@francisxavier.ac.in
Assistant Professor and Electronics & Communication Engineering
Francis Xavier Engineering College
R.Kabilan was born in Tirunelveli, Tamilnadu, India, in 1987. He received the B.E (ECE) degree from Anna University, Chennai, India, in 2009, the M.E (VLSI Design) degree from Anna University, Chennai, India, in 2011, and Ph.D (Information and Communication Engineering) Degree in Anna University, Chennai, India. He is currently working as an Associate Professor in Francis Xavier Engineering College, Tirunelveli. His major research interests are Image Processing, Digital and Analog Very Large-Scale Integration circuit design. He conducted several projects in the area of Image processing, Image Compression, Very Large-Scale Integration circuit. Since 2009 he has published more than 15 journals in International and 35 National/International conference papers.
B.E., M.E., Ph.D
Solar cell Design, Image Processing
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
R. Ravi, S. Kannadhasan, M. Mangaleswaran, R. Bharathi, R. Kabilan, and R. Mallika Pandeeswari
Springer Nature Singapore
S. Shankar, C. Maheswari, G. Abbas, R. Nithyaprakash, V.S. Jeganhes, S. Harish Adhithya, R. Kabilan, and Manish Gupta
EDP Sciences
The primary goal of this paper is to develop a robot capable of efficiently climbing teak wood trees and performing bud pruning tasks, thereby addressing the challenges posed by labor scarcity in farming. Teak wood cultivation has been significantly affected by the lack of skilled labor, necessitating a minimum of five tree climbs per year for successful cultivation. The proposed robot design features an ‘X’ frame structure with conical-shaped rollers positioned at the bottom, connected to two DC motors. These motors can be controlled remotely to enable vertical movement along the tree. To ensure secure attachment, springs are utilized to fasten the robot model to the tree. At the top of the robot, an appropriately arranged motor-driven chainsaw is installed to execute high-speed bud pruning. Overall, this robot will be helpful to automate the pruning process through sustainable development.The bud pruning robot described consists of an ‘X’ frame design with two conical-shaped rollers at the bottom.These rollers are connected to two DC motors, which are controlled by a remote, allowing the robot to move up and down the tree.To ensure stability and secure attachment to the tree, springs are utilized to firmly fasten the robot in place. The top of the frame is equipped with a high-speed DC motor to which a chainsaw is attached for the purpose of pruning buds.
A. Andrew Roobert, M. Philip Austin, Vignesh R, R. Subitha, and R. Kabilan
IEEE
To monitor and control unwanted traffic flows in the Internet of Things (IoT) network, it's essential differentiate between suspicious and malicious traffic. The use of ML (Machine Learning) approach models to avoid dangerous traffic flows has been shown in the Internet Things network. To set acceptance criteria for reliable malicious traffic detection in an IoT network, the issue has to be looked at. To solve the problem, we created a hybrid model that incorporates elements of artificial neural networks and logical regression.
R. Mallika Pandeeswari, R. Kabilan, T.M. Januanbumani, J. Rejoni, A. Ramya, and S. Jeya Jothi
IEEE
It gives importance about motion estimation (ME) as a top priority in video coding and testing. Extended BIST schemes are primarily concerned with memory circuit and testing concerns in video coding systems. Furthermore, by improving the abilities of Concurrent Error Detection, an dependability on several Processing Element will got increased. CED can discover mistakes by looking for inconsistencies and undesirable consequences from operations on the same operands. Concurrent Error Detection involves testing any route with full throttle without having to shut down the entire system. Focusing upon that Concurrent Error Detection idea, this work provides a unique Error - detecting Data Retrieval structure based here on Residue-Quotient code to identify faults & restore information in Processing Units of Motion Estimation in video coding testing analysers.
