Narasimhan Renga Raajan

@sastra deemed university

Associate Professor, Electronics and Communication Engineering
SHANMUGHA ARTS SCIENCE TECHNOLOGY AND RESEARCH ACADEMY



              

https://researchid.co/nrraajan

Raajan's research interests include augmented reality (AR), Image & Video Processing, Hydrophone Communication, Signal processing and Wireless Network Security. He has authored a chapter on a book titled Speech enhancement, modeling and recognition algorithms and applications, “Mathematical modeling of speech production and its application to noise cancellation”. He has published 70+ Research articles in National & International journals and 20+ IEEE conference papers with 4 BEST paper awards. He also holds Certificate of Appreciation from TI in 2007 for project presentation, Guiding “Automatized assistance for physically challenging people” and won the first prize. Recently He also served as TPC member & review member for 3 IEEE & ELSEVIER supported International Conferences apart from 3+ peer reviewed journals.

EDUCATION

B.E., (Electronics & Communication Engineering) - 1999-2003
M.E., (Communication Systems) - 2003-2005
M.B.A., (Systems) - 2003-2005
Ph.D., (Wireless Communication) - 2010

RESEARCH, TEACHING, or OTHER INTERESTS

Signal Processing, Computer Vision and Pattern Recognition, Biomedical Engineering, Multidisciplinary

218

Scopus Publications

650

Scholar Citations

14

Scholar h-index

20

Scholar i10-index

Scopus Publications

  • An ADO-OFDM with integrated precoding, companding and optimized power allocation methods for high-speed data transmission in visible light communication
    Swaminathan S. and Raajan N. R.

    Wiley
    AbstractVisible light communications (VLC) has received a lot of attention in recent studies because of its benefits over radio‐frequency (RF) communications. It is a short‐range optical wireless communication system that uses light‐emitting diodes (LEDs) as transmitters. Optical orthogonal frequency division multiplexing (OFDM) is an auspicious technology for VLC high‐speed data transfer. The use of OFDM in a VLC system raises the system's peak‐to‐average power ratio (PAPR). The intrinsic non‐linearity of LED is a key concern in an asymmetrically clipped DC‐biased optical OFDM (ADO‐OFDM) system due to its high PAPR. Also, conventional ADO‐OFDM modulation scheme cannot be used for accommodating different demands of services in downlink multiple access due to the restriction of direct current biased optical OFDM (DCO‐OFDM) and asymmetrically clipped optical (ACO‐OFDM) transmission on odd and even subcarriers. To tackle this issue, a modified ADO‐OFDM (MADO‐OFDM) is proposed that adjusts the numbers of subcarriers required for the transmission of ACO‐OFDM and DCO‐OFDM adaptively based on the requests of services in downlink multiple access. Also, the proposed MADO‐OFDM is integrated with a discrete Hartley Matrix transform (DisHMT) precoder and Generalized Piecewise Linear Compander (GPLD) to provide high‐speed data transmission with less PAPR. In addition, the power is allocated to the proposed MADO‐OFDM system optimally by maximizing the channel capacity based on the Aquila optimizer algorithm. The simulation results reveal that the suggested system's PAPR is reduced by 2.4 dB and 0.8 dB, respectively, compared to conventional ADO and hybrid ADO‐OFDM. It also confirms that the suggested generalized PLC can greatly increase BER without affecting the PAPR performance.

