17 results on '"Rajappa, Muthaiah"'
Search Results
2. A method to improve the computational efficiency of the Chan-Vese model for the segmentation of ultrasound images
- Author
-
Ramu, Saru Meena, Rajappa, Muthaiah, Krithivasan, Kannan, Jayakumar, Jaikanth, Chatzistergos, Panagiotis, and Chockalingam, Nachiappan
- Published
- 2021
- Full Text
- View/download PDF
3. A novel fast medical image segmentation scheme for anatomical scans
- Author
-
Ramu, Saru Meena, Rajappa, Muthaiah, Krithivasan, Kannan, and Nalluri, Madhusudhana Rao
- Published
- 2019
- Full Text
- View/download PDF
4. Helly hypergraph based matching framework using deterministic sampling techniques for spatially improved point feature based image matching
- Author
-
Divya Lakshmi K., Rajappa, Muthaiah, Krithivasan, Kannan, and Roy, Diptendu Sinha
- Published
- 2019
- Full Text
- View/download PDF
5. Simple Yet Secure Encoder Architecture and Ultralightweight Mutual Authentication Protocol for RFID Tags in IoT.
- Author
-
Nagarajan, Manikandan and Rajappa, Muthaiah
- Subjects
- *
RADIO frequency identification systems , *FIELD programmable gate arrays , *KEY agreement protocols (Computer network protocols) , *INTERNET of things , *INTERNET radio , *RANDOM numbers - Abstract
Internet of things (IoT) has evolved as the internet of everything, and it has grabbed the interest of all the researchers in recent days. Almost all the objects, including nonelectronics devices, can also be connected with the internet through radio frequency identification (RFID) technology. The security of the perception layer is crucial to secure the entire IoT network. RFID-enabled IoT perception layer has secured reader-to-server channel and unsecured tag to reader channel. Hence, securing the unsecured communication channel between the reader and the tag is the need of the hour. This work proposes a simple yet secure permutation approximate adder (SYSPXA)-based RFID mutual authentication protocol to address the need. The proposed protocol dramatically reduces the tag's storage and computational overhead. It needs 40% less storage and 66.7% less permutation operation in comparison with the existing protocols. Nondisclosure of the key and freshness of key, IDS and random numbers at every mutual authentication process gives resistance to the protocol against de-synchronization attack, disclosure attack, tag tracking, replay attack. The SYSPXA protocol is validated for its security features using Burrows–Abadi–Needham (BAN) logic formal verification. The performance and security of the proposed protocol are contrasted with various futuristic permutation-based protocols, and its superiority over other protocols is highlighted. We have simulated the SYSPXA protocol with ModelSim tool for verifying its functionality. The protocol encoder architecture is implemented in the Intel cyclone IV Field Programmable Gate Array (FPGA) EP4CE115F29C7 device. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. Power and area efficient cascaded effectless GDI approximate adder for accelerating multimedia applications using deep learning model
- Author
-
Manikandan Nagarajan, Rajappa Muthaiah, Yuvaraja Teekaraman, Ramya Kuppusamy, and Arun Radhakrishnan
- Subjects
Diffusion ,Deep Learning ,General Computer Science ,Article Subject ,Multimedia ,Semiconductors ,General Mathematics ,General Neuroscience ,Computer Simulation ,General Medicine - Abstract
Approximate computing is an upsurging technique to accelerate the process through less computational effort while keeping admissible accuracy of error-tolerant applications such as multimedia and deep learning. Inheritance properties of the deep learning process aid the designer to abridge the circuitry and also to increase the computation speed at the cost of the accuracy of results. High computational complexity and low-power requirement of portable devices in the dark silicon era sought suitable alternate for Complementary Metal Oxide Semiconductor (CMOS) technology. Gate Diffusion Input (GDI) logic is one of the prompting alternatives to CMOS logic to reduce transistors and low-power design. In this work, a novel energy and area efficient 1-bit GDI-based full swing Energy and Area efficient Full Adder (EAFA) with minimum error distance is proposed. The proposed architecture was constructed to mitigate the cascaded effect problem in GDI-based circuits. It is proved by extending the proposed 1-bit GDI-based adder for different 16-bit Energy and Area Efficient High-Speed Error-Tolerant Adders (EAHSETA) segmented as accurate and inaccurate adder circuits. The proposed adder’s design metrics in terms of delay, area, and power dissipation are verified through simulation using the Cadence tool. The proposed logic is deployed to accelerate the convolution process in the Low-Weight Digit Detector neural network for real-time handwritten digit classification application as a case study in the Intel Cyclone IV Field Programmable Gate Array (FPGA). The results confirm that our proposed EAHSETA occupies fewer logic elements and improves operation speed with the speed-up factor of 1.29 than other similar techniques while producing 95% of classification accuracy.
