Papers by Kayalvizhi Jayavel

International Journal of Electrical and Computer Engineering (IJECE)
Recently, the number of violence-related cases in places such as remote roads, pathways, shopping... more Recently, the number of violence-related cases in places such as remote roads, pathways, shopping malls, elevators, sports stadiums, and liquor shops, has increased drastically which are unfortunately discovered only after it’s too late. The aim is to create a complete system that can perform real-time video analysis which will help recognize the presence of any violent activities and notify the same to the concerned authority, such as the police department of the corresponding area. Using the deep learning networks CNN and LSTM along with a well-defined system architecture, we have achieved an efficient solution that can be used for real-time analysis of video footage so that the concerned authority can monitor the situation through a mobile application that can notify about an occurrence of a violent event immediately.

Design & Development of Hybrid Electric Fish-Harris Hawks Optimization-Based Privacy Preservation of Data in Supply Chain Network with Block Chain Technology
International Journal of Information Technology & Decision Making
Due to the expansion of privacy protection, and data sharing gets complicated and is known to be ... more Due to the expansion of privacy protection, and data sharing gets complicated and is known to be a hot issue in the research areas. Many business scenarios in the supply chain network have been highly important in research areas. Especially, blockchain technology ensures the essential solution in the supply chain network for securing information sharing. Yet, it is difficult to maintain security at every blockchain level, whereas it is suggested to use “public–private key cryptography.” The fundamental goal of this research work is to present new privacy preservation of data using hybrid meta-heuristic algorithms with blockchain technology. The secured supply chain network is built with blockchain technology. The privacy preservation of data sharing in blockchain technology is handled by the electric fish-Harris hawks optimization (EF-HHO). This new algorithm is utilized for the key generation phase of two processes like “data sanitization and restoration.” The optimal key generatio...

The catastrophic impacts of the lethal illness known as intestinal cancer are felt by those who s... more The catastrophic impacts of the lethal illness known as intestinal cancer are felt by those who suffer from it. Colonoscopy is the most effective cancer screening procedure currently available. While several deep learning methods are already used by existing systems, little research has been conducted on feature extraction and testing in the context of cancer diagnosis. The suggested system is a more comprehensive implementation of CADx technology that relies on intelligent detection. Data from the CKHK-22 dataset was preprocessed and kept in the cloud before being utilized for the system's training and testing purposes. To create local binary pattern (LBP) features, we first grayscale the colour features included in the colonoscopy dataset images. Several convolutional neural networks (CNNs), including VGG-16, DenseNet-201, and ResNet-50, are trained on the CKHK-22 dataset after it has been transformed to three features. In a vital step, the CKHK-22's feature acquisitions a...

Electronics
Blockchain is a recently developed advanced technology. It has been assisted by a lot of interest... more Blockchain is a recently developed advanced technology. It has been assisted by a lot of interest in a decentralized and distributed public ledger system integrated as a peer-to-peer network. A tamper-proof digital framework is created for sharing and storing data, where the linked block structure is utilized to verify and store the data. A trusted consensus method has been adopted to synchronize the changes in the original data. However, it is challenging for Ethereum to maintain security at all blockchain levels. As such, “public–private key cryptography” can be utilized to provide privacy over Ethereum networks. Several privacy issues make it difficult to use blockchain approaches over various applications. Another issue is that the existing blockchain systems operate poorly over large-scale data. Owing to these issues, a novel blockchain framework in the Ethereum network with soft computing is proposed. The major intent of the proposed technology is to preserve the data for tran...

Computational Intelligence and Neuroscience
Human colorectal disorders in the digestive tract are recognized by reference colonoscopy. The cu... more Human colorectal disorders in the digestive tract are recognized by reference colonoscopy. The current system recognizes cancer through a three-stage system that utilizes two sets of colonoscopy data. However, identifying polyps by visualization has not been addressed. The proposed system is a five-stage system called ColoRectalCADx, which provides three publicly accessible datasets as input data for cancer detection. The three main datasets are CVC Clinic DB, Kvasir2, and Hyper Kvasir. After the image preprocessing stages, system experiments were performed with the seven prominent convolutional neural networks (CNNs) (end-to-end) and nine fusion CNN models to extract the spatial features. Afterwards, the end-to-end CNN and fusion features are executed. These features are derived from Discrete Wavelet Transform (DWT) and Vector Support Machine (SVM) classification, that was used to retrieve time and spatial frequency features. Experimentally, the results were obtained for five stage...

