Radha Chandan - Academia.edu (original) (raw)

Papers by Radha Chandan

Research paper thumbnail of Vehicle Number Identification using Machine Learning & OPENCV

Surveillance is important in most of the applications. Vehicle number plate detection is the majo... more Surveillance is important in most of the applications. Vehicle number plate detection is the major part of traffic surveillance. The detection of number plates has become more challenging and interesting in the past few years. The most challenging part of number plate detection is the varying size, shape and font styles of the number plates. The interesting part of number plate detection is its use in security applications. This project proposes a method to detect the vehicle number plate using methods like edge detection and morphological operations. The approach is performed in five steps. The first step is image acquisition which captures the image scene using a camera. Next step is preprocessing which involves conversion of an image to a different model and noise reduction. The next step is license plate detection which involves use of various edge detection algorithms. The final two steps are character recognition and character matching which involves knn classifier and finally the characters are compared with test samples and matched.

Research paper thumbnail of Implementation and Execution of Blockchain Technology in the Field of Education

Research paper thumbnail of Kannada Character Recognition Using Multi-Class SVM Method

Character recognition also truncated to OCR (Optical Character Recognition), is the translation o... more Character recognition also truncated to OCR (Optical Character Recognition), is the translation of images: hand-written, typewritten (either mechanically or electronically), or even just a simple text printed into a machine-editable text. Among them, one of the most relevant types is handwritten character recognition. Each handwritten content is composed of symbols, alphabets, etc. that are very syllabic with a distinct font style. Character recognition is achieved through segmentation, feature ex-traction, and classification, by using any one the machine learning methods thereby making tremendous advancements. This paper keenly focuses on the recognition of handwritten Kannada alpha-bets. Different machine learning classification strategies have known to be applied to achieve this recognition. Although, in this paper, we mostly center around the procedures dependency on the solution provided by Support Vector Machine(SVM) classifiers using Python. For simplicity, we focus on only four Kannada alpha-bets in this paper.

Research paper thumbnail of Authorized Redundant Check Support in a Hybrid Cloud Environment

International Journal of Advanced Research in Science, Communication and Technology, Jul 18, 2023

Data deduplication is one of the most significant data contraction ways for removing indistinguis... more Data deduplication is one of the most significant data contraction ways for removing indistinguishable clones of recreating data, and it's generally used in pall storehouse to minimise storehouse space and save bandwidth. The coincident encryption approach has been developed to cipher the data before outsourcing to insure the confidentiality of sensitive data while easing deduplication. This work is the first attempt to explicitly address the content of authorised data deduplication in order to ameliorate data security. In discrepancy to standard deduplication systems, the discriminational boons of druggies are taken into account in indistinguishable check in addition to the data itself. In addition, we describe numerous innovative deduplication infrastructures that give authorised indistinguishable check in a cold-blooded pallarchitecture. Our approach is secure in terms of the delineations stated in the proposed security model, according to security analysis. We apply a prototype of our proposed authorised indistinguishable check medium as a evidence of conception and take over testbed tests with it. We demonstrate that our proposed authorised indistinguishable check fashion has a low outflow when compared to typical operations.

Research paper thumbnail of Performance Analysis of Relay Selection Algorithm for Video Transmission in Cooperative Ad Hoc Networks

The importance of cooperative communication in wireless networks cannot be stressed enough. It ha... more The importance of cooperative communication in wireless networks cannot be stressed enough. It has drawn a lot of attention for its capability to successfully tackle the inherent problem of fading in wireless communication. As the world is moving towards precision in all aspects, it is only natural that people desire to watch high quality video for realistic experience. Cooperative communication can undoubtedly help in this regard if appropriate relay selection schemes are used.This paper focusses on two relay selection methods for video transmission. One of the methods is to select the best relay on the basis of channel strength and the other method is to select the best relay based on video awareness. Video is transmitted using QPSK, 16-QAM and 64-QAM modulation schemes. Results showed that the quality of video obtained was better for the relay selection method based on video awareness.

Research paper thumbnail of Heterogeneity issues in IoT-driven devices and services

Journal of Autonomous Intelligence

Internet of Things (IoT), which connects billions of devices and services to the Internet, is vie... more Internet of Things (IoT), which connects billions of devices and services to the Internet, is viewed as the future industrial and intellectual revolution in technology. These connected devices are available in a variety of types. Different technologies and standards use various protocols to interact with each other. Due to these difficulties with heterogeneity, the application of IoT on a broad scale is difficult. This inspired us to identify the problems from the literature and offer solutions to solve the IoT scalability problem. This study is based on the systematic literature review (SLR) to identify the diverse problems and their solutions. We chose 81 primary sources in total. We found 14 distinct IoT heterogeneity concerns after extracting and interpreting the data. The following issues have been noted as potential obstacles: heterogeneity in data formats, heterogeneity of devices, heterogeneity in communication, and interoperability difficulty because of heterogeneity. From ...

