@sastra deemed university
Associate Professor, Electronics and Communication Engineering
SHANMUGHA ARTS SCIENCE TECHNOLOGY AND RESEARCH ACADEMY
Raajan's research interests include augmented reality (AR), Image & Video Processing, Hydrophone Communication, Signal processing and Wireless Network Security. He has authored a chapter on a book titled Speech enhancement, modeling and recognition algorithms and applications, “Mathematical modeling of speech production and its application to noise cancellation”. He has published 70+ Research articles in National & International journals and 20+ IEEE conference papers with 4 BEST paper awards. He also holds Certificate of Appreciation from TI in 2007 for project presentation, Guiding “Automatized assistance for physically challenging people” and won the first prize. Recently He also served as TPC member & review member for 3 IEEE & ELSEVIER supported International Conferences apart from 3+ peer reviewed journals.
B.E., (Electronics & Communication Engineering) - 1999-2003
M.E., (Communication Systems) - 2003-2005
M.B.A., (Systems) - 2003-2005
Ph.D., (Wireless Communication) - 2010
Signal Processing, Computer Vision and Pattern Recognition, Biomedical Engineering, Multidisciplinary
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Swaminathan S. and Raajan N. R.
Wiley
AbstractVisible light communications (VLC) has received a lot of attention in recent studies because of its benefits over radio‐frequency (RF) communications. It is a short‐range optical wireless communication system that uses light‐emitting diodes (LEDs) as transmitters. Optical orthogonal frequency division multiplexing (OFDM) is an auspicious technology for VLC high‐speed data transfer. The use of OFDM in a VLC system raises the system's peak‐to‐average power ratio (PAPR). The intrinsic non‐linearity of LED is a key concern in an asymmetrically clipped DC‐biased optical OFDM (ADO‐OFDM) system due to its high PAPR. Also, conventional ADO‐OFDM modulation scheme cannot be used for accommodating different demands of services in downlink multiple access due to the restriction of direct current biased optical OFDM (DCO‐OFDM) and asymmetrically clipped optical (ACO‐OFDM) transmission on odd and even subcarriers. To tackle this issue, a modified ADO‐OFDM (MADO‐OFDM) is proposed that adjusts the numbers of subcarriers required for the transmission of ACO‐OFDM and DCO‐OFDM adaptively based on the requests of services in downlink multiple access. Also, the proposed MADO‐OFDM is integrated with a discrete Hartley Matrix transform (DisHMT) precoder and Generalized Piecewise Linear Compander (GPLD) to provide high‐speed data transmission with less PAPR. In addition, the power is allocated to the proposed MADO‐OFDM system optimally by maximizing the channel capacity based on the Aquila optimizer algorithm. The simulation results reveal that the suggested system's PAPR is reduced by 2.4 dB and 0.8 dB, respectively, compared to conventional ADO and hybrid ADO‐OFDM. It also confirms that the suggested generalized PLC can greatly increase BER without affecting the PAPR performance.
V. S. Ramya Lakshmi, Suchindran Srinivasan, and N. R. Raajan
Springer Science and Business Media LLC
V. S. Ramya Lakshmi, N. R. Raajan, Natarajan Prabaharan, and K. Hariharan
IGI Global
With the overwhelming success of three-dimensional (3D) modeling technology of patient anatomy, surgeons are able to intuitively understand the most complex morphologies. In this work, the tractography model is constructed by focusing on the sub-voxel asymmetry and fiber consistency to enhance cortical tractography with strongly bent axonal trajectories which help to identify the fiber track by using the diffusion tensor imagining (DTI) method. The DTI algorithm is compared with the other tracking algorithms and the track parameters for different patients are compared. It is proven that the DTI method provides higher accuracy of 96.76% in tracking the cross fibers. The Y-axis dispersion for the different regions of interest from the tract center is measured. The tract amplitudes at this separation are decreased by 75% from the peak value. The 3D model is printed using an ultimate 3D printing machine at a diameter of about 0.025 mm at a low cost with high accuracy.
Sumathi Rajyam, N. R. Raajan, G. Samyuktha, V. Priyadharshini, and M. Sindhujaa
IGI Global
The cutting-edge technologies cloud computing and IoT are taking an upper hand in every domain. A huge and wide variety of data is being handled and processed by clouds. The cloud federation technique further adds up to this. In the coming years, quantum computers will replace the conventional computers. Pulling out particular data from the gigantic data set processed by clouds in a conventional computer would take a considerable amount of time. In the chapter, Grover's algorithm, a search algorithm, is implemented on traditional computers on IBM quantum simulator and also on QUIRK quantum simulator. Three qubit data is considered in the proposed scheme. The objective of this chapter is to compare the execution time taken to run the Grover's algorithm on IBM and Quirk quantum simulators and on classical computers. The work carried out proves that quantum computer execution speed is high compared to the classical counterpart. This could be effectively used in the future in searching for specific data from a mammoth data set using quantum simulators.
S. Swaminathan and N. R. Raajan
Springer Science and Business Media LLC
S. Swaminathan and N.R. Raajan
Elsevier BV
R. Bala Krishnan, N. Rajesh Kumar, N. R. Raajan, G. Manikandan, A. Srinivasan, and D. Narasimhan
Springer Science and Business Media LLC
M. Malini Deepika, N. R. Raajan, and A. Srinivasan
Springer Science and Business Media LLC
R. Bala Krishnan, M. M. Anishin Raj, N. Rajesh Kumar, B. Karthikeyan, G. Manikandan, and N. R. Raajan
Computers, Materials and Continua (Tech Science Press)
Suchindran Srinivasan, Varun Subramaniam, V. S. Ramya Lakshmi, and N. R. Raajan
Springer Nature Singapore
N. R. Raajan, V. S. Ramya Lakshmi, and Natarajan Prabaharan
Springer Science and Business Media LLC
K. Hariharan, N. R. Rajaan, Peter Pethuru Raj Chelliah, and Malini Deepika
Springer Science and Business Media LLC
C. Jaiseeli and N.R. Raajan
IOS Press
The neurological disorders are developed in adults due to reduced visual perception. Opto Kinetic Nystagmus (OKN) is a clinical method to detect visual perception. For objective measurements, a computational algorithm based OKN detection is preferable rather than clinical practice. In this paper, a memory-efficient Subsampled Lucas-Kanade Optical Flow (SLKOF) is proposed. The proposal employs the Subsampling of images for various levels. The proposal deals with the computation of OKN gain for different image Subsampling factors using the MATLAB platform. The experimental set up to observe OKN is done using computer-based rotation control of the drum through a stepper motor. The results are compared with the well established Lucas-Kanade (LK) method for Optical flow. It is observed that OKN gain corresponds to 1/4th of a subsampled image of the SLKOF method correlates with the LK method for the majority of the cases. This validation evidently elucidates that the proposal is computationally efficient.
N. R. Kumar, R. Krishnan, G. Manikandan and N. R. Raajan
Korean Society for Internet Information (KSII)
Data Security is the most challenging area in Internet communication, where most of the secret sharing schemes are proposed for binary images. But still it lacks in providing security for data communication, especially in image transmission. Traditional visual cryptography scheme generate meaningless diwies and the reconstruction phase leads to quality degradation over the secret image. In this work, an intelligent two dimensional secret share construction scheme is proposed. A secret image is expanded into n diwies with the choice of scheme selection. By Stacking all the qualified diwies to revert the secret image without content loss and less than s* - 1 shares could not reveal any information about the secret image. The experimental results emphasize that the proposed secret share scheme is highly secured for image transmission.
AK Vani, R N Raajan, D Haretha Winmalar., and R Sudharsan
IEEE
As the need for person-aligned, effective, and ethical structures emerges, automatic identification of gender is gaining interest in the era of machine-man interactions. Most of the systems for gender detection were analysed using textual or audiovisual sources. Far too many suggested different approaches for automatic identification of gender using the characteristics acquired from people’s bodies and/or behaviours. But the accuracy has always been a question or a drawback in automated gender detection. In the proposed research work, First, the faces and the facial features which includes eyes, mouth, and nose are detected using Haar Cascade based on Viola-Jones face detection algorithm. Before, the gender detection, the noise is reduced by applying adaptive filters, thereby increasing the accuracy. The obtained facial features are given as the input or test data to the neural network. The neural network is designed to obtain the features and acts as a classifier to detect the genders. Simply, the feature extraction and gender detection is performed using the open source neural network called keras.