  • Reduced 12 to 2 Lead EKG for Effective Transmission and Diagnosis of Cardiac Abnormalities
    V. S. Ramya Lakshmi, Suchindran Srinivasan, and N. R. Raajan

    Springer Science and Business Media LLC

  • Real-time study and analysis of brain fiber using 3D-printed tractography
    V. S. Ramya Lakshmi, N. R. Raajan, Natarajan Prabaharan, and K. Hariharan

    IGI Global
    With the overwhelming success of three-dimensional (3D) modeling technology of patient anatomy, surgeons are able to intuitively understand the most complex morphologies. In this work, the tractography model is constructed by focusing on the sub-voxel asymmetry and fiber consistency to enhance cortical tractography with strongly bent axonal trajectories which help to identify the fiber track by using the diffusion tensor imagining (DTI) method. The DTI algorithm is compared with the other tracking algorithms and the track parameters for different patients are compared. It is proven that the DTI method provides higher accuracy of 96.76% in tracking the cross fibers. The Y-axis dispersion for the different regions of interest from the tract center is measured. The tract amplitudes at this separation are decreased by 75% from the peak value. The 3D model is printed using an ultimate 3D printing machine at a diameter of about 0.025 mm at a low cost with high accuracy.

  • Investigations on the swiftness of a quantum and a classical processor
    Sumathi Rajyam, N. R. Raajan, G. Samyuktha, V. Priyadharshini, and M. Sindhujaa

    IGI Global
    The cutting-edge technologies cloud computing and IoT are taking an upper hand in every domain. A huge and wide variety of data is being handled and processed by clouds. The cloud federation technique further adds up to this. In the coming years, quantum computers will replace the conventional computers. Pulling out particular data from the gigantic data set processed by clouds in a conventional computer would take a considerable amount of time. In the chapter, Grover's algorithm, a search algorithm, is implemented on traditional computers on IBM quantum simulator and also on QUIRK quantum simulator. Three qubit data is considered in the proposed scheme. The objective of this chapter is to compare the execution time taken to run the Grover's algorithm on IBM and Quirk quantum simulators and on classical computers. The work carried out proves that quantum computer execution speed is high compared to the classical counterpart. This could be effectively used in the future in searching for specific data from a mammoth data set using quantum simulators.



  • An Approach for Attaining Content Confidentiality on Medical Images Through Image Encryption with Steganography
    R. Bala Krishnan, N. Rajesh Kumar, N. R. Raajan, G. Manikandan, A. Srinivasan, and D. Narasimhan

    Springer Science and Business Media LLC

  • Three dimensional reconstruction of brain tumor along with space occupying in lesions
    M. Malini Deepika, N. R. Raajan, and A. Srinivasan

    Springer Science and Business Media LLC

  • Scrambling based riffle shift on stego-image to channelize the ensured data
    R. Bala Krishnan, M. M. Anishin Raj, N. Rajesh Kumar, B. Karthikeyan, G. Manikandan, and N. R. Raajan

    Computers, Materials and Continua (Tech Science Press)

  • A Neoteric Image Encryption System Using Nonlinear Chaotic Strange Attractors
    Suchindran Srinivasan, Varun Subramaniam, V. S. Ramya Lakshmi, and N. R. Raajan

    Springer Nature Singapore

  • Non-Invasive Technique-Based Novel Corona(COVID-19) Virus Detection Using CNN
    N. R. Raajan, V. S. Ramya Lakshmi, and Natarajan Prabaharan

    Springer Science and Business Media LLC

  • The Enriched Feature Enhancement Technique for Satellite Image Based on Transforms Using PCNN
    K. Hariharan, N. R. Rajaan, Peter Pethuru Raj Chelliah, and Malini Deepika

    Springer Science and Business Media LLC

  • SLKOF: Subsampled Lucas-Kanade Optical Flow for Opto Kinetic Nystagmus detection
    C. Jaiseeli and N.R. Raajan

    IOS Press
    The neurological disorders are developed in adults due to reduced visual perception. Opto Kinetic Nystagmus (OKN) is a clinical method to detect visual perception. For objective measurements, a computational algorithm based OKN detection is preferable rather than clinical practice. In this paper, a memory-efficient Subsampled Lucas-Kanade Optical Flow (SLKOF) is proposed. The proposal employs the Subsampling of images for various levels. The proposal deals with the computation of OKN gain for different image Subsampling factors using the MATLAB platform. The experimental set up to observe OKN is done using computer-based rotation control of the drum through a stepper motor. The results are compared with the well established Lucas-Kanade (LK) method for Optical flow. It is observed that OKN gain corresponds to 1/4th of a subsampled image of the SLKOF method correlates with the LK method for the majority of the cases. This validation evidently elucidates that the proposal is computationally efficient.

