Shuaib M.,Bsa Crescent Engineering College |
Mumtaj I.,Bharath University
International Journal of Applied Engineering Research | Year: 2014
The state of a power system and the methods of calculating this state are extremely important in evaluating the operation of the power system, the control of this system, and the determination of future expansion for the power system. The state of the power system is determined through load flow analysis that calculates the power flowing in the lines. There are several different methods to determine the load flow for a given system. For the purpose of this paper, modified load flow procedure for radial distribution system is presented in this paper. © Research India Publications.
Prakash N.,Bsa Crescent Engineering College |
Rangaswamy T.R.,Bsa Crescent Engineering College
2012 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2012 | Year: 2012
Cost and time effective reliable test case prioritization technique is the need for present software industries. The test case prioritization for the entire program consumes more time and the selection of test case for entire software is also affecting the test performance. In order to alleviate the above problem a new methodology using modular based test case prioritization is proposed for regression testing. In this method the program is divided into multiple modules. The test cases corresponding to each module is prioritized first. In the second stage, the individual modular based prioritized test suites are combined together and further prioritized for the whole program. This method is verified for fault coverage and compared with overall program test case prioritization method. The proposed method is assessed using three standard applications namely University Students Monitoring System, Hospital Management System, and Industrial Process Operation System. The empirical studies show that the proposed algorithm is significantly performed well. The superiority of the proposed method is also highlighted. © 2012 IEEE.
Maria Rayappan S.,Anna University |
Easwaramurthy D.,Bsa Crescent Engineering College |
Palanichamy M.,Anna University |
Murugesan V.,Anna University
Inorganic Chemistry Communications | Year: 2010
Silver(I) catalyzed oxidation of amino acids such as glycine and α-alanine by peroxomonosulphate (PMS) in aqueous perchloric acid medium was found to be first order in [peroxomonosulphate] and fractional order in [amino acid] and [Ag(I)]. The rate equation was derived by assuming equilibrium formation of adduct between amino acids and Ag(I). This adduct was presumed to react with PMS in a slow step to yield (adduct)2+, which was self-oxidized in a fast step to give the products. The kinetic results revealed that silver catalyzed reaction occurred approximately 104 times faster than the uncatalyzed reaction and this is attributed to the formation of (adduct)2+. The bimolecular rate constant (k) for the slow step and the activation parameters were calculated and the results are discussed. © 2009 Elsevier B.V. All rights reserved.
Kavitha G.,Bsa Crescent Engineering College |
Sankaranarayanan V.,Bsa Crescent Engineering College
Journal of Computer Science | Year: 2011
Problem statement: Grid computing provides a virtual framework for controlled sharing of resources across institutional boundaries. In computational grids, a client application is executed on the available set of resources that satisfy the user QoS requirements. Some applications require exhaustive computation power for execution of its tasks. In general, these tasks are assigned to a single available resource on the grid that has the required computation power. Therefore, the client application waits indefinitely until a suitable resource is found. Approach: In this study a novel multiple resource selection strategy is presented, which selects multiple resources based on trust and QoS parameters and the tasks are mapped to the appropriate resources for parallel execution. Selection of resources is based on the trust value of the resource, the available computation power at the time of job submission, the speed of the connectivity link, the time deadline and the budget constraints. The proposed method performs task grouping and selects the optimum number of resources for task execution. The tasks are executed in parallel among the multiple resources and the results are aggregated and transferred to the client within the specified time deadline. Security for the user tasks is strengthened by creating a Virtual Private Network (VPN) to the selected resources and tasks are further mapped to the resources through the secured VPN channel. Results: Simulations results show that there is a significant improvement in the overall resource utilization of the grid with a high success rate of jobs and reduction in the total execution time of submitted jobs. Conclusion: The tasks are scheduled to available multiple resources with VPN security. As optimum number of resources is selected for parallel execution, the resources are utilized to a maximum and there is a reduction in the percentage of pending jobs on the grid. © 2011 Science Publications.
Sandhya M.,Bsa Crescent Engineering College |
Rangaswamy T.R.,Bsa Crescent Engineering College
Information Technology Journal | Year: 2011
This study describes the characteristics of data tampering in RFID-based information systems and a method addressing it is proposed using hashing techniques in mobile RFID environment. The proposed method requires only hash, XOR and simple calculations but can provide good security and privacy protection features. Mobile RFID-enhanced applications ("Mobile RFID") offer a unique way of interacting with the physical world by using the touch paradigm. They offer an intuitive way to interact with physical objects to which RFID transponders are attached. However, the development of mobile RFID applications is not well supported yet, in contrast to stationary RFID applications because of security and privacy related issues. A critical threat for Mobile RFID based information systems is represented by data tampering which corresponds to the malicious alteration of data recorded in the tag memory. © 2011 Asain Network for Scientific Information.