Ranjith Balakrishnan - Academia.edu (original) (raw)

Papers by Ranjith Balakrishnan

Research paper thumbnail of Cloud enabled patient-centric EHR management system

The records that are related to the persons health where maintained in the digital format, Electr... more The records that are related to the persons health where maintained in the digital format, Electronic Health Record (EHR), which can be used in time of emergency by medical practitioners and other healthcare providers. This provides the detailed medical information of a patient. Since there is need to provide security to those confidential data that are stored in a cloud. In this paper we are using Attribute Based Encryption which is a technique used to provide security based on patients attributes that are always unique. Here we are using multiple attributes of patient's record to generate a secret key. At the same time the visibility of attributes is varied depending on the users. The attributes that are used to generate the secret key will also be changed dynamically which enhances the security. In order to make it easy to work with, we are implementing in android phones.

Research paper thumbnail of Real time sleep apnea monitor using ECG

Sleep apnea is one of the common problem in world. Sleep apnea is generally known as interruption... more Sleep apnea is one of the common problem in world. Sleep apnea is generally known as interruption of breathing while sleeping. Every year 4% of the population are dying due to sleep apnea. The inspiration of this project is to find an efficient method for analyzing an " ECG Signal "which has good accuracy and less computation time. This paper deals with the study of ECG signal processing and analysis by means of MATLAB tool. With the help of this analysis further we implement in hardware. The apnea monitoring is used to recognize obstructive sleep apnea episodes.

Research paper thumbnail of Brain tumor diagnosis from MRI feature analysis - A comparative study

Brain tumors are due to abnormal growth of tissue in the brain. Magnetic resonance imaging (MRI) ... more Brain tumors are due to abnormal growth of tissue in the brain. Magnetic resonance imaging (MRI) is currently an indispensable diagnostic imaging technique for the early detection of any abnormal changes in tissues and organs. Brain tumors are the most aggressive and devastating types of cancer and therefore, its correct identification at an early stage followed by treatment is its only cure. In this project, a comparative study of transform techniques namely Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) each separately combined with the Probabilistic Neural Network (PNN) is used for the classification of brain tumor. The system consists of three stages for the diagnosis of brain tumor. In the first stage, MR image is obtained and preprocessing is done to remove the noise and sharpen the image. In the second stage, DCT and DWT is used for feature extraction. In the third stage, Probabilistic Neural Network with Radial Basis Function distinguishes brains abnormality. Finally the performance of DCT and DWT in diagnosing the brain tumor is compared using the parameters such as sensitivity rate and precision rate.

Research paper thumbnail of Distributed detection of flooding and gray hole attacks in Wireless Sensor Network

Research paper thumbnail of Language Localization for Mobile Phones 1 Language Localization for Mobile Phones

ABSTRACT: Predictive Text is an input technology used in mobile phones. It lets words be formed b... more ABSTRACT: Predictive Text is an input technology used in mobile phones. It lets words be formed by a single key press for each letter, as opposed to the multiple key press approach used in the older generation of mobile phones. It works via active reference to a dictionary of commonly used words. The predictive option works with PDAs and smart phones that have keypad recognitions. It helps by analyzing the user’s writing style and guessing the words in Tamil. The problem of optimizing keypad designs for predictive text entry methods for handheld devices has received significant i nterest in recent years. The necessity of such optimization lies in the ever- increasing difficulty of inputting Tamil text into mobile devices. In contrast to past research that allowed mapping of any letters to any keys, we hypothesize that maintaining alphabetical ordering across the keys of optimized keypad designs will result in higher novice usability and ease of learning, while still providing a more...