  • An intelligent 2D secret share construction using visual cryptography for secure transmission
    N. R. Kumar, R. Krishnan, G. Manikandan and N. R. Raajan

    Korean Society for Internet Information (KSII)
    Data Security is the most challenging area in Internet communication, where most of the secret sharing schemes are proposed for binary images. But still it lacks in providing security for data communication, especially in image transmission. Traditional visual cryptography scheme generate meaningless diwies and the reconstruction phase leads to quality degradation over the secret image. In this work, an intelligent two dimensional secret share construction scheme is proposed. A secret image is expanded into n diwies with the choice of scheme selection. By Stacking all the qualified diwies to revert the secret image without content loss and less than s* - 1 shares could not reveal any information about the secret image. The experimental results emphasize that the proposed secret share scheme is highly secured for image transmission.

  • Using the Keras Model for Accurate and Rapid Gender Identification through Detection of Facial Features
    AK Vani, R N Raajan, D Haretha Winmalar., and R Sudharsan

    IEEE
    As the need for person-aligned, effective, and ethical structures emerges, automatic identification of gender is gaining interest in the era of machine-man interactions. Most of the systems for gender detection were analysed using textual or audiovisual sources. Far too many suggested different approaches for automatic identification of gender using the characteristics acquired from people’s bodies and/or behaviours. But the accuracy has always been a question or a drawback in automated gender detection. In the proposed research work, First, the faces and the facial features which includes eyes, mouth, and nose are detected using Haar Cascade based on Viola-Jones face detection algorithm. Before, the gender detection, the noise is reduced by applying adaptive filters, thereby increasing the accuracy. The obtained facial features are given as the input or test data to the neural network. The neural network is designed to obtain the features and acts as a classifier to detect the genders. Simply, the feature extraction and gender detection is performed using the open source neural network called keras.

  • Identification of human actor in various scenarios by applying background modeling
    Anuradha K., Anand V., and Raajan N.R.

    Springer Science and Business Media LLC


  • Point cloud human posture estimation using single RGB image
    Poojitha Singu, V.S. Ramya Lakshmi, and N.R. Raajan

    Elsevier BV

  • Secret image communication scheme based on visual cryptography and tetrolet tiling patterns
    N.RajeshKumar, D.Yuvaraj, G.Manikandan, R.BalaKrishnan, B.Karthikeyan, and D.Narasimhanand N.R.Raajan

    Computers, Materials and Continua (Tech Science Press)
    Visual cryptographic scheme is specially designed for secret image sharing in the form of shadow images. The basic idea of visual cryptography is to construct two or more secret shares from the original image in the form of chaotic image. In this paper, a novel secret image communication scheme based on visual cryptography and Tetrolet tiling patterns is proposed. The proposed image communication scheme will break the secret image into more shadow images based on the Tetrolet tiling patterns. The secret image is divided into 4×4 blocks of tetrominoes and employs the concept of visual cryptography to hide the secret image. The main feature of the proposed scheme is the selection of random blocks to apply the tetrolet tilling patterns from the fundamental tetrolet pattern board. Single procedure is used to perform both tetrolet transform and the scheme of visual cryptography. Finally, the experimental results showcase the proposed scheme is an extraordinary approach to transfer the secret image and reconstruct the secret image with high visual quality in the receiver end.

