54 results on '"Vijayanand Palanisamy"'
Search Results
2. In the VEST trial: are we missed to address the pathology incurred by the external stent?
- Author
-
Vijayanand Palanisamy, Valikapthalil Mathew Kurian, and Rajan sethuratnam
- Subjects
Vest trial ,Saphenous vein ,Coronary artery bypass grafting ,Surgery ,RD1-811 ,Anesthesiology ,RD78.3-87.3 - Abstract
Abstract In the VEST IV trial, the author concluded that external stenting of saphenous vein graft mitigates its remodeling and also significantly reduces the diffuse intimal hyperplasia and development of lumen irregularities at 4.5 years after coronary artery bypass grafting surgery. We also have valuable a suggestion in addition to external stenting that might nullify the pathology caused by the stent and might enhances graft patency.
- Published
- 2021
- Full Text
- View/download PDF
3. Trans-sternal repair of incidentally diagnosed morgagni hernia during ventricular septal defect closure in a sickle cell trait infant
- Author
-
Vijayanand Palanisamy, R Karthik Raman, Sujatha Desai Indrajith, and Ravi Agarwal
- Subjects
Pediatrics ,RJ1-570 ,Surgery ,RD1-811 - Published
- 2020
- Full Text
- View/download PDF
4. A rare presentation of intrapericardial hematoma 20 months post aortic valve replacement
- Author
-
Khadhar Mohamed Sarjun Basha, Vijayanand Palanisamy, Ezhilan Janakiraman, Jacob Jamesraj, Sivakumar Pandian, Suresh Kumar Sangili, and Mullasari Ajit Sankardas
- Subjects
Chronic expanding hematoma ,Congestive cardiac failure ,Aortic valve replacement ,Surgery ,RD1-811 ,Diseases of the circulatory (Cardiovascular) system ,RC666-701 - Abstract
We report the successful treatment of a rare case of chronic intrapericardial hematoma which presented with congestive cardiac failure 20 months after aortic valve replacement surgery for severe calcific aortic stenosis. Chest roentgenograph demonstrated paracardiac mass over lower left ventricle border, left pleural effusion and pulmonary venous hypertension. An echocardiographic study demonstrated intrapericardial mass posterolateral to left ventricle compressing left ventricular cavity both during systole and diastole causing septum to bulge into right ventricle. Computed tomography showed a loculated pericardial mass in left heart margin, left pleural effusion, bilateral axillary and mediastinal lymphadenopathy. Surgical resection was planned to relieve the symptoms and to confirm the diagnosis of the mass. The mass was completely resected through left anterolateral thoracotomy and histopathology findings confirmed the diagnosis of hematoma with cystic degeneration. Postoperative course was uneventful, and his symptoms improved markedly.
- Published
- 2015
- Full Text
- View/download PDF
5. Conventional radiofrequency ablation of sphenopalatine ganglion for the treatment of cluster headache
- Author
-
Sudhindra Dharmavaram, Asokan Kondappan, Vijayanand Palanisamy, and Senthil Kumar Raju
- Subjects
Cluster headache ,radiofrequency ablation ,sphenopalatine ganglion ,Neurology. Diseases of the nervous system ,RC346-429 - Abstract
Cluster headache is a primary neurovascular unilateral headache associated with autonomic symptoms. The sphenopalatine ganglion plays an important role in the pathogenesis of this disorder. Although medications are the first line of treatment, percutaneous, and surgical interventions have been proposed to treat cluster headache. An attractive option is the radiofrequency ablation of the sphenopalatine ganglion for the treatment of cluster headache due to its relative safety and simplicity compared with other procedures.
- Published
- 2016
- Full Text
- View/download PDF
6. Mechanisms of Pain and Analgesia
- Author
-
Vijayanand, Palanisamy, primary
- Published
- 2017
- Full Text
- View/download PDF
7. Double cobra head technique of distal coronary anastomosis
- Author
-
Mithun Sundararaaja Ravikumar, Shilpa Shree, Vijayanand Palanisamy, Antony Leander Sathiaraj, V M Kurian, and Anbarasu Mohanraj
- Subjects
Pulmonary and Respiratory Medicine ,medicine.medical_specialty ,business.industry ,medicine.medical_treatment ,Stent ,Cobra ,Anastomosis ,Vascular surgery ,Cardiac surgery ,Surgery ,surgical procedures, operative ,medicine.anatomical_structure ,Cardiothoracic surgery ,medicine ,Head (vessel) ,Innovation ,Cardiology and Cardiovascular Medicine ,business ,computer ,Artery ,computer.programming_language - Abstract
In 1967, Dr. René Favaloro introduced the use of reversed greater saphenous vein graft for coronary artery bypass grafting, since then a lot of efforts were made to improve the venous graft patency rate. We introduce a novel double cobra head technique of distal coronary anastomosis for better distal runoff. We expect our technique will help in difficult situations such as limited conduit availability and target vessel with bifurcation lesions. Refining our surgical techniques is essential to keep ourselves well equipped to compete with the rapidly evolving stent culture.
- Published
- 2021
8. Unusual presentation of arteria lusoria along with ascending aortic aneurysm
- Author
-
Vijayanand Palanisamy, Shilpa Shree, Mithun Sundararaaja Ravikumar, and Antony Leander Sathiaraj
- Subjects
General Medicine - Published
- 2022
9. Pandemic created clinical eclipse: hemosiderosis versus COVID-19 pneumonia
- Author
-
Vijayanand Palanisamy, Shilpa Shree, Pradeep Ramkoomar, and Mithun Sundararaaja Ravikumar
- Subjects
Pulmonary and Respiratory Medicine ,Pediatrics ,medicine.medical_specialty ,Hemosiderosis ,Coronavirus disease 2019 (COVID-19) ,viruses ,SARS-CoV-2 pneumonia ,Disease ,Pandemic ,medicine ,skin and connective tissue diseases ,business.industry ,fungi ,virus diseases ,Vascular surgery ,medicine.disease ,Surgery ,Cardiac surgery ,respiratory tract diseases ,Pneumonia ,Cardiothoracic surgery ,Images ,Cardiology and Cardiovascular Medicine ,business - Abstract
In the severe acute respiratory syndrome coronavirus-2 (SARS-CoV-2) pandemic, the physician finds difficulty in differentiating the symptoms due to cardiac disease from that of SARS-CoV-2. We would like to present one such mystified situation (hemosiderosis versus SARS-CoV-2 pneumonia) we encountered.
- Published
- 2021
10. In the VEST trial: are we missed to address the pathology incurred by the external stent?
- Author
-
Rajan Sethuratnam, V M Kurian, and Vijayanand Palanisamy
- Subjects
Pulmonary and Respiratory Medicine ,medicine.medical_specialty ,Pathology ,Intimal hyperplasia ,Bypass grafting ,RD1-811 ,medicine.medical_treatment ,Lumen (anatomy) ,Coronary artery bypass grafting ,Coronary Angiography ,Anesthesiology ,medicine ,Humans ,RD78.3-87.3 ,Saphenous Vein ,cardiovascular diseases ,Coronary Artery Bypass ,Letter to the Editor ,Vascular Patency ,business.industry ,Stent ,General Medicine ,medicine.disease ,equipment and supplies ,Cardiac surgery ,medicine.anatomical_structure ,surgical procedures, operative ,Cardiothoracic surgery ,VEST ,Surgery ,Stents ,Vest trial ,Cardiology and Cardiovascular Medicine ,business ,Artery - Abstract
In the VEST IV trial, the author concluded that external stenting of saphenous vein graft mitigates its remodeling and also significantly reduces the diffuse intimal hyperplasia and development of lumen irregularities at 4.5 years after coronary artery bypass grafting surgery. We also have valuable a suggestion in addition to external stenting that might nullify the pathology caused by the stent and might enhances graft patency.