- Published
- 2022
7. A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System
- Author
-
David, Deebak Bakkiam, Rajappa, Muthaiah, Karupuswamy, Thenmozhi, and Iyer, Swaminathan Pitchai
- Published
- 2015
- Full Text
- View/download PDF
8. A Novel Random Error Approximate Adder-Based Lightweight Medical Image Encryption Scheme for Secure Remote Monitoring of Health Data
- Author
-
Ramya Kuppusamy, Arun Radhakrishnan, Rajappa Muthaiah, Nagarajan Manikandan, and Yuvaraja Teekaraman
- Subjects
Scheme (programming language) ,Adder ,Science (General) ,Article Subject ,Computational complexity theory ,Computer Networks and Communications ,Computer science ,business.industry ,Key space ,Key distribution ,Encryption ,Q1-390 ,Computer engineering ,Histogram ,Key (cryptography) ,T1-995 ,business ,computer ,Technology (General) ,Information Systems ,computer.programming_language - Abstract
In the present global scenario, social distancing is an inevitable one. The need for social distancing and advancements of technology to facilitate the patients and doctors around the world mandated the telemedicine and remote monitoring of patience details as the pivotal way to diagnose the disease. In this, it is essential to transmit the patient’s information such as X-ray and scan images of them to the doctor in the remote location. Preventing the medical data from the technological adversaries is the need of the hour. Infinitesimal attacks in medical images may cost human lives. This work proposes a lightweight, secure medical image encryption scheme for the remote monitoring of health data. The proposed encryption scheme uses computationally less complex weighted shift approximate adder (WSAA)–based encryption logic. The scheme uses a 256-bit key for the encryption process that strengthens the encryption and robust against various attacks. The proposed encryption scheme deploys the WSAA for diffusing the pixel values. A unique way of key distribution for pixel-wise encryption within the image is proposed that avoids the need for separate logic for the pixel-wise confusion. The proposed Encryption scheme is evaluated for its entropy and horizontal, vertical, diagonal correlation, histogram, key space, and sensitivity. Experimental results affirm that the proposed scheme significantly good with less computational complexity. The peak signal-to-noise ratio (PSNR) value of the decrypted image is infinity, and this matches the ideal requirement of the medical encryption scheme.
- Published
- 2021
9. Renovated XTEA Encoder Architecture-Based Lightweight Mutual Authentication Protocol for RFID and Green Wireless Sensor Network Applications.
- Author
-
Nagarajan, Manikandan, Rajappa, Muthaiah, Teekaraman, Yuvaraja, Kuppusamy, Ramya, and Thelkar, Amruth Ramesh
- Subjects
WIRELESS sensor networks ,RADIO frequency identification systems ,INTERNET of things ,CONFIRMATION (Logic) ,RANDOM numbers - Abstract
Wireless sensor networks find applications everywhere in day to day activities right from attendance entry systems to healthcare monitoring systems. The evolution of the Internet of Things (IoT) as the Internet of Everything (IoET) makes the wireless sensor network omnipresent and increases the use of Radio Frequency Identification (RFID) for the proper identification of devices and sensor nodes which are mostly battery operated. As technology evolves, security threats also increase rapidly. This mandates a strong and energy-efficient green solution. This work attempted to address these issues by effectively deploying the lightweight encryption scheme called Extended Tiny Encryption Algorithm (XTEA). Though the XTEA is lightweight and famous, it is commonly known for various attacks. Our work patches the security threats in the XTEA by applying domain-specific customization, random number utilization, and undisclosed key renewal techniques. Two custom Renovated XTEA Mutual Authentication Protocol (RXMAP) encoder architectures, namely, RXMAP-1 and RXMAP-2, are proposed based on the replacement of accurate computational blocks with approximate blocks. The proposed RXMAP protocol is evaluated for its computational and storage overhead and verified against various security threats using BAN logic formal verification and informal verification. The proposed encoder architectures are simulated for functional verification, and ASIC implementation is done with a 132 nm process node. ASIC implementation results show that the proposed designs RXMAP-1 and RXMAP-2 occupy 53.11% and 53.31% lesser area compared to XTEA I and 52.97% and 53.18% lesser area compared to XTEA II implementation. The total power consumed by the proposed encoder architectures RXMAP-1 and RXMAP-2 is 68.76% and 71.64% lesser than XTEA II implementation, respectively, while maintaining the equal throughput. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
