Qualification: 
M.Tech, B-Tech
chandniarun@am.amrita.edu

Chandni Arun currently serves as a Research Trainee at the Amrita Center for Wireless Networks and Applications, Amrita Vishwa Vidyapeetham.

Research Group: Embedded Systems

Education 

  • 2017: M.Tech. in VLSI Design
    School of Engineering, Amrita Vishwa Vidyapeetham, Amritapuri
  • 2015: B.Tech. in ECE
    SRM Easwari Engineering College

Paper Presented 

  • Design and Control of an Incubator for premature infant based on “LABVIEW” in Gojan Engineering College.
  • Design of Image Steganography using LSB XOR Substitution Method conducted by IICSP(6th IEEE International Conference)

Achievements

  • Won paper presentation award for the paper titled "Design and control of incubator using lab view" at Gojan Engineering College on August 23, 2014.

Publications

Publication Type: Conference Paper

Year of Publication Publication Type Title

2018

Conference Paper

Chandni Arun and Sreekumar, P. C., “Modeling and performance evaluation of parabolic trough solar collector desalination system”, in Materials Today: Proceedings, 2018.[Abstract]


Renewable energy employing desalination is a fast growing field of research. Solar technology employing water desalination is sustainable solution for dry region with scarcity of water. High potential of solar energy is used for purification of saltwater. The paper is concerned with an experimental study of parabolic trough solar collector desalination setup with tracking system manufactured to facilitate capturing of sunlight with respective sun position. Desalination assisted by parabolic trough collector with horizontally north-south orientation. Concentrating the solar irradiation to the focal line containing receiver tube of parabolic trough, where saline water inside receiver tube is heated up and produce steam. In the condenser, steam condenses and in the outlet of condenser potable water has been formed. During the research evaluation of parabolic trough performance using different receiver tube of stainless steel and glass covered copper tube had done. From the experiments, it is observed that the performance of parabolic trough solar collector strongly depend on solar light tracking and focal receiver. Also physical and chemical analysis of both input saline water and desalinated water had done. Desalination setup has a yield of 2 Litre/m2. © 2017 Published by Elsevier Ltd.

More »»

2018

Conference Paper

Chandni Arun and Prabu, K., “Applications of mobile cloud computing: A survey”, in Proceedings of the 2017 International Conference on Intelligent Computing and Control Systems, ICICCS 2017, 2018.[Abstract]


Mobile cloud computing (MCC) is a new technology having lot of applications in monitoring of vehicles, mobile learning, biometry, digital forensic analysis etc. With the help of mobile cloud computing, data processing and storage are performed outside the mobile device and it performed inside the cloud. Mobile cloud computing win several demerits such as limited speed, low bandwidth, mobile health monitoring, limited storage capacity of traditional mobile learning, and mobile gaming. In this paper, various applications of mobile cloud computing will be discussed. © 2017 IEEE.

More »»

2017

Conference Paper

Chandni Arun and Senthil Murugan, “Design of image steganography using LSB XOR substitution method”, in 2017 International Conference on Communication and Signal Processing (ICCSP), 2017.[Abstract]


This paper is mainly investigates the design of image steganography, where steganography is depicted in different ways. Steganography was first initiated from Greek, although ancient people made a conception to communicate without the knowledge of the third person. Steganography is virtually categorized into 2 words where “stegano/stego” indicate as “covered” (where the messages are being hidden) and “graphy” indicate as writing. Here the method is used for describing the design is the LSB XOR substitution method whereas it improves the security usage. It is one of the more appropriate and simplest method among the other function. It is a method of data hiding method that is been used in favor of security purposes. This paper is also attached to give a brief idea through algorithm using encryption and decryption technique which showcase the security betterment. Here we have a random 8 bit secret key that initially XOR with the RGB colors which leads to hold the embedding of data sharing and then after replace the LSB of pixel we get extracted data which is an actual message from encoding method. It has the storage capacity to hide a large number of characteristics than the existing features of data hiding and also data sharing. The Modern steganography is used to provide a developed security on mobiles devices such as ensuring a security on the android and check and verify the latest operating system to add up some betterment in the device.

More »»