Research paper thumbnail of Efficient Compression Sensing Mechanism Based WBAN System Using Blockchain

Security and Communication Networks

The hybrid wireless sensor network is made up of Wireless Body Area Network (WBAN). Generally, ma... more The hybrid wireless sensor network is made up of Wireless Body Area Network (WBAN). Generally, many hospitals use cellular networks to support telemedicine. To provide the treatment to the patient on time, for this, an early diagnosis is required, for treatment. With the help of WBANs, collections and transmissions of essential biomedical data to monitor human health becomes easy. Compressor Sensing (CS) is an emerging signal compression/acquisition methodology that offers a protruding alternative to traditional signal acquisition. The proposed mechanism reduces message exchange overhead and enhances trust value estimation via response time and computational resources. It reduces cost and makes the system affordable to the patient. According to the results, the proposed scheme in terms of Compression Ratio (CR) is 18.18% to 88.11% better as compared to existing schemes. Also in terms of Percentage Root-Mean-Squared Difference (PRD) value, the proposed scheme is 18.18% to 34.21% bett...

Research paper thumbnail of Implementation and Execution of Blockchain Technology in the Field of Education

2022 5th International Conference on Contemporary Computing and Informatics (IC3I)

Research paper thumbnail of Efficient COVID-19 Identification Using Deep Learning for IoT

2022 5th International Conference on Contemporary Computing and Informatics (IC3I)

Internet of Things (IoT) has made it possible to diagnose and treat patients remotely, as well as... more Internet of Things (IoT) has made it possible to diagnose and treat patients remotely, as well as to expedite the transportation of essential drugs and medical equipment to locations that are geographically separated. This has occurred at a time when society has become more socially distant. During the Ebola and COVID-19 outbreaks, the Internet of Things (IoT) technology was put to use in remote patient monitoring and the management of the vaccine cold chain. Concurrently, this study reflects on the variables that are required for IoT to scale. Since December 2019, the COVID-19outbreak on a worldwide scale has developed into a significant problem. In order for medical treatment to be successful, it is essential to make a prompt and accurate diagnosis of persons who may be infected with the COVID-19 virus. In order to puta halt to the spread of COVID-19, it is important to construct an automated system that is based on deep transfer learning and is capable of detecting the virus based on chest X-rays. The authors of this study present an internet-of-things (IoT) system that makes use of ensemble deep transfer learning to diagnoseCOVID-19 patients at an earlier stage. It is feasible to keep an eye on potentially hazardous COVID-19 incidents as they occur so long as suitable procedures are adhered to. Inceptions A variety of different deep learning models are included into the framework that has been proposed for the Internet of Things. According to the findings of the study, the method that was suggested assisted radiologists in accurately and quickly identifying patients who could have COVID-19. The proposed effort focuses on developing an effective identification system based on the COVID-19 standard for use in an IoT setting

Research paper thumbnail of Genetic Algorithm and Machine Learning

Advances in healthcare information systems and administration book series, Nov 18, 2022

Research paper thumbnail of A Critical analysis on Neural Networks and Deep Learning Based Techniques for the Cloud Computing System and its Impact on Industrial Management

2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)

Research paper thumbnail of Integration of Support Vector Machine and Deep Convolutional Neural Network for Rice Crop Diseases Identification

2023 4th International Conference on Smart Electronics and Communication (ICOSEC)

Research paper thumbnail of Secure Modern Wireless Communication Network Based on Blockchain Technology

Electronics

Sixth-generation (6G) wireless networking studies have begun with the global implementation of fi... more Sixth-generation (6G) wireless networking studies have begun with the global implementation of fifth-generation (5G) wireless systems. It is predicted that multiple heterogeneity applications and facilities may be supported by modern wireless communication networks (MWCNs) with improved effectiveness and protection. Nevertheless, a variety of trust-related problems that are commonly disregarded in network architectures prevent us from achieving this objective. In the current world, MWCN transmits a lot of sensitive information. It is essential to protect MWCN users from harmful attacks and offer them a secure transmission to meet their requirements. A malicious node causes a major attack on reliable data during transmission. Blockchain offers a potential answer for confidentiality and safety as an innovative transformative tool that has emerged in the last few years. Blockchain has been extensively investigated in several domains, including mobile networks and the Internet of Things...

Research paper thumbnail of Machine Learning-based Alzheimer’s Disease Prediction using Personalized Methods

2022 3rd International Conference on Smart Electronics and Communication (ICOSEC)

Research paper thumbnail of Machine Learning Model for the Prediction of an E-Vehicle's Battery Life Cycle

2022 International Conference on Edge Computing and Applications (ICECAA)

Research paper thumbnail of Machine learning Technique for improving the stability of Thermal Energy storage

Research paper thumbnail of Substantial Phase Exploration for Intuiting Covid using form Expedient with Variance Sensor

INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL

This article focuses on implementing wireless sensors for monitoring exact distance between two i... more This article focuses on implementing wireless sensors for monitoring exact distance between two individuals and to check whether everybody have sanitized their hands for stopping the spread of Corona Virus Disease (COVID). The idea behind this method is executed by implementing an objective function which focuses on maximizing distance, energy of nodes and minimizing the cost of implementation. Also, the proposed model is integrated with a variance detector which is denoted as Controlled Incongruity Algorithm (CIA). This variance detector is will sense the value and it will report to an online monitoring system named Things speak and for visualizing the sensed values it will be simulated using MATLAB. Even loss which is produced by sensors is found to be low when CIA is implemented. To validate the efficiency of proposed method it has been compared with prevailing methods and results prove that the better performance is obtained and the proposed method is improved by 76.8% than othe...

Research paper thumbnail of A context-aware improved POR protocol for Delay Tolerant networks

Research paper thumbnail of Classification of Motor Unit Action Potential Using Transfer Learning for the Diagnosis of Neuromuscular Diseases

2022 8th International Conference on Smart Structures and Systems (ICSSS)

Research paper thumbnail of A machine learning algorithm for classification under extremely scarce information

International Journal of Data Analysis Techniques and Strategies, 2012

When it is difficult to get learning data during the training time, we have to classify objects b... more When it is difficult to get learning data during the training time, we have to classify objects by having extremely small information about their feature. It is assumed in the paper that only some average or mean value of every feature and the lower and upper bounds of a set of its values are known. The main idea for constructing new classification models taking into account this information is to form a set of probability distributions bounded by some lower and upper probability distribution functions (a p-box). A discriminant function is derived in order to maximise the risk measure over the set of distributions and to minimise it over a set of classification parameters. The algorithm for classification is reduced to a parametric linear programming problem.

Research paper thumbnail of Vehicle Number Identification using Machine Learning & OPENCV

Surveillance is important in most of the applications. Vehicle number plate detection is the majo... more Surveillance is important in most of the applications. Vehicle number plate detection is the major part of traffic surveillance. The detection of number plates has become more challenging and interesting in the past few years. The most challenging part of number plate detection is the varying size, shape and font styles of the number plates. The interesting part of number plate detection is its use in security applications. This project proposes a method to detect the vehicle number plate using methods like edge detection and morphological operations. The approach is performed in five steps. The first step is image acquisition which captures the image scene using a camera. Next step is preprocessing which involves conversion of an image to a different model and noise reduction. The next step is license plate detection which involves use of various edge detection algorithms. The final two steps are character recognition and character matching which involves knn classifier and finally the characters are compared with test samples and matched.

Research paper thumbnail of Implementation and Execution of Blockchain Technology in the Field of Education

Research paper thumbnail of Kannada Character Recognition Using Multi-Class SVM Method

Character recognition also truncated to OCR (Optical Character Recognition), is the translation o... more Character recognition also truncated to OCR (Optical Character Recognition), is the translation of images: hand-written, typewritten (either mechanically or electronically), or even just a simple text printed into a machine-editable text. Among them, one of the most relevant types is handwritten character recognition. Each handwritten content is composed of symbols, alphabets, etc. that are very syllabic with a distinct font style. Character recognition is achieved through segmentation, feature ex-traction, and classification, by using any one the machine learning methods thereby making tremendous advancements. This paper keenly focuses on the recognition of handwritten Kannada alpha-bets. Different machine learning classification strategies have known to be applied to achieve this recognition. Although, in this paper, we mostly center around the procedures dependency on the solution provided by Support Vector Machine(SVM) classifiers using Python. For simplicity, we focus on only four Kannada alpha-bets in this paper.