10. Efficient signal selection using supervised learning model for enhanced state restoration.
- Author
-
Rajendran, Agalya and Rajappa, Muthaiah
- Subjects
- *
INTEGRATED circuit design , *MACHINE learning , *SIMULATION methods & models , *ALGORITHMS - Abstract
The post‐silicon validation and debug is the most important task in the contemporary integrated circuit design methodology. The vital problem prevailing in this system is that it has limited observability and controllability due to the minimum number of storage space in the trace buffer. This tends to select the signals prudently in order to maximize state reconstruction. In the reported works, to select and to restore the signals efficiently it is categorized into two types like low simulation with high‐quality technique and high simulation with low‐quality technique. In this work, a node‐based combinational gate signal selection algorithm is proposed based on machine learning method that maximizes the state restoration capability. A significant improvement (80%) has made to achieve adequate simulation time with the high‐quality associated with the state‐of‐the‐art of supplementary methods. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
11. Fixed point multi-bit approximate adder based convolutional neural network accelerator for digit classification inference.
- Author
-
Nagarajan, Manikandan, Sasikumar, A., Muralidharan, D., Rajappa, Muthaiah, Varadarajan, Vijayakumar, Kommers, Piet, Piuri, Vincenzo, and Subramaniyaswamy, V.
- Subjects
CONVOLUTIONAL neural networks ,CLASSIFICATION ,DEEP learning ,MACHINE learning ,ELECTRICITY pricing - Abstract
Approximate computing is a rapidly growing technique to speed up applications with less computational effort while maintaining the accuracy of error-resilient applications such as machine learning and deep learning. Inheritance properties of the machine and deep learning process give freedom for the designer to simplify the circuitry to speed up the computation process at the expense of accuracy of computational results. Fundamental blocks of any computation are adders. In order to optimize it for better performance, 2-bit multi-bit approximate adders (MAPX) are proposed in this work which breaks the lengthy carry chain. In contrast with other approximate larger width adders, instead of using accurate adders for the most significant part, here proposed 2-bit MAPX-1 and MAPX-2 adders are arranged in various ways to compose most and least significant parts. Designed 8-bit and 16-bit adders are evaluated for their performance and error characteristics. Proposed 2-bit MAPX-2 shows better error characteristics whose MED is 0.250 while occupying less area and MAPX-1 consumes less power and delay at the cost of accuracy. Among the extended adders, MAPX 8-bit adder design1 outperforms the best performing APX based 8-bit adder design1. The error performance of it is improved by 14%, 42.1% and 50.4% compared to the existing well-performing APX 8-bit Design1, Design2 and Design3 respectively. Similarly, proposed MAPX 16-bit Design1 exhibits overwhelming performance compared to best performing APX 16-bit Design1, and its error performance is improved by 24.3%, 34.9% and 50.3% compared to APX 16-bit Design1, Design2 and Design3 respectively. In order to evaluate the proposed adder for a real application, extended MAPX 16-bit Design1 is fit in the convolution layer of Low Weights Digit Detector (LWDD) convolutional neural network-based digit classification system. Our modified system accelerates the computation process by 1.25 factors while exhibiting the accuracy of 91% and it best fits error-tolerant real applications. All the adders are synthesized and implemented in the Intel Cyclone IV EP4CE22F17C6N FPGA. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
12. TOPOLOGICAL ORDERING SIGNAL SELECTION TECHNIQUE FOR INTERNET OF THINGS BASED DEVICES USING COMBINATIONAL GATE FOR VISIBILITY ENHANCEMENT.
