Alpha Vijayan - Academia.edu (original) (raw)

Papers by Alpha Vijayan

Research paper thumbnail of Smart Energy Meter Using Android Application And Gsm Network

International Journal of Engineering and Computer Science, Aug 20, 2016

This is implemented for the purpose of getting a fully automized electricity billing system. This... more This is implemented for the purpose of getting a fully automized electricity billing system. This is aim to measure and monitor the electricty consumed by consumers in a locality and transmitting the consumed power to the station as well as issuing the bill of consumed power automatically. It is also aims to find the malpractices in the meter. Using this system the Electricity Board can access all data regarding the consumed power in each home and in each station whenever required. From the data the Board can find out power theft also it is also offers a system to charge extra payment for the excess usage of power at peak time (6.00-10.00pm) .Online payment is also possible for our new system. GSM is using for automating the system. The consumed unit transmission, alerts and bill reception are achieved by the GSM module in the client side as set by the user. Server station is also served by a GSM module for transmission and reception of data .

Research paper thumbnail of Advance Single Stage Convolutional Neural Network for Drug-Drug Interactions

2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)

Research paper thumbnail of Drug-Drug Interactions and Side Effects Prediction Using Shallow Ensemble Deep Neural Networks

Lecture Notes in Electrical Engineering

Research paper thumbnail of An Ensemble BERT CHEM DDI for Prediction of Side Effects in Drug–Drug Interactions

Lecture notes in networks and systems, Nov 8, 2022

Research paper thumbnail of Clustering Based Approach for Isolating the Drug Elements Causing Side Effects

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Dec 21, 2019

The truthful identification of drug side effects represents a major concern for public health. Me... more The truthful identification of drug side effects represents a major concern for public health. Medication symptoms or Adverse Drug responses (ADRs) are a vital and complex challenge. In the pharmaceutical business, ADRs are one of the main causes of failure during the time spent in the development of drugs and of drug withdrawal once a medication has achieved the market. Medication used in prescription depends on a balance between expected advantages and conceivable dangers. Adverse Drug Reactions (ADRs) are impacts that happen when a medication is not administered or controlled at the best possible measurements. It is basic to build up an investigation pipeline to computationally foresee drug side effect symptoms from various assorted sources.

Research paper thumbnail of Drug-Drug Interactions and Side Effects Prediction Using Shallow Ensemble Deep Neural Networks

Lecture notes in electrical engineering, 2022

Research paper thumbnail of Video Anomaly Detection in Surveillance Cameras

2022 International Conference for Advancement in Technology (ICONAT), 2022

Research paper thumbnail of A Survey on AMUA Protocol Based On Cryptographic Algorithm

Cryptography is the principle and study of techniques for secure communication that is for provid... more Cryptography is the principle and study of techniques for secure communication that is for providing data integrity, authentication, data confidentiality etc....More precisely cryptography is about building and inspecting protocols that provide secure communication between two users. The cryptographic algorithms can be broadly divided into two based on their keys. They are private key cryptographic algorithms which uses the similar secret key for encryption and decryption and public key cryptographic algorithms which uses different keys for encryption and decryption. The mobile devices become rapidly appearing everywhere and popular due to the expeditious advances in wireless communication technologies. Therefore authentication protocol is used between two entities for transfer of authenticated data. One such protocol is the AMUA (Anonymous Mobile User Authentication Protocol) that can provide security of various mobile applications. This paper presents a comprehensive survey of var...

Research paper thumbnail of Smart Energy Meter Using Android Application And Gsm Network

International Journal Of Engineering And Computer Science, 2016

This is implemented for the purpose of getting a fully automized electricity billing system. This... more This is implemented for the purpose of getting a fully automized electricity billing system. This is aim to measure and monitor the electricty consumed by consumers in a locality and transmitting the consumed power to the station as well as issuing the bill of consumed power automatically. It is also aims to find the malpractices in the meter. Using this system the Electricity Board can access all data regarding the consumed power in each home and in each station whenever required. From the data the Board can find out power theft also it is also offers a system to charge extra payment for the excess usage of power at peak time (6.00-10.00pm) .Online payment is also possible for our new system. GSM is using for automating the system. The consumed unit transmission, alerts and bill reception are achieved by the GSM module in the client side as set by the user. Server station is also served by a GSM module for transmission and reception of data .