Research paper thumbnail of Cloud Enabled Patient -Centric EHR Mana System

The records that are related to the where maintained in the digital format, Electronic Health Rec... more The records that are related to the where maintained in the digital format, Electronic Health Record (EHR), which can be used in time of emergency by medical practitioners and other healthcare providers. This provides the detailed medical information of a patient. Since there provide security to those confidential data that are stored in a cloud. In this paper we are using Attribute Based Encryption which is a technique used to provide security based on patients attributes that are always unique. Here we are using mu attributes of patient's record to generate a secret key. At the same time the visibility of attributes is varied depending on the users. The attributes that are used to generate the secret key will also be changed dynamically which enhances the secu order to make it easy to work with, we are implementing in

Research paper thumbnail of Reversible Secure Steganography Based OnLifting Transform

International Journal of Innovative Research in Science, Engineering and Technology, 2014

An enhancement of data protection system for secret communication using reserve room in encrypted... more An enhancement of data protection system for secret communication using reserve room in encrypted images based on texture analysis with lifting wavelet is proposed here. The reserving space to conceal text messages was the reserve space. RSA asymmetric key encryption is used here to encrypt secret text before hiding for increasing the security. Adaptive least significant bit algorithm utilized for concealing the encrypted text into the effectively done in an image spectral domain and chaos crypto system used to encrypt the image frequency components except reserved space. An experimental result shows that used methodologies generated minimal error with high PSNR rate at various data hiding capacity.

Research paper thumbnail of IoT based Monitoring and Control System for Home Automation using Prediction Algorithms

Research paper thumbnail of Anticipating Human Activities from Surveillance Videos

International Journal Of Engineering And Computer Science, 2017

Research paper thumbnail of Auction based dynamic resource allocation in cloud

2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), 2016

Cloud computing is one of the fastest emerging technology. As we all know, cloud is a wide pool o... more Cloud computing is one of the fastest emerging technology. As we all know, cloud is a wide pool of resource which provides resources based on the users request. Any service can be provided as a service through cloud. As the cloud contains many resources, there may also wastage of resources. To reduce this wastage, cloud providers enter into auctioning of resources when the demand is high. Cloud computing includes distinct resources. Because of the complementary and supplementary effects between distinct assets, bidders have preferences not for just a single resource but also for a set of resources. Auctioning for a bundle of resources is called combinatorial auction. Dynamic resource allocation in on demand for a bundle of resource is proposed by using CA - PROVISION algorithm and the scenarios are simulated using Cloudsim, a simulator meant for cloud computing analysis.

Research paper thumbnail of Set top box system with android support using Embedded Linux operating systempaper

Ieee International Conference on Advances in Engineering Science and Management, 2012

This paper is about a customized operating system for the decoder system (set top box based) whic... more This paper is about a customized operating system for the decoder system (set top box based) which is based on Embedded Linux and has support of an Android Operating System. In general television is becoming like an Internet where there are multiplication of channels. This creates challenges for viewers, advertisers and creator's. Application proposed here is a set top box controlled by an operating system could help address the concerns of viewers and creators by giving people more control over their TV viewing experience. It also enhances the usability of the set-top box by opening it up to a wide variety of applications and advertising opportunities. There by creating interesting applications to keep viewers glued to their TV sets. It is proposed to develop with a set top box using Embedded Linux kernel and the Android Software Stack which is open source.

Research paper thumbnail of Distributed detection of flooding and gray hole attacks in Wireless Sensor Network

2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015

Wireless Sensor Networks(WSN) when sorted out as groups (clusters) increases throughput, energy s... more Wireless Sensor Networks(WSN) when sorted out as groups (clusters) increases throughput, energy savings and decreases delay. These types of WSN rely on cluster heads for data aggregation and transmission towards sink node. Subsequently cluster head nodes are outfitted with high energy. Conventional hierarchical routing protocols were not created considering security; they are helpless against Denial of Service (DoS) attacks. In the event that the information supply process is hampered and in this way the normal administrations get to be inaccessible because of the purposeful endeavors of the enemies, we consider this as a Denial of Service (DoS) attack. So in order to address this issue and to disseminate the computational heap of detection complexity among the cluster heads rather than the sink nodes, a distributed intrusion detection scheme (IDS) is developed. Among the various Denial of Service attacks, Flooding attacks consumes the maximum battery life of the sensor node, on the other hand Gray hole attack consumes the minimum battery life of the nodes. Thus based on energy these attacks are distinguished and isolated from the network using the proposed IDS and extensive simulations are carried out using NS2-MANNASIM framework.