- Published
- 2021
11. Comparative Analysis of Finger Vein Pattern Feature Extraction Techniques An Overview
- Author
-
R. Anandha Jothi, G. Thenmozhi, and Vijayanand Palanisamy
- Subjects
medicine.anatomical_structure ,Computer science ,business.industry ,Feature extraction ,medicine ,Pattern recognition ,Artificial intelligence ,Vein ,business - Published
- 2019
12. Defeating Jamming Attack in Wireless Network Techniques
- Author
-
R. Anandha Jothi, T. Aruna, and Vijayanand Palanisamy
- Subjects
Computer science ,Wireless network ,business.industry ,Jamming attack ,business ,Computer network - Published
- 2019
13. An Review on Ear Recognition Techniques Based On Local Texture Descriptors
- Author
-
R. Anandha Jothi, S. Saranya, and Vijayanand Palanisamy
- Subjects
Computer science ,business.industry ,Pattern recognition ,Artificial intelligence ,Ear recognition ,business ,Texture (geology) - Published
- 2019
14. Efficiency of dual siRNA-mediated gene therapy for intervertebral disc degeneration (IVDD)
- Author
-
A V Gurava Reddy, Vijayanand Palanisamy, Rajkiran Reddy Banala, Murahari Penkulinti, G.P.V. Subbaiah, MV Surekha, Ghulam Hassan Dar, Satish Kumar Vemuri, and Madhusudhana Rao Nalam
- Subjects
Male ,Small interfering RNA ,Caspase 3 ,Context (language use) ,Intervertebral Disc Degeneration ,03 medical and health sciences ,0302 clinical medicine ,In vivo ,Gene expression ,Animals ,Humans ,Medicine ,Orthopedics and Sports Medicine ,Caspase ,030222 orthopedics ,biology ,business.industry ,Intervertebral disc ,Hep G2 Cells ,In vitro ,RNAi Therapeutics ,medicine.anatomical_structure ,Cancer research ,biology.protein ,Surgery ,ADAMTS5 Protein ,Rabbits ,Neurology (clinical) ,business ,030217 neurology & neurosurgery - Abstract
BACKGROUND CONTEXT One of the common causes of low back pain is intervertebral disc degeneration. The pathophysiology of disc degeneration involves apoptosis of nucleus pulposes cells and degradation of extra cellular matrix (ECM). Caspase 3 plays a central role in apoptosis and the ADAMTS5 (A Disintegrin and Metalloproteinase with Thrombospondin motifs 5) gene plays a critical role in ECM degradation. Hence, we hypothesized that if one can silence these two genes, both apoptosis and ECM degradation can be prevented, thereby preventing the progression and even reverse disc degeneration. PURPOSE The purpose of this study is to demonstrate the regenerative potential of small interfering RNA (siRNA) designed against Caspase 3 and ADAMTS5 genes in an in vitro and animal model of disc degeneration. STUDY DESIGN In vitro study followed by in vivo study in a rabbit model. METHODS In vitro studies were done using the human hepatocellular carcinoma (Hep G2) cell line for validating the efficacy of liposomal siRNA in controlling the expression of genes (Caspase 3 and ADAMTS5). Later, siRNA's validation was done in a rabbit annular punctured model by administering siRNA's individually (Caspase 3 and ADAMTS5) and in combination Caspase3-ADAMTS5) for assessing their synergistic effect in down regulating the gene expression in the degenerative discs. Annular punctured intervertebral discs of the rabbit were injected with siRNA formulations (single and dual) and phosphate buffer saline, one week after initial puncture. Magnetic resonance imaging (MRI) scans were done before and after siRNA treatment (1, 4 and 8 weeks) for assessing the progression of disc degeneration. The histopathology and real time polymerase chain reaction (RT-PCR) studies were done for evaluating their efficacy. We did not receive any funding for conducting the study, and we do not have a conflict of interest with any researchers or scientific groups. RESULTS The observations made from both in vitro and in vivo studies indicate the beneficial effects of siRNA formulation in down regulating the expression of Caspase 3 and ADAMTS5 genes. The MRI and histopathological evaluation showed that the disc degeneration was progressive in phosphate buffer saline and AT5-siRNA injected discs but the discs that received Caspase 3-siRNA and dual siRNA (Cas3-AT5-siRNA) formulation showed signs of recovery and regeneration 4 and 8 weeks after injection. The efficacy of siRNA designed against Cas3 and AT5 was also assessed in both in vitro and in vivo experiments by using RT-PCR analysis and the results showed downregulation of Caspase 3 gene in Caspase 3-siRNA group, but there was no significant downregulation of ADAMTS5 gene in ADAMTS5-siRNA group (ie, indicated by fold change). Synergistic effect was observed in the group that received dual siRNA (Cas3-AT5 siRNA) formulation. CONCLUSIONS This experiment suggests that intervention by siRNA treatment significantly reduced the extent of apoptosis in the discs. CLINICAL SIGNIFICANCE Delivery of siRNA directly into spinal discs has a potential in treating disc degeneration nonsurgically.
- Published
- 2019
15. Hybrid Classification Algorithms for Predicting Student Performance
- Author
-
Vijayanand Palanisamy, R. Pandi Selvam, and A.Dinesh Kumar
- Subjects
0209 industrial biotechnology ,Radial basis function network ,business.industry ,Computer science ,Pattern recognition ,02 engineering and technology ,Educational data mining ,Hybrid algorithm ,Random forest ,Prediction algorithms ,Statistical classification ,ComputingMethodologies_PATTERNRECOGNITION ,020901 industrial engineering & automation ,Multilayer perceptron ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business - Abstract
Data mining is the progress of instinctively find out valuable information from huge depot. In educational data mining predicting the academic performance of the student is a well-known research. The intention of the research work is to examine the classification algorithms as a hybrid classification. We used Radial Basis Function network, Multilayer Perceptron, C4.5 and Random Forest Algorithms for classification. Initially classification accuracy was computed individually by the classification algorithms. The Radial Basis Function network, Multilayer Perceptron, C4.5 and Random Forest Algorithm’s individual classification gave the accuracy of 72.9167%, 75.4167%, 75% and 73.125% vice versa. To increase more accuracy of classification algorithm the Radial Basis Function network is combined with multilayer perceptron. This hybrid algorithm provides 75.625% of classification accuracy. Then we combined C4.5 algorithm with random forest algorithm which gives 76.4583% classification accuracy. In this study we found hybrid classification algorithm gives more accuracy than individual classification algorithm.
- Published
- 2021
16. A Rare Combination of Double Orifice Mitral Valve With Noncompaction of Left Ventricle
- Author
-
Vijayanand Palanisamy, Kumar Chidambaram, Rajan Sethuratnam, Mithun Sundararaaja Ravikumar, Arun Ramar, and Sureshkumar Sangili
- Subjects
Heart Defects, Congenital ,Male ,Pulmonary and Respiratory Medicine ,medicine.medical_specialty ,business.industry ,Heart Ventricles ,Heart Valve Diseases ,Middle Aged ,Rare Diseases ,medicine.anatomical_structure ,Echocardiography ,Ventricle ,Internal medicine ,Cardiology ,medicine ,Humans ,Mitral Valve ,Surgery ,Cardiology and Cardiovascular Medicine ,business ,Double orifice mitral valve - Published
- 2022
17. A Secure Authenticated Bio-cryptosystem Using Face Attribute Based on Fuzzy Extractor
- Author
-
Vijayanand Palanisamy, S. Aanjanadevi, S. Aanjankumar, and S. Poonkuntran
- Subjects
Database server ,Biometrics ,business.industry ,Computer science ,Hash function ,Cryptography ,02 engineering and technology ,Encryption ,Computer security ,computer.software_genre ,020202 computer hardware & architecture ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Cryptosystem ,020201 artificial intelligence & image processing ,The Internet ,business ,computer - Abstract
Development in usage of internet for sharing data over internet leads to some risk on privacy, authenticity and confidentiality of information. To overcome the problem of security and authenticity, biometrics and cryptography technology are separately used due few drawbacks in both system, but because of their similar characteristics these two technologies are combined and Bio-crypto system has been designed, to satisfy the needs of user who transmit their data through internet for enhancing the security and authenticity of data and the user. In this proposed work bio-cryptosystem based on fuzzy extractor using face attributes, the user face feature points are extracted and bio code can be generated by bio hashing technique to facilitate the user to access the key that are already stored on the database server. By using face attribute for retrieving the key there is no need for the user to remember the pass code which does not corresponds to the user moreover biometric features cannot be stole and forgotten. Using bio-crypto system the user can be authenticated by enrolment and verification process and encrypt the key along with the own face attribute of the user to make the system more secure and authenticated. The robustness of the data is prevented and there is no cause of bug or intrusion occurs during the interval of data transmission. By this proposed work security, privacy, confidentiality and authenticity can be increased and provide authority only to the valid user to access the data using bio-crypto key.