R. Ravi, G. Prince Devaraj, J. Monica Esther, R. Kabilan, Zahariya Gabriel, and U. Muthuraman
IEEE
Because of the mobility and scalability given by wireless networks, many applications have been made possible. MANET is a very important application in wireless networks. A fixed network infrastructure is not required for MANET. The node which is present in it can act both as transmitter as well receiver. The ability of MANET nodes to self-configure makes such as uses in military emergency application. MANET, is also used as vulnerable to malevolent attackers. New Enhanced Adaptive ACKnowledgment (NEAACK), is also a new technique which specifically intended to MANETs, is used in this research. NEAACK is used to find forge acknowledgement attacks as well as to detect misbehaving nodes. The integrity, authentication, and non-repudiation of NEAACK are all ensured by the Digital Signature Algorithm. The Routing Overhead will be decreased and Ratio of packet delivery will get increased.
J. Monica Esther, J. Zahariya Gabriel, R. Ravi, U. Muthuraman, G. Prince Devaraj, and R. Kabilan
IEEE
The purpose of the project is to improve the energy efficiency of a network. Cooperative communication has a lot of potential for increasing the efficiency of wireless network transmission. To come to terms with the intricate medium access conversations generated by such collaboration, and efficient CMAC protocol is required. In this study, DEL-CMAC, a novel cross-layer distributed power generation protocol for MANETs, was discovered. The primary goal of DEL-CMAC was to enhance MANET performance in the network in order to achieve a high gain. A functional energy consumption model is used to consider the energy consumed by the transceiver amplifier and transceiver circuit. To select an optimal relay, a dispersed convenience-perfect relaying technique related to the information residual energy was used. To increase spectrum utilization, a unique network allocation vector configuration is created to deal only with the varying transmitting power of either the relay or source terminals. Following a thorough simulation analysis, the suggested DEL-CMAC significantly improves network lifetime under various scenarios, even in elevated circuitry energy consumption instances.
J. Zahariya Gabriel, U. Muthuraman, R. Kabilan, G. Prince Devaraj, R. Ravi, and J. Monica Esther
IEEE
Spectrum efficiency has become extremely relevant as wireless networks evolve. Increasing transmitter antenna on receiver will be the most common ways of improving spectral efficiency. MIMO systems will always have the efficiency to significantly improve performance, but complexity of such systems has made developing viable transmission schemes difficult. Backlogged packets queuing at such a coordinating base station with downlink interference broadcast channel experience very least amount of delay within our suggested approach. Transmission scheduling is used in conjunction using Joint Space Frequency Resource Allocation that will reduce the the total number of backlogged data. The problem in JSFRA is indeed not convex. In SCA, different optimization strategies been used to make non-convex constraint problems. Each user with a specific frequency is assigned to the corresponding base station in consecutive convex approximation, whereas SCA is dependent on QWSRM. The calculation of a user's packet size in a queue is defined as QWSRM. If QWSRM exceeds the queue length, the user will be assigned to a different base station utilizing alternating optimization. Backlogged packets are transferred in FIFO order in the transmission scheduling algorithm, even though the packet with the smallest transmission size is sent first. The delay experienced by backlogged packets can be reduced and the packets are queued on base station by combining both strategies. Such benefits have a significant impact on multi-user OFDMA MIMO interference broadcast channels.
U. Muthuraman, R. Ravi, G. Prince Devaraj, J. Monica Esther, R. Kabilan, and J. Zahariya Gabriel
IEEE
Most civil constructions inside cities, such as flyovers and bridges, remain prone to damage as they are being used after their lifespan has ended which creates a threat to people who use it. Due to the large number of automobiles on the road in a populated city, bridges may collapse, resulting in a huge calamity. As a result, those bridges must be constantly monitored. In this paper, a model that comprises of a load sensing element, an arduino microcontroller, ac flux sensor, an infrared sensor, a Wi-Fi module, and a vibration sensor has been designed. This technology analyzes vibration, bridge bending and vehicle loads, and generates the alarm through buzzer, if the vehicle load, vehicle count, and bending of the bridge exceed the threshold level. Whenever necessary, an administrator delegates an assignment to the employees as upkeep. This communication between administration and the monitoring system is accomplished via the use of IoT. For future data analyses, a webapp is built with statistics acquired by the help of sensors.
