Selvi Sowmya

  • Citations Per Year
Learn More
Retrieving content from degraded document image is very big and difficult task due to high variation between document background and foreground text. To simplify the task, novel system first constructs correct contrast to the image. Correct contrast to be constructed, based on the local maximum minimum algorithm process's result. Then find text edge stroke(More)
Ancient documents play an important role in history. Various information regarding the literature, tradition and culture is kept in these documents. These heaps of documents are degraded because of some climatic circumstances, low quality and inappropriate holding. This paper reviews on the techniques used to retrieve the necessary content from these(More)
Control of temperature level in the process tank is vital in process industries. A proportional-integral-derivative controller (PID controller) is a control loop feedback mechanism (controller) widely used in industrial control systems. PID control is a control strategy that has been successfully used over many years. This algorithm involves three separate(More)
Network security consists of provisions and policies adopted by network administrator to prevent unauthorized access of network accessible resources. Jamming can be viewed as a form of Denial-of-Service attack, whose goal is to prevent users from receiving timely and adequate information. In these attacks, the adversary is active only for a short period of(More)
With the progression of computer networks extending boundaries and joining distant locations, Wireless Sensor Networks (WSN) emerge as the new frontier in developing opportunities to collect and process data from remote locations. This project focuses on spatially separated sensor networks. Areas such as hilly rural regions are less accessible by common(More)
  • 1