Research paper thumbnail of Filtering Mechanisms on Internet Protocol

International Journal of Advanced Research, 2017

Research paper thumbnail of A Survey on Internet Protocol Filtering Mechanisms

Mechanism that decides which types of IP datagrams will be processed normally and which will be d... more Mechanism that decides which types of IP datagrams will be processed normally and which will be discarded is called IP filtering. Discarding datagrams means that the datagram is completely ignored and deleted, as if it had never been received. There are many criteria to determine which datagrams are to be filtered. IP filtering is a network layer facility which doesn't understand anything about the application using the network connection. It only knows about the connections themselves. if we want to deny users access to internal network on the default telnet port, but rely on IP filtering alone, it is not possible to stop them from using the telnet program with a port that allow to pass through firewall. By using proxy servers for each service, it is possible to solve this problem. The proxy servers can prevent abuses. If firewall supports a World Wide Web proxy, telnet connection will always be answered by the proxy and will allow only http requests to pass. A large number of ...

Research paper thumbnail of Preserving Privacy of Multiple Data in a Cloud Over a Secured Network

Journal of emerging technologies and innovative research, 2018

In cloud computing, to protect privacy when outsourcing database management system, confidential ... more In cloud computing, to protect privacy when outsourcing database management system, confidential data has to be encryptedwhich however renders traditional query processing methods inapplicable. First the confidentiality requires hiding the value and the relative order of the attribute in records from the cloud server, but computing a range query requires comparing the values of this attribute. It defines and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted data in cloud computing Establish a set of strict privacy requirements for such a secure cloud data utilization system.Among various multi-keyword semantics, choose the efficient similarity measure of coordinate matching.This further use inner product similarity to quantitatively evaluate such similarity measure. First propose a basic idea for the multi-keyword ranked search over encrypted cloud data schemes based on secure inner product computation, and then give two significantly imp...

Research paper thumbnail of A Survey on Internet Protocol Filtering Mechanisms

Mechanism that decides which types of IP datagrams will be processed normally and which will be d... more Mechanism that decides which types of IP datagrams will be processed normally and which will be discarded is called IP filtering. Discarding datagrams means that the datagram is completely ignored and deleted, as if it had never been received. There are many criteria to determine which datagrams are to be filtered. IP filtering is a network layer facility which doesn't understand anything about the application using the network connection. It only knows about the connections themselves. if we want to deny users access to internal network on the default telnet port, but rely on IP filtering alone, it is not possible to stop them from using the telnet program with a port that allow to pass through firewall. By using proxy servers for each service, it is possible to solve this problem. The proxy servers can prevent abuses. If firewall supports a World Wide Web proxy, telnet connection will always be answered by the proxy and will allow only http requests to pass. A large number of proxy-server programs are there. Some are free software and many others are commercial products. Here we present a survey on IP filtering mechanisms.

Research paper thumbnail of Intelligent Power Meter using GSM network and Android Application

Now a days everything is being automated. The electrical energy provider still uses traditional m... more Now a days everything is being automated. The electrical energy provider still uses traditional methods for reading the energy consumed by individual consumer. The proposed system automatically reads the energy consumed and send it to the electricity provider using the short messaging services (SMS) and Android app.

Research paper thumbnail of Immoral Scene Censoring System

Harmful contents are rising in television day by day and this motivates the essence of more resea... more Harmful contents are rising in television day by day and this motivates the essence of more research in fast and reliable obscene and immoral material filtering. Adultery content image recognition is an important component in each filtering system. We use Skin detection process of finding skin colored pixels and regions in each frame of a video. This process is typically used as a preprocessing step to find regions that potentially have human faces and limbs in images. Many computer vision approaches have been developed for skin detection. Immoral imagery or as they put it pornography has been there for a long time and with the advent of web it has only just grown. Adultery is considered as obscene material whose intention is to provoke sexual arousal. So, it should be managed and certainly shouldn't be popping where it is not meant to. So we propose to design a system that takes a frame and detects if it is a pornographic image or not. We intend to be using SVM (Support Vector ...

Research paper thumbnail of A Hybrid Clustering Based Approach To Extract Drug Elements Which Causes Side Effects

Prescription manifestations or drug reactions are an imperative and complex test. Medications are... more Prescription manifestations or drug reactions are an imperative and complex test. Medications are synthetic substances for treating illnesses, however, may actuate unfriendly responses or results. Medication revelation is tedious and works concentrated, and applicant drugs experience the ill effects of likely side. Heaps of affirmed drugs were removed from the market due to sudden results. Since drug results are an incredible worry of the general wellbeing, the recognizable proof of medication results assists with diminishing dangers in drug revelation. With the expansion of medication information, scientists gathered data about endorsed sedates, and recognize possible symptoms of new applicant drugs. Medication disappointments because of unexpected unfriendly impacts at clinical preliminaries present wellbeing hazards for the members and lead to generous monetary misfortunes. Side effect forecast calculations can possibly direct the medication configuration measure. Drug utilized i...