- Author
-
RAJENDRAN, AGALYA and RAJAPPA, MUTHAIAH
- Subjects
INTERNET of things ,ERROR detection (Information theory) ,SYSTEMS on a chip ,CELL phones ,VISIBILITY ,GATES - Abstract
In modern System on Chip (SoC) design consist of intelligence of products, Internet of Things (IoT) based devices, mobile phones, laptops, servers etc. This shrinking market reduces the design automation validation process. Signal selection is the most effective and challenging technique in post-silicon validation and debug. The vital problem prevailing in this method is that it has limited observability and controllability due to the minimum number of storage space in the trace buffer. This tends to select the signals prudently in order to maximize the state reconstruction. To identify the trace signals, signal restoration is the extensive metric that has been used so far. Topology-based restoration method is proposed here to minimize the error detection latency which helps to select the trace signals with minimum error or even errorless. This method aid to detect more number of errors within limited number of clock cyclesthan the restoration only selection techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
13. Optimization and control of CMOS analog integrated circuits for cyber-physical systems using hybrid grey wolf optimization algorithm.
- Author
-
Asaithambi, Sasikumar, Rajappa, Muthaiah, Ravi, Logesh, Vijayakumar, V., Subramaniyaswamy, V., Abawajy, Jemal, and Yang, Longzhi
- Subjects
- *
ANALOG integrated circuits , *CMOS integrated circuits , *MATHEMATICAL optimization , *CYBER physical systems , *CIRCUIT complexity , *CMOS amplifiers - Abstract
Guaranteeing the reliability of cyber-physical systems (CPS) requires analog integrated circuits for correct functioning. Analog integrated circuits capture the continuous signal and amplify the signal for further processing in CPS applications. This paper presents the hybrid swarm intelligence based approach for determining the optimal transistors sizes and bias current values of CMOS differential amplifier and an operational amplifier. We proposed the simplex search based global optimization method called a hybrid grey wolf optimization (GWO) for solving amplifiers circuit sizing problems. Simplex and GWO techniques were combined to improve the local search capabilities of the optimization method. Our main aim is to optimize the transistor size and bias current values using hybrid GWO algorithm for an optimal design of the CMOS amplifiers. CMOS 180 nm technology was utilized to finding the circuit performance using proposed optimization approach. Simulation result shows that the proposed method provides the better result for circuit performance parameters such as DC gain, phase margin, unity gain bandwidth and power dissipation. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
14. Swarm intelligence-based approach for optimal design of CMOS differential amplifier and comparator circuit using a hybrid salp swarm algorithm.
- Author
-
Asaithambi, Sasikumar and Rajappa, Muthaiah
- Subjects
- *
ANALOG CMOS integrated circuits , *SWARM intelligence , *ALGORITHMS , *MATHEMATICAL optimization , *COMPARATOR circuits , *ELECTRONIC circuit design - Abstract
In this paper, an automatic design method based on a swarm intelligence approach for CMOS analog integrated circuit (IC) design is presented. The hybrid meta-heuristics optimization technique, namely, the salp swarm algorithm (SSA), is applied to the optimal sizing of a CMOS differential amplifier and the comparator circuit. SSA is a nature-inspired optimization algorithm which mimics the navigating and hunting behavior of salp. The hybrid SSA is applied to optimize the circuit design parameters and to minimize the MOS transistor sizes. The proposed swarm intelligence approach was successfully implemented for an automatic design and optimization of CMOS analog ICs using Generic Process Design Kit (GPDK) 180 nm technology. The circuit design parameters and design specifications are validated through a simulation program for integrated circuit emphasis simulator. To investigate the efficiency of the proposed approach, comparisons have been carried out with other simulation-based circuit design methods. The performances of hybrid SSA based CMOS analog IC designs are better than the previously reported studies. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