Sensors
Nowadays, building infrastructures are pushed to become smarter in response to desires for the en... more Nowadays, building infrastructures are pushed to become smarter in response to desires for the environmental comforts of living. Enhanced safety upgrades have begun taking advantage of new, evolving technologies. Normally, buildings are configured to respond to the safety concerns of the occupants. However, advanced Internet of Things (IoT) techniques, in combination with edge computing with lightweight virtualization technology, is being used to improve users’ comfort in their homes. It improves resource management and service isolation without affecting the deployment of heterogeneous hardware. In this research, a containerized architectural framework for support of multiple concurrent deployed IoT applications for smart buildings was proposed. The prototype developed used sensor networks as well as containerized microservices, centrally featuring the DevOps paradigm. The research proposed an occupant counting algorithm used to check occupants in and out. The proposed framework wa...

International Journal of Engineering & Technology
Cloud computing has raised majorly to provide everything as a service and also for scaling the re... more Cloud computing has raised majorly to provide everything as a service and also for scaling the resources and utilizing the resources in an effective way. This paper aims to propose a scheduling algorithm which allocates static tasks to the resources effectively without making any tasks starve for the resources for long time. In SJF algorithm, the shortest tasks will be executed initially, and the largest tasks will keep on starving for the resources to be allocated. The proposed algorithm handles such a situation effectively by adding the jobs under different weightage queues and then scheduling them in an SJF order. This gives priority to even largest job. In this paper a framework is proposed, which fetches data from Amazon SDB storage and the processing of data based on proposed algorithm occurs in a cloudsim and finally the results are visualized through an IOT mobile device. The comparison is also made for First Come First Serve (FCFS), which is a default scheduling algorithm a...

Design and implementation of smart garage- An IoT perspective
2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS)
Internet of Things is a burgeoning field in the world of technology. It helps ease life for a per... more Internet of Things is a burgeoning field in the world of technology. It helps ease life for a person by means of internetworking physical devices, automotive, home appliances and other items embedded with electronics, software, sensors and actuators. Smart garage is one such device that helps ease the access of the garage doors in domestic use. Unlike most solutions, smart garage help you to access your doors with the help of a computable device such as smart phones or tablets connected to a network, and access by means of secured pins to authorize the access. We designed one such garage using Arduino web server, and a smartphone. Which we compared with existing methods. We have illustrated the building process of the setup for the prototype of our garage, and various means to improve power consumptions and alternate methods for a secured pin.

Missing Data Estimation and Imputation Algorithm for Wireless Sensor Network Applications
2022 International Conference on Computer Communication and Informatics (ICCCI), 2022
Wireless Sensor Networks (WSNs) contain a large number of spatially located sensors for monitorin... more Wireless Sensor Networks (WSNs) contain a large number of spatially located sensors for monitoring the physical conditions of the environment or machinery. The data collected from the sensors are retrieved and stored in a central computer for analysis. The WSNs are used for measurement of parameters such as temperature, humidity, sound pressure, wind velocity, pollution levels and air quality usually from remote and sometime not easily reachable locations. The evolution of WSN has lead to developments in the field of Internet of Things (IoT) and now smart cities. In the aforementioned scenarios, data quality is highly crucial for better decision making. As WSNs are constrained by cost and resource factors, one has to carefully study the data collected either online or offline, to take the right decisions. Missing data is one of the prominent data quality problems. After thorough analysis of work carried out by many researchers in this field, a regression based approach for Multivariate data is proposed in this paper. An experimental analysis is carried out on a dataset generated from a simulated WSN environment.

A Review on Real-Time Sign Language Recognition
2022 International Conference on Computer Communication and Informatics (ICCCI), 2022
Sign Language Recognition (SLR) or Sign Language translation is one of the famous areas of resear... more Sign Language Recognition (SLR) or Sign Language translation is one of the famous areas of research. Sign Language Recognition (SLR) is aimed at creating two-way communication between people who use sign language as their basic communication with those who don't. Although these had been popular areas for computer vision, the application had been less due to resources that were required. Creating an efficient model becomes complicated and diverse. For this literature survey, the authors analysed and summarised several methodologies and models used to construct sign-language translators. On conducting a survey, those papers selected did conclude with excellent results respectively but did lack in certain areas. American Sign Language (ASL) has been taken as the parameter for differentiation because it consists of its own set of strengths and weaknesses.