Research paper thumbnail of A Framework of Computational Methods for Recommender Engine

International Journal of Computer Sciences and Engineering

Research paper thumbnail of A Survey on Realms and Applications of Social Media Data Analysis

International Journal of Computer Sciences and Engineering

The information era witnesses the creation of multimedia data, transfers and transactions in the ... more The information era witnesses the creation of multimedia data, transfers and transactions in the order of millions. This data by virtue of their formats comes in varying sizes and differing temporal characteristics. The wealth of information carries potential both in terms of explicit content that is expressed and the implicit or hidden content. Processing the former is quite developed while the procedures and applications of working with the implicit knowledge are growing steadily. This paper aims to present a range of techniques from recent works pertaining to the processing and applicability of such data. The purpose of the survey is to bring to light the specific methods of social media data analysis in a concise and organized manner. Specifically, natural language processing, topic modelling, sentiment analysis and affective analysis have been identified as the overarching heads taken up by several recent researches. Finally, some observations pertaining to social media data analysis identified from several works are enlisted.

Research paper thumbnail of Filtering Mechanisms on Internet Protocol

Mechanism that decides which types of IP datagrams will be processed normally and which will be d... more Mechanism that decides which types of IP datagrams will be processed normally and which will be discarded is called IP filtering. Discarding datagrams means that the datagram is completely ignored and deleted, as if it had never been received. There are many criteria to determine which datagrams are to be filtered. IP filtering is a network layer facility which doesn\'t understand anything about the application using the network connection. It only knows about the connections themselves. If we want to deny users access to internal network on the default telnet port, but rely on IP filtering alone, it is not possible to stop them from using the telnet program with a port that allow to pass through firewall. By using proxy servers for each service, it is possible to solve this problem. The proxy servers can prevent abuses. If firewall supports a World Wide Web proxy, telnet connection will always be answered by the proxy and will allow only http requests to pass. A large number of...

Research paper thumbnail of Smart Energy Meter Using Android Application And Gsm Network

International Journal of Engineering and Computer Science, Aug 20, 2016

This is implemented for the purpose of getting a fully automized electricity billing system. This... more This is implemented for the purpose of getting a fully automized electricity billing system. This is aim to measure and monitor the electricty consumed by consumers in a locality and transmitting the consumed power to the station as well as issuing the bill of consumed power automatically. It is also aims to find the malpractices in the meter. Using this system the Electricity Board can access all data regarding the consumed power in each home and in each station whenever required. From the data the Board can find out power theft also it is also offers a system to charge extra payment for the excess usage of power at peak time (6.00-10.00pm) .Online payment is also possible for our new system. GSM is using for automating the system. The consumed unit transmission, alerts and bill reception are achieved by the GSM module in the client side as set by the user. Server station is also served by a GSM module for transmission and reception of data .

Research paper thumbnail of Advance Single Stage Convolutional Neural Network for Drug-Drug Interactions

2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)

Research paper thumbnail of Drug-Drug Interactions and Side Effects Prediction Using Shallow Ensemble Deep Neural Networks

Lecture Notes in Electrical Engineering

Research paper thumbnail of An Ensemble BERT CHEM DDI for Prediction of Side Effects in Drug–Drug Interactions

Lecture notes in networks and systems, Nov 8, 2022

Research paper thumbnail of Clustering Based Approach for Isolating the Drug Elements Causing Side Effects

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Dec 21, 2019

The truthful identification of drug side effects represents a major concern for public health. Me... more The truthful identification of drug side effects represents a major concern for public health. Medication symptoms or Adverse Drug responses (ADRs) are a vital and complex challenge. In the pharmaceutical business, ADRs are one of the main causes of failure during the time spent in the development of drugs and of drug withdrawal once a medication has achieved the market. Medication used in prescription depends on a balance between expected advantages and conceivable dangers. Adverse Drug Reactions (ADRs) are impacts that happen when a medication is not administered or controlled at the best possible measurements. It is basic to build up an investigation pipeline to computationally foresee drug side effect symptoms from various assorted sources.