Research paper thumbnail of Brain tumor diagnosis from MRI feature analysis - A comparative study

2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015

Brain tumors are due to abnormal growth of tissue in the brain. Magnetic resonance imaging (MRI) ... more Brain tumors are due to abnormal growth of tissue in the brain. Magnetic resonance imaging (MRI) is currently an indispensable diagnostic imaging technique for the early detection of any abnormal changes in tissues and organs. Brain tumors are the most aggressive and devastating types of cancer and therefore, its correct identification at an early stage followed by treatment is its only cure. In this project, a comparative study of transform techniques namely Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) each separately combined with the Probabilistic Neural Network (PNN) is used for the classification of brain tumor. The system consists of three stages for the diagnosis of brain tumor. In the first stage, MR image is obtained and preprocessing is done to remove the noise and sharpen the image. In the second stage, DCT and DWT is used for feature extraction. In the third stage, Probabilistic Neural Network with Radial Basis Function distinguishes brains abnormality. Finally the performance of DCT and DWT in diagnosing the brain tumor is compared using the parameters such as sensitivity rate and precision rate.

Research paper thumbnail of Neural load prediction technique for power optimization in cloud management system

2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2013

Cloud computing is the current technology used for sharing and accessing resources via internet. ... more Cloud computing is the current technology used for sharing and accessing resources via internet. It provides a scalable and cost effective environment. Large number of servers in the data centers leads to huge consumption of power in the cloud computing scenario. Optimization of power consumption is a key challenge for effectively operating a datacenter. Power consumption can be regulated by using a proper load balancing technique. Load balancing is done so as to distribute the load fairly amidst the servers and also a scheduling technique k followed to selectively hibernate the servers to optimize the energy consumption. The load balancing is based on load prediction and server selection policy. Neural Network is used for load prediction, which predicts the future load based on the past historical data. The servers can be monitored and given ranking based on their reliability record and this information is used as a criterion while performing load balancing.

Research paper thumbnail of Cloud enabled patient-centric EHR management system

2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, 2014

The records that are related to the persons health where maintained in the digital format, Electr... more The records that are related to the persons health where maintained in the digital format, Electronic Health Record (EHR), which can be used in time of emergency by medical practitioners and other healthcare providers. This provides the detailed medical information of a patient. Since there is need to provide security to those confidential data that are stored in a cloud. In this paper we are using Attribute Based Encryption which is a technique used to provide security based on patients attributes that are always unique. Here we are using multiple attributes of patient's record to generate a secret key. At the same time the visibility of attributes is varied depending on the users. The attributes that are used to generate the secret key will also be changed dynamically which enhances the security. In order to make it easy to work with, we are implementing in android phones.

Research paper thumbnail of Real time sleep apnea monitor using ECG

2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2013

Sleep apnea is one of the common problem in world. Sleep apnea is generally known as interruption... more Sleep apnea is one of the common problem in world. Sleep apnea is generally known as interruption of breathing while sleeping. Every year 4% of the population are dying due to sleep apnea. The inspiration of this project is to find an efficient method for analyzing an " ECG Signal "which has good accuracy and less computation time. This paper deals with the study of ECG signal processing and analysis by means of MATLAB tool. With the help of this analysis further we implement in hardware. The apnea monitoring is used to recognize obstructive sleep apnea episodes.

Research paper thumbnail of Language localization for mobile phones

Mobile and …, 2008

... the current prefix could be proposed as a suggested word for auto-completion, thus further ac... more ... the current prefix could be proposed as a suggested word for auto-completion, thus further accelerating the input process. ... All mobile phones support the Unicode fonts [6]. This is a prototype model for predictive text entry for Tamil. ... Language Localization for Mobile Phones 55 ...

Research paper thumbnail of A novel algorithm for sudden cardiac death risk estimation using Lab VIEW

2011 International Conference on Recent Trends in Information Technology (ICRTIT), 2011

... [8] Usman Rashed, Muhammad Javed Mirza, “Identification of Sudden Cardiac Death Using Spectra... more ... [8] Usman Rashed, Muhammad Javed Mirza, “Identification of Sudden Cardiac Death Using Spectral Domain Analysis of ECG”IEEE-ICET International Conference on Emerging Technologies, 2008, Pakistan [9] Lina Zhang, Xinhua Jiang, “Acquisition and Analysis of the ECG ...