Research paper thumbnail of Authorized Redundant Check Support in a Hybrid Cloud Environment

International Journal of Advanced Research in Science, Communication and Technology, Jul 18, 2023

Data deduplication is one of the most significant data contraction ways for removing indistinguis... more Data deduplication is one of the most significant data contraction ways for removing indistinguishable clones of recreating data, and it's generally used in pall storehouse to minimise storehouse space and save bandwidth. The coincident encryption approach has been developed to cipher the data before outsourcing to insure the confidentiality of sensitive data while easing deduplication. This work is the first attempt to explicitly address the content of authorised data deduplication in order to ameliorate data security. In discrepancy to standard deduplication systems, the discriminational boons of druggies are taken into account in indistinguishable check in addition to the data itself. In addition, we describe numerous innovative deduplication infrastructures that give authorised indistinguishable check in a cold-blooded pallarchitecture. Our approach is secure in terms of the delineations stated in the proposed security model, according to security analysis. We apply a prototype of our proposed authorised indistinguishable check medium as a evidence of conception and take over testbed tests with it. We demonstrate that our proposed authorised indistinguishable check fashion has a low outflow when compared to typical operations.

Research paper thumbnail of Performance Analysis of Relay Selection Algorithm for Video Transmission in Cooperative Ad Hoc Networks

The importance of cooperative communication in wireless networks cannot be stressed enough. It ha... more The importance of cooperative communication in wireless networks cannot be stressed enough. It has drawn a lot of attention for its capability to successfully tackle the inherent problem of fading in wireless communication. As the world is moving towards precision in all aspects, it is only natural that people desire to watch high quality video for realistic experience. Cooperative communication can undoubtedly help in this regard if appropriate relay selection schemes are used.This paper focusses on two relay selection methods for video transmission. One of the methods is to select the best relay on the basis of channel strength and the other method is to select the best relay based on video awareness. Video is transmitted using QPSK, 16-QAM and 64-QAM modulation schemes. Results showed that the quality of video obtained was better for the relay selection method based on video awareness.

Research paper thumbnail of Heterogeneity issues in IoT-driven devices and services

Journal of Autonomous Intelligence

Internet of Things (IoT), which connects billions of devices and services to the Internet, is vie... more Internet of Things (IoT), which connects billions of devices and services to the Internet, is viewed as the future industrial and intellectual revolution in technology. These connected devices are available in a variety of types. Different technologies and standards use various protocols to interact with each other. Due to these difficulties with heterogeneity, the application of IoT on a broad scale is difficult. This inspired us to identify the problems from the literature and offer solutions to solve the IoT scalability problem. This study is based on the systematic literature review (SLR) to identify the diverse problems and their solutions. We chose 81 primary sources in total. We found 14 distinct IoT heterogeneity concerns after extracting and interpreting the data. The following issues have been noted as potential obstacles: heterogeneity in data formats, heterogeneity of devices, heterogeneity in communication, and interoperability difficulty because of heterogeneity. From ...

Research paper thumbnail of Efficient Compression Sensing Mechanism Based WBAN System Using Blockchain

Security and Communication Networks

The hybrid wireless sensor network is made up of Wireless Body Area Network (WBAN). Generally, ma... more The hybrid wireless sensor network is made up of Wireless Body Area Network (WBAN). Generally, many hospitals use cellular networks to support telemedicine. To provide the treatment to the patient on time, for this, an early diagnosis is required, for treatment. With the help of WBANs, collections and transmissions of essential biomedical data to monitor human health becomes easy. Compressor Sensing (CS) is an emerging signal compression/acquisition methodology that offers a protruding alternative to traditional signal acquisition. The proposed mechanism reduces message exchange overhead and enhances trust value estimation via response time and computational resources. It reduces cost and makes the system affordable to the patient. According to the results, the proposed scheme in terms of Compression Ratio (CR) is 18.18% to 88.11% better as compared to existing schemes. Also in terms of Percentage Root-Mean-Squared Difference (PRD) value, the proposed scheme is 18.18% to 34.21% bett...

Research paper thumbnail of Implementation and Execution of Blockchain Technology in the Field of Education

2022 5th International Conference on Contemporary Computing and Informatics (IC3I)

Research paper thumbnail of Efficient COVID-19 Identification Using Deep Learning for IoT

2022 5th International Conference on Contemporary Computing and Informatics (IC3I)