- Published
- 2020
18. Minor Finger Knuckle Print Image Enhancement Using CLAHE Technique
- Author
-
Vijayanand Palanisamy and L. Sathiya
- Subjects
Matching (statistics) ,Biometrics ,Computer science ,business.industry ,Image quality ,media_common.quotation_subject ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Process (computing) ,Input device ,Adaptive histogram equalization ,Computer vision ,Quality (business) ,Artificial intelligence ,Noise (video) ,business ,media_common - Abstract
The overall recognition rate of a biometric authentic system is completely depends upon the input of an image quality. Nowadays the image qualities are besmirched by some reasons such as apprehending the image of input devices, underprivileged quality of an image, large enlightenment dissimilarities of the inside and outside environments, pixel intensity level, etc. In biometrics based recognition system various physical and behavioral traits are used for recognition purpose. Here considering minor finger knuckle print trait is secondhand for authentication process. The main issue of the MinorFKP system is the quality of an image is relatively poor level and matching level of the image is difficult due to poor image quality. Therefore the CLAHE method is applied to MinorFKP image enhancement. The values of an MSE, RMSE and PSNR that the CLAHE technique considerably improves the better quality of MinorFKP images and reducing noise and artifacts.
- Published
- 2020
19. Evaluation of Fingerprint Minutiae on Ridge Structure Using Gabor and Closed Hull Filters
- Author
-
Vijayanand Palanisamy, R. Anandha Jothi, J. Nithyapriya, and S. Aanjanadevi
- Subjects
Minutiae ,Wavelet ,Gabor filter ,Matching (graph theory) ,Computer science ,business.industry ,Fingerprint (computing) ,Fast Fourier transform ,Adaptive histogram equalization ,Pattern recognition ,Artificial intelligence ,Fingerprint recognition ,business - Abstract
Minutiae-based fingerprint recognition system is an important technique for person identification. Yet spurious and false minutiae are often occurred and it can be removed during the post-processing phase is passible. False minutiae will affect the accuracy of fingerprint matching process. Hence it is essential to decrease the false minutiae and increase the fingerprint authentication. Besides initially at the pre-processing the input fingerprint image is subjected to adaptive histogram equalization (AHE) followed by Gabor Filter (GF). Using Gabor filter to improve the given fingerprint in wavelet domain and restructure the fingerprint. Further the enhanced image subjected to binarization and thinning process. After successful pre-processing the minutiae set extracted by crossing number method while the existence of spurious minutiae lying on the boundaries of the fingerprint image. To overcome this problem in post-processing stage, the Graham’s Scan Algorithm (GSA) based closed hull filtering technique (CHFT) is successfully to remove the border minutiae. The studied closed hull filtering can be simply superposed to the fingerprint template, the accuracy of filtered minutiae evaluated by Goodness Index (GI) value calculated through manually. Thus the post-processing method, the Graham’s scan algorithm applied on fingerprint minutiae points(vertex) proved mathematically, The investigational results of the projected algorithm was verified on FVC2002and 2004 fingerprint database DBI.
- Published
- 2020
20. A robust and efficient fingerprint minutiae extraction in post-processing algorithm
- Author
-
Vijayanand Palanisamy and R. Anandha Jothi
- Subjects
Computer science ,business.industry ,Applied Mathematics ,Extraction (chemistry) ,Pattern recognition ,Computer Vision and Pattern Recognition ,Artificial intelligence ,Electrical and Electronic Engineering ,Fingerprint recognition ,business ,Computer Science Applications - Published
- 2022
21. Optimal test suite selection in regression testing with testcase prioritization using modified Ann and Whale optimization algorithm
- Author
-
Vijayanand Palanisamy, P. Ramanathan, and S. K. Harikarthik
- Subjects
Source code ,Computer Networks and Communications ,business.industry ,Computer science ,media_common.quotation_subject ,020206 networking & telecommunications ,Context (language use) ,02 engineering and technology ,computer.software_genre ,Fault detection and isolation ,Test (assessment) ,Statistical classification ,Software ,Test case ,System under test ,Regression testing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Data mining ,business ,computer ,media_common - Abstract
Fault detection during testing can provide faster feedback on the system under test and permit software engineers begin correcting faults earlier. One application of prioritization technique involves regression testing for retesting of software following modifications. In this context, prioritization technique can take advantage of information gathered about the previous execution of test cases to obtain test case orderings. Test case prioritization techniques schedule test cases in an order that increases their effectiveness in meeting certain performance goals. Regression testing makes sure that up gradation of software in terms of adding new features or for bug fixing purposes should not hamper previously working functionalities. Whenever a software is upgraded or modified, a set of test cases are run on each of its functions to assure that the change to that function is not affecting other parts of the software that were previously running flawlessly.Our proposed regression test case prioritization research initially generates test cases. Then the generated test cases are clustered with the aid of kernel fuzzy c-means clustering technique. The KFCM will cluster relevant and irrelevant test cases later the relevant test cases are considered for test case prioritization. The goal of test case prioritization is to determine test case ordering that maximizes the probability to discover faults in source code early. Here for test case prioritization Modified Artificial Neural Network classification algorithms are used. A Whale Optimization Algorithm is used for weight optimization process.
- Published
- 2017
22. Uncommon Anatomic Variation of Left Internal Mammary Artery: God-Created Y-Graft Conduit
- Author
-
Karthik Raman R, Bharath Kumar Mohandoss, Vijayanand Palanisamy, Anjith Prakash Rajakumar, Mithun Sundararaaja Ravikumar, and V M Kurian
- Subjects
Male ,Pulmonary and Respiratory Medicine ,Bypass grafting ,education ,Coronary Artery Disease ,030204 cardiovascular system & hematology ,03 medical and health sciences ,0302 clinical medicine ,Electrical conduit ,Rare case ,medicine ,Humans ,Mammary Arteries ,Third intercostal space ,Internal Mammary-Coronary Artery Anastomosis ,health care economics and organizations ,Left internal mammary artery ,business.industry ,Anatomic Variation ,Angiography ,Anatomy ,Middle Aged ,medicine.anatomical_structure ,030228 respiratory system ,Surgery ,Cardiology and Cardiovascular Medicine ,business ,Artery - Abstract
The left internal mammary artery is the most accepted and widely used conduit in coronary artery bypass grafting. This report presents a rare case of very early bifurcation of the left internal mammary artery at the level of the third intercostal space.
