Universitytamil Nadu


Universitytamil Nadu


Time filter

Source Type

Mishra A.K.,UniversityTamil Nadu | Tripathy A.K.,UniversityTamil Nadu | Kumar A.,National University of Singapore | Turuk A.K.,National Institute of Technology Rourkela
Wireless Communications and Mobile Computing | Year: 2017

Node replication attack possesses a high level of threat in wireless sensor networks (WSNs) and it is severe when the sensors are mobile. A limited number of replica detection schemes in mobile WSNs (MWSNs) have been reported till date, where most of them are centralized in nature. The centralized detection schemes use time-location claims and the base station (BS) is solely responsible for detecting replica. Therefore, these schemes are prone to single point of failure. There is also additional communication overhead associated with sending time-location claims to the BS. A distributed detection mechanism is always a preferred solution to the above kind of problems due to significantly lower communication overhead than their counterparts. In this paper, we proposea distributed replica detection scheme for MWSNs. In this scheme, the deviation in the distance traveled by a node and its replica is recorded by the observer nodes. Every node is an observer node for some nodes in the network. Observers are responsible for maintaining a sliding window of recent time-distance broadcast of the nodes. A replica is detected by an observer based on the degree of violation computed from the deviations recorded using the time-distance sliding window. The analysis and simulation results show that the proposed scheme is able to achieve higher detection probability compared to distributed replica detection schemes such as Efficient Distributed Detection (EDD) and Multi-Time-Location Storage and Diffusion (MTLSD). © 2017 Alekha Kumar Mishra et al.

Navaneethan C.,UniversityTamil Nadu
International Journal of Pharmacy and Technology | Year: 2016

The wireless detector network is wide employed in totally different areas of application like military applications etc. Wireless detector network is nothing however the cluster of detector nodes those area unit human action to every alternative mistreatment radio frequencies through the bottom station. Every detector node in network has the battery that is important and crucial to outline the lifetime of detector node. Due to distributed nature of these networks and their deployment in remote areas,these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensornodes,traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security and energy efficient in sensor networks is,therefore,a particularly challenging tasks. This paper discusses the current state of the art in security mechanisms and energy saving techniques for WSNs. © 2016,International Journal of Pharmacy and Technology. All rights reserved.

Nivash J.P.,UniversityTamil Nadu | Dhinesh Babu L.D.,UniversityTamil Nadu
International Journal of Pharmacy and Technology | Year: 2016

In order to prevent air quality deterioration and human health consequences,globally the pollution makes up most important emergency. For theses causes,in a local and on a regional scale mobile monitoring has increased in the last decade. By describing vital issues and effects,we have summed up the present condition in this area. Recent research says that massive data collected from various devices have to be processed efficiently. Many researchers have proposed ideas for data collection in a distributed way. Efficient data processing architecture is needed for massive data collected through IOT environment. Three-layer architecture was designed to deal the data processing in IOT. The data received from devices are initially stored in Data Assembly Layer (DAL). It is then passed to Data Separation Layer (DSL) for assuring the data efficiency. If the data is static,it is directly stored in the database by DSL else the Data Examining Layer (DEL) prepares the data to neighborhood structure. ODP (Optimal Data processing) model distributes the stress of data storage which reduces the workload of remote air pollution monitor. © 2016,International Journal of Pharmacy and Technology. All rights reserved.

Ravi Sankar J.,UniversityTamil Nadu | Mokesh Rayalu G.,UniversityTamil Nadu | Felix A.,UniversityTamil Nadu
International Journal of Pharmacy and Technology | Year: 2016

In diagnostic testing,model specification tests play an important role. The specification of a good model is an art. Over specification yields unbiased estimates of regression coefficients,but larger variance; under specification yields biased estimates of regression coefficients and understates the variance of these estimates. In case of the left out variables or because of inclusion of variable not specified by the truth; the case of irrelevant variables. Mis-specification is usually interpreted as a case of omitted variables,and many researchers,concerned only with the bias resulting from it,the specification bias. Researchers seldom pay attention to the other aspects of mis-specification of the model. In view of the importance of these aspects of misspecification in empirical research,some major results of misspecification error tests are considered in this Article. In this research article,three types of new tests for the mis-specification of the linear regression model have been developed by using various types of residuals. © 2016,International Journal of Pharmacy and Technology. All rights reserved.

Marappan R.,UniversityTamil Nadu | Sethumadhavan G.,UniversityTamil Nadu
International Journal of Applied Engineering Research | Year: 2015

Graph coloring is a classical NP-Complete combinatorial optimization problem and it is widely applied in different engineering applications. This paper explores the effectiveness of applying heuristics and recursive backtracking strategy to solve the coloring assignment of a graph G. The proposed method applies heuristics through recursive backtracking to obtain the approximate solution to χ(G), the minimum number of colors needed to color the vertices of G. The proposed heuristics splits V(G) into higher degree and lower degree vertices such that the search space is reduced when calling the recursive backtracking algorithm for higher degree vertices first. The performance of this approximation method is evaluated using some well known benchmark graphs, and the results are found to be proficient. © Research India Publications.