Anuradha K., Anand V., and Raajan N.R.
Springer Science and Business Media LLC
K. Hariharan and N. R. Raajan
Springer Science and Business Media LLC
Poojitha Singu, V.S. Ramya Lakshmi, and N.R. Raajan
Elsevier BV
N.RajeshKumar, D.Yuvaraj, G.Manikandan, R.BalaKrishnan, B.Karthikeyan, and D.Narasimhanand N.R.Raajan
Computers, Materials and Continua (Tech Science Press)
Visual cryptographic scheme is specially designed for secret image sharing in the form of shadow images. The basic idea of visual cryptography is to construct two or more secret shares from the original image in the form of chaotic image. In this paper, a novel secret image communication scheme based on visual cryptography and Tetrolet tiling patterns is proposed. The proposed image communication scheme will break the secret image into more shadow images based on the Tetrolet tiling patterns. The secret image is divided into 4×4 blocks of tetrominoes and employs the concept of visual cryptography to hide the secret image. The main feature of the proposed scheme is the selection of random blocks to apply the tetrolet tilling patterns from the fundamental tetrolet pattern board. Single procedure is used to perform both tetrolet transform and the scheme of visual cryptography. Finally, the experimental results showcase the proposed scheme is an extraordinary approach to transfer the secret image and reconstruct the secret image with high visual quality in the receiver end.
K. Anuradha, V. Anand, and N. R. Raajan
Springer Science and Business Media LLC
R. Sumathi and N. R. Raajan
Springer Science and Business Media LLC
N. Rajesh Kumar*, , R. Bala Krishnan, N.R. Raajan, , and
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Traditional biometric schemes used master copy minutiaefor authentication. The enrollment and verification process carried out through the same master copy minutiae. However, the protection of biometric template is more crucial as the number of minutiae compromise will be occurred. In this paper, an improved secret sharing scheme for biometric authentication using finite field is proposed. The master copy of biometric template is transformed into finite field for masking minutiae information. The concept of secret sharing is employed to split the template into multiple copies and maintained between smart card and public consortium. This approach allows perfect biometric authentication for operating smart cards with high-level security.
S. Greeta, N.R. Raajan, and M. Meenu
IEEE
Video Stabilization is a technology used to rectify the blurry motion of camera while capturing a video. It is an optimization technology which is proposed to eliminate the video shakiness. To achieve this image motion has to be measured by multi layer gray projection method. Multi layer gray projection method is introduced to evaluate scaling motion, translation and rotation among the target image and the reference image. Differential gray projection is used to measure the relative image translation and the resulting high-grade projection will help us to find the projection centre for the round projection and ring projection. Then find the rotational values and values obtained by scaling among the target frames and the reference frames by performing ring and circular projection. Keywords— multilayer gray projection, translation, rotation, scaling
K S Lavanya, V Vennisa, K G Sujanth Narayan, and N R Raajan
IEEE
Full wave at microwave range under FDTD(Finite Difference Time Domain) analysis is done for an invisible cloak is designed under software environment, the cylindrical electromagnetic cloak’s performance is verified with its simulation within its cloak structure and behavioral study is carried out for different light’s wavelength in its visible spectrum range when the light get incident on the 2D cylindrical cloak which is invisible in nature in order to make the structure works under optical frequency region which get processed with parameter changes (differently) namely cloak’s inner and outer radii with varying cell size and number of steps that tend to affect the parameters of the structure.
A. R. Isra, N. Hema priya, M. Meenu, and N.R. Raajan
IEEE
Image is the collection and representation of pixels. The details of the image involves with the overlapping of adjacent pixels. Image Stitching is a process of combining many individual images to get a detailed information. Eventually, a good resolution image with details emerges. Analysing the maps of the complete world can be the best example of image stitching process. In digitally sewing the pictures or data, there may occur stitching errors. This flaw can overcome with software emerging now along with the reference data available. Image stitching can also be called Image Counterpane. This image processing is widely gaining attention in various fields like computer vision, deterministic process based on the geological models, stochastic simulation of meandering rivers. In this paper, image counterpane algorithm, texture synthesis and texture transfer are presented.