Egspillay Engineering College

Nāgappattinam, India

Egspillay Engineering College

Nāgappattinam, India
SEARCH FILTERS
Time filter
Source Type

Sivaraman V.,Egspillay Engineering College | Vijayaraghavan L.,Indian Institute of Technology Madras | Sankaran S.,Indian Institute of Technology Madras
Procedia Manufacturing | Year: 2017

Multiphase ferrite-bainite-martensite (FBM) microalloyed steel produced through two step cooling procedure was turned and compared with ferrite-pearlite (FP) microstructure and tempered-martensite (TM) microstructure to study the effect of vibration on surface finish. The cutting parameters like cutting speed, feed and depth of cut were varied to understand the parameter influence on surface finish due to vibration. The result shows that FBM microstructure steel gives better performance in terms of lower surface roughness and lower vibration compared to FP and TM microstructure steel. © 2017 The Authors


Nantha Kumar G.,Anjalai Ammal Mahalingam Engineering College | Arokiasamy A.,Egspillay Engineering College
Journal of Theoretical and Applied Information Technology | Year: 2014

Admission Control plays a remarkable role in dealing with lots of wireless heterogeneous networks which may admit new sessions for a network with most conquer aspect to supply the requested QoS. To keep off the abjection of QoS under the low priority sessions here, we nominate a QoS based Robust Call Admission Control (RCAC) Algorithm. The service classes are assorted into four major categories on the basis of class of service and type of service, which could be reacted on the real time and non real time traffics along with handover and incoming new request. The algorithm concentrates on providing priority based on transmission and space. This algorithm trying to downplays the blocked sessions that have been chosen with deficient resources around the network. With the help of simulated results and graph, we display that our suggested technique affords improve throughput along with cut down in delay. © 2005 - 2014 JATIT & LLS. All rights reserved.


Aruna V.,Egspillay Engineering College | Abdul Gafoor A.,Egspillay Engineering College
IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012 | Year: 2012

Retailing in India is one of the pillars of its economy and accounts for about 15 percent of its GDP. Organised retailing is absent in most rural and small towns of India. Supermarkets and similar organized retail stores account for just 4 percent of the market. Challenges to the retail trade in general include, Geographically dispersed population, complex distribution network, little use of IT systems, limitations of mass media and existence of counterfeit goods. FDI is a major source of external finance which means that countries with limited amounts of capital can receive finance beyond national borders from wealthier countries. Until 2011, Indian government denied foreign direct investment (FDI) in multi-brand retail, forbidding foreign groups from any ownership in supermarkets, convenience stores or any retail outlets. But, single-brand retail was limited to 51 percent ownership with government approval. But now, the government continues the hold on retail reforms for multi-brand stores. There are some, who are in favour of the entry of FDI in multi- brand retail in india and some against it. This paper analyses all the views and presents a clear picture. © 2012 Pillay Engineering College.


Sathya V.,Prist University | Balasubramaniyam K.,Egspillay Engineering College | Murali N.,Egspillay Engineering College | Rajakumaran M.,Egspillay Engineering College | Vigneswari,King's College
IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012 | Year: 2012

Steganography means hiding a message. Information hiding technique is a new kind of secret communication technology. Information hiding system uses multimedia objects like audio, images and text. Digital audio, images, text are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorized copying directly. Today the growth in the information technology, especially in computer networks such as internet, mobile communication and digital multimedia applications such as digital camera, handset video etc., © 2012 Pillay Engineering College.


Elayaraja D.,Dhanalakshmi College of Engineering | Ramabalan S.,Egspillay Engineering College
IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012 | Year: 2012

This paper describes the fuzzy logic control of motion control of mobile robot on rough terrain. The controller employed for this purpose is a two output and single output system. The input to the controller are slope of the terrain and terrain type. The output from the controller is the speed commands for the driving wheels. The controller is designed in Matlab. We have simulated the control process. © 2012 Pillay Engineering College.


Selvi K.S.,Bharath Niketan Enginering College | Vaishnavi T.,Egspillay Engineering College
IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012 | Year: 2012

The past few years have witnessed an explosive growth in the use of mobile devices as the enabling technology for accessing Internet based services, as well as for personal communication needs in networking environments. Most studies indicate that it is impossible to utilize strong cryptographic functions for implementing security protocols on mobile devices. Our work refutes this. Specifically, we present a performance analysis focused on the most commonly used cryptographic protocols for mobile applications and we proposed provably secure authentication protocol that is more efficient than any of the existing authentication protocol in the literature. The increasing progress in wireless mobile communication has attracted an important amount of attention on the security issue. To provide secure communication for mobile devices, authenticated protocol is an important primitive for establishing trusted connection. In this work, we focus on an important constraint of such devices - battery life - and examine how it is impacted by the use of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems. Our result shows that proposed authentication protocol provides a better security guarantee and incurs much less energy consumption than the existing authentication protocols. Finally, performance analysis will show that compared with existing authentication protocols, our proposed scheme is to be more simple, secure and efficient. © 2012 Pillay Engineering College.


