MNM Jain Engineering College

Chennai, India

MNM Jain Engineering College

Chennai, India

Time filter

Source Type

Kalaivaani P.T.,MNM Jain Engineering College | Rajeswari A.,Coimbatore Institute of Technology
Wireless Personal Communications | Year: 2016

Wireless Sensor Networks (WSNs) are more popular due to the use of low cost sensors with their interfaces. In designing of WSNs, energy conservation is a main issue. The nodes available in WSNs use battery as limited energy source. Various techniques have been proposed to improve the energy efficiency in WSNs. Energy efficient Medium Access Control (MAC) protocol is required for obtaining higher energy efficiency during difficult operating conditions, where node failure and link failures are common. Cross layer approach between data link and network layer is adapted in the proposed work. In the proposed work, the MAC protocols such as Correlation based Collaborative MAC (CC-MAC), CC-MAC combined with Hybrid MAC, Hybrid MAC, Hybrid MAC combined with sensor MAC have been considered for analysis. Two popular routing protocols such as Ad hoc On-demand Distance Vector, Ad hoc On-demand Multipath Distance Vector are also considered to identify the routing performance of the network. The Parameters such as end-to-end delay, packet drop, packet delivery ratio, throughput, energy efficiency are considered to measure the network performance. These parameters are acting as a primary and secondary attributes to design an efficient MAC protocols for WSNs. © 2016 Springer Science+Business Media New York

Kalaivaani P.T.,MNM Jain Engineering College | Rajeswari A.,Coimbatore Institute of Technology
2nd International Conference on Electronics and Communication Systems, ICECS 2015 | Year: 2015

The energy performance of Wireless Sensor Networks (WSNs) is more significant only when the design of Medium Access Control (MAC) Protocols is completed. The Proposed work deals with energy efficiency analysis of WSNs. To achieve energy efficiency in WSNs three different hybrid medium access control based protocols are preferred. The three protocols are Hybrid Medium Access Control (H-MAC), Hybrid Sensor Medium Access Control (HSMAC), Hybrid Medium Access Control (H-MAC) based Adhoc on Demand Multipath Distance Vector (AOMDV). Among the protocols, H-MAC based AOMDV yields better result. The Spatial Correlation method with Routing Concept is adapted for H-MAC oriented protocols. From the results, the energy efficiency value of H-MAC based AOMDV provides 13.9% higher value than that of H-MAC and HSMAC protocols. Along with energy efficiency the QoS issues such as End to End delay, Packet delivery ratio, Throughput are also considered. The parameter based analysis proves that H-MAC based AOMDV is the best protocol to analyze the energy efficiency in WSNs. © 2015 IEEE.

Kalaivaani P.T.,MNM Jain Engineering College | Rajeswari A.,Coimbatore Institute of Technology
2014 International Conference on Electronics and Communication Systems, ICECS 2014 | Year: 2014

To monitor the physical observable fact Wireless Sensor Networks (WSNs) can be deployed in a wide space with acceptable accuracy and reliability. The entities monitored by WSNs are temperature, pressure, humidity, salinity, metallic object, mobility. The capabilities of WSNs are used in military, commercial, environmental applications. Numerous battery powered devices are available in WSNs but the designing aspect of energy efficient protocols are significant. The proposed work deals with security aspect in WSNs. Injected false data at sink level is a threat to WSNs security system. When the false data is injected at sink, it creates a problem when updating the information at base station and also to filter the false data. False data injection leads to energy wastage in WSNs architecture. To minimize the energy wastage and to reduce the false data injection at sink node, a novel method is proposed which drops the packets at node level and also in the sink level with key management technique. Gang attack based scheme is preferred than the other existing methods and the results are taken using network simulator (NS2) tool. © 2014 IEEE.