Arulmozhi P.,SASTRA University | Rayappan J.B.B.,UniversityTamil Nadu | Raj P.,IBM
Biomedical Research (India) | Year: 2016

With the overwhelming acceptance and adoption of RFID tags, a variety of everyday automation activities are being systematically accelerated and accomplished across different industry verticals. The passive RFID tags can be easily observed within 20 feet and hence can be applied to supply a unique RFID code for every tagged entity. For granting more powerful two-factor authentication, fingerprint images of students and other stakeholders are also being carefully captured and stored in networkaccessible database systems locally as well as remotely for data and disaster recovery. This sort of arrangement significantly enhances the veracity of the participants’ attendance and participation in their learning and professional assignments. For example, for schools, colleges and universities, the attendance details of students and scholars can be minutely captured and leveraged. In this paper, we have explained a framework for highly accurate attendance system. We have described how the local and the remote (AWS cloud) execution of data capture, processing, and storage happens and the distinct advantages of cloud-based data processing. Considering the need for higher network performance requirements, we have demonstrated how the seamless convergence of RFID with Li-Fi communication is to realize heightened cloud performance. © 2016, Scientific Publishers of India. All rights reserved.

Banudevi S.,UniversityTamil Nadu | Swaminathan S.,UniversityTamil Nadu | Maheswari K.U.,UniversityTamil Nadu
Nutrition and Cancer | Year: 2015

Cancer is considered a complicated health issue worldwide. The mean cancer survival through standard therapeutic strategies has not been significantly improved over the past few decades. Hence, alternate remedies are needed to treat or prevent this dreadful disease being explored. Currently, it has been recognized that repeated treatment with chemotherapeutic agents has been largely ineffective due to multidrug resistance and further conventional treatment possesses limited drug accessibility to cancerous tissues, which in turn necessitates a higher dose resulting in increased cytotoxicity. Drug combinations have been practiced to address the problems associated with conventional single drug treatment. Recently, natural dietary agents have attracted much attention in cancer therapy because of their synergistic effects with anticancer drugs against different types of cancer. Natural phytochemicals may execute their anticancer activity through targeting diverse cancer cell signaling pathways, promoting cell cycle arrest and apoptosis, regulating antioxidant status and detoxification. This review focuses mainly on the anticancer efficacy of dietary phytochemicals in combination with standard therapeutic drugs reported from various in vitro and in vivo experimental studies apart from clinical trials. This review adds knowledge to the field of intervention studies using combinational modalities that opens a new window for cancer treatment/chemoprevention. Copyright © 2015 Taylor & Francis Group, LLC.

Rajkumar S.,UniversityTamil Nadu | Antony Savarimuthu S.,St Xaviers College | Senthil Kumaran R.,Biocon | Nagaraja C.M.,IIT RoparPunjab | Gandhi T.,UniversityTamil Nadu
Chemical Communications | Year: 2016

Ruthenium-catalyzed simple, cascade and one-pot synthesis of cinnoline-fused diones has been carried out by the C-H activation of phthalazinones/pyridazinones accomplished by the unusual deoxygenation of propargyl alcohols. The bond selectivity is accredited to the traceless directing nature of the hydroxyl group of propargyl alcohol. A sequential C-H activation, insertion and deoxy-oxidative annulation has been proposed based on the preliminary mechanistic study. © The Royal Society of Chemistry 2016.

Choudhary P.,UniversityTamil Nadu | Singh J.,UniversityTamil Nadu | Subramanian S.,UniversityTamil Nadu
International Journal of ChemTech Research | Year: 2015

The marine bacterium, Planococcussp.VITP21 from Kumta costal region of Karnataka, India was investigated for the sorption of acidic Brill Blue dye. The effect of different parameters such as pH, initial dye concentration, initial salt (NaCl) concentration and initial Cr (III) concentration on bio sorption were investigated. The parameters were analysed using Langmuir, Freundlich and Temkin adsorption isotherms. On comparison, Freundlich was found best fitted with regression coefficient and biosorption capacity of .99 and 8.9mg/gm respectively. The FT-IR analysis confirmed the interaction of biosorbent with the dye. The results indicated that marine biosorbent, Planococcus sp. VITP21 has a very good potential for removing acidic dye from aqueous solution under different operating conditions. © 2015, Sphinx Knowledge House. All rights reserved.

Arunma M.,UniversityTamil Nadu | Ezhilmaran D.,UniversityTamil Nadu
International Journal of Applied Engineering Research | Year: 2016

In this paper, we propose a new key-agreement protocol using near polynomial ring over a near-ring. We concretely generate the near polynomial ring f (x)ЄN(x) such that (formula presented) It is proved that the proposed protocol meets several security attributes under the assumption that the near polynomial ring over the near-ring defined below. © Research India Publications.

Loading Universitytamil Nadu collaborators
Loading Universitytamil Nadu collaborators