Priya S.V.,Egspillay Engineering College | Arulmozhi M.,Anna University
IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012 | Year: 2012

The present investigation shows that the agricultural by-products like bengal gram husk, tur dal husk, and tamarind husk can be used as an effective adsorbent for the treatment of wastewaters containing metals like chromium (VI), iron (III), nickel (II) and mercury (II). The term biosorption commonly refers to the passive binding of metal ions or radioactive elements by dead biomass. It has to be distinguished from bio-accumulation which is usually understood to be an active, metabolically mediated metal-accumulation process occurring specifically in living organisms. The focus in early studies has been exclusively on the toxicological aspects of biosorption. Recently, however, efforts are being made to harness this phenomenon into a technique for the detoxification of metal-bearing industrial effluents by removing and/or eventually also recovering the metals. Compared to conventional wastewater polishing techniques such as ion-exchange, activated carbon treatment or membrane technologies (electro-dialysis, reverse osmosis), and the advantage of biosorption is not only in that it can be operated under a broad range of conditions (pH, temperature) but especially that it appears to be economically attractive due to the cheap raw materials that can be used as biosorbents. The effects of pH adsorbent dosage on the removal of metals for all the adsorbates were examined. The optimum pH level for the removal of chromium (VI), iron (III), mercury (II) and nickel (II) was found to be 2.0, 2.5, 5.5 and 6.0 respectively. The review shows that the amount of the metal removed at optimum pH increased with increase in initial metal concentration but the percentage absorbed decreased with increase in initial metal concentration. © 2012 Pillay Engineering College.


Amaravathi D.,Bharath Niketan Enginering College | Swathi P.,Egspillay Engineering College
IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012 | Year: 2012

Mobile users enjoy seamless roaming over wireless environment. The wireless network is cumbersome and error prone, thus there is a need for a good and strong authentication scheme which should be designed in such a way that it retains the privacy of the user. It should also be capable of providing minimized communication overhead as most of the exchange of messages in wireless network is found to be the exchange of messages meant for authentication. This results in clumsy environment. The proposed scheme brings out the solution for the above mentioned problems, where the authentication procedure consists of only four messages exchanged between home agent, mobile user and foreign agent. Also the light weight authentication scheme with user anonymity is presented. Apart from that other main issues that are to be solved are prevention of fraud, updating of session key periodically, no need of password verification table and single registration of user to home network. It provides security in protecting the password even if the information is disclosed. The proposed scheme deserves the property of protecting the wireless network from various attacks. And the proposed scheme is simple and user friendly. © 2012 Pillay Engineering College.


Eswari N.,Periyar Maniammai University | Sundarapandiyan S.,Periyar Maniammai University | Vennila P.,Egspillay Engineering College | Umamaheswari R.,Egspillay Engineering College | Jothilakshmi G.,Egspillay Engineering College
IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012 | Year: 2012

Keystroke Biometrics is a new authentication technique to identify legitimate users via their typing behavior, which are in turn derived from the timestamps of key-press and keyrelease events in the keyboard while typing their password. Many researchers have explored this domain, with mixed results, but few have examined the relatively impoverished results for digits only password, so that the input password is from the number-pad portion of the keyboard. In this paper, machine learning technique is adapted for keystroke authentication. The selected classification method is adaboost and random forest. Also, combination of adaboost and Random forest will improve the accuracy of the system. The performance metrics are FAR (False Acceptance Rate) and FRR (False Rejection Rate). © 2012 Pillay Engineering College.


Priya S.V.,Egspillay Engineering College
IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012 | Year: 2012

This paper is focused on determination of optimum conditions of the reactant and catalyst required for the production of biodiesel. The demand for petroleum is increasing with each passing day. This may be attributed to the limited resources of petroleum crude. In that case it becomes utmost necessity to search for alternate fuels which are renewable and in that biodiesel emerges a real solution. Biodiesel is a cleaner burning fuel than diesel and act as suitable alternate fuel. It is made from non-toxic, biodegradable, renewable resources. In this study biodiesel was produced by Transesterification process from edible oil. In transesterification process alcohol group from an ester is replaced by another alcohol. In this report, the reaction was carried out with palm oil by varying parameters such as composition of methanol, catalyst and temperature. The production of biodiesel was also done with Gingili oil and waste mixture oil under optimum condition. The yield percentage of biodiesel from palm oil, gingili oil and waste mixture oil were found to be 76.6%, 75% and 55% respectively. Production of biodiesel with 3% of alcohol, o.25 % of catalyst under 40-70°C is found to be an optimum condition for economical production. © 2012 Pillay Engineering College.

Loading Egspillay Engineering College collaborators
Loading Egspillay Engineering College collaborators