Pankajavalli P.B.,Mother Teresa Women's University | Arumugam N.,MNM Jain Engineering College
European Journal of Scientific Research | Year: 2011

Ad-hoc network is a collection of mobile nodes dynamically forming a temporary network without the use of any existing infrastructure or centralized administration. Building such a network poses many technical challenges such as routing, energy consumption, load balancing, and security. Routing in mobile ad-hoc network (MANETs) becomes more sophisticated issue especially when a certain quality of service (QOS) requirement is to be satisfied. This paper concentrates on two technical challenges such reliability in routing and energy consumption. In this paper an algorithm is proposed and implementation of this algorithm is done via simulation. Simulation results prove that the new algorithm performs better in terms of reliability, energy consumption. © EuroJournals Publishing, Inc. 2011.

Vijay Ananth S.,MNM Jain Engineering College | Kalaichelvan K.,Massachusetts Institute of Technology | Rajadurai A.,Massachusetts Institute of Technology
International Review of Mechanical Engineering | Year: 2012

Aluminium Metal Matrix composites are having applications in the field of aerospace and automobile industries because of their high strength to weight ratio. Forming process in Metal Matrix Compositesat normaltemperatureis difficult because of their poor ductility resulting from the incorporation of reinforcement. Forming at elevated temperatures has shown excellent ductility accompanied by net shape forming. This process is primarily governed by parameters such as pressure, temperature and time. By finding optimum superplastic forming parameters for Metal Matrix Composites will attract significant industrial applications. Optimum superplastic forming was computed by Taguchi's optimization technique. Analysis by variance (ANOVA) was employed to know the effect of input process parameters on response i.e. dome height. Confirmation tests were conducted in the optimum superplastic forming parameters. This investigation reveals pressure being vital parameter which has greater influence on forming and hence on dome height. © 2012 Praise Worthy Prize S.r.l. - All rights reserved.

Banu S.U.N.,Mnm Jain Engineering College | Maheswaran G.,Salem College
International Journal of ChemTech Research | Year: 2015

Activated carbon was prepared from Eichornia crassipes by pyrolysis at 250°C. The plant biomass was impregnated with transition metal salt solution prior to pyrolysis. The activated carbon was charecterised by XRD, SEM and EDAX. The activated carbon was found to contain nanocrystallites embedded in it. Batch experiments were carried out for the adsorption of malachite green onto the prepared carbon. Equilibrium data for the adsorption process was fitted to two parameter and three parameter isotherm models, including Langmuir, Freundlich, Temkin and Dubinin-Radushkevich, Redlich-Peterson, Toth, and Koble-Corrigan. Linear and Non-linear regression methods were used to determine the best fit model to the equilibrium data. The data obtained was fitted to different kinetic models namely, pseudo first order, pseudo second order, intraparticle diffusion and Elovich model. Nanocrystallite embedded activated carbon was found to have superior adsorption capacity for malachite green, through physisorption, and can be used to treat waste water containing dyes. The kinetics follows pseudo second order mechanism under favourable adsorption conditions. © 2015, Sphinx Knowledge House. All rights reserved.

Sivabalakrishnan M.,Vellore Institute of Technology | Shanthi K.,MNM Jain Engineering College
Smart Innovation, Systems and Technologies | Year: 2016

Background subtraction is a very popular approach for foreground segmentation in a still scene image. A common approach is to perform background subtraction, which identifies moving objects from the portion of a video frame that differs significantly from a background model. Each video frame from the sequence is compared against a reference frame. There are several problems that a good background subtraction algorithm must resolve. To achieve robust background subtraction is required to have reliable and effective background estimation. In the existing system the background reference image is arbitrarily chosen. This paper presents a novel background estimation algorithm based on improved mode algorithm to obtain static background reference frame from input image. Evaluation of the background extraction is presented in this paper. The experimental results of using background image estimated by background estimation method are faster and accurate in background subtraction. The major goal is to obtain a clean static background reference image using a real-time video. © Springer International Publishing Switzerland 2016.