Research paper thumbnail of Impact of simulation softwares as teaching tools in engineering learning - An instructional design choice

2016 IEEE Global Engineering Education Conference (EDUCON), 2016

Quality Engineering Education has been identified as the foremost thrust area in India. The thrus... more Quality Engineering Education has been identified as the foremost thrust area in India. The thrust is mainly due to the new establishment/enrichment of various core engineering industry sectors like Automobile, Healthcare, Agriculture, Avionics, Structural, Telecommunication and Mobile Technologies. Currently even though the country graduates a bulk volume of engineers every year, a major composition of this volume is drained to IT service sectors for employment. To enhance the above thrust of the country many engineering education institutions started focusing on quality of the offered education in terms of numerical ability, creativity and design ability of engineers. The Course Outcomes and Programme Specific Outcomes have been designed with the above focus as a guideline. More emphasis on integration of technology into instruction with learner-centric approach is encouraged. Simulation tools as teaching aids will enrich the understanding ability of the learner. In this work the confidence level of the learners to attain the course level objectives through simulation based teaching pedagogy has been explored. The survey records ensure the impact of this innovative instructional design for the desired course outcomes.

Research paper thumbnail of Automated diagnosis and prevention of unsafe dynamic software component loadings

2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2013

For an improved system modularity and flexibility through code reuse, efficient memory usage, and... more For an improved system modularity and flexibility through code reuse, efficient memory usage, and reduced disk space dynamic loading of software components is widely used mechanism in operating system. However, Programming mistakes may create malicious components being loaded with regular dynamic loadings. In particular, dynamic loadings can be made as malicious components by placing an arbitrary file with the same or specified name in target components. Although this issue has not been considered serious because such vulnerabilities are dangerous than virus and exploiting it requires access to local file system. This kind of malicious will act as original dynamic loadings with the same name and makes remote exploitation realistic. To avoid remote attacks and intruders, in this paper we present the automated technique to detect unsafe dynamic component loadings and malicious. By applying dynamic binary instrumentation to collect runtime information on component loading, and analyze the collected information to detect vulnerable component loadings can prevent unsafe dynamic components.

Research paper thumbnail of Cloud enabled patient-centric EHR management system

The records that are related to the persons health where maintained in the digital format, Electr... more The records that are related to the persons health where maintained in the digital format, Electronic Health Record (EHR), which can be used in time of emergency by medical practitioners and other healthcare providers. This provides the detailed medical information of a patient. Since there is need to provide security to those confidential data that are stored in a cloud. In this paper we are using Attribute Based Encryption which is a technique used to provide security based on patients attributes that are always unique. Here we are using multiple attributes of patient's record to generate a secret key. At the same time the visibility of attributes is varied depending on the users. The attributes that are used to generate the secret key will also be changed dynamically which enhances the security. In order to make it easy to work with, we are implementing in android phones.

Research paper thumbnail of Real time sleep apnea monitor using ECG

Sleep apnea is one of the common problem in world. Sleep apnea is generally known as interruption... more Sleep apnea is one of the common problem in world. Sleep apnea is generally known as interruption of breathing while sleeping. Every year 4% of the population are dying due to sleep apnea. The inspiration of this project is to find an efficient method for analyzing an " ECG Signal "which has good accuracy and less computation time. This paper deals with the study of ECG signal processing and analysis by means of MATLAB tool. With the help of this analysis further we implement in hardware. The apnea monitoring is used to recognize obstructive sleep apnea episodes.

Research paper thumbnail of Brain tumor diagnosis from MRI feature analysis - A comparative study

Brain tumors are due to abnormal growth of tissue in the brain. Magnetic resonance imaging (MRI) ... more Brain tumors are due to abnormal growth of tissue in the brain. Magnetic resonance imaging (MRI) is currently an indispensable diagnostic imaging technique for the early detection of any abnormal changes in tissues and organs. Brain tumors are the most aggressive and devastating types of cancer and therefore, its correct identification at an early stage followed by treatment is its only cure. In this project, a comparative study of transform techniques namely Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) each separately combined with the Probabilistic Neural Network (PNN) is used for the classification of brain tumor. The system consists of three stages for the diagnosis of brain tumor. In the first stage, MR image is obtained and preprocessing is done to remove the noise and sharpen the image. In the second stage, DCT and DWT is used for feature extraction. In the third stage, Probabilistic Neural Network with Radial Basis Function distinguishes brains abnormality. Finally the performance of DCT and DWT in diagnosing the brain tumor is compared using the parameters such as sensitivity rate and precision rate.