R. Mallika Pandeeswari, K. Deepthyka, M. Abinaya, V. Deepa, R. Kabilan, and J. Glorintha
IEEE
This research, which employs granular computing and hybrid spatial feature extraction, presents face identification with surgically changed characteristics. The increased popularity of cosmetic surgery and its influence on automatic face recognition has sparked the curiosity of researchers. The face detection module generates face pictures with normalised intensity, homogenous size and shape, and just the face region. The Difference of Gaussian (DOG) structures will then be generated from successive iterations of Gaussian photographs. Granulation divides face pictures into different resolutions and provides blurriness, edge information, and noise in a face image. The Gabor filter bank is then used to extract characteristics from face regions in order to differentiate between illumination variations. These characteristics are merged in order to reliably identify a huge samples, and they will be matched with stored real face samples to identify them. The simulated results of detecting surgically changed face photographs show that utilising granulation and hybrid spatial and spectral descriptors has greater selectivity and recognition accuracy.
R. Kabilan, E. Kamala Devi, R. Mari Bhuvaneshwari, S. Jothika, R. Gayathiri, and R. Mallika Pandeeswari
IEEE
The most dependable source of location is the Global Positioning System (GPS). The range of operation of the sensors employed for localization is limited, as are the surrounding conditions. A system based on GPS localising properties and a network of sensors is proposed to avoid insufficient localization and improve surveillance conditions. The GPS output is continuously checked in conjunction with the sensor network output in order to monitor and provide a systematic elimination of incursion while also improving the surveillance situation in the designated region. It was created with the military barrier portion in mind. A pyroelectric sensor for human detection, a vibration sensor for unnoticed vibration detection in the fence section, and a heartbeat sensor at the designated entry offer systematic access to the individuals working in the specified area are all part of the sensor network. The GPS node is installed near the fence section to produce a highly accurate localised output. The sensor output is displayed in the control monitor along with the GPS localised output. The goal is to improve the localisation techniques employed in military fence units so that intruders may be detected and monitoring can be increased.
R P Janani, K. Lakshmi Narayanan, R. Santhana Krishnan, P. Kannan, R. Kabilan, and N. Muthukumaran
IEEE
Road accidents lead to fear in anyone who travels in their daily life. Violations of traffic restrictions, negligence, and other reasons can cause road accidents, but most studies show that the majority of accidents are caused by drivers’ sudden health concerns or tiredness. Despite their unpredictability, these events have a huge impact on human lives. These problems are solved by the proposed method. To assess whether a driver is awake or asleep, as well as whether the driver has any health issues, the system employs an eye blink sensor and a photoplethysmography sensor accordingly. The sensors’ output is connected to the driver’s phone via GSM module and any other human monitor via NodeMCU (cloud server) in that order. As a result, if the driver falls asleep, he or she will be awoken. And if a medical emergency arises, he or she will be able to receive immediate assistance because they are being monitored by another person via NodeMCU, which connects to the cloud server.
G. Prince Devaraj, R. Kabilan, U. Muthuraman, J. Zahariya Gabriel, J. Monica Esther, and R. Ravi
IEEE
Social inclusion and technological assistance to provide autonomy for individuals with impairments have recently gotten a lot of attention around the world. The scope of this study is to create a display for accessible interaction in home area networks. An interface design was proposed based on a project on the current state of accessible interfaces. This interface was created using a Tablet to control domestic gadgets via a prototype home network controller. A project was done to evaluate the design, which included interviews with people with impairments. This research created a feasible accessible interface for controlling home area networks, highlighting the most important criteria while taking into account a wide range of impairments. This project provides a display design for accessible home control, focusing on the usage of home area networks to promote impaired people's autonomy at home.
