Jay Shriram Group of Institutions

Tiruppur, India

Jay Shriram Group of Institutions

Tiruppur, India
SEARCH FILTERS
Time filter
Source Type

Nandhini J.,Jay Shriram Group of Institutions | Sharmila D.,Bannari Amman Institute of Technology
Asian Journal of Information Technology | Year: 2016

In this research to minimize the energy consumption on broadcasting the message through multiple cells, Multiple Cell and Trust-based Progressive Energy Efficient Routing (MC-TPEER) framework is developed. MPEER protocol consists of the integration process where the energy consumption is minimized and trust maintenance is maximized. Initially, for minimizing the energy rate on multiple cell based broadcasting, MC-TPEER follows the shortest path routing scheme. Multiple cell-based progressive energy efficient routing model on movable node starts by searching of the entire shortest route path in mobile ad-hoc network and picks up the minimal energy conservation path. MC-TPEER was also implemented using NS2 and compared against anonymous location-based efficient routing protocol and report-based payment scheme to assess its performance experimentally. The trust level on broadcasting the message, packet delivery ratio is reported versus several variables where MC-TPEER showed to be superior when compared to the other methods. © Medwell Journals, 2016.


Rajalakshmi S.,Jay Shriram Group of Institutions | Maguteeswaran R.,Jay Shriram Group of Institutions
Asian Journal of Information Technology | Year: 2016

Cloud computing is a pristine methodology of computing in which dynamically scalable and often virtualized s are given as service over internet. Appropriation of cloud is a fascinating and yet unfamiliar province in cloud computing to imbrutes the miscellany of s for cloud purveyor becomes a challenging issue in recent years. This problem is solve by using three novel fashion for cloud purveyor with appropriation: Cloud-Dominant Strategy Incentive Compatible (C-DSIC), Cloud-Bayesian Incentive Compatible (C-BIC) and Cloud Optimal (C-OPT). In C-OPT modules where the administration is done based on host winner value, the major issue of the work is that corroboration is done for all cloud end user. To solve security issue problem in the cloud appropriation method in this effort introduce a novel Expectation Maximization (EM) algorithm for cloud optimal modules. The proposed EM methods are utilized for identifying maximum likelihood based on undiscovered dormant cloud artifice variables for virtual cost and quality of service curtailments. To corroborate the cloud end user data, cryptanalysis method is introduced in this proposed work. The proposed cryptanalysis method follows the procedure of Elliptic curve cryptography for corroborating end users and cloud purveyors. Key values between the cloud end user and cloud purveyors are exchanged. Each and every key is verified by both cloud end user and cloud purveyor. If the key value anyone becomes wrong the appropriation is not administrated to cloud end user, since these end users become uncorroborated end user, there are not allowed to perform appropriation process. A cloud negotiator with such an appropriation module enables end users to miscellany the miscellany of a cloud purveyor. Our demonstration indicates that the appropriation cost drops by calculation of the expectation maximization algorithm and more security than the existing C-OPT Methods by using the elliptic curve cryptography with multiplication in number of cloud purveyors irrespective of the fashions. © Medwell Journals 2016.


Paulraj S.,Karpagam University | Balasundaram N.,Karpagam University | Sates Kumar K.,Jay Shriram Group of Institutions | Dharshna Devi M.,Jay Shriram Group of Institutions
International Journal of Civil Engineering and Technology | Year: 2017

Concrete is second most widely used material other than water, its more versatile but modern day engineering structures require more demanding concrete owing to the huge applied load on smaller area and increasing adverse environmental conditions. Many materials were studied as impregnation agents to concrete to enhance its quality, strength and durability, in this work we had tried to utilize Basalt fiber as a strength enhancement agent in Self compacting concrete to obtain higher strength values in tandem with good workability. Promising results were obtained in the self compacting nature by using simple admixtures such as VBA, workability agents etc. Rheological properties obtained suggested that the concrete is not only highly workable but also possess high durability and versatility. The SCC slump value varied from 620 to 760 mm with good compressive strength in the range of 25-32 N/mm2. © 2017 IAEME Publication.