- Published
- 2020
23. Securing Data with Selective Encryption Based DAC Scheme for MANET
- Author
-
R. Anandha Jothi, Vijayanand Palanisamy, and J. Nithyapriya
- Subjects
Scheme (programming language) ,Computer science ,business.industry ,Mobile ad hoc network ,Encryption ,law.invention ,Energy conservation ,Set (abstract data type) ,law ,Data set (IBM mainframe) ,business ,Cryptanalysis ,computer ,Energy (signal processing) ,Computer network ,computer.programming_language - Abstract
MANETs consist of mobile nodes which can any time enter or exit from the network [16]. The no central admin set up of the MANET makes it more prone to attacks [5]. Sending much more secured data than any other networks is verily needed in MANETs since the mobile nodes consume a lot of energy for capturing signals and cryptanalysis of messages. Here we are presenting a security scheme that adorns selective encryption strategy and encrypts selective bit positions instead the entire data set. The scheme needs less computation capability while providing adequate security to the MANET nodes [15]. It provides better security compared to the existing selective encryption algorithms. Thus we manage safety as well energy conservation of mobile nodes.
- Published
- 2019
24. Porcine versus bovine bioprosthetic valves in mitral position: does choice really matter?
- Author
-
Anjith Prakash Rajakumar, Sivakumar Pandian, Ejaz Ahmed Sheriff, Karthik Raman, Valikapathalil Mathew Kurian, Jacob Jamesraj, Vijayanand Palanisamy, Rajan Sethuratnam, Ravi Agarwal, Bharat Kumar Mohandoss, and Anbarasu Mohanraj
- Subjects
Pulmonary and Respiratory Medicine ,medicine.medical_specialty ,business.industry ,medicine.medical_treatment ,Mitral valve replacement ,030204 cardiovascular system & hematology ,Vascular surgery ,medicine.disease ,Surgery ,Cardiac surgery ,03 medical and health sciences ,0302 clinical medicine ,030228 respiratory system ,Cardiothoracic surgery ,Infective endocarditis ,Concomitant ,Heart failure ,medicine ,Original Article ,Cardiology and Cardiovascular Medicine ,business ,Survival analysis - Abstract
BACKGROUND: Bioprosthetic valves are increasingly used for surgical mitral valve replacement (MVR). The long-term outcomes of bovine (BoMVR) vs porcine (PoMVR) remain an enigma regarding the durability. This study aims to examine the outcomes of BoMVR vs PoMVR. METHODS: A retrospective analysis of all bioprosthetic MVRs, with concomitant procedures, at a single tertiary referral institution from January 2005 to December 2008 was conducted. Procedures were classified as BoMVR or PoMVR. The age group was from 40 to 70 years. RESULTS: We identified 154 BoMVR patients and 120 PoMVR patients after matching the two groups with respect to age, sex, valve size and concomitant procedures. Kaplan-Meier survival analysis model was used for corresponding statistical analysis. Freedom from reoperation (all cause), freedom from non-structural valve deterioration, freedom from structural valve deterioration, freedom from heart failure and freedom from infective endocarditis were 96.4 ± 0.08, 97.1 ± 0.07, 96.4 ± 0.08%, 98.2 ± 0.07, and 98.6 ± 0.06% in PoMVR, respectively, and 92.6 ± 0.09, 91.6 ± 0.08, 90.6 ± 0.09, 94 ± 0.08, and 92.8 ± 0.08% in BoMVR groups, respectively, at the end of 10-year follow-up (mean follow up of 6.2 ± 2.3 years). Overall, 20 (12.9%) patients were lost to follow-up in the BoMVR and 15(12.5%) patients in the PoMVR groups for a global follow-up of 87.1%. CONCLUSIONS: For patients undergoing MVR with a bioprosthetic valve, the choice of PoMVR vs BoMVR favours more in favour of PoMVR as evidenced by the outcome results. Probably long-term follow-up with more patients might throw further light on the debatable topic.
- Published
- 2019
25. Trans-Sternal Repair of Incidentally Diagnosed Morgagni Hernia during Ventricular Septal Defect Closure in a Sickle Cell Trait Infant
- Author
-
Ravi Agarwal, Vijayanand Palanisamy, R Karthik Raman, and Sujatha Desai Indrajith
- Subjects
medicine.medical_specialty ,Sickle cell trait ,business.industry ,lcsh:RJ1-570 ,lcsh:Surgery ,lcsh:Pediatrics ,lcsh:RD1-811 ,medicine.disease ,Surgery ,Defect closure ,Pediatrics, Perinatology and Child Health ,Medicine ,Hernia ,business ,Letter to the Editor - Published
- 2019
26. Protecting Messages Using Selective Encryption Based ESI Scheme for MANET
- Author
-
R. Anandha Jothi, Vijayanand Palanisamy, and J. Nithyapriya
- Subjects
Scheme (programming language) ,Router ,SIMPLE (military communications protocol) ,business.industry ,Computer science ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Topology (electrical circuits) ,Mobile ad hoc network ,Encryption ,Routing (electronic design automation) ,business ,computer ,Computer network ,computer.programming_language - Abstract
Mobile ad hoc network is a group of mobile nodes which have no centralized administrator. MANETs have dynamic topology since the nodes are moving. For this reason it is more prone to attacks that any node may be a misbehaving node. Every node acts as a router thereby it may lead the network with wrong routing. For these reasons MANETs have to be more protected than the wired networks. The mobile nodes will lavishly consume energy and so a security scheme that consumes less energy still provides ample protection to the messages have to be introduced. Here we propose an encryption scheme for the messages passing through MANET. The security scheme is based on selective encryption that is very robust, simple and with less computational capability.
- Published
- 2019
27. Performance Improvement in Fingerprint Feature Extraction Using Minutiae Local Triangle Feature Set
- Author
-
R. Anandha Jothi, Vijayanand Palanisamy, and J. Nithyapriya
- Subjects
Minutiae ,business.industry ,Computer science ,Feature vector ,Feature extraction ,Pattern recognition ,Invariant (physics) ,Fingerprint recognition ,Impression ,ComputingMethodologies_PATTERNRECOGNITION ,Nonlinear distortion ,Artificial intelligence ,Performance improvement ,business - Abstract
Minutiae-based fingerprint recognition is a challenging problem, mostly due poor quality of the sensing image, large nonlinear distortion among dissimilar impressions of similar fingerprint and several common transactions. Those problems make poor feature extraction and matching. Most of the fingerprint matching system is constructed on minutiae-based feature vector. The minutiae position, size and direction of the fingerprint impression must be invariant to scaling and rotation. Such distortion problems are generated by the image capturing devices; in this study the scanned fingerprint image is subjected to feature extraction and minutiae evaluation. In the feature extracting stage image pre-processing, minutiae extraction is accomplished and in the minutiae evaluation stage the original minutiae was evaluated. The scope of this work is to attain invariance by extracting the characteristics based on the spatial connection between minutiae points. We suggest four minutiae based structural local feature vectors, at the same time it is expected to fulfill at least two necessary feature vector properties. These feature vector descriptions support in solving the spurious and missing minutiae problems and hence help us develop a robust person authentication system. The performance improvement of the proposed system is evaluated by Goodness of Index (GI) GI values. These techniques achieve effectiveness with the help of FVC databases.
- Published
- 2019
28. An Improved Method for Generating Biometric-Cryptographic System from Face Feature
- Author
-
S. Aanjanadevi, S. Aanjankumar, and Vijayanand Palanisamy
- Subjects
Password ,Biometrics ,Computer science ,business.industry ,Feature extraction ,Cryptography ,Computer security ,computer.software_genre ,Encryption ,Strong cryptography ,Encoding (memory) ,The Internet ,business ,computer - Abstract
One of the most difficult tasks in networking is to provide security to data during transmission, the main issue using network is lack of security. Various techniques and methods had been introduced to satisfy the needs to enhance the firmness of the data while transmitting over internet. Due to several reasons and intruders the mechanism of providing security becomes a tedious task. At first conventional passwords are used to provide security to data while storing and transmitting but remembering the password quite confusing and difficult for the user to access the data. After that cryptography methodology is introduced to protect the data from the intruders by converting readable form of data into unreadable data by encryption process. Then the data is processed and received the receiver can access the original data by the reverse process of encryption called decryption. The processes of encoding have broken by intruders using various combinations of keys. In this proposed work strong encryption key can be generated by combining biometric and cryptography methods for enhancing firmness of data. Here biometric face image is pre-processed at initial stage then facial features are extracted to generate biometric-cryptographic key. After generating bio-crypto key data can be encrypted along with newly produced key with 0's or 1's bit combination and stored in the database. By generating bio-crypto key and using them for transmitting or storing the data the privacy and firmness of the data can be enhanced and by using own biometrics as key the process of hacking and interfere of intruders to access the data can be minimized.
