and non maneuvering targets and multiple sensors to detect and identify the targets. The performance of the proposed ITTWSN is compared with the KF scheme and it is found that the accuracy of the proposed ITTWSN is better than the existing KF based approach.


asia-pacific conference on communications | 2005

Authentication of Signaling in VoIP Applications

R. Srinivasan; V. Vaidehi; K. Harish; K. Lakshmi Narasimhan; S. Lokeshwer Babu; V. Srikanth

Session initiation protocol known as SIP is currently being preferred to H.323 protocol due to its simple architecture. In traditional SIP, security mechanisms are inadequate for assuring the identity of the end user based on cryptography. This is vulnerable in the sense that a third person, an impersonator, may easily duplicate one of the users engaged in the session. This can pose serious threats as it affects the secrecy of the user. In order to reduce the threat posed by an eavesdropper, an authentication scheme is required. This paper proposes a scheme for authenticating the end users identities with the outbound proxy server in that domain with the help of the registrar server. The authentication scheme is based on end users public key infrastructure (PKI) certificate and strong one way hash function. The proposed scheme is implemented using JAVA and tested for its validity in a LAN environment. The delay overhead in providing authentication in the proposed scheme is found to be within the allowable limit as per IETF standard


wireless and optical communications networks | 2006

An activity based mobility prediction strategy for next generation wireless networks

M.S. Sricharan; V. Vaidehi; P.P. Arun

The basic obligation of a wireless system is to provide scope for maximum mobility (terminal) while the system continues to provide the services at agreed levels of quality. The fundamental requirement for the system to support mobility is that it must be aware of the location where the mobile terminal (MT) resides at any point of time. The importance of mobility prediction techniques can be seen at both the network and service levels. This paper proposes a novel mobility prediction technique based on user activity pattern that could overcome some of the drawbacks associated with regular pattern based techniques available in the literature


Expert Systems With Applications | 2014

Hierarchical Particle Swarm Optimization with Ortho-Cyclic Circles

Kirupa Ganapathy; V. Vaidehi; Bhairavi Kannan; Harini Murugan

Designed for real world problems in order to handle changing environment.Significant out performance in comparison with the various fitness function and other existing PSO algorithms.Near optimal solution is obtained for any number of swarms and swarm particles.Maximum of customers are served with reduced service waiting time.Avoids the necessity of rediversification, thereby reducing the convergence problem. Cloud computing is an emerging technology which deals with real world problems that changes dynamically. The users of dynamically changing applications in cloud demand for rapid and efficient service at any instance of time. To deal with this paper proposes a new modified Particle Swarm Optimization (PSO) algorithm that work efficiently in dynamic environments. The proposed Hierarchical Particle Swarm Optimization with Ortho Cyclic Circles (HPSO-OCC) receives the request in cloud from various resources, employs multiple swarm interaction and implements cyclic and orthogonal properties in a hierarchical manner to provide the near optimal solution. HPSO-OCC is tested and analysed in both static and dynamic environments using seven benchmark optimization functions. The proposed algorithm gives the best solution and outperforms in terms of accuracy and convergence speed when compared with the performance of existing PSO algorithms in dynamic scenarios. As a case study, HPSO-OCC is implemented in remote health monitoring application for optimal service scheduling in cloud. The near optimal solution from HPSO-OCC and Dynamic Round Robin Scheduling algorithm is implemented to schedule the services in healthcare.

Collaboration


Dive into the V. Vaidehi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

C. Sweetlin Hemalatha

Madras Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Kirupa Ganapathy

Madras Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

N. T. Naresh Babu

Madras Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge