Alpha Vijayan - Academia.edu (original) (raw)
Papers by Alpha Vijayan
International Journal of Engineering and Computer Science, Aug 20, 2016
This is implemented for the purpose of getting a fully automized electricity billing system. This... more This is implemented for the purpose of getting a fully automized electricity billing system. This is aim to measure and monitor the electricty consumed by consumers in a locality and transmitting the consumed power to the station as well as issuing the bill of consumed power automatically. It is also aims to find the malpractices in the meter. Using this system the Electricity Board can access all data regarding the consumed power in each home and in each station whenever required. From the data the Board can find out power theft also it is also offers a system to charge extra payment for the excess usage of power at peak time (6.00-10.00pm) .Online payment is also possible for our new system. GSM is using for automating the system. The consumed unit transmission, alerts and bill reception are achieved by the GSM module in the client side as set by the user. Server station is also served by a GSM module for transmission and reception of data .
2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)
Lecture Notes in Electrical Engineering
Lecture notes in networks and systems, Nov 8, 2022
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Dec 21, 2019
The truthful identification of drug side effects represents a major concern for public health. Me... more The truthful identification of drug side effects represents a major concern for public health. Medication symptoms or Adverse Drug responses (ADRs) are a vital and complex challenge. In the pharmaceutical business, ADRs are one of the main causes of failure during the time spent in the development of drugs and of drug withdrawal once a medication has achieved the market. Medication used in prescription depends on a balance between expected advantages and conceivable dangers. Adverse Drug Reactions (ADRs) are impacts that happen when a medication is not administered or controlled at the best possible measurements. It is basic to build up an investigation pipeline to computationally foresee drug side effect symptoms from various assorted sources.
Lecture notes in electrical engineering, 2022
2022 International Conference for Advancement in Technology (ICONAT), 2022
Cryptography is the principle and study of techniques for secure communication that is for provid... more Cryptography is the principle and study of techniques for secure communication that is for providing data integrity, authentication, data confidentiality etc....More precisely cryptography is about building and inspecting protocols that provide secure communication between two users. The cryptographic algorithms can be broadly divided into two based on their keys. They are private key cryptographic algorithms which uses the similar secret key for encryption and decryption and public key cryptographic algorithms which uses different keys for encryption and decryption. The mobile devices become rapidly appearing everywhere and popular due to the expeditious advances in wireless communication technologies. Therefore authentication protocol is used between two entities for transfer of authenticated data. One such protocol is the AMUA (Anonymous Mobile User Authentication Protocol) that can provide security of various mobile applications. This paper presents a comprehensive survey of var...
International Journal Of Engineering And Computer Science, 2016
This is implemented for the purpose of getting a fully automized electricity billing system. This... more This is implemented for the purpose of getting a fully automized electricity billing system. This is aim to measure and monitor the electricty consumed by consumers in a locality and transmitting the consumed power to the station as well as issuing the bill of consumed power automatically. It is also aims to find the malpractices in the meter. Using this system the Electricity Board can access all data regarding the consumed power in each home and in each station whenever required. From the data the Board can find out power theft also it is also offers a system to charge extra payment for the excess usage of power at peak time (6.00-10.00pm) .Online payment is also possible for our new system. GSM is using for automating the system. The consumed unit transmission, alerts and bill reception are achieved by the GSM module in the client side as set by the user. Server station is also served by a GSM module for transmission and reception of data .
International Journal of Advanced Research, 2017
Mechanism that decides which types of IP datagrams will be processed normally and which will be d... more Mechanism that decides which types of IP datagrams will be processed normally and which will be discarded is called IP filtering. Discarding datagrams means that the datagram is completely ignored and deleted, as if it had never been received. There are many criteria to determine which datagrams are to be filtered. IP filtering is a network layer facility which doesn't understand anything about the application using the network connection. It only knows about the connections themselves. if we want to deny users access to internal network on the default telnet port, but rely on IP filtering alone, it is not possible to stop them from using the telnet program with a port that allow to pass through firewall. By using proxy servers for each service, it is possible to solve this problem. The proxy servers can prevent abuses. If firewall supports a World Wide Web proxy, telnet connection will always be answered by the proxy and will allow only http requests to pass. A large number of ...
Journal of emerging technologies and innovative research, 2018
In cloud computing, to protect privacy when outsourcing database management system, confidential ... more In cloud computing, to protect privacy when outsourcing database management system, confidential data has to be encryptedwhich however renders traditional query processing methods inapplicable. First the confidentiality requires hiding the value and the relative order of the attribute in records from the cloud server, but computing a range query requires comparing the values of this attribute. It defines and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted data in cloud computing Establish a set of strict privacy requirements for such a secure cloud data utilization system.Among various multi-keyword semantics, choose the efficient similarity measure of coordinate matching.This further use inner product similarity to quantitatively evaluate such similarity measure. First propose a basic idea for the multi-keyword ranked search over encrypted cloud data schemes based on secure inner product computation, and then give two significantly imp...
Mechanism that decides which types of IP datagrams will be processed normally and which will be d... more Mechanism that decides which types of IP datagrams will be processed normally and which will be discarded is called IP filtering. Discarding datagrams means that the datagram is completely ignored and deleted, as if it had never been received. There are many criteria to determine which datagrams are to be filtered. IP filtering is a network layer facility which doesn't understand anything about the application using the network connection. It only knows about the connections themselves. if we want to deny users access to internal network on the default telnet port, but rely on IP filtering alone, it is not possible to stop them from using the telnet program with a port that allow to pass through firewall. By using proxy servers for each service, it is possible to solve this problem. The proxy servers can prevent abuses. If firewall supports a World Wide Web proxy, telnet connection will always be answered by the proxy and will allow only http requests to pass. A large number of proxy-server programs are there. Some are free software and many others are commercial products. Here we present a survey on IP filtering mechanisms.
Now a days everything is being automated. The electrical energy provider still uses traditional m... more Now a days everything is being automated. The electrical energy provider still uses traditional methods for reading the energy consumed by individual consumer. The proposed system automatically reads the energy consumed and send it to the electricity provider using the short messaging services (SMS) and Android app.
Harmful contents are rising in television day by day and this motivates the essence of more resea... more Harmful contents are rising in television day by day and this motivates the essence of more research in fast and reliable obscene and immoral material filtering. Adultery content image recognition is an important component in each filtering system. We use Skin detection process of finding skin colored pixels and regions in each frame of a video. This process is typically used as a preprocessing step to find regions that potentially have human faces and limbs in images. Many computer vision approaches have been developed for skin detection. Immoral imagery or as they put it pornography has been there for a long time and with the advent of web it has only just grown. Adultery is considered as obscene material whose intention is to provoke sexual arousal. So, it should be managed and certainly shouldn't be popping where it is not meant to. So we propose to design a system that takes a frame and detects if it is a pornographic image or not. We intend to be using SVM (Support Vector ...
Prescription manifestations or drug reactions are an imperative and complex test. Medications are... more Prescription manifestations or drug reactions are an imperative and complex test. Medications are synthetic substances for treating illnesses, however, may actuate unfriendly responses or results. Medication revelation is tedious and works concentrated, and applicant drugs experience the ill effects of likely side. Heaps of affirmed drugs were removed from the market due to sudden results. Since drug results are an incredible worry of the general wellbeing, the recognizable proof of medication results assists with diminishing dangers in drug revelation. With the expansion of medication information, scientists gathered data about endorsed sedates, and recognize possible symptoms of new applicant drugs. Medication disappointments because of unexpected unfriendly impacts at clinical preliminaries present wellbeing hazards for the members and lead to generous monetary misfortunes. Side effect forecast calculations can possibly direct the medication configuration measure. Drug utilized i...
International Journal of Computer Sciences and Engineering
International Journal of Computer Sciences and Engineering
The information era witnesses the creation of multimedia data, transfers and transactions in the ... more The information era witnesses the creation of multimedia data, transfers and transactions in the order of millions. This data by virtue of their formats comes in varying sizes and differing temporal characteristics. The wealth of information carries potential both in terms of explicit content that is expressed and the implicit or hidden content. Processing the former is quite developed while the procedures and applications of working with the implicit knowledge are growing steadily. This paper aims to present a range of techniques from recent works pertaining to the processing and applicability of such data. The purpose of the survey is to bring to light the specific methods of social media data analysis in a concise and organized manner. Specifically, natural language processing, topic modelling, sentiment analysis and affective analysis have been identified as the overarching heads taken up by several recent researches. Finally, some observations pertaining to social media data analysis identified from several works are enlisted.
Mechanism that decides which types of IP datagrams will be processed normally and which will be d... more Mechanism that decides which types of IP datagrams will be processed normally and which will be discarded is called IP filtering. Discarding datagrams means that the datagram is completely ignored and deleted, as if it had never been received. There are many criteria to determine which datagrams are to be filtered. IP filtering is a network layer facility which doesn\'t understand anything about the application using the network connection. It only knows about the connections themselves. If we want to deny users access to internal network on the default telnet port, but rely on IP filtering alone, it is not possible to stop them from using the telnet program with a port that allow to pass through firewall. By using proxy servers for each service, it is possible to solve this problem. The proxy servers can prevent abuses. If firewall supports a World Wide Web proxy, telnet connection will always be answered by the proxy and will allow only http requests to pass. A large number of...
International Journal of Engineering and Computer Science, Aug 20, 2016
This is implemented for the purpose of getting a fully automized electricity billing system. This... more This is implemented for the purpose of getting a fully automized electricity billing system. This is aim to measure and monitor the electricty consumed by consumers in a locality and transmitting the consumed power to the station as well as issuing the bill of consumed power automatically. It is also aims to find the malpractices in the meter. Using this system the Electricity Board can access all data regarding the consumed power in each home and in each station whenever required. From the data the Board can find out power theft also it is also offers a system to charge extra payment for the excess usage of power at peak time (6.00-10.00pm) .Online payment is also possible for our new system. GSM is using for automating the system. The consumed unit transmission, alerts and bill reception are achieved by the GSM module in the client side as set by the user. Server station is also served by a GSM module for transmission and reception of data .
2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)
Lecture Notes in Electrical Engineering
Lecture notes in networks and systems, Nov 8, 2022
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Dec 21, 2019
The truthful identification of drug side effects represents a major concern for public health. Me... more The truthful identification of drug side effects represents a major concern for public health. Medication symptoms or Adverse Drug responses (ADRs) are a vital and complex challenge. In the pharmaceutical business, ADRs are one of the main causes of failure during the time spent in the development of drugs and of drug withdrawal once a medication has achieved the market. Medication used in prescription depends on a balance between expected advantages and conceivable dangers. Adverse Drug Reactions (ADRs) are impacts that happen when a medication is not administered or controlled at the best possible measurements. It is basic to build up an investigation pipeline to computationally foresee drug side effect symptoms from various assorted sources.
Lecture notes in electrical engineering, 2022
2022 International Conference for Advancement in Technology (ICONAT), 2022
Cryptography is the principle and study of techniques for secure communication that is for provid... more Cryptography is the principle and study of techniques for secure communication that is for providing data integrity, authentication, data confidentiality etc....More precisely cryptography is about building and inspecting protocols that provide secure communication between two users. The cryptographic algorithms can be broadly divided into two based on their keys. They are private key cryptographic algorithms which uses the similar secret key for encryption and decryption and public key cryptographic algorithms which uses different keys for encryption and decryption. The mobile devices become rapidly appearing everywhere and popular due to the expeditious advances in wireless communication technologies. Therefore authentication protocol is used between two entities for transfer of authenticated data. One such protocol is the AMUA (Anonymous Mobile User Authentication Protocol) that can provide security of various mobile applications. This paper presents a comprehensive survey of var...
International Journal Of Engineering And Computer Science, 2016
This is implemented for the purpose of getting a fully automized electricity billing system. This... more This is implemented for the purpose of getting a fully automized electricity billing system. This is aim to measure and monitor the electricty consumed by consumers in a locality and transmitting the consumed power to the station as well as issuing the bill of consumed power automatically. It is also aims to find the malpractices in the meter. Using this system the Electricity Board can access all data regarding the consumed power in each home and in each station whenever required. From the data the Board can find out power theft also it is also offers a system to charge extra payment for the excess usage of power at peak time (6.00-10.00pm) .Online payment is also possible for our new system. GSM is using for automating the system. The consumed unit transmission, alerts and bill reception are achieved by the GSM module in the client side as set by the user. Server station is also served by a GSM module for transmission and reception of data .
International Journal of Advanced Research, 2017
Mechanism that decides which types of IP datagrams will be processed normally and which will be d... more Mechanism that decides which types of IP datagrams will be processed normally and which will be discarded is called IP filtering. Discarding datagrams means that the datagram is completely ignored and deleted, as if it had never been received. There are many criteria to determine which datagrams are to be filtered. IP filtering is a network layer facility which doesn't understand anything about the application using the network connection. It only knows about the connections themselves. if we want to deny users access to internal network on the default telnet port, but rely on IP filtering alone, it is not possible to stop them from using the telnet program with a port that allow to pass through firewall. By using proxy servers for each service, it is possible to solve this problem. The proxy servers can prevent abuses. If firewall supports a World Wide Web proxy, telnet connection will always be answered by the proxy and will allow only http requests to pass. A large number of ...
Journal of emerging technologies and innovative research, 2018
In cloud computing, to protect privacy when outsourcing database management system, confidential ... more In cloud computing, to protect privacy when outsourcing database management system, confidential data has to be encryptedwhich however renders traditional query processing methods inapplicable. First the confidentiality requires hiding the value and the relative order of the attribute in records from the cloud server, but computing a range query requires comparing the values of this attribute. It defines and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted data in cloud computing Establish a set of strict privacy requirements for such a secure cloud data utilization system.Among various multi-keyword semantics, choose the efficient similarity measure of coordinate matching.This further use inner product similarity to quantitatively evaluate such similarity measure. First propose a basic idea for the multi-keyword ranked search over encrypted cloud data schemes based on secure inner product computation, and then give two significantly imp...
Mechanism that decides which types of IP datagrams will be processed normally and which will be d... more Mechanism that decides which types of IP datagrams will be processed normally and which will be discarded is called IP filtering. Discarding datagrams means that the datagram is completely ignored and deleted, as if it had never been received. There are many criteria to determine which datagrams are to be filtered. IP filtering is a network layer facility which doesn't understand anything about the application using the network connection. It only knows about the connections themselves. if we want to deny users access to internal network on the default telnet port, but rely on IP filtering alone, it is not possible to stop them from using the telnet program with a port that allow to pass through firewall. By using proxy servers for each service, it is possible to solve this problem. The proxy servers can prevent abuses. If firewall supports a World Wide Web proxy, telnet connection will always be answered by the proxy and will allow only http requests to pass. A large number of proxy-server programs are there. Some are free software and many others are commercial products. Here we present a survey on IP filtering mechanisms.
Now a days everything is being automated. The electrical energy provider still uses traditional m... more Now a days everything is being automated. The electrical energy provider still uses traditional methods for reading the energy consumed by individual consumer. The proposed system automatically reads the energy consumed and send it to the electricity provider using the short messaging services (SMS) and Android app.
Harmful contents are rising in television day by day and this motivates the essence of more resea... more Harmful contents are rising in television day by day and this motivates the essence of more research in fast and reliable obscene and immoral material filtering. Adultery content image recognition is an important component in each filtering system. We use Skin detection process of finding skin colored pixels and regions in each frame of a video. This process is typically used as a preprocessing step to find regions that potentially have human faces and limbs in images. Many computer vision approaches have been developed for skin detection. Immoral imagery or as they put it pornography has been there for a long time and with the advent of web it has only just grown. Adultery is considered as obscene material whose intention is to provoke sexual arousal. So, it should be managed and certainly shouldn't be popping where it is not meant to. So we propose to design a system that takes a frame and detects if it is a pornographic image or not. We intend to be using SVM (Support Vector ...
Prescription manifestations or drug reactions are an imperative and complex test. Medications are... more Prescription manifestations or drug reactions are an imperative and complex test. Medications are synthetic substances for treating illnesses, however, may actuate unfriendly responses or results. Medication revelation is tedious and works concentrated, and applicant drugs experience the ill effects of likely side. Heaps of affirmed drugs were removed from the market due to sudden results. Since drug results are an incredible worry of the general wellbeing, the recognizable proof of medication results assists with diminishing dangers in drug revelation. With the expansion of medication information, scientists gathered data about endorsed sedates, and recognize possible symptoms of new applicant drugs. Medication disappointments because of unexpected unfriendly impacts at clinical preliminaries present wellbeing hazards for the members and lead to generous monetary misfortunes. Side effect forecast calculations can possibly direct the medication configuration measure. Drug utilized i...
International Journal of Computer Sciences and Engineering
International Journal of Computer Sciences and Engineering
The information era witnesses the creation of multimedia data, transfers and transactions in the ... more The information era witnesses the creation of multimedia data, transfers and transactions in the order of millions. This data by virtue of their formats comes in varying sizes and differing temporal characteristics. The wealth of information carries potential both in terms of explicit content that is expressed and the implicit or hidden content. Processing the former is quite developed while the procedures and applications of working with the implicit knowledge are growing steadily. This paper aims to present a range of techniques from recent works pertaining to the processing and applicability of such data. The purpose of the survey is to bring to light the specific methods of social media data analysis in a concise and organized manner. Specifically, natural language processing, topic modelling, sentiment analysis and affective analysis have been identified as the overarching heads taken up by several recent researches. Finally, some observations pertaining to social media data analysis identified from several works are enlisted.
Mechanism that decides which types of IP datagrams will be processed normally and which will be d... more Mechanism that decides which types of IP datagrams will be processed normally and which will be discarded is called IP filtering. Discarding datagrams means that the datagram is completely ignored and deleted, as if it had never been received. There are many criteria to determine which datagrams are to be filtered. IP filtering is a network layer facility which doesn\'t understand anything about the application using the network connection. It only knows about the connections themselves. If we want to deny users access to internal network on the default telnet port, but rely on IP filtering alone, it is not possible to stop them from using the telnet program with a port that allow to pass through firewall. By using proxy servers for each service, it is possible to solve this problem. The proxy servers can prevent abuses. If firewall supports a World Wide Web proxy, telnet connection will always be answered by the proxy and will allow only http requests to pass. A large number of...