- Published
- 2019
29. Minor finger knuckle print image edge detection using second order derivatives
- Author
-
Vijayanand Palanisamy and L. Sathiya
- Subjects
Authentication ,Biometrics ,business.industry ,Computer science ,Image segmentation ,Edge detection ,Knuckle ,medicine.anatomical_structure ,Fingerprint ,medicine ,Preprocessor ,Segmentation ,Computer vision ,Artificial intelligence ,business - Abstract
Biometrics means an authentication of the person's Physiological and Behavioral Characteristics. One of the key steps in biometric based authentication is verification and identification. In physiological and behavioral based authentications are carried out using different traits such as fingerprint, finger vein, finger knuckle, iris, voice, handwriting, keystrokes, ear, EEG, ECG signals, etc. In these traits Minor finger knuckle print means backside of the finger surface and its very cheapest and easiest one for authentication system. First and second minor finger knuckle images has lot of thin lines and creases but it is not easily visible to the system for substantiation process. To overcome the above drawback image pre - processing step is very essential. Image preprocessing step segmentation is a one of the important portion. Edge detection is a pre-step of segmentation which is directly cut all the significant edges from the image correctly. In this proposed work to cut the first and second minor finger knuckle print image edges using diverse edge detection techniques. The second order derivatives are yields better results compare than first order derivatives and it's suitable for noisy Images. The output of the edge detection results are measured by various parameters such as MSE, RMSE and PSNR. According to the measurement parameters second order derivatives which give better results comparing with other datasets.
- Published
- 2019
30. Weight gain potential-a neglected entity during valve replacement
- Author
-
Ejaz Ahmed Sheriff, Karthik Raman, Vijayanand Palanisamy, Jacob Jamesraj, Anjith Prakash Rajakumar, Rajan Sethuratnam, V M Kurian, and Anbarasu Mohanraj
- Subjects
Pulmonary and Respiratory Medicine ,medicine.medical_specialty ,medicine.medical_treatment ,Hemodynamics ,030204 cardiovascular system & hematology ,03 medical and health sciences ,0302 clinical medicine ,Valve replacement ,Internal medicine ,medicine.artery ,medicine ,business.industry ,Mitral valve replacement ,Surgery ,Cardiac surgery ,Blood pressure ,030228 respiratory system ,Cardiothoracic surgery ,Pulmonary artery ,Cardiology ,Original Article ,medicine.symptom ,Cardiology and Cardiovascular Medicine ,business ,Weight gain - Abstract
INTRODUCTION: During valve replacement, appropriate valve size will be chosen based on many factors, neglecting the potential of the patient for gaining weight. We aimed at evaluating the weight gain potential and its effect on hemodynamics in post mitral valve replacement (MVR) patients. MATERIAL AND METHODS: In 118 post-MVR patients, demographic and echocardiographic data at the time of discharge and follow-up were obtained and analyzed. Primary aim of study is to analyze the hemodynamics of patients based on weight gain/loss. Secondary aim is to evaluate the same in patient-prosthesis mismatch (PPM) subgroup and to evaluate the study population for the potential to gain/loss weight. RESULTS: Among 118 patients, 87 patients (73.7%) gained weight. In 87 weight gained patients, left atrial (LA) size (p = 0.011) and pulmonary artery systolic (PA) pressure (p = 0.028) at follow-up were significantly elevated than the discharge values. Among 53 PPM patients (incidence, 44.9%), 34 patients gained weight and their PA pressure was found to be elevated at follow-up (p = 0.021) whereas weight lost group does not show any significant difference (p = 0.972). Frequency of weight gain was more among patients who weighed
- Published
- 2019
31. Role of surgical ventricular restoration post surgical treatment of heart failure (STICH) trial
- Author
-
Anbarasu Mohanraj, Karthik Raman, Mithun Sundararaaja Ravikumar, Mullasari S. Ajit, Rajan Sethuratnam, Jacob Jamesraj, Vijayanand Palanisamy, V M Kurian, and Anjith Prakash Rajakumar
- Subjects
Pulmonary and Respiratory Medicine ,medicine.medical_specialty ,Ejection fraction ,Ischemic cardiomyopathy ,business.industry ,030204 cardiovascular system & hematology ,Vascular surgery ,medicine.disease ,Cardiac surgery ,Surgery ,03 medical and health sciences ,0302 clinical medicine ,medicine.anatomical_structure ,030228 respiratory system ,Cardiothoracic surgery ,Heart failure ,cardiovascular system ,medicine ,Original Article ,cardiovascular diseases ,Cardiology and Cardiovascular Medicine ,business ,Survival analysis ,Artery - Abstract
OBJECTIVE: To compare the outcomes of isolated coronary artery bypass grafting (CABG) versus surgical ventricular restoration (SVR) with or without CABG for patients with ischemic cardiomyopathy (ICM). METHODS: Retrospectively, 49 patients with ICM and severe LV dysfunction (LVEF
- Published
- 2018
32. A rare presentation of intrapericardial hematoma 20 months post aortic valve replacement
- Author
-
Suresh Kumar Sangili, Sivakumar Pandian, Vijayanand Palanisamy, Ezhilan Janakiraman, Mullasari Ajit Sankardas, Jacob Jamesraj, and Khadhar Mohamed Sarjun Basha
- Subjects
Male ,Aortic valve ,medicine.medical_specialty ,Time Factors ,RD1-811 ,Pleural effusion ,Case Report ,Postoperative Hemorrhage ,Diagnosis, Differential ,Hematoma ,Aortic valve replacement ,medicine ,Humans ,Pericardium ,Diseases of the circulatory (Cardiovascular) system ,Chronic expanding hematoma ,Congestive cardiac failure ,Heart Valve Prosthesis Implantation ,business.industry ,Calcinosis ,Aortic Valve Stenosis ,Middle Aged ,medicine.disease ,Surgery ,medicine.anatomical_structure ,Echocardiography ,Ventricle ,Aortic Valve ,Aortic valve stenosis ,RC666-701 ,Pulmonary venous hypertension ,Radiology ,Tomography, X-Ray Computed ,Cardiology and Cardiovascular Medicine ,business ,Follow-Up Studies - Abstract
We report the successful treatment of a rare case of chronic intrapericardial hematoma which presented with congestive cardiac failure 20 months after aortic valve replacement surgery for severe calcific aortic stenosis. Chest roentgenograph demonstrated paracardiac mass over lower left ventricle border, left pleural effusion and pulmonary venous hypertension. An echocardiographic study demonstrated intrapericardial mass posterolateral to left ventricle compressing left ventricular cavity both during systole and diastole causing septum to bulge into right ventricle. Computed tomography showed a loculated pericardial mass in left heart margin, left pleural effusion, bilateral axillary and mediastinal lymphadenopathy. Surgical resection was planned to relieve the symptoms and to confirm the diagnosis of the mass. The mass was completely resected through left anterolateral thoracotomy and histopathology findings confirmed the diagnosis of hematoma with cystic degeneration. Postoperative course was uneventful, and his symptoms improved markedly.
