Entity

Time filter

Source Type


Velumani K.,Sri Vasavi College | Kumar P.E.,Erode Arts & Science College | Sivakumar V.,Sri Vasavi College
Rasayan Journal of Chemistry | Year: 2016

Activated carbon was prepared from Passiflora foetida plant seed by chemical activation with KOH. The prepared activated carbon was characterized and utilized for the chromium (VI) removal from the aqueous solution. The effect of pH, contact time, initial concentration of adsorbate and temperature on the adsorption of Cr (VI) was investigated. The Cr (VI) adsorption followed the pseudo second order kinetics with good correlation coefficient. The Freundlich model best described the Cr (VI) adsorption with high correlation coefficient. The thermodynamic parameters such as Free energy change (ΔG°), Enthalpy change (ΔH°) and Entropy change (ΔS°) were evaluated. The negative value of ΔG° confirmed the feasibility and spontaneity of the process. Reversibility of Cr (VI) adsorption and reuse of the adsorbent, was investigated by desorption process. © RASAYAN. All rights reserved. Source


Parameswari M.,Erode Arts & Science College | Sukumaran S.,Erode Arts & Science College
International Journal of Applied Engineering Research | Year: 2016

DDoS (Distributed Denial of Service) is the attack to pollute the network. The attacker creates a large amount of packet to the particular system. The packets are sending by using the compromised computers. It is an effort to make a device or network resource engaged to its intended users. This paper describes training the DDoS attack detection system to recognize possible attacks on a system. The objective of this paper is to develop practical and scalable mechanisms to identify the DoS or DDoS attack sources. This paper includes implementation of traceback system in Single ISP domain, Multi ISP domain, and stateless Internet architecture and enhancing security features. The proposed system is offered to trace-back method based on entropy variations and fuzzy logic method. The system works on different between the normal data flow and attacking data flow. It has a number of advantages such as avoid packet pollution, no need to change the current routing software. Through empirical evaluation it is confirmed that the detection can be completed within improved real time limits and that by using fuzzy estimators instead of crisp statistical descriptors it can be avoided the shortcomings posed by hypothesis on the model distribution of the traffic. © Research India Publications. Source

Discover hidden collaborations