Research paper thumbnail of Distributed detection of flooding and gray hole attacks in Wireless Sensor Network

Research paper thumbnail of Language Localization for Mobile Phones 1 Language Localization for Mobile Phones

ABSTRACT: Predictive Text is an input technology used in mobile phones. It lets words be formed b... more ABSTRACT: Predictive Text is an input technology used in mobile phones. It lets words be formed by a single key press for each letter, as opposed to the multiple key press approach used in the older generation of mobile phones. It works via active reference to a dictionary of commonly used words. The predictive option works with PDAs and smart phones that have keypad recognitions. It helps by analyzing the user’s writing style and guessing the words in Tamil. The problem of optimizing keypad designs for predictive text entry methods for handheld devices has received significant i nterest in recent years. The necessity of such optimization lies in the ever- increasing difficulty of inputting Tamil text into mobile devices. In contrast to past research that allowed mapping of any letters to any keys, we hypothesize that maintaining alphabetical ordering across the keys of optimized keypad designs will result in higher novice usability and ease of learning, while still providing a more...

Research paper thumbnail of Cloud Enabled Patient -Centric EHR Mana System

The records that are related to the where maintained in the digital format, Electronic Health Rec... more The records that are related to the where maintained in the digital format, Electronic Health Record (EHR), which can be used in time of emergency by medical practitioners and other healthcare providers. This provides the detailed medical information of a patient. Since there provide security to those confidential data that are stored in a cloud. In this paper we are using Attribute Based Encryption which is a technique used to provide security based on patients attributes that are always unique. Here we are using mu attributes of patient's record to generate a secret key. At the same time the visibility of attributes is varied depending on the users. The attributes that are used to generate the secret key will also be changed dynamically which enhances the secu order to make it easy to work with, we are implementing in

Research paper thumbnail of Reversible Secure Steganography Based OnLifting Transform

International Journal of Innovative Research in Science, Engineering and Technology, 2014

An enhancement of data protection system for secret communication using reserve room in encrypted... more An enhancement of data protection system for secret communication using reserve room in encrypted images based on texture analysis with lifting wavelet is proposed here. The reserving space to conceal text messages was the reserve space. RSA asymmetric key encryption is used here to encrypt secret text before hiding for increasing the security. Adaptive least significant bit algorithm utilized for concealing the encrypted text into the effectively done in an image spectral domain and chaos crypto system used to encrypt the image frequency components except reserved space. An experimental result shows that used methodologies generated minimal error with high PSNR rate at various data hiding capacity.

Research paper thumbnail of IoT based Monitoring and Control System for Home Automation using Prediction Algorithms

Research paper thumbnail of Anticipating Human Activities from Surveillance Videos

International Journal Of Engineering And Computer Science, 2017

Research paper thumbnail of Auction based dynamic resource allocation in cloud

2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), 2016

Cloud computing is one of the fastest emerging technology. As we all know, cloud is a wide pool o... more Cloud computing is one of the fastest emerging technology. As we all know, cloud is a wide pool of resource which provides resources based on the users request. Any service can be provided as a service through cloud. As the cloud contains many resources, there may also wastage of resources. To reduce this wastage, cloud providers enter into auctioning of resources when the demand is high. Cloud computing includes distinct resources. Because of the complementary and supplementary effects between distinct assets, bidders have preferences not for just a single resource but also for a set of resources. Auctioning for a bundle of resources is called combinatorial auction. Dynamic resource allocation in on demand for a bundle of resource is proposed by using CA - PROVISION algorithm and the scenarios are simulated using Cloudsim, a simulator meant for cloud computing analysis.