  • An effective technique for the creation of a video synopsis
    K. Anuradha, V. Anand, and N. R. Raajan

    Springer Science and Business Media LLC

  • A multilevel distributed image based encryption for full integrity
    R. Sumathi and N. R. Raajan

    Springer Science and Business Media LLC

  • An improved secret sharing scheme for biometric authentication using finite field
    N. Rajesh Kumar*, , R. Bala Krishnan, N.R. Raajan, , and

    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    Traditional biometric schemes used master copy minutiaefor authentication. The enrollment and verification process carried out through the same master copy minutiae. However, the protection of biometric template is more crucial as the number of minutiae compromise will be occurred. In this paper, an improved secret sharing scheme for biometric authentication using finite field is proposed. The master copy of biometric template is transformed into finite field for masking minutiae information. The concept of secret sharing is employed to split the template into multiple copies and maintained between smart card and public consortium. This approach allows perfect biometric authentication for operating smart cards with high-level security.

  • Video Stabilization
    S. Greeta, N.R. Raajan, and M. Meenu

    IEEE
    Video Stabilization is a technology used to rectify the blurry motion of camera while capturing a video. It is an optimization technology which is proposed to eliminate the video shakiness. To achieve this image motion has to be measured by multi layer gray projection method. Multi layer gray projection method is introduced to evaluate scaling motion, translation and rotation among the target image and the reference image. Differential gray projection is used to measure the relative image translation and the resulting high-grade projection will help us to find the projection centre for the round projection and ring projection. Then find the rotational values and values obtained by scaling among the target frames and the reference frames by performing ring and circular projection. Keywords— multilayer gray projection, translation, rotation, scaling

  • Broadband Microwave Cloaking Analysis under FDTD in Visible Frequency Spectrum
    K S Lavanya, V Vennisa, K G Sujanth Narayan, and N R Raajan

    IEEE
    Full wave at microwave range under FDTD(Finite Difference Time Domain) analysis is done for an invisible cloak is designed under software environment, the cylindrical electromagnetic cloak’s performance is verified with its simulation within its cloak structure and behavioral study is carried out for different light’s wavelength in its visible spectrum range when the light get incident on the 2D cylindrical cloak which is invisible in nature in order to make the structure works under optical frequency region which get processed with parameter changes (differently) namely cloak’s inner and outer radii with varying cell size and number of steps that tend to affect the parameters of the structure.

  • Image Counterpane
    A. R. Isra, N. Hema priya, M. Meenu, and N.R. Raajan

    IEEE
    Image is the collection and representation of pixels. The details of the image involves with the overlapping of adjacent pixels. Image Stitching is a process of combining many individual images to get a detailed information. Eventually, a good resolution image with details emerges. Analysing the maps of the complete world can be the best example of image stitching process. In digitally sewing the pictures or data, there may occur stitching errors. This flaw can overcome with software emerging now along with the reference data available. Image stitching can also be called Image Counterpane. This image processing is widely gaining attention in various fields like computer vision, deterministic process based on the geological models, stochastic simulation of meandering rivers. In this paper, image counterpane algorithm, texture synthesis and texture transfer are presented.

RECENT SCHOLAR PUBLICATIONS

  • An ADO-OFDM with integrated precoding, companding and optimized power allocation methods for high-speed data transmission in visible light communication
    S Swaminathan, NR Raajan
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES 35 (2) 2024

  • Reduced 12 to 2 Lead EKG for Effective Transmission and Diagnosis of Cardiac Abnormalities
    VS Ramya Lakshmi, S Srinivasan, NR Raajan
    National Academy Science Letters 47 (1), 41-44 2024

  • High-speed Optical OFDM transmission by reducing the nonlinearity of LEDs in Visible light Communication Systems
    S Swaminathan, NR Raajan
    Multimedia Tools and Applications, 1-19 2023

  • Investigations on the Swiftness of a Quantum and a Classical Processor
    S Rajyam, NR Raajan, G Samyuktha, V Priyadharshini, M Sindhujaa
    Perspectives on Social Welfare Applications’ Optimization and Enhanced 2023

  • Real-Time Study and Analysis of Brain Fiber Using 3D-Printed Tractography
    VSR Lakshmi, NR Raajan, N Prabaharan, K Hariharan
    Perspectives on Social Welfare Applications’ Optimization and Enhanced 2023