- Published
- 2015
33. Tramadol: a valuable treatment for pain in Southeast Asian countries
- Author
-
Vijayan,Ramani, Afshan,Gauhar, Bashir,Khalid, Cardosa,Mary, Chadha,Madhur, Chaudakshetrin,Pongparadee, Hla,Khin Myo, Joshi,Muralidhar, Javier,Francis, Kayani,Asif Gul, Musba,Andi Takdir, Nimmaanrat,Sasikaan, Pantjawibowo,Dwi, Que,Jocelyn C, Vijayanand,Palanisamy, Vijayan,Ramani, Afshan,Gauhar, Bashir,Khalid, Cardosa,Mary, Chadha,Madhur, Chaudakshetrin,Pongparadee, Hla,Khin Myo, Joshi,Muralidhar, Javier,Francis, Kayani,Asif Gul, Musba,Andi Takdir, Nimmaanrat,Sasikaan, Pantjawibowo,Dwi, Que,Jocelyn C, and Vijayanand,Palanisamy
- Abstract
Ramani Vijayan,1 Gauhar Afshan,2 Khalid Bashir,3 Mary Cardosa,4 Madhur Chadha,5 Pongparadee Chaudakshetrin,6 Khin Myo Hla,7 Muralidhar Joshi,8 Francis O Javier,9 Asif Gul Kayani,10 Andi Takdir Musba,11 Sasikaan Nimmaanrat,12 Dwi Pantjawibowo,13 Jocelyn C Que,14 Palanisamy Vijayanand15 1Department of Anaesthesiology, University Malaya Medical Centre, Kuala Lumpur, Malaysia; 2Department of Anaesthesiology, The Aga Khan University, Karachi, Pakistan; 3Department of Anaesthesia, Hameed Latif Hospital, Lahore, Pakistan; 4Department of Anaesthesiology, Hospital Selayang, Selangor, Malaysia; 5Department of Pain Medicine, Primus Hospital and Fortis Group of Hospitals, New Delhi, India; 6Pain Management Clinic, Department of Anesthesiology, Siriraj Hospital, Mahidol University, Bangkok, Thailand; 7Department of Physical Medicine & Rehabilitation, Yangon General Hospital, University of Medicine-1, Yangon, Myanmar; 8Department of Anaesthesia & Pain Medicine, Virinchi Hospitals, Hyderabad, India; 9Pain Management Center, St Luke’s Medical Center, Metro Manila, Philippines; 10Department of Anesthesiology, Kulsum International Hospital, Islamabad, Pakistan; 11Department of Anesthesiology, Faculty of Medicine, Hasanuddin University, Makassar, Indonesia; 12Department of Anesthesiology, Faculty of Medicine, Prince of Songkla University, Hatyai, Songkhla, Thailand; 13Department of Anesthesiology, Intensive Therapy, and Hospital Pain Management, Premier Bintaro Hospital, South Tangerang, Indonesia; 14Center for Pain Medicine, Department of Anesthesiology, Faculty of Medicine and Surgery, University of Santo Tomas, Manila, Philippines; 15Pain Management Department, Sri Ramakrishna Hospital, Coimbatore, Tamil Nadu, India Background: The supply of controlled drugs is limited in the Far East, despite the prevalence of health disorders that warrant their prescription. Reasons for this include strict regulatory frameworks, limited financial resources, lack of appro
- Published
- 2018
34. Conventional radiofrequency ablation of sphenopalatine ganglion for the treatment of cluster headache
- Author
-
Senthil Kumar Raju, Sudhindra Dharmavaram, Asokan Kondappan, and Vijayanand Palanisamy
- Subjects
medicine.medical_specialty ,Percutaneous ,Cluster headache ,Radiofrequency ablation ,First line ,Industrial and Manufacturing Engineering ,lcsh:RC346-429 ,law.invention ,03 medical and health sciences ,0302 clinical medicine ,law ,medicine ,030212 general & internal medicine ,sphenopalatine ganglion ,lcsh:Neurology. Diseases of the nervous system ,business.industry ,Neurovascular bundle ,medicine.disease ,Surgery ,Ganglion ,medicine.anatomical_structure ,Anesthesia ,Autonomic symptoms ,radiofrequency ablation ,business ,Surgical interventions ,030217 neurology & neurosurgery - Abstract
Cluster headache is a primary neurovascular unilateral headache associated with autonomic symptoms. The sphenopalatine ganglion plays an important role in the pathogenesis of this disorder. Although medications are the first line of treatment, percutaneous, and surgical interventions have been proposed to treat cluster headache. An attractive option is the radiofrequency ablation of the sphenopalatine ganglion for the treatment of cluster headache due to its relative safety and simplicity compared with other procedures.
- Published
- 2016
35. A Novel Intrusion Detection Model for Mobile Ad-Hoc Networks using CP-KNN
- Author
-
M. Lalli and Vijayanand Palanisamy
- Subjects
Computer Networks and Communications ,Computer science ,Network security ,business.industry ,Node (networking) ,Intrusion detection system ,Mobile ad hoc network ,computer.software_genre ,Set (abstract data type) ,Network management ,Hardware and Architecture ,Anomaly detection ,False positive rate ,Data mining ,business ,computer ,Computer network - Abstract
Mobile ad-hoc network security problems are the subject of in depth analysis. A group of mobile nodes area unit connected to a set wired backbone. In MANET, the node themselves implement the network management in a very cooperative fashion. All the nodes area unit accountable to create a constellation that is dynamically, modification it and conjointly the absence of any clear network boundaries. We tend to project a completely unique intrusion detection model for mobile ad-hoc network victimization. CP-KNN (Conformal Prediction K-Nearest Neighbor) algorithmic rule is to classify the audit knowledge for anomaly detection. The non-conformity score worth is employed to cut back the classification period of time for multi level iteration. It is effectively notice anomalies with high true positive rate, low false positive rate and high confidence that the progressive of assorted anomaly detection ways. Additionally it is interfered by “noisy” knowledge (unclean data), the projected technique is strong, effective and conjointly it retains its smart detection performance and to avoid the abnormal activity.
- Published
- 2014
36. Tramadol: a valuable treatment for pain in Southeast Asian countries
- Author
-
Vijayan, Ramani, primary, Afshan, Gauhar, additional, Bashir, Khalid, additional, Cardosa, Mary, additional, Chadha, Madhur, additional, Chaudakshetrin, Pongparadee, additional, Hla, Khin Myo, additional, Joshi, Muralidhar, additional, Javier, Francis, additional, Kayani, Asif Gul, additional, Musba, Andi Takdir, additional, Nimmaanrat, Sasikaan, additional, Pantjawibowo, Dwi, additional, Que, Jocelyn C, additional, and Vijayanand, Palanisamy, additional
- Published
- 2018
- Full Text
- View/download PDF
37. Automatic Service Graph Generation for Service Composition in Wireless Sensor Networks
- Author
-
K. Baskaran, V. Vanitha, and Vijayanand Palanisamy
- Subjects
Service layer ,Tiered service ,Service delivery framework ,Computer science ,business.industry ,Distributed computing ,Service discovery ,General Medicine ,Mobile QoS ,Differentiated service ,Service provider ,service composition ,service oriented architecture ,Data as a service ,business ,wireless sensor networks ,service graph ,Engineering(all) ,Computer network - Abstract
Service Oriented Architecture has gained significant attention as programming model for heterogeneous wireless sensor networks. Its key idea is to exploit the decoupling of service providers and consumers to enable platform independent applications that are dynamically bound to platform specific services. The promise of service oriented architecture is to enable the composition of new distributed applications/solutions: when no available service can satisfy a client request, available services can be composed in order to satisfy such a request. In this paper we explore a simple approach to create service graph on-demand for service composition in service oriented wireless sensor network based on input/output dependency between services. The proposed algorithm ASSG (Automatic Service Graph Generation) discovers abstract services that satisfies user constraints and identifies the relationship between these services. Based on this service graph is generated. The application of this method is discussed with an example. Simulation results prove that our proposed algorithm increases success ratio and reduces service composition time.