Research paper thumbnail of Drug-Drug Interactions and Side Effects Prediction Using Shallow Ensemble Deep Neural Networks

Lecture notes in electrical engineering, 2022

Research paper thumbnail of Video Anomaly Detection in Surveillance Cameras

2022 International Conference for Advancement in Technology (ICONAT), 2022

Research paper thumbnail of A Survey on AMUA Protocol Based On Cryptographic Algorithm

Cryptography is the principle and study of techniques for secure communication that is for provid... more Cryptography is the principle and study of techniques for secure communication that is for providing data integrity, authentication, data confidentiality etc....More precisely cryptography is about building and inspecting protocols that provide secure communication between two users. The cryptographic algorithms can be broadly divided into two based on their keys. They are private key cryptographic algorithms which uses the similar secret key for encryption and decryption and public key cryptographic algorithms which uses different keys for encryption and decryption. The mobile devices become rapidly appearing everywhere and popular due to the expeditious advances in wireless communication technologies. Therefore authentication protocol is used between two entities for transfer of authenticated data. One such protocol is the AMUA (Anonymous Mobile User Authentication Protocol) that can provide security of various mobile applications. This paper presents a comprehensive survey of var...

Research paper thumbnail of Smart Energy Meter Using Android Application And Gsm Network

International Journal Of Engineering And Computer Science, 2016

This is implemented for the purpose of getting a fully automized electricity billing system. This... more This is implemented for the purpose of getting a fully automized electricity billing system. This is aim to measure and monitor the electricty consumed by consumers in a locality and transmitting the consumed power to the station as well as issuing the bill of consumed power automatically. It is also aims to find the malpractices in the meter. Using this system the Electricity Board can access all data regarding the consumed power in each home and in each station whenever required. From the data the Board can find out power theft also it is also offers a system to charge extra payment for the excess usage of power at peak time (6.00-10.00pm) .Online payment is also possible for our new system. GSM is using for automating the system. The consumed unit transmission, alerts and bill reception are achieved by the GSM module in the client side as set by the user. Server station is also served by a GSM module for transmission and reception of data .

Research paper thumbnail of Filtering Mechanisms on Internet Protocol

International Journal of Advanced Research, 2017

Research paper thumbnail of A Survey on Internet Protocol Filtering Mechanisms

Mechanism that decides which types of IP datagrams will be processed normally and which will be d... more Mechanism that decides which types of IP datagrams will be processed normally and which will be discarded is called IP filtering. Discarding datagrams means that the datagram is completely ignored and deleted, as if it had never been received. There are many criteria to determine which datagrams are to be filtered. IP filtering is a network layer facility which doesn't understand anything about the application using the network connection. It only knows about the connections themselves. if we want to deny users access to internal network on the default telnet port, but rely on IP filtering alone, it is not possible to stop them from using the telnet program with a port that allow to pass through firewall. By using proxy servers for each service, it is possible to solve this problem. The proxy servers can prevent abuses. If firewall supports a World Wide Web proxy, telnet connection will always be answered by the proxy and will allow only http requests to pass. A large number of ...

Research paper thumbnail of Preserving Privacy of Multiple Data in a Cloud Over a Secured Network

Journal of emerging technologies and innovative research, 2018

In cloud computing, to protect privacy when outsourcing database management system, confidential ... more In cloud computing, to protect privacy when outsourcing database management system, confidential data has to be encryptedwhich however renders traditional query processing methods inapplicable. First the confidentiality requires hiding the value and the relative order of the attribute in records from the cloud server, but computing a range query requires comparing the values of this attribute. It defines and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted data in cloud computing Establish a set of strict privacy requirements for such a secure cloud data utilization system.Among various multi-keyword semantics, choose the efficient similarity measure of coordinate matching.This further use inner product similarity to quantitatively evaluate such similarity measure. First propose a basic idea for the multi-keyword ranked search over encrypted cloud data schemes based on secure inner product computation, and then give two significantly imp...

Research paper thumbnail of A Survey on Internet Protocol Filtering Mechanisms

Mechanism that decides which types of IP datagrams will be processed normally and which will be d... more Mechanism that decides which types of IP datagrams will be processed normally and which will be discarded is called IP filtering. Discarding datagrams means that the datagram is completely ignored and deleted, as if it had never been received. There are many criteria to determine which datagrams are to be filtered. IP filtering is a network layer facility which doesn't understand anything about the application using the network connection. It only knows about the connections themselves. if we want to deny users access to internal network on the default telnet port, but rely on IP filtering alone, it is not possible to stop them from using the telnet program with a port that allow to pass through firewall. By using proxy servers for each service, it is possible to solve this problem. The proxy servers can prevent abuses. If firewall supports a World Wide Web proxy, telnet connection will always be answered by the proxy and will allow only http requests to pass. A large number of proxy-server programs are there. Some are free software and many others are commercial products. Here we present a survey on IP filtering mechanisms.