  • Improved spectral allocation in optical wireless communication based on quadrature amplitude modulation using metaheuristic wavelength division multiplexing
    S Swaminathan, NR Raajan
    Optik 271, 170121 2022

  • An Optimized Tuning of Pid Controller for Photonics and Optics Using Bio-Inspired Algorithm for Controlling Voltage and Current for Enhancement of Robustness
    S Swaminathan, NR Raajan
    2022

  • Three dimensional reconstruction of brain tumor along with space occupying in lesions
    MM Deepika, NR Raajan, A Srinivasan
    Multimedia Tools and Applications 81 (9), 12701-12724 2022

  • Scrambling Based Riffle Shift on Stego-Image to Channelize the Ensured Data.
    R Bala Krishnan, MM Anishin Raj, N Rajesh Kumar, B Karthikeyan, ...
    Intelligent Automation & Soft Computing 32 (1) 2022

  • A Neoteric Image Encryption System Using Nonlinear Chaotic Strange Attractors
    S Srinivasan, V Subramaniam, VS Ramya Lakshmi, NR Raajan
    Futuristic Communication and Network Technologies: Select Proceedings of 2022

  • Non-invasive technique-based novel corona (COVID-19) virus detection using CNN
    NR Raajan, VSR Lakshmi, N Prabaharan
    National Academy Science Letters 44, 347-350 2021

  • An approach for attaining content confidentiality on medical images through image encryption with steganography
    R Bala Krishnan, N Rajesh Kumar, NR Raajan, G Manikandan, ...
    Wireless Personal Communications, 1-17 2021

  • SLKOF: Subsampled Lucas-Kanade Optical Flow for Opto Kinetic Nystagmus detection
    C Jaiseeli, NR Raajan
    Journal of Intelligent & Fuzzy Systems 41 (5), 5265-5274 2021

  • An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission.
    NR Kumar, RB Krishnan, G Manikandan, NR Raajan
    KSII Transactions on Internet & Information Systems 14 (7) 2020

  • An effective technique for the creation of a video synopsis
    K Anuradha, V Anand, NR Raajan
    Journal of Ambient Intelligence and Humanized Computing, 1-6 2020

  • Identification of human actor in various scenarios by applying background modeling
    R NR
    Multimedia Tools and Applications 79 (5), 3879-3891 2020

  • Performance enhanced hyperspectral and multispectral image fusion technique using ripplet type-II transform and deep neural networks for multimedia applications
    K Hariharan, NR Raajan
    Multimedia Tools and Applications 79 (5), 3561-3570 2020

  • Secret image communication scheme based on visual cryptography and tetrolet tiling patterns
    N RajeshKumar, D Yuvaraj, G Manikandan, R Balakrishnan, ...
    Comput Mater Continua 65 (2), 1283-1301 2020

  • Point cloud human posture estimation using single RGB image
    P Singu, VSR Lakshmi, NR Raajan
    Materials Today: Proceedings 33, 3907-3911 2020

  • A multilevel distributed image based encryption for full integrity
    R Sumathi, NR Raajan
    Multimedia Tools and Applications 79 (3), 2161-2183 2020

MOST CITED SCHOLAR PUBLICATIONS

  • Facial recognition system using local binary patterns (LBP)
    TV Priya, GV Sanchez, NR Raajan
    International Journal of Pure and Applied Mathematics 119 (15), 1895-1899 2018
    Citations: 31

  • Non-invasive technique-based novel corona (COVID-19) virus detection using CNN
    NR Raajan, VSR Lakshmi, N Prabaharan
    National Academy Science Letters 44, 347-350 2021
    Citations: 25

  • Speech and non-speech identification and classification using KNN algorithm
    TL Priya, NR Raajan, N Raju, P Preethi, S Mathini
    Procedia engineering 38, 952-958 2012
    Citations: 25