- Published
- 2012
- Full Text
- View/download PDF
38. An Efficient Cluster Based Approach for Multi-Source Multicast Routing Protocol in Mobile Ad Hoc Networks
- Author
-
Vijayanand Palanisamy and R. Pandi Selvam
- Subjects
Zone Routing Protocol ,Dynamic Source Routing ,Protocol Independent Multicast ,Multicast ,Computer Networks and Communications ,business.industry ,Computer science ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Distance Vector Multicast Routing Protocol ,Wireless Routing Protocol ,ODMRP ,Optimized Link State Routing Protocol ,Hardware and Architecture ,business ,Computer network - Abstract
Mobile ad hoc networks are becoming an important concept of modern communication technologies and services. It provides some advantages to this communication world such as self-organizing and decentralization. In this paper, we are going to design a cluster-based multi source multicast routing protocol with new cluster head election, path construction and maintenance techniques. The main objective of this work to compute the maximum performance of proposed routing protocol in various environments, and also it has been compared with Multicast Ad-hoc On-Demand Distance Vector (MAODV) and On-Demand Multicast Routing Protocol (ODMRP) to prove the performance of delivery ratio, control overhead and forwarding efficiency.
- Published
- 2011
39. A Global QoS-Aware Service Composition in Wireless Sensor Networks
- Author
-
V. Vanitha and Vijayanand Palanisamy
- Subjects
business.industry ,computer.internet_protocol ,Computer science ,Quality of service ,Distributed computing ,Service-oriented architecture ,Service provider ,Network dynamics ,Network performance ,The Internet ,business ,computer ,Wireless sensor network ,Computer network - Abstract
Wireless sensor networks (WSN) present a challenging programming environment because of their limited resources, heterogeneity and highly dynamic nature. Service oriented computing (SOC) can simplify application development by hiding platform-specific capabilities behind services. Their services are dynamically discovered and used at run time, enabling application to be platform independent and adapt to network dynamics. While service-oriented computing is widely used on the internet, adapting it to WSNs is non-trivial due to the extremely limited resource available. The selection of which service provider to use and how to adapt as provider change significantly impacts application and network performance. In this paper, we present a global QoS optimizing and multiobjective service composition algorithm based on the construction of convex hull. Simulation experiments were conducted to show the efficiency of the proposed algorithm.
- Published
- 2010
40. Estimation based Efficient and Resilient Hierarchical In-Network Data Aggregation Scheme for Wireless Sensor Network
- Author
-
Vijayanand Palanisamy, K. Baskaran, K. Swathithya, and N. Chitradevi
- Subjects
Key distribution in wireless sensor networks ,business.industry ,Network packet ,Computer science ,Data integrity ,Outlier ,Aggregate (data warehouse) ,business ,Wireless sensor network ,Energy (signal processing) ,Computer network - Abstract
In a large sensor network, in-network data aggregation is inherently used as a communication paradigm which reduces the number of packets transmitted and hence the energy consumed. However the unattended and hostile operation of sensor network makes the system vulnerable to node compromise attack. The compromised nodes can inject false data in to the network which deteriorates the accuracy of the aggregate data. So the research on resilient data aggregation with a focus on data integrity and accuracy becomes a major issue. In this paper, we propose a statistical based robust estimate to design a resilient in-network aggregation scheme which detects and isolates the outliers from computed aggregate value. Simulation results demonstrate that our approach provides a powerful mechanism for detecting outliers even in the presence of multiple compromised nodes.
- Published
- 2010
41. Enhancement ofregression testing using genetic data generation and test case prioritization using m-ACO technique
- Author
-
P. Ramanathan, S. K. Harikarthik, and Vijayanand Palanisamy
- Subjects
Prioritization ,Environmental Engineering ,Hardware and Architecture ,Computer science ,General Chemical Engineering ,General Engineering ,Computer Science (miscellaneous) ,Genetic data ,Data mining ,computer.software_genre ,computer ,Biotechnology ,Test (assessment) - Abstract
The changes that occur during the software development process is rapid. Hence software has to undergo modification frequently. Due to this modification,the cost for testing increases due to repetitive retesting. This retesting process is called as the regression testing. Modification made in the single test case will make the side effect in all other related test cases. In order to overcome this problem all the test cases have to be retested again and again whenever the changes are incorporated in the software. But testing all the test cases is time consuming and will also increase the cost of testing. To address this problem, this work focuses on providing priority to the test cases. Test case which had more effect to changes is assigned with higher priority and the test case which had the less effect to changes is assigned lower priority. For test case prioritization, we employ m-ACO (Modified Ant colony optimization) method.Test case prioritization is done in two ways namely “Triangle classification problem” and “Quadratic Equation Problem”. Flow of the data in the test case is done by Genetic Algorithm. This identifies the changed code in the program under test. It identifies both indirectly and directly affected def-use association in the modified part of the software by using forward walk algorithm and backward walk algorithm.
- Published
- 2017
42. Genetic based sensorless hybrid intelligent controller for strip loop formation control between inter-stands in hot steel rolling mills
- Author
-
S. Thangavel, Vijayanand Palanisamy, and K. Duraiswamy
- Subjects
Engineering ,business.industry ,Wear and tear ,Applied Mathematics ,Process (computing) ,Open-loop controller ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Fuzzy control system ,Fuzzy logic ,Computer Science Applications ,Control and Systems Engineering ,Control theory ,Control system ,Electrical and Electronic Engineering ,Strip mill ,business ,Instrumentation - Abstract
Safe operating environment is essential for all complex industrial processes. The safety issues in steel rolling mill when the hot strip passes through consecutive mill stands have been considered in this paper. Formation of sag in strip is a common problem in the rolling process. The excessive sag can lead to scrap runs and damage to machinery. Conventional controllers for mill actuation system are based on a rolling model. The factors like rise in temperature, aging, wear and tear are not taken into account while designing a conventional controller. Therefore, the conventional controller cannot yield a requisite controlled output. In this paper, a new Genetic-neuro-fuzzy hybrid controller without tension sensor has been proposed to optimize the quantum of excessive sag and reduce it. The performance of the proposed controller has been compared with the performance of fuzzy logic controller, Neuro-fuzzy controller and conventional controller with the help of data collected from the plant. The simulation results depict that the proposed controller has superior performance than the other controllers.
- Published
- 2008
43. Epigenetics, pain, and analgesia
- Author
-
Sivaraman, Krishnan, primary and Vijayanand, Palanisamy, additional
- Published
- 2017
- Full Text
- View/download PDF
44. Intrusion detection for MANET to detect unknown attacks using Genetic algorithm
- Author
-
Vijayanand Palanisamy and M. Lalli
- Subjects
Computer science ,Anomaly-based intrusion detection system ,Distributed computing ,Scalability ,Genetic algorithm ,Feature selection ,Anomaly detection ,Intrusion detection system ,False positive rate ,Mobile ad hoc network - Abstract
Traditional intrusion detection have a trouble dealing with lack of secure boundaries, threats from compromised nodes, lack of centralized management facility, restricted power supply and scalability. Due to these issues, we are motivated to propose efficient IDS, which involve a new technique to identify the anomalous activities in mobile ad-hoc networks. During this paper, we propose a Genetic based feature selection and rule evaluation process for anomaly detection. This process is effectively classified with new rules and also increases with high positive rate alarm. The new findings of our proposed work is effectively notice the anomalies with low false positive rate, high detection rate and attain the upper detection accuracy.