Internet of Things (IoT) has made it possible to diagnose and treat patients remotely, as well as... more Internet of Things (IoT) has made it possible to diagnose and treat patients remotely, as well as to expedite the transportation of essential drugs and medical equipment to locations that are geographically separated. This has occurred at a time when society has become more socially distant. During the Ebola and COVID-19 outbreaks, the Internet of Things (IoT) technology was put to use in remote patient monitoring and the management of the vaccine cold chain. Concurrently, this study reflects on the variables that are required for IoT to scale. Since December 2019, the COVID-19outbreak on a worldwide scale has developed into a significant problem. In order for medical treatment to be successful, it is essential to make a prompt and accurate diagnosis of persons who may be infected with the COVID-19 virus. In order to puta halt to the spread of COVID-19, it is important to construct an automated system that is based on deep transfer learning and is capable of detecting the virus based on chest X-rays. The authors of this study present an internet-of-things (IoT) system that makes use of ensemble deep transfer learning to diagnoseCOVID-19 patients at an earlier stage. It is feasible to keep an eye on potentially hazardous COVID-19 incidents as they occur so long as suitable procedures are adhered to. Inceptions A variety of different deep learning models are included into the framework that has been proposed for the Internet of Things. According to the findings of the study, the method that was suggested assisted radiologists in accurately and quickly identifying patients who could have COVID-19. The proposed effort focuses on developing an effective identification system based on the COVID-19 standard for use in an IoT setting

Research paper thumbnail of Genetic Algorithm and Machine Learning

Advances in healthcare information systems and administration book series, Nov 18, 2022

Research paper thumbnail of A Critical analysis on Neural Networks and Deep Learning Based Techniques for the Cloud Computing System and its Impact on Industrial Management

2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)

Research paper thumbnail of Integration of Support Vector Machine and Deep Convolutional Neural Network for Rice Crop Diseases Identification

2023 4th International Conference on Smart Electronics and Communication (ICOSEC)

Research paper thumbnail of Secure Modern Wireless Communication Network Based on Blockchain Technology

Electronics

Sixth-generation (6G) wireless networking studies have begun with the global implementation of fi... more Sixth-generation (6G) wireless networking studies have begun with the global implementation of fifth-generation (5G) wireless systems. It is predicted that multiple heterogeneity applications and facilities may be supported by modern wireless communication networks (MWCNs) with improved effectiveness and protection. Nevertheless, a variety of trust-related problems that are commonly disregarded in network architectures prevent us from achieving this objective. In the current world, MWCN transmits a lot of sensitive information. It is essential to protect MWCN users from harmful attacks and offer them a secure transmission to meet their requirements. A malicious node causes a major attack on reliable data during transmission. Blockchain offers a potential answer for confidentiality and safety as an innovative transformative tool that has emerged in the last few years. Blockchain has been extensively investigated in several domains, including mobile networks and the Internet of Things...

Research paper thumbnail of Machine Learning-based Alzheimer’s Disease Prediction using Personalized Methods

2022 3rd International Conference on Smart Electronics and Communication (ICOSEC)

Research paper thumbnail of Machine Learning Model for the Prediction of an E-Vehicle's Battery Life Cycle

2022 International Conference on Edge Computing and Applications (ICECAA)

Research paper thumbnail of Machine learning Technique for improving the stability of Thermal Energy storage

Research paper thumbnail of Substantial Phase Exploration for Intuiting Covid using form Expedient with Variance Sensor

INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL

This article focuses on implementing wireless sensors for monitoring exact distance between two i... more This article focuses on implementing wireless sensors for monitoring exact distance between two individuals and to check whether everybody have sanitized their hands for stopping the spread of Corona Virus Disease (COVID). The idea behind this method is executed by implementing an objective function which focuses on maximizing distance, energy of nodes and minimizing the cost of implementation. Also, the proposed model is integrated with a variance detector which is denoted as Controlled Incongruity Algorithm (CIA). This variance detector is will sense the value and it will report to an online monitoring system named Things speak and for visualizing the sensed values it will be simulated using MATLAB. Even loss which is produced by sensors is found to be low when CIA is implemented. To validate the efficiency of proposed method it has been compared with prevailing methods and results prove that the better performance is obtained and the proposed method is improved by 76.8% than othe...

Research paper thumbnail of A context-aware improved POR protocol for Delay Tolerant networks

Research paper thumbnail of Classification of Motor Unit Action Potential Using Transfer Learning for the Diagnosis of Neuromuscular Diseases

2022 8th International Conference on Smart Structures and Systems (ICSSS)

Research paper thumbnail of A machine learning algorithm for classification under extremely scarce information

International Journal of Data Analysis Techniques and Strategies, 2012

When it is difficult to get learning data during the training time, we have to classify objects b... more When it is difficult to get learning data during the training time, we have to classify objects by having extremely small information about their feature. It is assumed in the paper that only some average or mean value of every feature and the lower and upper bounds of a set of its values are known. The main idea for constructing new classification models taking into account this information is to form a set of probability distributions bounded by some lower and upper probability distribution functions (a p-box). A discriminant function is derived in order to maximise the risk measure over the set of distributions and to minimise it over a set of classification parameters. The algorithm for classification is reduced to a parametric linear programming problem.