Nayak N.C.,Mnm Jain Engineering College | Rajan C.C.A.,Pondicherry Engineering College
International Review of Electrical Engineering | Year: 2012

This Paper proposes a new hybrid algorithm for solving the Unit Commitment problem in Hydrothermal Power System using a hybrid Evolutionary Programming - Tabu Search method with cooling-banking constraints. The main objective of this project is to find the generation scheduling by committing the generating units such that the total operating cost can be minimized by satisfying both the forecasted load demand and various operating constraints of the generating units. It is a Global Optimization technique for solving Unit Commitment Problem, operates on a system, which is designed to encode each unit's operating schedule with regard to its minimum up/down time. In this method, the unit commitment schedule is coded as a string of symbols. An initial population of parent solutions is generated at random. Here the parents are obtained from a pre-defined set of solutions i.e. each and every solution is adjusted to meet the requirements. Then, random recommitment is carried out with respect to the unit's minimum down times. Tabu search (TS) is a powerful optimization procedure that has been successfully applied to a number of combinatorial optimization problems. It avoids entrapment at local optimum by maintaining a short term memory of recently obtained solutions. The memory structure assists in forbidding certain moves that deteriorates the quality of the solution by assigning Tabu status to the forbidden solutions. The Tabu status of a solution can be overruled if certain conditions are satisfied expressed in the form of Aspiration Level. Aspiration Level (AL) adds flexibility in Tabu Search by directing the search towards attractive moves. The best population is selected by Evolutionary Strategy. Numerical results are shown comparing the cost solutions and computation time obtained by using the proposed hybrid method than conventional methods like Dynamic Programming, Lagrangian Relaxation. © 2012 Praise Worthy Prize S.r.l. - All rights reserved.

Sivasankar C.,MNM Jain Engineering College | Srinivasan A.,MNM Jain Engineering College
Advances in Intelligent Systems and Computing | Year: 2015

Moving Object detection based on video, of late has gained momentum in the field of research. Moving object detection has extensive application areas and is used for monitoring intelligence interaction between human and computer, transportation of intelligence, and navigating visual robotics, clarity in steering systems. It is also used in various other fields for diagnosing, compressing images, reconstructing 3D images, retrieving video images and so on. Since surveillance of human movement detection is subjective, the human objects are precisely detected to the framework proposed for human detection based on the Locomotive Object Extraction.The issue of illumination changes and crowded human image is discriminated. The image is detected through the detection feature that identifies head and shoulder and is the loci for the proposed framework. The detection of individual objects has been revamped appreciably over the recent years but even now environmental factors and crowd-scene detection remains significantly difficult for detection of moving object. The proposed framework subtracts the background through Gaussian mixture model and the area of significance is extracted. The area of significance is transformed to white and black picture by picture binarization. Then, Wiener filter is employed to scale the background level for optimizing the results of the object in motion. The object is finally identified. The performance in every stage is measured and is evaluated. The result in each stage is compared and the performance of the proposed framework is that of the existing system proves satisfactory. © Springer International Publishing Switzerland 2015.

Gnanavel V.K.,MNM Jain Engineering College | Srinivasan A.,MNM Jain Engineering College
Advances in Intelligent Systems and Computing | Year: 2015

ntelligent Video Investigation is on nice interest in trade applications because of increasing demand to scale back the force of analyzing the largescale video information. Sleuthing the abnormal events from crowded video scenes offer varied difficulties. Initially, an oversized variety of moving persons will simply distract the native anomaly detector. Secondly it’s tough to model the abnormal events in real time. Thirdly, the inaccessibility of ample samples of coaching information for abnormal events ends up in problem in sturdy detection of abnormal events. Our planned system provides a peculiar approach to find anomaly in crowded video scenes. We are initially divide the video frame into patches and apply the Difference-of-Gaussian (DoG) filter to extract edges. Then we work out Multiscale Histogram of Optical Flow (MHOF) and Edge directed bar chart (EOH) for every patch. Then exploitation of Normalized Cuts (NCuts) and Gaussian Expectation-Maximization (GEM) techniques, and to cluster the similar patches into cluster and assign the motion context. Finally exploitation of k-Nearest neighbor (k-NN) search, and establish the abnormal activity at intervals in the crowded scenes. Our spatio-temporal anomaly search system helps to boost the accuracy and computation time for detection of irregular patterns. This technique is helpful for investigation, trade specific and market applications like public transportation, enforcement, etc. © Springer International Publishing Switzerland 2015.

Loading MNM Jain Engineering College collaborators
Loading MNM Jain Engineering College collaborators