ganesan Kaliyaperumal | VIT University (original) (raw)

Papers by ganesan Kaliyaperumal

Research paper thumbnail of Vehicle Over Speed Detection System

Studies in big data, 2023

Research paper thumbnail of A physical memristor based Muthuswamy–Chua–Ginoux system

Scientific Reports, Nov 5, 2020

In 1976, Leon Chua showed that a thermistor can be modeled as a memristive device. Starting from ... more In 1976, Leon Chua showed that a thermistor can be modeled as a memristive device. Starting from this statement we designed a circuit that has four circuit elements: a linear passive inductor, a linear passive capacitor, a nonlinear resistor and a thermistor, that is, a nonlinear "locally active" memristor. Thus, the purpose of this work was to use a physical memristor, the thermistor, in a Muthuswamy-Chua chaotic system (circuit) instead of memristor emulators. Such circuit has been modeled by a new three-dimensional autonomous dynamical system exhibiting very particular properties such as the transition from torus breakdown to chaos. Then, mathematical analysis and detailed numerical investigations have enabled to establish that such a transition corresponds to the so-called route to Shilnikov spiral chaos but gives rise to a "double spiral attractor". Michael Faraday (1791-1867) is generally well known for his contributions to the study of electromagnetism and electrochemistry. However, according to Orton 1 , while investigating the effect of temperature on the conductivity of "sulphuret of silver" (silver sulfide) in 1833 he discovered what is now considered as a thermistor 2. Thermistor, i.e., thermal resistor, is thus an electrical-resistance element made of a semiconducting material the resistance of which varies with temperature. Thermistor production was then difficult, and applications were limited. One century had to pass before thermistors became commonly used by commercial manufacturers. In the 1930s, Samuel Ruben (1900-1988) invented the first commercial thermistor that he called "electrical pyrometer resistance" (Patents N o 2,021,491). He explained that: This invention relates to an electrical pyrometer and specifically to one utilizing the resistance change of a metallic compound with heat to indicate temperature changes. The characteristic property of the material employed for the temperature indicating resistance element is one having a high negative resistance coefficient.

Research paper thumbnail of Aqua Site Classification Using Neural Network Models

AGRIS on-line Papers in Economics and Informatics, Dec 30, 2016

India being one of the major producers of fish contributes 5.5 percent of global fish production ... more India being one of the major producers of fish contributes 5.5 percent of global fish production and ranks second in the world after China. The production of aquaculture mainly depends on the quality of land selected for aqua farming. Neural Network algorithms have been applied to classify the aquaculture sites based on 6 input variables viz., water, soil, support, infrastructure, input and risk factor. An artificial neural network (ANN) consists of huge number of interconnected elements called neurons that work together to solve a specific problem. An Artificial Neural network can be used for classification, prediction, pattern recognition etc., through a learning process. In this paper, the models were constructed using three Neural Network algorithms viz., Back Propagation Network (BPN), Radial Basis Function (RBF) and Linear Vector Quantization (LVQ). The models classify each aquaculture site into 3 classes viz., suitable, moderate and unsuitable. From the results of the three models, it has been found that Radial Basis Function model not only gives accurate results but also time taken for training the dataset is less when compared with the other two Neural Network models. The results obtained from the neural network models were validated with the results of the fuzzy model.

Research paper thumbnail of Ad hoc-obstacle avoidance-based navigation system using Deep Reinforcement Learning for self-driving vehicles

IEEE Access, 2023

The authors would like to acknowledge the support rendered by the centre in completing this work ... more The authors would like to acknowledge the support rendered by the centre in completing this work successfully.