Due to rise of the load demand, the Renewable Energy Sources (RES) are linked with the transmission system using power electronic converters and other devices. In recent years, Active Power Filter (APF) has become an active area of research due to its significant harmonic compensation. However, there is always a scope for betterment in the performance of the active filter which appears to be inconsistence with various control approaches. This paper presents active and reactive current method (id - iq) control strategy for extracting reference currents of shunt active filters under un-balanced and non linear load conditions. This (id - iq) control strategy is used in this approach for attaining utmost profit from grid-interfacing inverters installed in transmission systems. The inverter used in this approach can be considered as a Shunt Active Power Filter (SAPF) to compensate unbalanced and non linear load current harmonics. In order to improve the overall performance of the system, Space Vector Pulse Width Modulation (SVPWM) is used in this proposed approach which is regulates power frequency and produces good circularity through DC-AC part. The output of the (id - iq) control strategy is given as input to the SVPWM. This research work proposes the integration of (id - iq) control strategy and SVPWM. According to this proposed control strategy, the integration of grid-interfacing inverter and unbalanced non-linear load at point of common coupling seems to be balanced linear load. The experimental results are carried out in MATLAB/Simulink and the performance of the proposed approach is compared with other control strategies. © 2013 Praise Worthy Prize S.r.l. - All rights reserved.


Saravanan P.,Jay Shriram Group of Institutions | Balakrishnan P.A.,Bharathiyar Institute of Engineering for Women
WSEAS Transactions on Power Systems | Year: 2014

In recent decades, the utilization of highly automatic electric equipments has resulted in enormous economic loss. Thus, the power suppliers as well as the power consumers are very much concerned about the power quality issues and compensation approaches. In order to deal with this issue, Active Power Filter (APF) has been considered as an attractive solution due to its significant harmonic compensation. But, the performance of APF is not consistent and is varies based on the output of the controller techniques. This research work mainly focuses on using an efficient control strategy for extracting reference currents of shunt active filters under non linear load conditions. An efficient (id - iq) control strategy is used in this approach for attaining utmost profit from grid-interfacing inverters installed in transmission systems. The voltages are controlled through the PI controller which is further tuned by an optimization approach. Bacterial Forge Optimization (BFO) is used in this approach for tuning the PI controller for the optimal value. The inverter used in this approach can be considered as a Shunt Active Power Filter (SAPF) to compensate non linear load current harmonics. In order to improve the overall performance of the system, Space Vector Pulse Width Modulation (SVPWM) is used in this proposed approach which regulates power frequency and produces good circularity through DC-AC part. SVPWM also eliminates the 3rd order harmonics and minimizes the 5th order harmonics effectively. The integration of (id - iq) control strategy and SVPWM has been proposed in this research work. Simulation results are carried out in MATLAB/Simulink and the performance of the proposed approach is compared with other control strategies. This research works shows unique approach for attaining maximum benefits from RES with suppression of current harmonics.


Kalaiselvi D.,Jay Shriram Group of Institutions | Radhakrishnan R.,Coimbatore Institute of Technology
Mathematical Problems in Engineering | Year: 2015

This paper presents a multiconstrained quality-of-service routing (QoSR) based on a differentially guided krill herd (DGKH) algorithm in mobile ad hoc networks (MANETs). QoSR is a NP-complete and significant problem with immense challenges in determining an optimum path that simultaneously satisfies various constraints in MANETs, where the topology varies constantly. Various heuristic algorithms are widely used to solve this problem with compromise on excessive computational complexities and/or low performance. This paper proposes a krill herd based algorithm called DGKH, where the krill individuals do not update the position in comparison with one-to-one (as usual), but instead it uses the information from various krill individuals and then searches to determine a feasible path. Experiment results on MANETs with different number nodes (routes) are considered with three constraints which are maximum allowed delay, maximum allowed jitter, and minimum requested bandwidth. It is demonstrated that the proposed DGKH algorithm is an effective approximation algorithm exhibiting satisfactory performance than the KHA and existing algorithms in the literature by determining an optimum path that satisfies more than one QoS constraint in MANETs. Copyright © 2015 D. Kalaiselvi and R. Radhakrishnan.


Maguteeswaran R.,Jay Shriram Group of Institutions | Sivasubramanian R.,Coimbatore Institute of Technology | Suresh V.,Jay Shriram Group of Institutions
International Review of Mechanical Engineering | Year: 2012

Metal matrix composites are emerging as very promising materials especially in the fields of aerospace, electrical, electronics and automotive for there various applications and technical demanding properties. The [Fe3O4] iron oxide is reinforced in the aluminum matrix composites to increase the more conductivity and characterized for there mechanical properties such as hardness and tensile strength. LM25aluminum alloy metal matrix composites (MMCs) reinforced with iron oxide [Fe3O4] particles up to 11 wt % was produced by stir casting. © 2012 Praise Worthy Prize S.r.l. - All rights reserved.


