ARULSELVI.S

@annamalaiuniversity.ac.in

PROFESSOR
Annamalai University

EDUCATION

M.E., Ph.D.

RESEARCH INTERESTS

PROCESS CONTROL, IMAGE PROCESSING, POWER ELECTRONICS AND INTELLIGENT CONTROL

64

Scopus Publications

Scopus Publications



  • A Multi-Compartment Automated Vehicle Designed, Implemented and Controlled by RFID and DTMF Decoder
    V. Chitra, S. Arulselvi, and B. Karthik

    IEEE
    The proposed system is enhanced with two parts, an automated vehicle designed to transfer the materials to their corresponding places effectively. The prototype has a supply of 9V and Radio Frequency Identification and Dual tone multi-frequency decoder are interfaced with Arduino. The first part of the prototype is, servomotor, motor driver unit, ultrasonic sensor and decoder are interfaced with Arduino mega to function the vehicle and also to carry the container for transportation. Second part of the system is, the load amplifier, servomotor and reader are interfaced with Arduino Uno to distribute precisely the recognized material into the corresponding destination. Light Depending Resister is used to detect the vehicle arrival place. The proposed system has affordability, time saving, and user friendly, it is highly reliable and also it can be used in hazardous zones, human restricted sectors and military areas. The proposed system exclusively suitable for unmanned vehicles in robotics industrial applications like logistics, commercial and mining.

  • Design of Fractal Structured RFID Reader Antenna for Inventory Management and Automatic Vehicle Detection Applications
    V. Chitra, S Arulselvi, and B Karthik

    IEEE
    Adouble-band Radio Frequency Identification reader antenna for 2.5 GHz and 5.5 GHz frequency has been proposed. The corresponding frequencies are utilized in readers for Inventory management and automatic vehicle detection applications. The notion of the fractal antenna can be used in analysis and design. The return loss (S11) parameter is compared among simulated and measured results from both frequency and transient domain solvers.



  • Characterization of Composite RFID Antennas Based on Thermal Properties: A Survey
    Chitra Varadhan, Fekadu Ashine Chamatu, and S. Arulselvi

    Hindawi Limited
    In this paper, a comprehensive survey on thermal and geometric design parameters of composite materials utilized in the fabrication of modern RFID systems has been discussed mainly due to its advantages such as lightweight and high strength. Designing of RF antenna setup requires careful consideration of material, geometric and fabrication parameters. Polymer materials were chosen as the substrate and subjected to extensive studies to determine and predict the capability of the miniaturized RFID antenna. The effect of the polymer matrix composite (PMC) material on the antenna parameters such as gain, bandwidth, and return loss is analyzed and realized that improvement in bandwidth and perfection in impedance matching can be further accomplished by employing fractal structure. It is also discovered that the thermal properties affect the impedance and operating frequencies, thus enabling multilayer PMC deploying fractal structured RFID antennas to be used for many applications such as logistics, aerospace, biomedical, and mining.

  • Effects of the FR 4 Substrate Realized in a Circularly Polarized UHF-RFID Reader Antenna with Fractal Geometry for Enhancing Parameters
    Chitra Varadhan, S. Arulselvi, and Fekadu Ashine Chamatu

    Hindawi Limited
    The proposed RFID reader antenna progressed with perfect electric conductor (PEC) as the radiating element and FR 4 as the substrate to achieve circular polarization, enhancement in bandwidth, and read range. The design presents a CPW feed RFID antenna for near-field reading applications, between the range of 903 MHz to 929 MHz. The operating frequency of the proposed design is 900 MHz, axial ratio of the model is less than 3 dB, impedance bandwidth is 256 MHz, and axial bandwidth is 36 MHz, proving to be adequate for near-field RFID reader applications such as item-level tagging and smart shelf. The proposed antenna model is realized with fractal structure to achieve miniaturization. The developed antenna is optimized using EM software for numerical analysis. The designed antenna is fabricated, and the prototype is characterized in terms of dielectric constant and loss tangent. The obtained results indicate high correlation with simulation results.

  • Identification and analysis of palm print in biometric authentication system using SVM techniques


  • Visualization of coherent tract green crystallize during speech synthesis


  • Machine learning based digital image watermarking
    K. Neelima and S. Arulselvi

    SynthesisHub Advance Scientific Research
    Watermarking is the method of adding information in digital media for content protection and authentication. Digital image watermarking is one of the solutions to offer value added security on the top of authentication and data encryption for content protection in digital images. The watermarking methods can be frequential and spatial domain methods. In this work, the frequency domain based watermarking method is implemented with the use of discrete wavelet transform (DWT). Along with the frequency domain technique, here we are utilizing the combination of topical developments of the mathematical techniques and most advanced algorithms of machine learning for digital image watermarking process. The mathematical technique considered here is the principal component analysis (PCA) because of its property of dimensionality reduction which further enhances the robustness to watermarking process. The machine learning algorithm taken into account in this work is the support vector machine (SVM) algorithm to increase the accuracy of watermarking process.

  • Classification of printed text and handwritten characters with neural networks
    K. Neelima and S. Arulselvi

    SynthesisHub Advance Scientific Research
    Various scanned documents consist of machine printed text as well as handwritten alphabet. The classification of handwritten alphabet and machine printed alphabet in document images is the required process afore character recognition. We can distinguish these two types of alphabet images by their shape structural, statistical and visual difference features. This work proposes the artificial neural network based classification technique for machine printed and handwritten text classification at character level using a set of new features which are combination of statistical, shape structural and visual impression features. The projected technique attained remarkable classification efficiency on two databases; IAM dataset and prepared dataset.