  • Security for an image using bit-slice rotation method-image encryption
    R Vijayaraghavan, S Sathya, NR Raajan
    Indian Journal of Science and Technology, 1-7 2014
    Citations: 24

  • PAPR reduction in OFDM using Partial Transmit Sequence (PTS)
    R Gayathri, V Sangeetha, S Prabha, D Meenakshi, NR Raajan
    International Journal of Engineering and Technology (IJET) 5 (2), 1428-1431 2013
    Citations: 24

  • A review on: augmented reality technologies, systems and applications
    NR Raajan, G Shiva, P Mithun, PVM Vijayabhas
    Journal of Applied Sciences 14 (14), 1485-1495 2014
    Citations: 23

  • Disparity estimation from stereo images
    NR Raajan, M Ramkumar, B Monisha, C Jaiseeli
    Procedia engineering 38, 462-472 2012
    Citations: 23

  • Augmented reality based virtual reality
    NR Raajan, S Suganya, MV Priya, SV Ramanan, S Janani, NSS Nandini, ...
    Procedia engineering 38, 1559-1565 2012
    Citations: 22

  • Performance analysis of DWT-OFDM and FFT-OFDM systems
    G Gowri, GU Maheswari, E Vishnupriya, S Prabha, D Meenakshi, ...
    STRUCTURE 2 (2), 6 2013
    Citations: 21

  • Improved performance in OFDM systems by PAPR reduction techniques
    NR Raajan, S Prabha, D Meenakshi
    2013 International Conference on Computer Communication and Informatics, 1-4 2013
    Citations: 20

  • Augmented Reality for 3D construction
    NR Raajana, S Suganya, R Hemanand, S Janani, SN NS, SV Ramanan
    Procedia Engineering 38, 66-72 2012
    Citations: 20

  • An intellectual intrusion detection system model for attacks classification using RNN
    RB Krishnan, NR Raajan
    Int. J. Pharm. Technol 8 (4), 23157-23164 2016
    Citations: 19

  • Brain mobile interfacing (BMI) system embedded with wheelchair
    GN Jayabhavani, NR Raajan, R Rubini
    2013 IEEE Conference on Information & Communication Technologies, 1129-1133 2013
    Citations: 15

  • COMPARE THE PERFORMANCE ANALYSIS FOR FFT BASED MIMO-OFDM WITH DWT BASED MIMO-OFDM
    D Meenakshi, S Prabha, NR Raajan
    International Conference on Emerging Trends in Computing, Communication and 2013
    Citations: 15

  • An approach for attaining content confidentiality on medical images through image encryption with steganography
    R Bala Krishnan, N Rajesh Kumar, NR Raajan, G Manikandan, ...
    Wireless Personal Communications, 1-17 2021
    Citations: 14

  • Design and implementation of orthogonal based haar wavelet division multiplexing for 3GPP networks
    B Monisha, M Ramkumar, MV Priya, AJ Philomina, D Parthiban, ...
    2012 International Conference on Computer Communication and Informatics, 1-6 2012
    Citations: 13

  • Augmented reality-landmark estimation
    S Suganya, NR Raajan
    2011 INTERNATIONAL CONFERENCE ON RECENT ADVANCEMENTS IN ELECTRICAL 2011
    Citations: 12

  • Augmented reality: The future tense of 3D Advertisement
    G Shiva, NR Raajan
    2013 International Conference on Computer Communication and Informatics, 1-4 2013
    Citations: 11

  • Steganographic approach to enhancing secure data communication using contours and clustering
    G Manikandan, R Bala Krishnan, N Rajesh Kumar, D Narasimhan, ...
    Multimedia Tools and Applications 77, 32257-32273 2018
    Citations: 10

  • An enhanced bishop tour scheme for information hiding
    NR Krishnan Raghupathy, B., Namachivayam, R.K
    International Journal of Applied Engineering Research 9 (1), 145 - 151 2014
    Citations: 10