Time filter

Source Type

Trichūr, India

Krishnan B.,College of Engineering, Trivandrum | Vasantha P.A.,Thejus Engineering College
Journal of Computing in Civil Engineering | Year: 2015

A fuzzy logic-based modeling approach using the universal soil-loss equation (USLE) along with selection and application of the appropriate coir geotextile (CG) in soil erosion control was attempted in this study. The fuzzy logic model was developed to address issues of soil erosion risk with constant rainfall intensity. Two simple and efficient fuzzy logic soil erosion models were developed, of which one was for predicting soil erosion intensity (fuzzy-soil erosion model, or F-SEM) and the other was for selecting an appropriate CG type for soil erosion control based on types of soil in various combinations of slope angle and length, crop cover, rainfall intensity, and so forth (fuzzy-CG model, or F-CGM). These two models were developed in such a way that the input data requirement was the minimum for model execution. The considered input parameters were the main primary governing factors that influence soil erosion intensity in the USLE platform. F-SEM and F-CGM was compared with actual field data and found to be very closely matching. F-SEM predicts the erosion intensity of an area, and F-CGM can be used in the selection of CGs for erosion control application. © 2014 American Society of Civil Engineers. Source

John S.P.,Thejus Engineering College
International Conference on Intelligent Systems Design and Applications, ISDA | Year: 2012

Mobile ad hoc networks play a vital role in the military tactical and other security-sensitive operations. Due to unreliable wireless media, host mobility and lack of infrastructure, providing secure communications is an immense challenge in this unique network environment. Specifically Key Distribution cryptographic techniques are typically applied in order to provide secure communications in wired and wireless networks. In Distributed Key Management Model Surplus memory usage and amplified Process Time were sufficiently needed. In order to address this current issue a novel one hop virtual group Shared Based Key Management system called is presented. It minimizes the number of key usage, memory usage and improves throughput; simultaneously acquiring increasing rate in Quality of Service. Experiment is made for the above supposed strategies wherein 10% to 20% rise is obtained in our proposed strategy. © 2012 IEEE. Source

Sreedevi A.,Thejus Engineering College | Priyanka K.P.,Nanoscience Research Center | Babitha K.K.,Nanoscience Research Center | Aloysius Sabu N.,Nanoscience Research Center | And 2 more authors.
Indian Journal of Physics | Year: 2015

Silver tungstate (α-Ag2WO4) nanoparticles were synthesized by chemical precipitation method. Thermodynamic stability of the α-Ag2WO4 nanoparticles was studied by thermogravimetric and differential thermal analysis. These nanoparticles were structurally characterized by X-ray diffraction, Fourier transform infrared spectroscopy and Raman spectroscopy. The structure and morphology of these nanoparticles were studied by scanning electron microscopy and high-resolution transmission electron microscopy. The composition of nanoparticles near and at the surface was estimated by using energy-dispersive X-ray analysis. The optical properties of these nanoparticles were investigated by UV–Visible as well as photoluminescence spectroscopy. The effects of calcination temperature on the geometric parameters and optical properties of α-Ag2WO4 nanoparticle samples was also investigated. © 2015, Indian Association for the Cultivation of Science. Source

John S.P.,Thejus Engineering College | Samuel P.,Cochin University of Science and Technology
Information Security Journal | Year: 2011

In cluster-based key management techniques, the details of the mobile nodes are gathered always before joining or starting the clustering process,which produces congestion and additional overhead. In this paper, to reduce overhead and congestion of a cluster head, we propose a predictive clustering technique for effective key management. The predictive technique predicts the node movement and proactively sends information in cases of cluster movement. The combined metric for prediction is estimated based on route expiration time and node velocity. In key management technique, each cluster head retains the public key of its member nodes only and act as a router when dealing with nodes of other cluster members. Using this technique, the overhead on centralized key management schemes is reduced. Moreover, the need of each node storing all public keys is diminished, thus minimizing the storage overhead on each node. By simulation results, we show that the proposed scheme is more efficient for minimizing overhead and congestion. © 2011 Copyright Taylor and Francis Group, LLC. Source

John S.P.,Thejus Engineering College | Samuel P.,Cochin University of Science and Technology
International Journal of Business Data Communications and Networking | Year: 2014

Owing to the wireless and dynamic nature, MANETs are susceptible to security attacks from malicious nodes. Key management, certificate exchange and certificate revocation mechanisms play a vital role in securing the network from attacks. When the certificate of a malicious node is revoked, it is denied from all activities and isolated from the network. This paper surveys various existing mechanisms in key management and certificate exchange. Key management methods are broadly classified into two types namely, contributory and distributive methods. Here, certificate distribution and exchange techniques are classified as trust-based and non-trust based methods. Certificate revocation techniques are classified as voting-based, cluster-based and trust-based schemes. The merits and demerits of each mechanism along with the performance are analyzed. Finally, a comparison table is designed to compare the existing mechanisms in an effective manner. © 2014, IGI Global. Source

Discover hidden collaborations