  • Security for industrial communication system using encryption/decryption modules
    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    The industrial communication systems of present time are to a large extent based on commercial operating systems, open protocol implementation & communication application which are not secure. By connecting to the internet or other public networks these risks are exposed to potential attacker and cause damage to the industries. The data send by the network can be tampered causing network failure. This results in an increase in the downtime of the industry causing major loss. The industrial communication channel can be accessed by unauthorized person and uncorrect information can be transmitted, i.e. the originality of the information is violated. Cryptography is the technique, which is used to improve SCADA security. Cryptography is hiding of actual information. But SCADA protocols do not support any type of cryptography due to limited computational capabilities of SCADA device and low rate data transmission in SCADA network. To tackle this situation we are introducing an encrypting/decrypting module (ENIGMA) which can be connected at one end of the plant and one end of the control room. The encrypting module encrypts the data at the transmitting end and transmits it through the communication channel. The decrypting module decrypts the data received via the communication channel.

  • IoT based gas detection in home environment
    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    The Hydro chlorofluorocarbon(HCFC) and Chlorofluorocarbon(CFC) causes ozone layer depletion and pollutes the atmosphere. The usage of LPG without precautions creates fire accidents. The CFC released by air conditioners and refrigerator cause health issues. To solve these health problems and for safety purpose, this paper proposes for monitoring system to realize in indoor environmental pollutants. This system consists of ARM LPC 2148 microcontroller, a sensor module (mq-5 & mq-135) and a Wireless Fidelity (WIFI) for communication. The data acquisition, monitoring and alarm are achieved by the proposed system. The experiments results reveal that data acquisition and transmission is reliable. Furthermore, new sensors can be integrated and an application can be developed to monitor the events in home environment.

  • Intermittently associated mobile cognitive radio networks using portability assisted routing
    G. Kumari, Dr. M. Jasmin and D. Arulselvi

    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    In versatile specially appointed intellectual radio systems, with accessible range groups for optional clients may or may not exist incidentally, because of the dynamism of the essential client exercises. Customary CRN steering calculations, which normally overlook the discontinuous availability of system topology, and customary portability helped directing calculations, which for the most part disregard the range accessibility, are clearly unacceptable. To handle this test, aAssisted Mobility Routing calculation with Spectrum Awareness (MARSA)is proposed to choose transfers in light of not just the likelihood that a hub meets the goal additionally the possibility that exists no less than one accessible channel. This dissertation is proposed to bring the possibility of versatility helped steering to manage the irregularly associated characteristic of versatile impromptu CRNs, and the first to improve the portability helped directing by considering the worldly, spatial, and range spaces in the meantime. Our reenactment comes about show the predominance of MARSA over customary calculations in discontinuously associated portable CRNs.

  • Superscalar pipelined matrix multiplier in VHDL
    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    Parallel processing is used by simultaneous information processing to boost the computing velocity of the computer system. Parallel processing is implemented by pipeline processing.. In this paper we presented design of a A[100][100] x B[100][100] Pipelined Matrix Multiplier and its results is stored in P[100][100] matrix. We present design and stimulate a functional Pipelined Matrix Multiplier Unit. By which we can learn about the working of Pipelined Matrix Multiplier and how pipelining works. We also get the knowledge of clock timing and learn to make a timing critical design. In this Pipelined Matrix Multiplier Unit design we use design compiler, which is a module of Synopsys tools that uses lsi_10k library and BCCOM method to synthesis the design and simulate the design through VCS compiler

  • Stacking techniquefor low power sram
    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    Static random access memory leakage current is becoming one of the critical issues for low-power systems. SRAM-based FinFET Double Gate has become a better option for profound submicron techniques owing to its better short channel effect. In this work, we review some of the leakage current sources and low power reduction technique to reduce leakage. As animprovement of our research work,6T SRAM memory cells can be implemented using independent gate FinFET which gives lower leakage as well as better performance over the shorted gate FinFET mode. This is also implemented using stacking technique to decrease leakage. Therefore, the power devoured by the different SRAM cells is likened with the Tanner tool in 45 nm technique

  • Neighbor discovery in ASN
    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    Generally the hubs that are placed in a system of sensors remain in static condition. The availability condition of these hubs are also likely to change due to various conditions such as remote location, change of power due to transmitting procedure and also due to the lack of coordination between the hubs which are placed adjacently. The system should continuously track its components. This process should takes place without any gap. This work deals with nonstop tracking of the adjacent component present in the framework. This procedure should utilize power to the minimum level thereby upgrading the performance metrics

  • Reliable power quality monitoring and protection system
    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    The principle goal is to add a GSM based vitality meter perusing framework and burden control through SMS. Power division sends workers to take meter perusing each month, which is a costly and tedious employment. The proposed venture gives a helpful and productive strategy to maintain a strategic distance from this issue. The power division and the client can get the readings of the vitality meter of buyers by means of SMS. The heaps can likewise be checked by the voltage level indicator.This undertaking likewise screens load control by sensor which it remove the framework when high or low voltage occurred.It utilizes a standard advanced vitality meter that conveys yield heartbeats to the microcontroller to perform meaning essential activity. On getting charge it can switch ON/OFF the heaps

  • Multifactor optimized clustering with improved scheduling for receiver-initiated mac


  • Construction of ensemble square classification approaches in MIMO OFDM


  • Receiver-initiated medium access control (RI-MAC) protocols


  • An effective intra and inter cluster formation with scheduling technique for a WSN system


  • Optimized method of spectrum sensing in cognitive radio networks


  • IOT based industrial automation