Time filter

Source Type

Ashok M.,Nachimuthu Polytechnic College | Shenbagavinyagamoorthi N.,Anna University | Neelakrishnan A.,PSG College of Technology | Saravanan S.V.,King College
Pollution Research | Year: 2013

In this paper, the temperature variations inside a passenger cabin of an automobile parked in the open sun with different sun shades for its window were analyzed. The car door windows and rear wind screen glasses account for nearly 30% of the total heat gain area. These glasses are given shades having different percentage of heat transmittance and the temperature variations for a period of time of the day is recorded corresponding to the ambient temperature. The analysis reveals that cloth curtain as sunshade significantly reduces the cabin temperature. This analysis will be helpful in deciding on the material to cover the window glasses so as to reduce the car air conditioner load which in turn helps to improve the mileage of the automotive. Copyright © EM International.


Michael Gnanaraj S.,Nachimuthu Polytechnic College | Devadasan S.R.,PSG College of Technology | Murugesh R.,OPPIS Ready Foods | Shalij P.R.,Government Engineering College at Thrissur
International Journal of Services and Operations Management | Year: 2010

In recent years, the world has been focusing on the development of Small and Medium Enterprises (SMEs). Meanwhile, the world has also been looking at the Lean Six Sigma concept as an enabler for companies to achieve prosperity. Hence, it is recommended that Lean Six Sigma be applied to SMEs. However, contemporary SMEs are suffering from certain deficiencies which make it unsuitable for them to implement the Lean Six Sigma concept immediately. This situation indicates the need for developing a model that can overcome the deficiencies existing in SMEs and enable implementation of the Lean Six Sigma concept for achieving prosperity. In order to fulfil this need, in this paper, a model named DOLADMAICS (for Deficiencies Overcoming-Lean Anchored-Define- Measure-Analyse-Improve-Control-Stabilise) is contributed. The DOLADMAICS model is designed to enable an SME to implement the Lean Six Sigma concept at five levels. The workings of DOLADMAICS model is explored by presenting a hypothetical case study. © 2010 Inderscience Enterprises Ltd.


Vennila R.,Nachimuthu Polytechnic college
Journal of Theoretical and Applied Information Technology | Year: 2013

In Mobile AdHoc Networks (MANETs), data transmission is speeded up by means of multicasting. Though multicast transmission lessens overhead, collision and congestion, it persuades new challenges towards security management. This challenge must be conquered to bring better throughput of the network. In this paper, we introduce a multi level group key management technique for multicast security in MANET. Our technique works in a hierarchical model such that cluster heads are prioritized over cluster members. The secure keys are generated using one-way function chain. In addition to secure key management, the issue of mobility is also handled. By simulation results, we prove the proficiency of our proposed technique. Our secure key management technique incurs low overhead and delay and significantly increases the throughput. © 2005 - 2013 JATIT & LLS. All rights reserved.


Vennila R.,Nachimuthu Polytechnic College
European Journal of Scientific Research | Year: 2012

The multicast for mobile ad hoc network (MANET) is more vulnerable to attacks. Very few existing works have concentrated on security mechanisms along with Quality of Service (QoS) for multicasting in MANET. Hence in this paper, we propose a QoS based clustering technique for multicast security in MANET. In this technique, the nodes with maximum available bandwidth and residual energy are elected as cluster heads which act as multicast group leaders. Each cluster head computes the trust value of its members using success ratio of data and control packets. Based on the trust value, the cluster head decides whether a node is authorized to join the multicast group or not. When the multicast source wants to transmit the data packet, it utilizes the secret key based packet forwarding technique. By simulation results, we show that the proposed approach enhances the security of multicast MANET. © EuroJournals Publishing, Inc. 2012.


Rajamanickam V.,Nachimuthu Polytechnic College | Veerappan D.,Coimbatore Institute of Technology
IET Information Security | Year: 2014

Owing to dynamic topology changes in mobile ad hoc networks (MANETs), nodes have the freedom of movement. This characteristic necessitates the process of rekeying to secure multicast transmission. Furthermore, a secure inter cluster communication technique is also mandatory to improve the performance of multicast transmission. In this paper, we propose an inter cluster communication and rekeying technique for multicast security in MANET. The technique facilitates inter cluster communication by distributing private key shares to the nodes, which is performed by the centralised key manager. By tamper proofing the data using private key share, inter cluster communication is accomplished. Furthermore, the rekeying mechanism is invoked when a node joins the cluster. Our rekeying technique incurs low overhead and computation cost. Our technique is simulated in network simulator tool. The simulation results show the proficiency of our technique. © The Institution of Engineering and Technology 2014.

Loading Nachimuthu Polytechnic College collaborators
Loading Nachimuthu Polytechnic College collaborators