Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by S. Balaji
Total Records ( 6 ) for S. Balaji
  Sandhya P.N. Dubey , N. Gopalakrishna Kini , M. Sathish Kumar , S. Balaji , M.P. Sumana Bhat and Harshad R. Kavathiyal
  Background and Objective: The Protein Structure Prediction (PSP) problem is one of the hardest problems in computational biology and technological research. To reduce the complexity of the problem, Dill proposed the Hydrophobic-Polar (HP) model which subsequently became a major tactic to the PSP problem. Methodology: In this study, a novel algorithm was proposed to solve the PSP problem using Dill’s HP model. Here, protein conformation is modeled with square and triangular lattice. The proposed method is tested on a set of benchmark sequences and real protein sequence 4RXN taken from Protein Data Bank (PDB). Results: It is observed that, the proposed approach results in good quality conformation in term of hydrophobic contact with 89% of accuracy. Also, experimental results show that the structure modeled with triangular lattice is closer to the wet lab structure. Conclusion: Results indicate that the proposed approach is promising to generate good number HP conformation, with immense drop in time.
  S. Balaji and N. Vasudevan
  Now a days the wireless communication plays an important role in various fields such as business, entertainment, information processing, etc. There are various methods of modulation schemes which are used to send and receive the data to or from the base station and mobile stations. The 4G wireless communications are used in various applications such as multimedia, live streaming, video conferencing, mobile TV and so on. The OFDMA (Orthogonal Frequency Division Multiple-Access) techniques are used to support multiple users who can communicate with the single base station to improve the throughput. MIMO (Multiple Input Multiple Output) is a technique which is used to satisfy the demand of the wireless communication system. The channels are allocated to the user for efficient communication between base station and mobile stations. The channel with minimum transmission power has been assigned to the user from the channel list. Suppose the requested channel is not available which leads a performance problem then the channels are maintained as a group. The proposed technique maintains a group of channel in an increasing order. Suppose the channel unavailability occur it will select a suitable channel from the group. If the requested channel is not available in the group it will automatically select a channel from the other group which decreased the signal to noise ratio in the communication. It also uses various algorithms like channel and group estimation, channel assignment and alignment which improve the throughput over the wireless communication. The adaptive technique also implemented to assign and align the channel to the requested users. In future the throughput will be improved by using an efficient technique.
  S. Balaji , M. Janga Reddy and Habibullah Khan
  In order to identify an individual, biometric systems are extensively used in India. Recently JNT University, Hyderabad has introduced finger print Biometric system for all faculty working in various private engineering colleges in Telangana. Every day the faculty have to record their biometric attendance in the college, so that, it will be recorded in the server of JNTU, Hyderabad. In this way, the university will have a way to monitor the faculty who are really working in private Engineering college, so that, they can identify the presence of real faculty members. However, the system is vulnerable to various kinds of attacks. In this study, we introduce a novel method for enhancing security of biometric systems by combining watermark with the fingerprint system. Two spatial domain watermarking methods for fingerprint images are proposed in this. The first method utilizes gradient orientation analysis in watermark embedding, so that, the watermarking process alters none of the features extracted using gradient information. The second method preserves the singular points in the fingerprint image which in turn preserves the classification of the watermarked fingerprint image (e.g., into arch, left loop classes). In both methods, watermark data consisted of 154 bits corresponding to the 7 bit ASCII code of string fingerprint watermark.
  S. Balaji and S. Ramachandran
  Coffee in spite of the fact that a critical ware in India’s farming fares has confronted fluctuating global costs and diminishing unit esteem acknowledgment, particularly in the post-change period. Henceforth, household advertise for espresso can’t be dismissed out and out. Truth be told, Coffee Board has proposed a limited time crusade to expand local interest for espresso. In this unique situation, it ends up noticeably important to comprehend climate the accentuation ought to be on value motivations or non value variables. We evaluate espresso interest for the Indian residential market utilizing the dynamic blunder redress procedure (ECM). Comes about demonstrate that while interest for espresso is inelastic over the long haul, it is very inelastic in the short-run. This recommends Coffee Board may concentrate endeavors on non-value considers as opposed to value impetuses in their non-specific espresso limited time crusade.
  S. Balaji , S. Karthik and T.S. Balaji
  With increase in modernization day by day we expect all our work to be done in a simple way on its own with reduced human effort. Ultimately, it has led to advent of new technology called internet of things. IoT is an emerging technology which enables different devices to be interconnected between them and to communicate among them for various information exchange using internet. With world stepping into advanced communication technology new smart objects are getting evolved day by day with the applications of IoT. When IoT is implemented the main key role is played by a vital element called sensor. This study throws light on various sensors that are used in different application that makes use of IoT. This study also highlights various parameters of using sensors based on effectiveness, economic concern, efficiency, power consumption, availability, flexibility and compatibility.
  S. Balaji and S. Ramachandran
  Interfirm connections present new difficulties for administration bookkeeping. One such test is the arrangement of data for the coordination and advancement of exercises crosswise over firms in an esteem chain. As indicated by the writing, an esteem chain investigation (VCA) is a helpful instrument to address this difficulty. Be that as it may, minimal experimental proof has been distributed on the utilization of this examination practically speaking. This study shows a contextual investigation on the utilization of a movement Based Costing (ABC) demonstrate by a substantial UK retail firm and a gathering of providers for supporting their inventory network administration (SCM) hones. This cost model depended on the standards of significant worth chain examination and coordinated cost data over the inventory network. It was utilized to enhance inventory network operations by performing benchmark examinations, vital imagine a scenario in which investigations and cost observing. A translation of the case discoveries is given utilizing hierarchical hypothesis and exchange cost financial aspects.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility