S. Sivaranjani

Learn More
Fingerprint and Footprint verification is an important biometric technique for authentication. In this paper, implementation of feature extraction of fingerprint and footprint in Raspberry pi has been discussed. The raspberry Pi is ARM1176JZFS application processor. It enhances performance, consumes less power, and reduces overall system cost and size. The(More)
Leveraging community imparted data for personalized recommendation is one of the active research problems since there are rich contexts and human activities in such explosively growing data. We focus on personalized travel recommendation and show promising applications. We conduct personalized travel recommendation by considering specific user profiles or(More)
Today networks are protected by many firewalls and encryption software's. But many of them protection mechanisms are not sufficient and effective. Therefore an intrusion detection system (IDS) is required to monitor the network that detects misbehavior or anomalies and intimate other nodes in the network to avoid the misbehaving nodes. Various schemes are(More)
This work investigates the possibility of utilizing gender classification in gait recognition to reduce search space time as gender classification reduces the total number of search subjects from database. In this paper, gender classification is performed by utilizing Sparse spatiotemporal features along with most effective features, more informative less(More)
Crime detection is the vital and emerging research field in the real world environment which aims to prevent the number of crimes happening in the world. The nature of crime differs in different places based on location, age, religion, habitual characteristics and so on. Mitigating the serial crimes which are identical to each other is the most important(More)
Big data is a term with large or complex dataset where traditional data processing applications are inadequate. Usage of social networks has been increasing which leads the path for users to have multiple accounts for sharing their thoughts. On the other hand, Fakers pretend like an authorized users and cause discomfort to the users during the brainstorming(More)
Tuberculosis is a major health threat in many regions of the world after HIV, while diagnosing tuberculosis still remains a challenge. It is estimated that nine million new cases appears every year. Mortality rates of patients with undiagnosed TB are high. Modern diagnostic techniques are often too slow and too expensive. In order to reduce the burden of(More)
This concept represents an AC-to-AC conversion for voltage and current control scheme with instantaneous reactive power minimization also reduce the harmonics for high power applications in a distorted AC power supply. The strategy uses the commutation state of the converter in the subsequent sampling time according to an optimization algorithm given by a(More)
The mobile WiMAX plays a vital role in accessing the delay sensitive audio, video streaming and mobile IPTV. To minimize the handover delay, a Location Management Area (LMA) based Multicast and Broadcast Service (MBS) zone is established. The handover delay is increased based on the size of the MBS zone. In this paper, Location Management Area is easily(More)