Smart Bracelet: With Handshake Recognition For Information Exchange
2021 International Conference Engineering Technologies and Computer Science (EnT), 2021
Digital bracelets or wrist watches, which include functionalities like calculators and unit conve... more Digital bracelets or wrist watches, which include functionalities like calculators and unit converters, were commercially available for decades. Due to the technological advancements, they are equipped with data transferring facilities and becoming multifunctional. This paper presents design of a smart bracelet, which can identify the pairs of people during handshakes and exchange their contact details with each other. An advanced system was implemented to detect pairs of handshakes when happening concurrently as multiple pairs of people may do hand shaking at the same time when the crowd size is large in a gathering. A peak detection algorithm and a top-k algorithm were used to identify the matching handshakes by processing data. Communication links were also established using the Bluetooth Low Energy (BLE) technology to exchange contact information of people who are handshaking with each other. Finally, a smart bracelet with multiple functionalities was manufactured and its performance was evaluated.

International Journal of Electrical and Computer Engineering (IJECE), 2021
With the increase of vehicles and cars of different kind and the large movement that occurs every... more With the increase of vehicles and cars of different kind and the large movement that occurs every day on the roads it was natural to observe an increase in traffic accidents, but the real dilemma lies in how to make the rescue process efficient. The problem that we want to solve is the response of ambulances towards accidents and the lengthy registration process of patients in hospitals. In the above two scenarios, the manual process of calling the ambulance leads to delay in rescue of patients from an accident and the delay in registration of patient leads to delay in medication or treatment of the patient. We want to make the process more efficient by automating accident detection for increasing the efficiency of the ambulance rescue process and by sending the details of the patient before the patient reaches the hospitals for faster treatment of patients. Along with this, alert messages will be sent to the family or friends of the patients to notify them as soon as an accident is...

Design and implementation of IoT framework for Home Automation and Monitoring
2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on, 2018
The primary concern everywhere is security and everyone wants his home to be secured. Advancement... more The primary concern everywhere is security and everyone wants his home to be secured. Advancements in technology have made the implementation of and IoT and embedded systems within home appliances easy. This not only improves the security of the house but also gives one more control of their home devices. This paper describes a security system by which one can monitor and control one’s home. As in today’s world, automation plays a very powerful role, this paper will implement an automated way of controlling home appliances by the help of human interaction. The user will be able to monitor their home devices using their smartphones when connected to the same local area network. Through this paper, we try to bring forward a safer and a more monitored view of Home Automation by making sure that the user is always in control of his house.

Design and Implementation of IoT Testbed with Improved Reliability using Conditional Probability Techniques
2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2020
Internet of Things (IoT) test beds are widely used by developers predominantly. Off late, Test be... more Internet of Things (IoT) test beds are widely used by developers predominantly. Off late, Test beds are being used by data analysts, academicians, industrial persons and hardware ardent. The real purpose of test beds, is to achieve accurate testing results, mimicking the real time environment to the extent possible which is otherwise not possible to reproduce using simulators. As predicted by many industrial giants IoT based devices will reach the scale of billions by 2015. The applications and opportunities they create will also be innumerable. This has created a huge demand for such testing grounds, because a system deployed without proper testing may be vulnerable and sometimes disastrous. Thus our research aims to explore the qualities of test beds, the services they offer and how to enhance the performance of test beds. Our test bed framework is designed and developed with open-source boards to achieved heterogeneity, reusability, interoperability and scalability. This framework would like to be addressed as a utility, with “X” as service: data, sensor client, actuator client, and platform. To achieve this, APIs which is platform and language independent has been developed and provides third-party developer support. The APIs developed have shown considerable improvement in terms of data transfer rate, database upload and retrieval, and user responsiveness. Thus, our framework is capable of offering services through our API. And have demonstrated with the help of conditional probability techniques enhancement in performance and reusability, visualized the same in terms of graphs and datasets.

— Most of the reminder applications available today in mobile phones are time and date based. In ... more — Most of the reminder applications available today in mobile phones are time and date based. In which the user has to save the time and date of when he/she wants to be reminded about in the reminder. If the reminder is ON, the device continuously tries to match the device time and date with the saved time and date, and the user will be alerted if it is a match. But in many cases the user will not be aware about the time and date, but he/she will be aware about the place where he/she wants the reminder. In this project, I have tried to design an application which gives alert about the reminder when he/she enters into the geographical region specified in the reminder. While a time based alarm application alerts a user at a specified time, a location based alert application alerts a user when he/she is in the proximity of a specified location. Location alert applications are quite useful when time of an event is unknown.

Cloud Intelligent based Reference model for Voice-Interactive Application Suites
2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), 2020
As technology progresses towards blurring the lines between computers and more human aspects of l... more As technology progresses towards blurring the lines between computers and more human aspects of life, there have been burgeoning new facets, particularly to the information technology space with Intelligent Personal Assistants (IPAs) being among those at the forefront. Amazon Alexa, Google Assistant, Apple Siri, Microsoft Cortana have promoted their use in diverse domains such as education, business, smart home technology and many more. Many campuses of higher education institutions still utilize conventional strategies to disperse information to individuals in non-ubiquitous ways. Technology-enabled campuses, thus, must become more robust by capitalizing on cloud computing technology and appropriate asynchronous application layer network strategy to provide users with accurate and relevant information with human-like speech output, upon requisition, at any time. A modular suite of cloud-deployed voice applications with robust architecture, to provide campus related information will solve the problems encountered by individuals on campus, on a day-to-day basis.