Research paper thumbnail of Hardware and Software Design for Mobile Robot’s Navigation Over On-Road and Off-Road Curvature Paths

IEEE Access

Navigating a mobile robot through a curve path is a difficult task in both on-road and off-road n... more Navigating a mobile robot through a curve path is a difficult task in both on-road and off-road navigation. This research provides a hardware and software platform to address this issue. Two types of research have been conducted in this paper. First, a hardware platform consisting of a Linear Actuator-based steering mechanism is implemented to hold the steering at the desired angle. Second, the curvature information from Google Maps path data is collected and used to improve the existing Pure Pursuit algorithm, which is known as the curve-aware Pure Pursuit (C-PP) algorithm, which navigates a mobile robot in both on-road and off-road (with scattered small obstacles) environments. The mobile robot is navigated using C-PP and steering is controlled by a Linear Actuator. The results taken in real-time and simulation show that the proposed algorithm for on-road and off-road environments has lower longitudinal and lateral RMSE values compared to the existing algorithms. INDEX TERMS Mobile robot, curvature path, pure pursuit, linear actuator.

Research paper thumbnail of Tiling algorithm with line-based transform for rapid ship detection and wake feature extraction in ALOS-2 SAR sensor data

International Journal of Applied Science and Engineering

Research paper thumbnail of An adaptive HVS based video watermarking scheme for multiple watermarks using BAM neural networks and fuzzy inference system

Expert Systems with Applications, 2016

Research paper thumbnail of Advanced dynamic finite element analysis of a skew steel railway bridge

Engineering Structures, 2011

The aim of this paper is to present advanced modelling techniques for dynamic analysis of steel r... more The aim of this paper is to present advanced modelling techniques for dynamic analysis of steel railway bridges. Finite element analyses of a case study skew bridge are carried out and the results are compared with available field measurements. Initially, eigenvalue analyses of different models are carried out in order to obtain the fundamental mode shapes and bridge frequencies and

Research paper thumbnail of In-Vehicle Networking Based Services

Research paper thumbnail of Steganography Using Enhanced Chaotic Encryption Technique

In recent years, there is considerable interest in using the chaotic solutions of simple nonlinea... more In recent years, there is considerable interest in using the chaotic solutions of simple nonlinear dynamical systems [1] for encrypting the data. Baptista [2] has demonstrated how to use the chaotic solutions of Logistic equation for encryption. In order to increase the efficiency, we extended the method for a two coupled logistic equation . In this method, we divide the available phase space of a two coupled logistic equation into 94X94 boxes, each of which are associated with a pair of alphabets. A sender divides his messages into pairs of alphabets and identifies the associated box in the phase space. For this purpose, the two coupled logistic equation is iterated until the chaotic trajectory reaches the identified box. The corresponding iteration number is converted into its equivalent binary. The binary data is embedded into an image using standard steganographic technique and it is transmitted to the receiver. The receiver does the reverse operation for identifying the text. The similar process is repeated for all pairs of alphabets.

Research paper thumbnail of Maximizing the Availability and Reliability of Videos in VoD System Using Markov Chain

2009 Second International Conference on Communication Theory, Reliability, and Quality of Service, 2009

In a Video on Demand system, by forwarding the server video stream client by client, a chain base... more In a Video on Demand system, by forwarding the server video stream client by client, a chain based scheme is formed, which reduces the server load. The existing chaining schemes are not reliable because there are frequent breaks in the chain among the clients due to stringent bandwidth and buffer, stop fail, and hardware and software failures. This leads to

Research paper thumbnail of Memristor modeling

In this paper, we show a simple cir- cuit setup for experimentally plotting the v − i non- transv... more In this paper, we show a simple cir- cuit setup for experimentally plotting the v − i non- transversal pinched-hysteresis Lissajous fingerprint of a physical memristor - the common fluorescent gas discharge tube. The setup helped us investigate the effects of physical parasitics (inductors and capacitors) on the memristor v − i.

Research paper thumbnail of Look-up Table Based Chaotic Encryption of Audio Files

APCCAS 2006 - 2006 IEEE Asia Pacific Conference on Circuits and Systems, 2006

... [2] M. Lakshmanan and K. Murali, "Chaos in nonlinear oscillators - Controlling a... more ... [2] M. Lakshmanan and K. Murali, "Chaos in nonlinear oscillators - Controlling and synchronization", World Scientific, Singapore (2006). [3] MS Baptista, Phys.Letts.A, 240 (1-2), 50 (1998) [4] K.Ganesan and V. Rosepriyanka, "Enhanced Chaotic encryption using coupled ...

