Loading [MathJax]/extensions/MathMenu.js
R. Dhivya - IEEE Xplore Author Profile

Showing 1-12 of 12 results

Filter Results

Show

Results

Many applications are available today that let us exchange images online. Only the intended receivers should have access to all of these images, which must be stored securely. Therefore, it is crucial to provide effective and quick methods for image encryption. This study introduced a kNN classification based Hybrid Chaotic encryption algorithm with combination of Discrete Wavelet Transform(DWT) w...Show More
One of the most important problems in a large-scale distributed database is the detection of point outliers. Many studies have used clustering to address these issues, and DBSCAN appears to be the most effective method. The paper concentrated on reducing the high temporal complexity of the problem by reducing the data dimensionality of the data points. Due to these issues, previous techniques are ...Show More
Data security is essential to the e-healthcare industry for protecting patients' confidential information. It is necessary to continuously monitor the patient's health to give them the proper medical care. The proposed work develops a Raspberry Pi cryptosystem by sending real-time patient health data to the physician via the Thing Speak cloud environment. In order to create the highly random keys ...Show More
Globally, plant diseases are the main factor in agricultural losses, which has an effect on the worldwide economy. Deep neural network concepts for early disease diagnosis and control are part of the smart agricultural solutions that are developing to address these problems. Utilizing precise or automatic detection methods, early identification of plant diseases can improve food production quality...Show More
The noise would be a significant element that affects the quality of leaf images. The level of valuable features that could be extracted from the image has frequently been reduced by the level of noise, also some essential image sections are most often distorted. Image noise has been experimented with by several analysts as the spontaneous variance of illumination or color details within images le...Show More
Nowadays, digital image communication through internet has become essential in public network as images can give a clear vision than describing something through text. Data such as medical images, military images, etc. which are highly prone to intruders are mandatory to be maintained confidential to transmit and receive data safely without being intruded by unauthorised persons. This technique ca...Show More
To minimize the consumption of power, chip area and to enhance the battery life and performance of the system, the low power VLSI circuit is designed. Scaling design or counter is used as a key element for increasing or decreasing the values of an operator depending on its previous state. During the counting process frequency and time can be measured. The major problem in scaling circuit is the po...Show More
Image Compression is a technique, which reduces the size of an image without much loss of information. In this paper we have put forward a new method for image compression that includes techniques such as Shannon-Fano - Elias coding followed by Run Length Encoding (RLE). By using parameters like Peak Signal to Noise Ratio(PSNR), Mean Square Error (MSE) the efficiency of our proposed algorithm is e...Show More
Ultrasound imaging has features like non-invasive nature, real time image formation capacity and relatively low cost, which makes this diagnostic tool attractive and hence has become an important imaging modality in medical diagnoses. However the usefulness of this imaging is degraded by the presence of speckle noise. Hence, speckle suppression in ultrasound images is essential for improving the i...Show More
Biosignals such as Electrocardiogram (ECG), Electroencephalogram (EEG) and Electromyogram (EMG) contains critical and sensitive information about the patient's health. In order to preserve its confidentiality, the information about the patient must be transmitted in a secure manner. In this work, biosignals are communicated by employing a chaotic secure system to safeguard the medical information....Show More
The various acoustic parameters obtained from TracheoEsophageal Laryngectomy subjects implanted with prosthesis are compared with that of a normal subject. In the advanced stage, laryngeal carcinoma leads to Laryngectomy, which is the removal of larynx. The replacement of speech is done with the help of a prosthetic device. The sentence material is chosen from IEEE corpus. A laryngectomee subject'...Show More
MRI brain images are widely used in medical applications for research, diagnosis, treatment, surgical planning and image guided surgeries. These MR brain images are often corrupted with Intensity Inhomogeneity artifact cause unwanted intensity variation due to non- uniformity in RF coils and Rician noise, the dominant noise in MRI due to thermal vibrations of electrons and ions and movement of obj...Show More