Research paper thumbnail of Set top box system with android support using Embedded Linux operating systempaper

Ieee International Conference on Advances in Engineering Science and Management, 2012

This paper is about a customized operating system for the decoder system (set top box based) whic... more This paper is about a customized operating system for the decoder system (set top box based) which is based on Embedded Linux and has support of an Android Operating System. In general television is becoming like an Internet where there are multiplication of channels. This creates challenges for viewers, advertisers and creator's. Application proposed here is a set top box controlled by an operating system could help address the concerns of viewers and creators by giving people more control over their TV viewing experience. It also enhances the usability of the set-top box by opening it up to a wide variety of applications and advertising opportunities. There by creating interesting applications to keep viewers glued to their TV sets. It is proposed to develop with a set top box using Embedded Linux kernel and the Android Software Stack which is open source.

Research paper thumbnail of Distributed detection of flooding and gray hole attacks in Wireless Sensor Network

2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015

Wireless Sensor Networks(WSN) when sorted out as groups (clusters) increases throughput, energy s... more Wireless Sensor Networks(WSN) when sorted out as groups (clusters) increases throughput, energy savings and decreases delay. These types of WSN rely on cluster heads for data aggregation and transmission towards sink node. Subsequently cluster head nodes are outfitted with high energy. Conventional hierarchical routing protocols were not created considering security; they are helpless against Denial of Service (DoS) attacks. In the event that the information supply process is hampered and in this way the normal administrations get to be inaccessible because of the purposeful endeavors of the enemies, we consider this as a Denial of Service (DoS) attack. So in order to address this issue and to disseminate the computational heap of detection complexity among the cluster heads rather than the sink nodes, a distributed intrusion detection scheme (IDS) is developed. Among the various Denial of Service attacks, Flooding attacks consumes the maximum battery life of the sensor node, on the other hand Gray hole attack consumes the minimum battery life of the nodes. Thus based on energy these attacks are distinguished and isolated from the network using the proposed IDS and extensive simulations are carried out using NS2-MANNASIM framework.

Research paper thumbnail of Brain tumor diagnosis from MRI feature analysis - A comparative study

2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015

Brain tumors are due to abnormal growth of tissue in the brain. Magnetic resonance imaging (MRI) ... more Brain tumors are due to abnormal growth of tissue in the brain. Magnetic resonance imaging (MRI) is currently an indispensable diagnostic imaging technique for the early detection of any abnormal changes in tissues and organs. Brain tumors are the most aggressive and devastating types of cancer and therefore, its correct identification at an early stage followed by treatment is its only cure. In this project, a comparative study of transform techniques namely Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) each separately combined with the Probabilistic Neural Network (PNN) is used for the classification of brain tumor. The system consists of three stages for the diagnosis of brain tumor. In the first stage, MR image is obtained and preprocessing is done to remove the noise and sharpen the image. In the second stage, DCT and DWT is used for feature extraction. In the third stage, Probabilistic Neural Network with Radial Basis Function distinguishes brains abnormality. Finally the performance of DCT and DWT in diagnosing the brain tumor is compared using the parameters such as sensitivity rate and precision rate.

Research paper thumbnail of Neural load prediction technique for power optimization in cloud management system

2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2013

Cloud computing is the current technology used for sharing and accessing resources via internet. ... more Cloud computing is the current technology used for sharing and accessing resources via internet. It provides a scalable and cost effective environment. Large number of servers in the data centers leads to huge consumption of power in the cloud computing scenario. Optimization of power consumption is a key challenge for effectively operating a datacenter. Power consumption can be regulated by using a proper load balancing technique. Load balancing is done so as to distribute the load fairly amidst the servers and also a scheduling technique k followed to selectively hibernate the servers to optimize the energy consumption. The load balancing is based on load prediction and server selection policy. Neural Network is used for load prediction, which predicts the future load based on the past historical data. The servers can be monitored and given ranking based on their reliability record and this information is used as a criterion while performing load balancing.