Research paper thumbnail of Image Encryption and Decryption Using Chaotic Maps and Modular Arithmetic

American Journal of Signal Processing, 2011

Research paper thumbnail of A Reliable Replication Strategy for VoD System using Markov Chain

In this paper we have investigated on the reliability of streams for a VoD system. The objective ... more In this paper we have investigated on the reliability of streams for a VoD system. The objective of the paper is to maximize the availability of streams for the peers in the VoD system. We have achieved this by using data replication technique in the peers. Hence, we proposed a new data replication technique to optimally store the videos in the peers. The new data replication technique generates more number of replicas than the existing techniques such as random, minimum request and maximize hit. We have also investigated by applying the CTMC model for the reliability of replications during the peer failures. Our result shows that the mean lifetime of replicas are more under various circumstances. We have addressed the practical issues of efficient utilization of overall bandwidth and buffer in the VoD system. We achieved greater success playback probability of videos than the existing techniques.

Research paper thumbnail of Memristor modelling

2014 IEEE International Symposium on Circuits and Systems (ISCAS), 2014

ABSTRACT In this paper, we show a simple circuit setup for experimentally plotting the v - i non-... more ABSTRACT In this paper, we show a simple circuit setup for experimentally plotting the v - i non-transversal pinched-hysteresis Lissajous fingerprint of a physical memristor - the common fluorescent gas discharge tube. The setup helped us investigate the effects of physical parasitics (inductors and capacitors) on the memristor v - i.

Research paper thumbnail of Public Key Encryption of Images and Videos in Real Time Using Chebyshev Maps

2008 Fifth International Conference on Computer Graphics, Imaging and Visualisation, 2008

Due to rapid developments in limits and possibilities of communications and information transmiss... more Due to rapid developments in limits and possibilities of communications and information transmissions, there is a growing demand of cryptographic techniques, which has spurred a great deal of intensive research activities in the study of cryptography. This paper describes a public key encryption based on chebyshev polynomials. We discuss the algorithm for textual data and present the cryptanalysis which can

Research paper thumbnail of Pseudorandom carrier based subharmonic PWM for cascaded multilevel inverters

2014 IEEE International Symposium on Circuits and Systems (ISCAS), 2014

Multilevel inverters are replacing conventional two level inverters due to reduced dv/dt stresses... more Multilevel inverters are replacing conventional two level inverters due to reduced dv/dt stresses, common mode voltages, and lower harmonic distortion. They are finding applications in motor drives, active filters and power conditioning. Cascaded Multilevel inverter is the most used topology among Multilevel Inverters, due to reduced number of components at higher voltage levels. Constant frequency PWM is normally employed for cascaded multilevel inverter. However, to overcome EMI and higher harmonic distortion, a random modulation technique, adopting pseudorandom carrier modulation is employed. This improves the spread spectra effect; where in the signal generated with a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with wider bandwidth. The pseudorandom carrier involves random selection of two triangular carriers of same frequency but opposite in phase depending on the output states of pseudorandom generator. Pseudorandom carrier modulation is employed on various kinds of sub harmonic PWM techniques. Total Harmonic Distortion (THD) and Harmonic Spread Factor (HSF) are considered for evaluating the performance of these methods .HSF was found to be 5% less in pseudorandom carrier scheme compared to constant frequency scheme. Current THD was found to be less than 4% in all schemes.

Research paper thumbnail of Automated parking slot allocation using RFID technology

2007 9th International Symposium on Signal Processing and Its Applications, 2007

Abstract One of the challenging problems for many vehicle owners in big metropolitan cities is wh... more Abstract One of the challenging problems for many vehicle owners in big metropolitan cities is where to park their vehicles. If the parking slot availability is known in advance one can save precious time and fuel wastage. In this paper we would like to propose an RFID ...

Research paper thumbnail of Optimal fingerprint scheme for video on demand using block designs

Multimedia Tools and Applications, 2012

Abstract Video fingerprint is a mechanism to protect movie from the traitors and also have the ca... more Abstract Video fingerprint is a mechanism to protect movie from the traitors and also have the capability to identify the traitors. The problem arises in video fingerprint when several traitors having the same copies of a movie with different fingerprints collude together. ...

