RMD Engineering College
RMD Engineering College
Durai S.,Rmd Engineering College |
Parthasarathy R.,Rmd Engineering College
Journal of Computational and Theoretical Nanoscience | Year: 2017
System-on-chip (SoC) face major problem due to vulnerability of hack. The hacker target the cryptographic IP block in the architecture of SoC. However, PUF test wrapper provides the security for individual IP core. The individual IP core protection plays major problem in PUF test. We propose a novel method to protect the IP core with QFT-PUF authentication mechanism. QFT-PUF implement in PSOC-FPGA. The mechanism reduces the area and memory in architecture. The proposed method of key generation and their handling process drive from Quantum Fourier Transform. From the validation of QFT-PUF, Fault Acceptance Rate (FAR) increases then the Fault Rejection Rate (FRR). © 2017 American Scientific Publishers.
Padma P.,Sri Sai Ram Engineering College |
Srinivasan S.,RMD Engineering College
Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016 | Year: 2017
The study focuses on presenting a review on the various biometric authentication mechanisms in the cloud computing environment. Cloud Computing is used to deliver computing Services over the internet and is used to store data in cloud servers. Due to the sharing of services, privacy and data security have become a major area of concern in cloud computing. The cloud service providers store and maintain client data across data centers which provides threats of data leaks. It is found that several mechanisms have emphasized on data security and in the ensuing process have ignored privacy. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data residing in cloud and there have been instances when the password based authentication has been manipulated to gain access into the cloud data. Multifactor authentication is a methodology that uses two or more authentication techniques along with the password but it still does not provide fool-proof data security. Since the conventional methods such as passwords do not serve the purpose of data security, research works focused on biometric traits were as a means of user authentication in cloud services. The biometric authentication is broadly classified into physical based biometric authentication and behavioral based biometric authentication. This paper presents an overview of those methods and analyzes their merits and demerits. The study has been structured to analyze the prevailing biometric authentication mechanisms to gain insights in developing a new authentication model that is more efficient than the existing methods.
Thyagharajan K.K.,Rmd Engineering College |
Vignesh T.,Sa Engineering College
Archives of Computational Methods in Engineering | Year: 2017
Multispectral remote sensing images are the primary source in the land use and land cover (LULC) monitoring. This is achieved by LULC classification and LULC change detection. The change detection in LULC includes the detection of water bodies, forest fire, forest degradation, agriculture areas monitoring, etc. Various change detection and LULC classification methods have their own advantages and disadvantages, and no single method is optimal and finds applicability for all cases. This paper summarizes and analyses the various soft computing and feature extraction techniques used for LULC classification and change detection. Based on the average error rate, performances of the different soft computing techniques are evaluated. The broad usage of multispectral remote sensing images, object-based change detection, neural networks and various levels of image fusion methods offer more potential in LULC monitoring. © 2017 CIMNE, Barcelona, Spain
Menon V.G.,Sathyabama University |
Joe Prathap P.M.,RMD Engineering College
Proceedings of IEEE International Conference on Emerging Technological Trends in Computing, Communications and Electrical Engineering, ICETT 2016 | Year: 2017
Underwater wireless sensor networks have received increased attention in recent years due to its numerous applications in oil spills detection, ocean exploration, submarine detection and disaster avoidance. All these applications make use of a number of sensor nodes deployed in different depths in the ocean for data collection and communication. Efficient communication in the network of sensor nodes requires a dynamic routing approach. Most of the routing protocols proposed for traditional sensor networks cannot be used for underwater sensor networks due to its unique characteristics such as dynamic topology, limited bandwidth, high energy utilization and increased latency. Considering these unique features, efficient routing protocols are exclusively designed for underwater sensor networks. The latest opportunistic routing protocols proposed for underwater sensor network guarantees very high Quality of Service to all the applications. This research paper presents a survey and comparison of all the latest opportunistic routing protocols that has been designed for underwater sensor networks. We then discuss the issues and challenges with each of these opportunistic protocols with future research directions. © 2016 IEEE.
Ramya E.,Rmd Engineering College |
Sasikumar R.,Rmd Engineering College
Proceedings of the 3rd IEEE International Conference on Advances in Electrical and Electronics, Information, Communication and Bio-Informatics, AEEICB 2017 | Year: 2017
In many areas, the municipal garbage bins are overflowing and get down some places they are not cleaned at proper time in garbage bin, if the garbage bin is overflowed it's defects is spread pollution and people affect disease. In this paper to propose a smart garbage bin, once if it fill the garbage bin it will send the notification to authorized person by using a GSM then the garbage is dumped into waste land. © 2017 IEEE.