Research paper thumbnail of Cloud enabled patient-centric EHR management system

2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, 2014

The records that are related to the persons health where maintained in the digital format, Electr... more The records that are related to the persons health where maintained in the digital format, Electronic Health Record (EHR), which can be used in time of emergency by medical practitioners and other healthcare providers. This provides the detailed medical information of a patient. Since there is need to provide security to those confidential data that are stored in a cloud. In this paper we are using Attribute Based Encryption which is a technique used to provide security based on patients attributes that are always unique. Here we are using multiple attributes of patient's record to generate a secret key. At the same time the visibility of attributes is varied depending on the users. The attributes that are used to generate the secret key will also be changed dynamically which enhances the security. In order to make it easy to work with, we are implementing in android phones.

Research paper thumbnail of Real time sleep apnea monitor using ECG

2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2013

Sleep apnea is one of the common problem in world. Sleep apnea is generally known as interruption... more Sleep apnea is one of the common problem in world. Sleep apnea is generally known as interruption of breathing while sleeping. Every year 4% of the population are dying due to sleep apnea. The inspiration of this project is to find an efficient method for analyzing an " ECG Signal "which has good accuracy and less computation time. This paper deals with the study of ECG signal processing and analysis by means of MATLAB tool. With the help of this analysis further we implement in hardware. The apnea monitoring is used to recognize obstructive sleep apnea episodes.

Research paper thumbnail of Language localization for mobile phones

Mobile and …, 2008

... the current prefix could be proposed as a suggested word for auto-completion, thus further ac... more ... the current prefix could be proposed as a suggested word for auto-completion, thus further accelerating the input process. ... All mobile phones support the Unicode fonts [6]. This is a prototype model for predictive text entry for Tamil. ... Language Localization for Mobile Phones 55 ...

Research paper thumbnail of A novel algorithm for sudden cardiac death risk estimation using Lab VIEW

2011 International Conference on Recent Trends in Information Technology (ICRTIT), 2011

... [8] Usman Rashed, Muhammad Javed Mirza, “Identification of Sudden Cardiac Death Using Spectra... more ... [8] Usman Rashed, Muhammad Javed Mirza, “Identification of Sudden Cardiac Death Using Spectral Domain Analysis of ECG”IEEE-ICET International Conference on Emerging Technologies, 2008, Pakistan [9] Lina Zhang, Xinhua Jiang, “Acquisition and Analysis of the ECG ...

Research paper thumbnail of Impact of simulation softwares as teaching tools in engineering learning - An instructional design choice

2016 IEEE Global Engineering Education Conference (EDUCON), 2016

Quality Engineering Education has been identified as the foremost thrust area in India. The thrus... more Quality Engineering Education has been identified as the foremost thrust area in India. The thrust is mainly due to the new establishment/enrichment of various core engineering industry sectors like Automobile, Healthcare, Agriculture, Avionics, Structural, Telecommunication and Mobile Technologies. Currently even though the country graduates a bulk volume of engineers every year, a major composition of this volume is drained to IT service sectors for employment. To enhance the above thrust of the country many engineering education institutions started focusing on quality of the offered education in terms of numerical ability, creativity and design ability of engineers. The Course Outcomes and Programme Specific Outcomes have been designed with the above focus as a guideline. More emphasis on integration of technology into instruction with learner-centric approach is encouraged. Simulation tools as teaching aids will enrich the understanding ability of the learner. In this work the confidence level of the learners to attain the course level objectives through simulation based teaching pedagogy has been explored. The survey records ensure the impact of this innovative instructional design for the desired course outcomes.

Research paper thumbnail of Automated diagnosis and prevention of unsafe dynamic software component loadings

2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2013

For an improved system modularity and flexibility through code reuse, efficient memory usage, and... more For an improved system modularity and flexibility through code reuse, efficient memory usage, and reduced disk space dynamic loading of software components is widely used mechanism in operating system. However, Programming mistakes may create malicious components being loaded with regular dynamic loadings. In particular, dynamic loadings can be made as malicious components by placing an arbitrary file with the same or specified name in target components. Although this issue has not been considered serious because such vulnerabilities are dangerous than virus and exploiting it requires access to local file system. This kind of malicious will act as original dynamic loadings with the same name and makes remote exploitation realistic. To avoid remote attacks and intruders, in this paper we present the automated technique to detect unsafe dynamic component loadings and malicious. By applying dynamic binary instrumentation to collect runtime information on component loading, and analyze the collected information to detect vulnerable component loadings can prevent unsafe dynamic components.