Rajalakshmi S.,Jay Shriram Group of Institutions | Anitha R.,Jay Shriram Group of Institutions
International Journal of Applied Engineering Research | Year: 2015

The purpose of the clustering method is to separate the data based A on the assumed similarities between different classes. These classes can be differentiated from one another based on the search between the provided data. Classifying patients into group is not a new phenomenon. In fact, it is followed in the beginning in the field of medical science. The thought process is based on the natural ordering of things which gives the characteristic of human being. However to this additionally, 1) determining the application of clustering and classification techniques based on patients intra and inter institutionally with the help of available medical resources. 2) Finding the growing importance, reliability and validity aspects of classification procedures are discussed. The proposed paper also allows retrieving information of a person from a large database who is affected by breast cancer and the patients‘details are retrieved using the attributes presented in the datasets is done by clustering. Classifying breast cancer dataset results whether disease will reoccurrence or no-reoccurrence event for the patients. The clustering is carried out by KNN algorithm and classification is processed with random forest. © Research India Publications.


Nagalakshmi N.,Jay Shriram Group of Institutions | Rajalakshmi S.,Jay Shriram Group of Institutions
2015 IEEE 7th National Conference on Computing, Communication and Information Systems, NCCCIS 2015 | Year: 2015

Cloud computing is a new style of computing in which dynamically scalable and often virtualized resources are provided as service over internet. Resource procurement of cloud resources is an interesting and yet unexplored area in cloud computing, to automates the selection of resources for cloud vendor becomes a challenging issue in recent years. This problem is solve by using three novel mechanism for cloud vendor with resource procurement: cloud-dominant strategy incentive compatible (C-DSIC), cloud-Bayesian incentive compatible (C-BIC), and cloud optimal (C-OPT). In C-OPT modules, where the resource allocation is performed based host winner value, the major issue of the work is that authentication is performed for each cloud user. To solve security issue problem in the cloud resource procurement approach, in this work introduce a novel expectation maximization (EM) algorithm for cloud optimal modules resources. The proposed EM methods are used for finding maximum likelihood depends on unobserved latent cloud resource variables for virtual cost and quality of service constraints. To authenticate the cloud user data, cryptography method is introduced in this proposed work. The proposed cryptographic method follows the procedure of Elliptic curve cryptography for authenticating users and cloud vendors. Key values between the cloud user and cloud vendors are exchanged. Each and every key is verified by both cloud user and cloud vendor. If the key value anyone becomes wrong the resource Procurement is not allocated to cloud user, since these users becomes unauthenticated user, there are not allowed to performed resource Procurement process. A cloud broker with such a procurement module enables users to automate the choice of a cloud vendor. Our experiments indicate that the resource procurement cost decrease by calculation of the expectation maximization algorithm and more security than the existing COPT methods by using the elliptic curve cryptography with increase in number of cloud vendors irrespective of the mechanisms. © 2015 IEEE.


Mahalakshmi K.,Jay Shriram Group of Institutions | Sharmila D.,Bannari Amman Institute of Technology
Asian Journal of Information Technology | Year: 2016

Mobile Ad hoc network (MANET) is an infrastructure less multi-hop network which makes it more vulnerable to various security threats. The black hole attack is one of the severe threat that affects the routing in MANET. To prevent this black hole attack, an efficient Intrusion Detection Agent Node using Credit Based Ranking (IDAN-CBR) Model is developed. The IDA node performs the credit value estimation and assign the rank to all nodes in the network at regular interval. Then, Anti-Block hole Mechanism (ABM) is applied to easily calculate the suspicious value of a node along with the anomalous difference between the routing messages transmitted from the node. If the suspicious value of the node is greater than the threshold value, IDAN transmits a block message, notifying all nodes on the network, requesting them to collaboratively avoid the malicious node in the network. The Intrusion Detection Agent Node using Credit Based Ranking (IDAN-CBR) addresses all types of black hole attacks in mobile networks. Simulation is carried out on the factors such as the packet delivery ratio, packet delivery overhead due to black hole attacks, time to identify the black hole attack and black hole attack avoidance rate. © Medwell Journals, 2016.

Loading Jay Shriram Group of Institutions collaborators
Loading Jay Shriram Group of Institutions collaborators