Virtual Aided Teacher-Learner Relationship-A Text Analytical Approach for Improved Behavior Analysis
2020 Sixth International Conference on e-Learning (econf), 2020
Traditionally, teacher-learner interactions are limited to classrooms. However, technology has br... more Traditionally, teacher-learner interactions are limited to classrooms. However, technology has brought flexibility allowing development of more personalized and meaningful teacher-learner relationships. Using a case study approach, this work investigates how such behaviors and qualities like; approachability, kind words, enthusiasm, simple smile, body language, scheduled and disciplined availability and knowledge on the part of the teacher impacts learner behavior. Further, an attempt is made to prove how through the use of polite language and a courteous approach, the problems associated with new technology can be reverted leading to a balanced student-teacher relationship. It is inferred that there is a great longing in people to have open conversation with someone trustworthy; but unfortunately, everyone is preoccupied with their own work or the student lacks good friendships depriving them of a trustable outlet. Hence, through the case study we also prove that proactiveness, care and concern expressed by mere words can have tremendous effect on student's behavior, habit, attitude and performance.

Journal of Public Health Research, 2021
Accurate staff scheduling is crucial in overcoming the problem of mismatch between staffing ratio... more Accurate staff scheduling is crucial in overcoming the problem of mismatch between staffing ratios and demand for health services which can impede smooth patient flow. Patient flow is an important process towards provision of improved quality of service and also improved utilization of hospital resources. However, extensive waiting times remains a key source of dissatisfaction with the quality of health care service among patients. With rarely scheduled hospital visits, the in-balance between hospital staffing and health service demand remains a constant challenge in Sub-Saharan Africa. Accurate workload predictions help anticipate financial needs and also aids in strategic planning for the health facility. Using a local health facility for a case study, we investigate problems faced by hospital management in staff scheduling. We apply queuing theory techniques to assess and evaluate the relationship between staffing ratios and waiting times at the facility. Specifically, using pati...

Data Collection and Deep Learning for Traffic and Road Infrastructure Management
Artificial Intelligence Techniques for Advanced Computing Applications, 2020
Managing the traffic of a city or a demographic is a deceptively significant task. The productivi... more Managing the traffic of a city or a demographic is a deceptively significant task. The productivity of the people commuting through the region and the pollution caused by their vehicles can be critically impacted by the traffic management of the roads that they are in. Therefore, artificial intelligence systems can be a good alternative to traditional traffic management techniques. A framework for mining real-time data will help build the foundation for intelligent traffic management approaches that can be immediately tested instead of proposing a data collection subroutine every time. In addition to data collection, this paper proposes ways to derive insights, from which both short-term (real-time traffic routing and dynamic traffic signals) and long-term (building flyovers and installing new traffic signals) decisions can be made. Raw data is collected in the form of video feeds from the traffic cameras. Machine learning routines such as Deep Sort and Lucas–Kanade method are used to extract statistics (such as speed of vehicles and vehicle count) from the video feeds. Multi-layer perceptions are used to extract license plate information from the video feeds. This license plate information can be further extended for many security applications.

Migration techniques of data centric networks to internet of things with control plane based virtual sensor layer
2017 International Conference on IoT and Application (ICIOT), 2017
Data centric networks are application specific and proprietary as against address centric network... more Data centric networks are application specific and proprietary as against address centric networks which are uniquely addressable and standardized. Internet of Things which is a culmination of data centric and address centric networks have brought in a need to integrate various technologies which were otherwise in silos. The basic requirement of Internet of Things (IoT), is connecting anything, anytime and anywhere. Thus, our paper attempts to provide a brief idea of existing methodologies towards integration and propose a new architecture for Internet of Things towards integration of these most useful networks to the internet. As the volume of things connected have increased multifold have brought in new challenges with respect to monitoring and management of resources and data. Thus, this architecture is inspired from Software Defined concepts and attempts to divide the monitoring and the actual data into two layers namely the control and the data plane. The control plane will take care of dynamic resource discovery and provisioning based on user needs. The data plane deals only with pure/raw data. This model reduces the complexity by abstracting the control task from the data bounded physical layer.
Uploads
Papers by Kayalvizhi Jayavel