- Published
- 2014
45. An optimized cluster based approach for multi-source multicast routing protocol in mobile ad hoc networks with differential evolution
- Author
-
R. Pandi Selvam and Vijayanand Palanisamy
- Subjects
Routing protocol ,Dynamic Source Routing ,Computer science ,Wireless ad hoc network ,Distributed computing ,Enhanced Interior Gateway Routing Protocol ,Wireless Routing Protocol ,Distance Vector Multicast Routing Protocol ,Xcast ,Destination-Sequenced Distance Vector routing ,Zone Routing Protocol ,Adaptive quality of service multi-hop routing ,Multicast ,Protocol Independent Multicast ,Inter-domain ,Network packet ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mobile ad hoc network ,Ad hoc wireless distribution service ,Source-specific multicast ,Link-state routing protocol ,Optimized Link State Routing Protocol ,Geocast ,business ,Computer network - Abstract
This paper presents a new; cluster based multicast routing protocol with some upgrading features such as multiple sources, less redundancy in packet delivery and better forwarding efficiency in mobile ad hoc networks. In this proposed work we have used the differential evolution algorithm for the cluster and hence cluster heads optimization. To prove the proposed routing protocol performance which has been simulated in NS2 and that results are proved that better delivery ratio, control overhead and forwarding efficiency as the function of increasing multicast sources and destinations.
- Published
- 2012
46. Designing an efficient PCA based data model for wireless sensor networks
- Author
-
K. Baskaran, D. Aswini, N. Chitradevi, and Vijayanand Palanisamy
- Subjects
Computer science ,business.industry ,Node (networking) ,Real-time computing ,computer.software_genre ,Data aggregator ,Key distribution in wireless sensor networks ,Transmission (telecommunications) ,Data model ,Outlier ,Computer Science::Networking and Internet Architecture ,Wireless ,Data mining ,business ,Wireless sensor network ,computer - Abstract
Recent technology in wireless communication has enabled the development of low-cost sensor networks. Sensors at different locations can generate streaming data, which can be analyzed in real-time to identify events of interest. Wireless sensor networks (WSNs) usually have limited energy and transmission capacity, which cannot match the transmission of a large number of data collected by sensor nodes. So, it is necessary to perform in-network data aggregation in the WSN which is performed by aggregator node. Since, the nodes in WSN are vulnerable to malicious attackers and physical impairment; the data collected in WSNs may be unreliable. So, in this paper, we propose an efficient model based technique to detect the unreliable data. Data model is designed using the sound statistical multivariate technique called Principal Component Analysis (PCA). But as a drawback, it is not robust to outliers. Hence, if the input data is corrupted, an arbitrarily wrong representation is obtained. To overcome this problem, we propose two approaches namely Minimum Volume Ellipsoid (MVE) and Minimum Covariance Determinant (MCD) to design robust PCA which aids in design of a noise-free data model. The performance of proposed approach is evaluated and compared with previous approaches and found that our approach is effective and efficient.
- Published
- 2011
47. A cluster based multi-source multicast routing protocol using genetic algorithm for mobile ad hoc networks
- Author
-
Vijayanand Palanisamy and R. Pandi Selvam
- Subjects
Protocol Independent Multicast ,Multicast ,business.industry ,Computer science ,computer.internet_protocol ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Distance Vector Multicast Routing Protocol ,Source-specific multicast ,ODMRP ,IP multicast ,Xcast ,business ,computer ,Pragmatic General Multicast ,Computer network - Abstract
Ad hoc networks are wireless, infrastructureless, multi-hop and dynamic networks, established by a collection of mobile nodes which provide envisioned applications and features to the modern communication technologies and services. Multicast is a type of routing scheme, which transmit datagram's to a set of desirable destinations identified by a single address which can efficiently support a variety of applications and services. Most of existing multicast routing protocols in MANETs consider only one source in a multicast group and become extended to multi-source multicasting. In this paper, we proposed a cluster-based multicast routing protocol with the use of genetic algorithm to provide efficient multicasting for ad hoc networks in multicast environment. The simulation composed with 200 mobile nodes with both single active multicast cluster and multiple active multicast clusters. This proposed cluster-based routing preserve forwarding efficiency as well as robustness due to this cluster structure and maintenance. Moreover, to prove the proposed approach performance which has compared with ODMRP routing protocol for delivery ratio, control overhead and forwarding efficiency in the different multicast effects such as increasing number of sources and receivers in the network.
- Published
- 2011
48. An efficient cluster-based multi-source Multicast Routing Protocol in mobile ad hoc networks
- Author
-
R. Pandi Selvam and Vijayanand Palanisamy
- Subjects
Dynamic Source Routing ,Zone Routing Protocol ,Protocol Independent Multicast ,Computer science ,business.industry ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wireless Routing Protocol ,Distance Vector Multicast Routing Protocol ,Ad hoc wireless distribution service ,ODMRP ,Optimized Link State Routing Protocol ,business ,Computer network - Abstract
Mobile ad hoc networks are becoming an important concept of modern communication technologies and services. It provides some advantages to this communication world such as self-organizing and decentralization. In this paper, we are going to design a cluster-based multi source multicast routing protocol with new cluster head election, path construction and maintenance techniques. The main objective of this work to compute the maximum performance of proposed routing protocol in various environments, and also it has been compared with On-Demand Multicast Routing Protocol (ODMRP) to prove the better performance of delivery ratio, control overhead and forwarding efficiency.
- Published
- 2010
49. An Ant Colony based Hybrid Intelligent Controller for looper tension in steel rolling mills
- Author
-
S. Thangavel, Vijayanand Palanisamy, S. Chenthur Pandian, and K. Duraiswamy
- Subjects
Engineering ,Nonlinear system ,Neuro-fuzzy ,business.industry ,Control theory ,Ant colony optimization algorithms ,Control engineering ,Fuzzy control system ,Ant colony ,business ,Intelligent control ,Fuzzy logic - Abstract
Strip tension control is crucial in the tandem finishing mills for its safe operation. Most of the industrial applications are of nonlinear. Fuzzy logic controller is the most useful approach to achieve the adaptive ness in the case of nonlinear system. Since fuzzy logic control provides a systematic method of incorporating human expertise and implementing nonlinear system. Neural networks are integrated with fuzzy logic which forms a neuro fuzzy system. To get a desired solution from the vagueness of the problem, an ant colony system (ACS) is implemented. The nature of search of food by the real antpsilas colony to find the food from its source (i.e. nest), to its destination (i.e. food) is known as ACS. The same foraging behavior of ants can be used to determine the optimal solution for the membership functions of FLC and hence form the hybrid intelligent controller (HIC). This paper demonstrates the effectiveness of HIC in optimizing the looper height in steel rolling mills compared with conventional controllers, FLC. The simulation result depicts that HIC quickly restore the speed of the main drive and hence looper height is quickly reduced to its optimal (zero) value which intern ensures the safety working condition of steel rolling mills.
- Published
- 2006
50. A Hybrid Intelligent Controller for Control of Strip Tension and Looper Height in Tandem Finishing Mill
- Author
-
Vijayanand Palanisamy, K. Duraiswamy, S. Chenthur Pandian, and S. Thangavel
- Subjects
Engineering ,Nonlinear system ,Artificial neural network ,Neuro-fuzzy ,Control theory ,business.industry ,Genetic algorithm ,Control engineering ,Fuzzy control system ,business ,Intelligent control ,Fuzzy logic - Abstract
Strip tension control is crucial in the tandem finishing mills for its safe operation. Most of the industrial applications are of nonlinear. Fuzzy logic controller is the most useful approach to achieve the adaptive ness in the case of nonlinear system. Since fuzzy logic control provides a systematic method of incorporating human expertise and implementing non-linear system. Neural networks are integrated with fuzzy logic which forms a neuro fuzzy system. Genetic algorithm is used to search optimal fuzzy rules and membership functions of neuro fuzzy system in order to give optimal output and hence form the hybrid intelligent controller (HIC). This paper demonstrates the effectiveness of HIC in optimizing the looper height in steel rolling mills compared with conventional controllers, FLC. The simulation result depicts that HIC quickly restore the speed of the main drive and hence looper height is quickly reduced to its optimal (zero) value which intern ensures the safety working condition of steel rolling mills.
- Published
- 2006
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.