Research paper thumbnail of Vehicle Over Speed Detection System

Studies in big data, 2023

Research paper thumbnail of A physical memristor based Muthuswamy–Chua–Ginoux system

Scientific Reports, Nov 5, 2020

In 1976, Leon Chua showed that a thermistor can be modeled as a memristive device. Starting from ... more In 1976, Leon Chua showed that a thermistor can be modeled as a memristive device. Starting from this statement we designed a circuit that has four circuit elements: a linear passive inductor, a linear passive capacitor, a nonlinear resistor and a thermistor, that is, a nonlinear "locally active" memristor. Thus, the purpose of this work was to use a physical memristor, the thermistor, in a Muthuswamy-Chua chaotic system (circuit) instead of memristor emulators. Such circuit has been modeled by a new three-dimensional autonomous dynamical system exhibiting very particular properties such as the transition from torus breakdown to chaos. Then, mathematical analysis and detailed numerical investigations have enabled to establish that such a transition corresponds to the so-called route to Shilnikov spiral chaos but gives rise to a "double spiral attractor". Michael Faraday (1791-1867) is generally well known for his contributions to the study of electromagnetism and electrochemistry. However, according to Orton 1 , while investigating the effect of temperature on the conductivity of "sulphuret of silver" (silver sulfide) in 1833 he discovered what is now considered as a thermistor 2. Thermistor, i.e., thermal resistor, is thus an electrical-resistance element made of a semiconducting material the resistance of which varies with temperature. Thermistor production was then difficult, and applications were limited. One century had to pass before thermistors became commonly used by commercial manufacturers. In the 1930s, Samuel Ruben (1900-1988) invented the first commercial thermistor that he called "electrical pyrometer resistance" (Patents N o 2,021,491). He explained that: This invention relates to an electrical pyrometer and specifically to one utilizing the resistance change of a metallic compound with heat to indicate temperature changes. The characteristic property of the material employed for the temperature indicating resistance element is one having a high negative resistance coefficient.

Research paper thumbnail of Aqua Site Classification Using Neural Network Models

AGRIS on-line Papers in Economics and Informatics, Dec 30, 2016

India being one of the major producers of fish contributes 5.5 percent of global fish production ... more India being one of the major producers of fish contributes 5.5 percent of global fish production and ranks second in the world after China. The production of aquaculture mainly depends on the quality of land selected for aqua farming. Neural Network algorithms have been applied to classify the aquaculture sites based on 6 input variables viz., water, soil, support, infrastructure, input and risk factor. An artificial neural network (ANN) consists of huge number of interconnected elements called neurons that work together to solve a specific problem. An Artificial Neural network can be used for classification, prediction, pattern recognition etc., through a learning process. In this paper, the models were constructed using three Neural Network algorithms viz., Back Propagation Network (BPN), Radial Basis Function (RBF) and Linear Vector Quantization (LVQ). The models classify each aquaculture site into 3 classes viz., suitable, moderate and unsuitable. From the results of the three models, it has been found that Radial Basis Function model not only gives accurate results but also time taken for training the dataset is less when compared with the other two Neural Network models. The results obtained from the neural network models were validated with the results of the fuzzy model.

Research paper thumbnail of Ad hoc-obstacle avoidance-based navigation system using Deep Reinforcement Learning for self-driving vehicles

IEEE Access, 2023

The authors would like to acknowledge the support rendered by the centre in completing this work ... more The authors would like to acknowledge the support rendered by the centre in completing this work successfully.

Research paper thumbnail of Hardware and Software Design for Mobile Robot’s Navigation Over On-Road and Off-Road Curvature Paths

IEEE Access

Navigating a mobile robot through a curve path is a difficult task in both on-road and off-road n... more Navigating a mobile robot through a curve path is a difficult task in both on-road and off-road navigation. This research provides a hardware and software platform to address this issue. Two types of research have been conducted in this paper. First, a hardware platform consisting of a Linear Actuator-based steering mechanism is implemented to hold the steering at the desired angle. Second, the curvature information from Google Maps path data is collected and used to improve the existing Pure Pursuit algorithm, which is known as the curve-aware Pure Pursuit (C-PP) algorithm, which navigates a mobile robot in both on-road and off-road (with scattered small obstacles) environments. The mobile robot is navigated using C-PP and steering is controlled by a Linear Actuator. The results taken in real-time and simulation show that the proposed algorithm for on-road and off-road environments has lower longitudinal and lateral RMSE values compared to the existing algorithms. INDEX TERMS Mobile robot, curvature path, pure pursuit, linear actuator.