Research paper thumbnail of Intelligent Power Meter using GSM network and Android Application

Now a days everything is being automated. The electrical energy provider still uses traditional m... more Now a days everything is being automated. The electrical energy provider still uses traditional methods for reading the energy consumed by individual consumer. The proposed system automatically reads the energy consumed and send it to the electricity provider using the short messaging services (SMS) and Android app.

Research paper thumbnail of Immoral Scene Censoring System

Harmful contents are rising in television day by day and this motivates the essence of more resea... more Harmful contents are rising in television day by day and this motivates the essence of more research in fast and reliable obscene and immoral material filtering. Adultery content image recognition is an important component in each filtering system. We use Skin detection process of finding skin colored pixels and regions in each frame of a video. This process is typically used as a preprocessing step to find regions that potentially have human faces and limbs in images. Many computer vision approaches have been developed for skin detection. Immoral imagery or as they put it pornography has been there for a long time and with the advent of web it has only just grown. Adultery is considered as obscene material whose intention is to provoke sexual arousal. So, it should be managed and certainly shouldn't be popping where it is not meant to. So we propose to design a system that takes a frame and detects if it is a pornographic image or not. We intend to be using SVM (Support Vector ...

Research paper thumbnail of A Hybrid Clustering Based Approach To Extract Drug Elements Which Causes Side Effects

Prescription manifestations or drug reactions are an imperative and complex test. Medications are... more Prescription manifestations or drug reactions are an imperative and complex test. Medications are synthetic substances for treating illnesses, however, may actuate unfriendly responses or results. Medication revelation is tedious and works concentrated, and applicant drugs experience the ill effects of likely side. Heaps of affirmed drugs were removed from the market due to sudden results. Since drug results are an incredible worry of the general wellbeing, the recognizable proof of medication results assists with diminishing dangers in drug revelation. With the expansion of medication information, scientists gathered data about endorsed sedates, and recognize possible symptoms of new applicant drugs. Medication disappointments because of unexpected unfriendly impacts at clinical preliminaries present wellbeing hazards for the members and lead to generous monetary misfortunes. Side effect forecast calculations can possibly direct the medication configuration measure. Drug utilized i...

Research paper thumbnail of A Framework of Computational Methods for Recommender Engine

International Journal of Computer Sciences and Engineering

Research paper thumbnail of A Survey on Realms and Applications of Social Media Data Analysis

International Journal of Computer Sciences and Engineering

The information era witnesses the creation of multimedia data, transfers and transactions in the ... more The information era witnesses the creation of multimedia data, transfers and transactions in the order of millions. This data by virtue of their formats comes in varying sizes and differing temporal characteristics. The wealth of information carries potential both in terms of explicit content that is expressed and the implicit or hidden content. Processing the former is quite developed while the procedures and applications of working with the implicit knowledge are growing steadily. This paper aims to present a range of techniques from recent works pertaining to the processing and applicability of such data. The purpose of the survey is to bring to light the specific methods of social media data analysis in a concise and organized manner. Specifically, natural language processing, topic modelling, sentiment analysis and affective analysis have been identified as the overarching heads taken up by several recent researches. Finally, some observations pertaining to social media data analysis identified from several works are enlisted.

Research paper thumbnail of Filtering Mechanisms on Internet Protocol

Mechanism that decides which types of IP datagrams will be processed normally and which will be d... more Mechanism that decides which types of IP datagrams will be processed normally and which will be discarded is called IP filtering. Discarding datagrams means that the datagram is completely ignored and deleted, as if it had never been received. There are many criteria to determine which datagrams are to be filtered. IP filtering is a network layer facility which doesn\'t understand anything about the application using the network connection. It only knows about the connections themselves. If we want to deny users access to internal network on the default telnet port, but rely on IP filtering alone, it is not possible to stop them from using the telnet program with a port that allow to pass through firewall. By using proxy servers for each service, it is possible to solve this problem. The proxy servers can prevent abuses. If firewall supports a World Wide Web proxy, telnet connection will always be answered by the proxy and will allow only http requests to pass. A large number of...