Thamizharasan S.,Surya Group of Institutions |
Baskaran J.,Adhiparasakthi Engineering College |
Ramkumar S.,RMD Engineering College |
Jeevananthan S.,Pondicherry Engineering College
International Journal of Electrical Power and Energy Systems | Year: 2013
This paper attempts to construct a new hybrid multilevel dc-link inverter (MLDCLI) topology with a focus to synthesize a higher quality sinusoidal output voltage. The idea emphasizes the need to reduce the switch count considerably and thereby claim its superiority over the existing multilevel inverter (MLI) configurations. The structure incorporates a new module along with a differently used H-bridge that facilitates the increase in levels with much lower switch counts. The proposed dual bridge MLDCLI (DBMLDCLI) is evaluated using phase disposition (PD) multi-carrier pulse width modulation (MC-PWM) strategy in a filed programmable gate array (FPGA) platform. The MATLAB/System generator based simulation results validated through FPGA based prototype for a typical output level exhibit the drastic enhancement in the quality of output voltage. The total harmonic distortion (THD) obtained using a harmonic spectrum reveals the mitigation of the frequency components of output voltage other than the fundamental and paves the way to open a new avenue for nurturing innovative applications in this domain. © 2012 Elsevier Ltd. All rights reserved.
Paulraj D.,Rmd Engineering College |
Swamynathan S.,Anna University |
Madhaiyan M.,TeleData Technology Solutions Ltd
Enterprise Information Systems | Year: 2012
Web Service composition has become indispensable as a single web service cannot satisfy complex functional requirements. Composition of services has received much interest to support business-to-business (B2B) or enterprise application integration. An important component of the service composition is the discovery of relevant services. In Semantic Web Services (SWS), service discovery is generally achieved by using service profile of Ontology Web Languages for Services (OWL-S). The profile of the service is a derived and concise description but not a functional part of the service. The information contained in the service profile is sufficient for atomic service discovery, but it is not sufficient for the discovery of composite semantic web services (CSWS). The purpose of this article is two-fold: first to prove that the process model is a better choice than the service profile for service discovery. Second, to facilitate the composition of inter-organisational CSWS by proposing a new composition method which uses process ontology. The proposed service composition approach uses an algorithm which performs a fine grained match at the level of atomic process rather than at the level of the entire service in a composite semantic web service. Many works carried out in this area have proposed solutions only for the composition of atomic services and this article proposes a solution for the composition of composite semantic web services. © 2012 Copyright Taylor and Francis Group, LLC.
Srilakshmi Ch.,Rmd Engineering College
2014 International Conference on Science Engineering and Management Research, ICSEMR 2014 | Year: 2014
A fundamental challenge in the design of Wireless Sensor Network (WSN) is to enhance the network lifetime. This paper proposes a genetic replacement algorithm to enhance the lifetime of a wireless sensor network when some of the sensor nodes shut down. The algorithm is based on the grade diffusion algorithm combined with the genetic algorithm. The algorithm results in fewer replacements of sensor nodes and more reused routing paths. In the simulation, the results show that the proposed algorithm increases the number of active nodes, reduces the rate of data loss and reduces the rate of energy consumption. © 2014 IEEE.
Balaramesh P.,RMK Engineering College |
Venkatesh P.,Pachaiyappas College |
Rekha S.,RMD Engineering College
Surface Engineering | Year: 2014
In this study, the effect of imidazole and benzotriazole as primary stabilisers in saccharose and xylitol based copper electroless baths were studied. Copper methane sulphate was used as the complexing agent instead of copper sulphate and para formaldehyde was used as the reducing agent in the bath. The surface morphologies of copper deposits were characterised by SEM, AFM and XRD studies. The electrochemical characteristics were studied by cyclic voltametry to understand the role of the stabilisers in electroless deposition. In the saccharose bath, the imidazole and benzotriazole acted as inhibitors and best deposition was obtained at pH of 12·75. Benzotriazole afforded smoother and shiner deposits than imidazole. In xylitol bath, the stabilizers acted as accelerators and optimum deposition occurred at a pH of 13·25. © 2014 Institute of Materials, Minerals and Mining.
Sindhuja B.,RMD Engineering College
International Conference on Control, Instrumentation, Energy and Communication, CIEC 2014 | Year: 2014
Energy resources in our modern fast paced technoworld is fast depleting. Hence a renewable energy source is much required at the moment. Thus researching new and innovative systems in renewable energy sector is an indispensable prerequisite. This paper attempts to propose a model for generating clean energy by harnessing the power of wind in moving trains. The scope of this paper concentrates on a new approach to harvest wind power by installing a conical shaped ducted turbines on the roof of the trains which are coupled to a generating unit. Another auxiliary system is also installed that sucks in air through a tunnel like shroud and compresses it. The compressed air is stored in pressure conduits or an agitation tank that maintains the turbine speed at the desirable rate during fluctuations in train speed or wind potential at the inlet turbine. To complement this approach, CFD simulated results are used to investigate the design profile of the proposed model. The conclusion thus obtained proves the efficiency of the system to harness large scale power in a sustainable manner. © 2014 IEEE.