Time filter

Source Type

Nāgappattinam, India

Nantha Kumar G.,Anjalai Ammal Mahalingam Engineering College | Arokiasamy A.,Egspillay Engineering College
Journal of Theoretical and Applied Information Technology | Year: 2014

Admission Control plays a remarkable role in dealing with lots of wireless heterogeneous networks which may admit new sessions for a network with most conquer aspect to supply the requested QoS. To keep off the abjection of QoS under the low priority sessions here, we nominate a QoS based Robust Call Admission Control (RCAC) Algorithm. The service classes are assorted into four major categories on the basis of class of service and type of service, which could be reacted on the real time and non real time traffics along with handover and incoming new request. The algorithm concentrates on providing priority based on transmission and space. This algorithm trying to downplays the blocked sessions that have been chosen with deficient resources around the network. With the help of simulated results and graph, we display that our suggested technique affords improve throughput along with cut down in delay. © 2005 - 2014 JATIT & LLS. All rights reserved.

Mohan V.,Egspillay Engineering College | Stalin N.,Anna University | Jeevananthan S.,Pondicherry Engineering College
International Journal of Power Electronics and Drive Systems | Year: 2015

The pulse width modulated voltage source inverters (PWM-VSI) dominate in the modern industrial environment. The conventional PWM methods are designed to have higher fundamental voltage, easy filtering and reduced total harmonic distortion (THD). There are number of clustered harmonics around the multiples of switching frequency in the output of conventional sinusoidal pulse width modulation (SPWM) and space vector pulse width modulation (SVPWM) inverters. This is due to their fixed switching frequency while the variable switching frequency makes the filtering very complex. Random carrier PWM (RCPWM) methods are the host of PWM methods, which use randomized carrier frequency and result in a harmonic profile with well distributed harmonic power (no harmonic possesses significant magnitude and hence no filtering is required). This paper proposes a chaos-based PWM (CPWM) strategy, which utilizes a chaotically changing switching frequency to spread the harmonics continuously to a wideband and to reduce the peak harmonics to a great extent. This can be an effective way to suppress the current harmonics and torque ripple in induction motor drives. The proposed CPWM scheme is simulated using MATLAB / SIMULINK software and implemented in three phase voltage source inverter (VSI) using field programmable gate array (FPGA). © 2015 Institute of Advanced Engineering and Science. All rights reserved.

Priya S.V.,Egspillay Engineering College | Arulmozhi M.,Anna University
IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012 | Year: 2012

The present investigation shows that the agricultural by-products like bengal gram husk, tur dal husk, and tamarind husk can be used as an effective adsorbent for the treatment of wastewaters containing metals like chromium (VI), iron (III), nickel (II) and mercury (II). The term biosorption commonly refers to the passive binding of metal ions or radioactive elements by dead biomass. It has to be distinguished from bio-accumulation which is usually understood to be an active, metabolically mediated metal-accumulation process occurring specifically in living organisms. The focus in early studies has been exclusively on the toxicological aspects of biosorption. Recently, however, efforts are being made to harness this phenomenon into a technique for the detoxification of metal-bearing industrial effluents by removing and/or eventually also recovering the metals. Compared to conventional wastewater polishing techniques such as ion-exchange, activated carbon treatment or membrane technologies (electro-dialysis, reverse osmosis), and the advantage of biosorption is not only in that it can be operated under a broad range of conditions (pH, temperature) but especially that it appears to be economically attractive due to the cheap raw materials that can be used as biosorbents. The effects of pH adsorbent dosage on the removal of metals for all the adsorbates were examined. The optimum pH level for the removal of chromium (VI), iron (III), mercury (II) and nickel (II) was found to be 2.0, 2.5, 5.5 and 6.0 respectively. The review shows that the amount of the metal removed at optimum pH increased with increase in initial metal concentration but the percentage absorbed decreased with increase in initial metal concentration. © 2012 Pillay Engineering College.

Amaravathi D.,Bharath Niketan Enginering College | Swathi P.,Egspillay Engineering College
IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012 | Year: 2012

Mobile users enjoy seamless roaming over wireless environment. The wireless network is cumbersome and error prone, thus there is a need for a good and strong authentication scheme which should be designed in such a way that it retains the privacy of the user. It should also be capable of providing minimized communication overhead as most of the exchange of messages in wireless network is found to be the exchange of messages meant for authentication. This results in clumsy environment. The proposed scheme brings out the solution for the above mentioned problems, where the authentication procedure consists of only four messages exchanged between home agent, mobile user and foreign agent. Also the light weight authentication scheme with user anonymity is presented. Apart from that other main issues that are to be solved are prevention of fraud, updating of session key periodically, no need of password verification table and single registration of user to home network. It provides security in protecting the password even if the information is disclosed. The proposed scheme deserves the property of protecting the wireless network from various attacks. And the proposed scheme is simple and user friendly. © 2012 Pillay Engineering College.

Selvi K.S.,Bharath Niketan Enginering College | Vaishnavi T.,Egspillay Engineering College
IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012 | Year: 2012

The past few years have witnessed an explosive growth in the use of mobile devices as the enabling technology for accessing Internet based services, as well as for personal communication needs in networking environments. Most studies indicate that it is impossible to utilize strong cryptographic functions for implementing security protocols on mobile devices. Our work refutes this. Specifically, we present a performance analysis focused on the most commonly used cryptographic protocols for mobile applications and we proposed provably secure authentication protocol that is more efficient than any of the existing authentication protocol in the literature. The increasing progress in wireless mobile communication has attracted an important amount of attention on the security issue. To provide secure communication for mobile devices, authenticated protocol is an important primitive for establishing trusted connection. In this work, we focus on an important constraint of such devices - battery life - and examine how it is impacted by the use of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems. Our result shows that proposed authentication protocol provides a better security guarantee and incurs much less energy consumption than the existing authentication protocols. Finally, performance analysis will show that compared with existing authentication protocols, our proposed scheme is to be more simple, secure and efficient. © 2012 Pillay Engineering College.

Discover hidden collaborations