R. Kabilan, R. Ravi, J. Monica Esther, U. Muthuraman, J. Zahariya Gabriel, and G. Prince Devaraj
IEEE
A basic testing architecture to DRAM memory controllers is given in this paper. The suggested verification architecture based upon universal verification methodology, it employs common characteristics among numerous DRAM memory controllers that offer an standardized test-cases, UVM components, scoreboard and payload. The verification architecture provided employs the fewest possible macros, methods, and classes. UVM tests can be reused thanks to the proposed verification architecture. SoC Verification has been one of the greatest subjects in VLSI. The verification process requires well over 70% of the total time. As a result, a reusable and resilient verification environment is required. The universal verification methodology, is a viable solution to such issues. In a few simple stages, it also teaches how to validate an IP and build up an efficient verification environment. In a SoC case study, traditional verification is matched with UVM-based verification.
R. Kabilan, R. MallikaPandeeswari, N. Lalitha, E. Kanmanikarthiga, C. Karthica, and L. Michelle Hamlin Sharon
IEEE
In this project, we created a robot that will be beneficial in military operations on the battlefield. In enemy territory, it’s mostly utilized for secret surveillance. This robot can also be used to indicate the status of a wounded soldier in a combat zone and call for help in order to save the soldier’s life. Robots are also utilized for security purposes in addition to these qualities. The robot is built like a tank circuit, with the ability to pivot at any angle on its axis, move forward in reverse, turn left and right, and reverse direction immediately. The robot’s top is equipped with a wireless camera that transmits footage and audio from the battlefield to the monitoring area. When an attack is required, the robot is equipped with a laser gun that can be used to fire on the adversary. It will carry out all of its functions on the field of battle in response to orders from the monitoring station. A worker in the monitoring station is providing the robot instructions via live video feed from the robot. The robot vehicle is equipped with a PIR sensor that detects the soldier’s warmth and sends a signal to the monitoring station as to whether the individual is alive or dead, as well as an emergency call. Check the person ID with the RFID reader on the robot to see if the individual is a soldier or an unauthorized person. The robot is equipped with a bomb detector, which allows it to traverse through the safe zone. If the robot is captured by the adversaries, we can use the self-attacking procedure to utterly destroy it.
R. Kabilan, G. Prince Devaraj, U. Muthuraman, N. Muthukumaran, J. Zahariya Gabriel, and R. Swetha
IEEE
In this paper, a new approach to fast digital image processing is proposed. Digital image processing (DIP) is a rapidly developing technology for quality development for primary products, also referred to as computer or machine vision. In communication systems, digital images have become an information source. Image segmentation is a cue for the field of image analysis and image editing. Our understanding of this field depends on advances in image segmentation and image editing, yet it remains open and challenging. The proposed approach suffers from complexity, improper segmentation, enhanced computing time, etc. To overcome these drawbacks, three segmentation levels are used here. The first stage is the key component analysis that provides more edge knowledge. Quick mapping that maps similar objects in a faster way is the next step. Finally, multidimensional scaling in a picture with the same colours to classify and segment related areas. This technique has a very fast and robust benefit. It also offers improved picture quality.
G. Prince Devaraj, R. Kabilan, J. Zahariya Gabriel, U. Muthuraman, N. Muthukumaran, and R. Swetha
IEEE
A non-volatile memory designed to FLASH recollections and switch SRAM seems to be the Magnetic RAM (MRAM) proximity unit. Due to its inherent radiation hardness, Spin Transfer Torque Magnetic Memory (STT-MRAM) was also used for top-responsibility applications. CMOS circuit sensitive to radiation Pre Charge Sense electronic equipment (PCSA); but we are able to recharge the non-volatile storage ceaselessly to urge accurate details. Since the current advantages are abandoned by radiation effects, STT-MRAM cannot be used specifically for top radiation applications. In this paper, a new style in the change of PCSA STT-MRAM sensing circuit is proposed and the paper focused more on power and space with performance up gradation.