15. Sweep frequency response analysis based diagnosis of shorts within transformer windings.
- Author
-
Rajamani, Rajesh, Rajappa, Muthaiah, and Madanmohan, Balasubramanian
- Subjects
- *
FREQUENCY response , *ELECTRIC generators , *ELECTRIC windings , *ELECTRIC transformers , *ELECTRIC impedance , *ELECTRIC potential , *POWER transformers - Abstract
Sweep frequency response analysis (SFRA) is a diagnostic technique which can identify faults within transformers. Though SFRA approaches are used to identify faults, their effectiveness in discriminating two same level faults at two different locations within transformer is not much analysed and reported. Experiments were carried out on a 1 kVA, single phase, 240 V/240 V laboratory transformers and on a 315 kVA, three phase, 11 kV/433 V, Dyn11, ONAN, distribution transformer, to analyse the usefulness of SFRA in inter turn short identification and discriminations. Faulty conditions were created artificially in transformers, by shorting the tappings provided in one of their windings, at different levels and locations. Open circuit self-impedance and transfer voltage transfer function approaches were experimented and transfer function plots representing winding impedance and voltage transfer ratios at various frequencies were developed for transformers, under normal and faulty conditions. Significant differences were identified at some frequencies while comparing normal case plots with faulty case plots. It was observed that the SFRA is effective in identifying shorts within transformer winding as well as, discriminating two same level shorts (i.e.) locating shorts. Statistical analysis using absolute difference and min-max ratio also confirmed the efficacy of these approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
16. Interturn short diagnosis in small transformers through impulse injection: online on-load self-impedance transfer function approach.
- Author
-
Rajamani, Rajesh, Rajappa, Muthaiah, Arunachalam, Kamalaselvan, and Madanmohan, Balasubramanian
- Subjects
- *
ELECTRIC transformers , *FREQUENCY response , *ELECTRICAL load , *TRANSFER functions , *ELECTRIC faults - Abstract
Electrical shorts in transformers on load can be diagnosed by frequency response analysis (FRA) using impulse or sinusoidal sweep signal. At HV laboratory of SASTRA, a low-voltage impulse based on-line on-load FRA (OLOL FRA) was carried out on a single phase 50 Hz, 1 kVA, 240 V/240 V small laboratory transformer while delivering power to lamp load, and the effectiveness in electrical short diagnosis was analysed. For this purpose, some artificial faults were created within one of the windings of the transformer investigated, and the responses of the winding to different frequency components of the impulse voltages were observed before and after introducing these faults. Comparison of the frequency response (impedance) of the winding under normal condition with frequency response under fault condition was made, which clearly indicated that faults had altered the winding impedance for some frequency components of the impulse. This reveals that fault within the winding can be identified and located, by the OLOL FRA technique, through careful comparisons of frequency response. Statistical analysis of transfer function magnitudes with correlation coefficient, standard deviation and absolute sum of logarithmic error has also validated the same. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
17. Interturn short diagnosis in small transformers through impulse injection: on‐line on‐load self‐impedance transfer function approach.
- Author
-
Rajamani, Rajesh, Rajappa, Muthaiah, Arunachalam, Kamalaselvan, and Madanmohan, Balasubramanian
- Abstract
Electrical shorts in transformers on load can be diagnosed by frequency response analysis (FRA) using impulse or sinusoidal sweep signal. At HV laboratory of SASTRA, a low‐voltage impulse based on‐line on‐load FRA (OLOL FRA) was carried out on a single phase 50 Hz, 1 kVA, 240 V/240 V small laboratory transformer while delivering power to lamp load, and the effectiveness in electrical short diagnosis was analysed. For this purpose, some artificial faults were created within one of the windings of the transformer investigated, and the responses of the winding to different frequency components of the impulse voltages were observed before and after introducing these faults. Comparison of the frequency response (impedance) of the winding under normal condition with frequency response under fault condition was made, which clearly indicated that faults had altered the winding impedance for some frequency components of the impulse. This reveals that fault within the winding can be identified and located, by the OLOL FRA technique, through careful comparisons of frequency response. Statistical analysis of transfer function magnitudes with correlation coefficient, standard deviation and absolute sum of logarithmic error has also validated the same. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.