Research paper thumbnail of Tiling algorithm with line-based transform for rapid ship detection and wake feature extraction in ALOS-2 SAR sensor data

International Journal of Applied Science and Engineering

Research paper thumbnail of An adaptive HVS based video watermarking scheme for multiple watermarks using BAM neural networks and fuzzy inference system

Expert Systems with Applications, 2016

Research paper thumbnail of Advanced dynamic finite element analysis of a skew steel railway bridge

Engineering Structures, 2011

The aim of this paper is to present advanced modelling techniques for dynamic analysis of steel r... more The aim of this paper is to present advanced modelling techniques for dynamic analysis of steel railway bridges. Finite element analyses of a case study skew bridge are carried out and the results are compared with available field measurements. Initially, eigenvalue analyses of different models are carried out in order to obtain the fundamental mode shapes and bridge frequencies and

Research paper thumbnail of In-Vehicle Networking Based Services

Research paper thumbnail of Steganography Using Enhanced Chaotic Encryption Technique

In recent years, there is considerable interest in using the chaotic solutions of simple nonlinea... more In recent years, there is considerable interest in using the chaotic solutions of simple nonlinear dynamical systems [1] for encrypting the data. Baptista [2] has demonstrated how to use the chaotic solutions of Logistic equation for encryption. In order to increase the efficiency, we extended the method for a two coupled logistic equation . In this method, we divide the available phase space of a two coupled logistic equation into 94X94 boxes, each of which are associated with a pair of alphabets. A sender divides his messages into pairs of alphabets and identifies the associated box in the phase space. For this purpose, the two coupled logistic equation is iterated until the chaotic trajectory reaches the identified box. The corresponding iteration number is converted into its equivalent binary. The binary data is embedded into an image using standard steganographic technique and it is transmitted to the receiver. The receiver does the reverse operation for identifying the text. The similar process is repeated for all pairs of alphabets.

Research paper thumbnail of Maximizing the Availability and Reliability of Videos in VoD System Using Markov Chain

2009 Second International Conference on Communication Theory, Reliability, and Quality of Service, 2009

In a Video on Demand system, by forwarding the server video stream client by client, a chain base... more In a Video on Demand system, by forwarding the server video stream client by client, a chain based scheme is formed, which reduces the server load. The existing chaining schemes are not reliable because there are frequent breaks in the chain among the clients due to stringent bandwidth and buffer, stop fail, and hardware and software failures. This leads to

Research paper thumbnail of Memristor modeling

In this paper, we show a simple cir- cuit setup for experimentally plotting the v − i non- transv... more In this paper, we show a simple cir- cuit setup for experimentally plotting the v − i non- transversal pinched-hysteresis Lissajous fingerprint of a physical memristor - the common fluorescent gas discharge tube. The setup helped us investigate the effects of physical parasitics (inductors and capacitors) on the memristor v − i.

Research paper thumbnail of Look-up Table Based Chaotic Encryption of Audio Files

APCCAS 2006 - 2006 IEEE Asia Pacific Conference on Circuits and Systems, 2006

... [2] M. Lakshmanan and K. Murali, "Chaos in nonlinear oscillators - Controlling a... more ... [2] M. Lakshmanan and K. Murali, "Chaos in nonlinear oscillators - Controlling and synchronization", World Scientific, Singapore (2006). [3] MS Baptista, Phys.Letts.A, 240 (1-2), 50 (1998) [4] K.Ganesan and V. Rosepriyanka, "Enhanced Chaotic encryption using coupled ...

Research paper thumbnail of Image Encryption and Decryption Using Chaotic Maps and Modular Arithmetic

American Journal of Signal Processing, 2011

Research paper thumbnail of A Reliable Replication Strategy for VoD System using Markov Chain

In this paper we have investigated on the reliability of streams for a VoD system. The objective ... more In this paper we have investigated on the reliability of streams for a VoD system. The objective of the paper is to maximize the availability of streams for the peers in the VoD system. We have achieved this by using data replication technique in the peers. Hence, we proposed a new data replication technique to optimally store the videos in the peers. The new data replication technique generates more number of replicas than the existing techniques such as random, minimum request and maximize hit. We have also investigated by applying the CTMC model for the reliability of replications during the peer failures. Our result shows that the mean lifetime of replicas are more under various circumstances. We have addressed the practical issues of efficient utilization of overall bandwidth and buffer in the VoD system. We achieved greater success playback probability of videos than the existing techniques.

Research paper thumbnail of Memristor modelling

2014 IEEE International Symposium on Circuits and Systems (ISCAS), 2014

ABSTRACT In this paper, we show a simple circuit setup for experimentally plotting the v - i non-... more ABSTRACT In this paper, we show a simple circuit setup for experimentally plotting the v - i non-transversal pinched-hysteresis Lissajous fingerprint of a physical memristor - the common fluorescent gas discharge tube. The setup helped us investigate the effects of physical parasitics (inductors and capacitors) on the memristor v - i.

Research paper thumbnail of Public Key Encryption of Images and Videos in Real Time Using Chebyshev Maps

2008 Fifth International Conference on Computer Graphics, Imaging and Visualisation, 2008

Due to rapid developments in limits and possibilities of communications and information transmiss... more Due to rapid developments in limits and possibilities of communications and information transmissions, there is a growing demand of cryptographic techniques, which has spurred a great deal of intensive research activities in the study of cryptography. This paper describes a public key encryption based on chebyshev polynomials. We discuss the algorithm for textual data and present the cryptanalysis which can

Research paper thumbnail of Pseudorandom carrier based subharmonic PWM for cascaded multilevel inverters

2014 IEEE International Symposium on Circuits and Systems (ISCAS), 2014

Multilevel inverters are replacing conventional two level inverters due to reduced dv/dt stresses... more Multilevel inverters are replacing conventional two level inverters due to reduced dv/dt stresses, common mode voltages, and lower harmonic distortion. They are finding applications in motor drives, active filters and power conditioning. Cascaded Multilevel inverter is the most used topology among Multilevel Inverters, due to reduced number of components at higher voltage levels. Constant frequency PWM is normally employed for cascaded multilevel inverter. However, to overcome EMI and higher harmonic distortion, a random modulation technique, adopting pseudorandom carrier modulation is employed. This improves the spread spectra effect; where in the signal generated with a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with wider bandwidth. The pseudorandom carrier involves random selection of two triangular carriers of same frequency but opposite in phase depending on the output states of pseudorandom generator. Pseudorandom carrier modulation is employed on various kinds of sub harmonic PWM techniques. Total Harmonic Distortion (THD) and Harmonic Spread Factor (HSF) are considered for evaluating the performance of these methods .HSF was found to be 5% less in pseudorandom carrier scheme compared to constant frequency scheme. Current THD was found to be less than 4% in all schemes.

Research paper thumbnail of Automated parking slot allocation using RFID technology

2007 9th International Symposium on Signal Processing and Its Applications, 2007

Abstract One of the challenging problems for many vehicle owners in big metropolitan cities is wh... more Abstract One of the challenging problems for many vehicle owners in big metropolitan cities is where to park their vehicles. If the parking slot availability is known in advance one can save precious time and fuel wastage. In this paper we would like to propose an RFID ...

Research paper thumbnail of Optimal fingerprint scheme for video on demand using block designs

Multimedia Tools and Applications, 2012

Abstract Video fingerprint is a mechanism to protect movie from the traitors and also have the ca... more Abstract Video fingerprint is a mechanism to protect movie from the traitors and also have the capability to identify the traitors. The problem arises in video fingerprint when several traitors having the same copies of a movie with different fingerprints collude together. ...