@alameen.ac.in
ASSOCIATE PROFESSOR, Department of Computer Science and Engineering
Al-Ameen Engineering College. Erode
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
K. Anitha, Shailesh, L. Ramesh, and Murugananth Gopal Raj
Springer Nature Singapore
C. N. Vanitha, S. Malathy, K. Anitha, and S. Suwathika
IEEE
Nowadays, face recognition is used everywhere in all fields. Though the face recognition is used for security purposes there is also chance in hacking the faces which is used for face recognition. For enhancing the face security, encryption and decryption technique is used. Face cognizance has been engaged in more than a few security-connected purposes such as supervision, e-passport, and etc… The significant use of biometric raises vital private concerns, in precise if the biometric same method is carried out at a central or unfrosted servers, and calls for implementation of Privacy improving technologies. For privacy concerns the encoding and decoding is used. For achieving the result we are using the Open Computer Vision (OpenCV) tool. With the help of this tool we are going to cipher the face and decode the face with advanced encryption standards techniques. OpenCV is the tool used in this project
M. MOHAMED MUSTHAFA, K. VANITHA, A.M.J.MD. ZUBAIR RAHMAN, and K. ANITHA
IEEE
Mobile Ad hoc Network is a collection of autonomous mobile nodes connected with each other without any central coordinator. There is several security issues arise in MANET due to dynamically changing network topology. The reliable communication is achieved only when there exists cooperation among the mobile nodes in MANET. Due to the lack of resources some mobile nodes refuse to forward the packet to other nodes. This type of nodes is called the selfish nodes. These kind of selfish nodes in the route degrade the overall performance of the whole network. In this paper we discussed about the various selfish node detection methods and propose a selfish node detection algorithm (SNDA) for identifying and isolation of selfish node from the network.
K M Anitha, V. Saraswathy, K. Gayathri, and S. Saravana Priya
IEEE
Social media became prevalent in our day to day life. People express their views, feelings, emotion via comments. Those comments entered by the user is analyzed. The Naïve Bayes Algorithm is used to detect the offensive and sarcastic comment, thus preventing them from being uploaded in social media.
M. Prathik, K. Anitha, and V. Anitha
IEEE
Electricity plays a cardinal role in day to day life. The electrical energy consumption in India is the third biggest after China and USA with 5.5% global share in 2016. The per person energy use rate in India is closer to 0.7 KW. India's share with global energy demand will rise to 9% by 2035. Internet of Things (IoT) is an emerging field and IoT based devices have created a revolution in electronics and IT. The foremost objective of this project is to create awareness about energy consumption and efficient use of home appliances for energy savings. Due to manual work, our existing electricity billing system has major drawbacks. This system gives the information on meter reading, power cut and the alert systems for producing an alarm when energy consumption exceeds beyond the specified limit using IoT. This idea is being implemented to reduce the human dependency to collect the monthly reading and minimize the technical problems regarding billing process. This project extends the design and implementation of an energy monitoring system with the pre-intimation of power agenda using Arduino micro controller and a GSM (Global System for Mobile Communication) module. The advantage of this system is that a user can understand the power consumed by the electrical appliances on the daily basis and can take further steps to control them and thus help in energy conservation. From the electricity board section, the information regarding the bill amount, payment and the pre-planned power shut down details are communicated to the consumer. If the customer does not pay the bill in time, the user is informed through a message. If still the customer does not pay the bill, then as per designated consideration, one alert message will be sent then automatically power connection is disconnected from the remote server. In the already existing smart energy meter, it shows the energy consumed by the appliances from the date of installation of the energy meter and its corresponding rupees. In this proposed energy meter, the meter gives the energy consumed on daily basis, its corresponding rupees, billing details and payment using IoT. Additionally, it has the main objective of giving the preintimation of power schedule and an alert system for producing an alarm when the energy consumption exceeds beyond the certain limit. It also has the facility of terminating the power supply when the residents are out of station to minimize the wastage of energy. This system not only reduces the power cut issues and the labor cost for noticing the residential energy consumption in regular intervals but also increases the energy conservation with the help of alarm systems and the energy meter accuracy by reducing the billing error and the cost of maintenance.
Susila Sakthy S, Bose S, Ajitha X, and Anitha K.M
IEEE
Wireless sensor network consists of independent device spatially distributed in the wireless network with sensor that observes the environment conditions. The cluster based transaction is the gateway of wireless medium and distributed nodes has limitations in power supply. Packet scheduling is the mandatory process in wireless networks to balance the network and minimize the end delay. In energy efficient clustering approach the SNR based node selection is the recent development. As in the proposed process, the overall packet data scheduled according to the High Powered Multilevel priority scheduling, the scheduled data transmitted between the clusters and the base station consists of transmission node in between them. The transmission node is been selected according to the SNR value between the cluster head and the base station.