Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Robust Touch-Free Palm Vein Sensor Authentication System

    Palm vein authentication systems have become an increasingly popular biometric technology in recent years due to their high accuracy and convenience. This technology uses near-infrared light to capture the uni...

    Vijayakumar Ponnusamy, R. Madhava in Proceedings of the International Conferenc… (2024)

  2. Article

    RETRACTED ARTICLE: Continuous Activity-Aware Stress Detection Using Sensors

    T. Karthick, M. Sangeetha, M. Ramprasath in Wireless Personal Communications (2022)

  3. No Access

    Article

    Load Balancing: DCN Servers based on Regression Analysis During Heavy and Frequent Messages

    Data center network (DCN) consists of server-farms and provides various services, which includes software, storage and applications. DCN uses software-defined networking (SDN) to centralize control for enhanci...

    G. Sulthana Begam, M. Sangeetha, N. R. Shanker in Wireless Personal Communications (2022)

  4. No Access

    Article

    A Consortium Blockchain Based Overseas Fund Transfer System

    Domestic fund transfers are all the time immediate, handier and obtainable however in overseas fund transfer, funds are transferred from payers account to payees account through the correspondent banks, centra...

    Pradnya Patil, M. Sangeetha, Vidhyacharan Bhaskar in Wireless Personal Communications (2022)

  5. No Access

    Article

    Blockchain for IoT Access Control, Security and Privacy: A Review

    In modern era, blockchain technology is gaining a major attention among researchers and scientists for different scopes such as access control, data security, privacy and decentralization of the wireless netwo...

    Pradnya Patil, M. Sangeetha, Vidhyacharan Bhaskar in Wireless Personal Communications (2021)

  6. No Access

    Article

    Fair Adaptive Cross-Layer Resource Allocation Scheme for IEEE 802.16 Broadband Wireless Networks

    In a WiMAX network, the Medium Access Control (MAC) protocol deals with resource allocation to different types of traffic. The key components that ensure Quality of Service (QoS) guarantees in a WiMAX network ...

    M. Deva Priya, M. Sangeetha, A. Christy Jeba Malar in Wireless Personal Communications (2021)

  7. No Access

    Article

    Improved Non-coherent Communication Systems Using Noise Reduction Chaotic ON–OFF Keying (NR-COOK) Techniques

    The major drawback of the conventional chaotic ON–OFF keying (COOK) scheme is that the transmitted signal energy is not constant due to the non-periodic nature of the chaotic sequences. These chaotic sequences...

    M. Sangeetha, Vidhyacharan Bhaskar in Wireless Personal Communications (2020)

  8. No Access

    Chapter and Conference Paper

    Cancer Prediction Through a Bacterial Evolutionary Algorithm Based Adaptive Weighted Fuzzy C-Means Approach

    Clustering of tumor plays a significant part in classifying malignancies from carcinoma genetic data and hence is introduced to deal among the classification problem. It is used in critical applications like c...

    M. Sangeetha, N. K. Karthikeyan in Advances in Computer Communication and Com… (2019)

  9. No Access

    Chapter and Conference Paper

    BER Performance Analysis of Short Reference Differential Chaos Shift Keying Scheme Using Various Maps Over Different Channel Conditions

    In this paper, design and development of chaos-based radio system are realized using short reference differential shift keying. In this communication system, the length of chaos reference sequence is reduced to R

    M. Sangeetha, Toshiba Chamoli in Wireless Communication Networks and Intern… (2019)

  10. No Access

    Chapter and Conference Paper

    An Innovative Technique Toward the Recognition of Carcinoma Using Classification and Regression Technique

    Usually, the nature of a human body is that the cells start to develop, grow, live for some time, and die after a certain period of time. This phenomenon proceeds until the life span. But instead of this norma...

    M. Sangeetha, N. K. Karthikeyan in Smart Innovations in Communication and Com… (2019)

  11. No Access

    Article

    NR-DCSK Based Chaotic Communications in MIMO Multipath Channels

    In this paper, digital chaotic communications in multiple-input–multiple-output (MIMO) wireless multipath fading channels is considered. A noise reduction-differential chaos shift keying (NR-DCSK) scheme is em...

    M. Sangeetha, Vidhyacharan Bhaskar in Wireless Personal Communications (2018)

  12. No Access

    Article

    A New Hybrid Search Algorithm with Novel Cross-Diagonal-Hexagon Search Video Coding Algorithm for Block Motion Estimation

    Computational complexity and motion estimation time are the main factors which affect the performance of video codec for real time applications. In block matching motion estimation algorithm, search patterns h...

    R. Vani, M. Sangeetha in Wireless Personal Communications (2016)

  13. No Access

    Article

    Performance Analysis of Downlink W-CDMA Systems in Weibull and Lognormal Fading Channels Using Chaotic Codes

    In this paper, a subspace based blind channel estimation scheme for downlink W-CDMA systems using chaotic codes under Weibull and Lognormal fading channel conditions is proposed and compared with W-CDMA system...

    M. Sangeetha, Vidhyacharan Bhaskar, Ann Rose Cyriac in Wireless Personal Communications (2014)

  14. No Access

    Article

    Performance Analysis of Subspace Based Downlink Channel Estimation for W-CDMA Systems Using Chaotic Codes

    This paper presents blind channel estimation for downlink W-CDMA system that employs chaotic codes and Walsh codes for spreading information bits of the multiple users. In a W-CDMA system, while transmitting o...

    M. Sangeetha, Vidhyacharan Bhaskar in Wireless Personal Communications (2013)