Time filter

Source Type

Sivakumar B.,Adhiparasakthi Engineering College | Sivakumar D.,Easwari Engineering college Chennai
Proceedings of the 2013 2nd International Conference on Information Management in the Knowledge Economy, IMKE 2013

Critical nodes are severe threats to network performance. Critical nodes when deteriorating would disturb the communication in the network. Presence of such critical nodes/links in MANETs should be detected in advance to retain the prevailing communication setup. This paper discusses a short survey on the existing clustering algorithms utilized for routing in MANETs. This paper also proposes mobility based clustering for critical node detection. The evaluation of proposed Mobility based NN clustering (MNN) protocols for critical node detection is on par with other unequal clustering protocols. The results show a promising improvement in network performance ignoring the efficiency of cluster head. © 2013 IEEE. Source

Murugan R.,Easwari Engineering college Chennai | Poorani S.,Erode Sengunthar Engineering College
International Journal of Applied Engineering Research

The inductance gradient of the rails is important parameter in rail gun system as it directly decides the force acting on the armature. For the past few decades numeric methods and analytical methods are developed and used to calculate inductance gradient of the rails. Problems which are simple in nature are solved by using analytical methods and numerical methods are required codes and program and it is being considered as a time consuming process. Hence easy technique needs to calculate inductance gradient of rail. Since the inductance gradient value is purely depends on rail dimensions and its properties now researcher focused to obtain a simple formula which can be used to compute the L’ value with respect to rail dimensions. In this paper an effort is made to obtain empirical formula that can be used to compute the L’ value using curve fitting software called Oakdale date fit engineering. This software uses regression analysis to obtain the empirical formula for given set of data. Circular bore geometry is considered as a case study in this paper. © Research India Publications. Source

Maria Anu V.,Sathyabama University | Anandha Mala G.S.,Easwari Engineering college Chennai | Mathi K.,Sathyabama University
International Journal of Applied Engineering Research

Radio Frequency Identification (RFID) technology is very useful in broad range of areas. In supply chain management, the large volume of data to be processed. The RFID tags can be attached to each product to find the movements of the product. In this paper, we discuss various techniques to manage RFID data for supply chain management. By using path encoding methods we can process the RFID data efficiently. First we analyze the various path encoding schemes, observe the performance and compare the performance of this various encoding schemes. Each encoding scheme has its own advantages and disadvantages like poor performance, cycles in the path, long path schema. In this paper we explored various path encoding schemes to process the RFID data in efficient manner. © Research India Publications. Source

Renuka R.,Easwari Engineering college Chennai | Dhanalakshmi S.,Easwari Engineering college Chennai
International Journal of Applied Engineering Research

The growing population has created many problems one of the challenging one is car parking. The problem occurs more for searching of the parking space than the vehicle moving in the road at urban areas, especially driving during the rush hours is difficult for the drivers. This paper proposes online “Smart Parking” system for a Metropolitan area. The system assigns and reserves an optimal parking space based on the driver’s cost function that combines proximity to destination and parking cost. Our approach solves problem at each decision point defined in a time-driven sequence. Slot allocation algorithm, it is guidance based systems, reduces the average time to find a parking space and parking cost, whereas the parking capacity is more efficiently utilized. © Research India Publications. Source

Pradishta D.,Easwari Engineering college Chennai | Jothimohan B.,Easwari Engineering college Chennai | Ponraj A.,Easwari Engineering college Chennai
International Conference on Communication and Signal Processing, ICCSP 2014 - Proceedings

User's requests have increased from one to many different services at the same, thus increasing the demand for bandwidth from the service provider. Since bandwidth available is limited, the network has to either optimize the data from the input or to efficiently allocate the resources. An important problem in a WiMAX network is finding a suitable technique to improve the bandwidth available to the network as well providing QoS to large number of users. High bandwidth consuming services such as video services demand its required bandwidth to provide high quality of service (QoS), thus an adaptive modulation technique is proposed to provide QoS at reduced rates by measuring the channel state. A QoS-based scheduling architecture is also proposed to provide the guaranteed QoS requirements to the users. This architecture includes optimization at physical layer, QoS differentiation and scheduling at medium access control (MAC) layer, dynamic bandwidth allocation at MAC layer and admission control. Results have shown good throughput and delay characteristics for large number of users. © 2014 IEEE. Source

Discover hidden collaborations