Time filter

Source Type

Parthasarathy V.,Vel Technology Multitech Dr Rangarajan Dr Sakunthala Engineering College
2014 International Conference on Science Engineering and Management Research, ICSEMR 2014 | Year: 2014

This paper is focusing on detection and prevention Sybil nodes in Wireless Sensor Networks. Sybil is a fake-ID based malicious activity destroying the networks behavior. Here IPTTA - [IP Traceback and Token Assigner] approach is proposed to detect and prevent Sybil attack by assigning and verifying IP address with assigned unique Token for each node in the route. IPTTA verify the node IP, Token with time stamp and fetch the contradictory node as Sybil node. The simulation results show that the IPTTA provides better result than the existing systems and reduces cost and time. © 2014 IEEE.


Chellaram C.,Vel Technology Multitech Dr Rangarajan Dr Sakunthala Engineering College | John A.A.,St Peters University
2014 International Conference on Science Engineering and Management Research, ICSEMR 2014 | Year: 2014

The present study involved the isolation and structural elucidation of the active constituent of gastropod, Drupa margariticola extract using different Chromatographie techniques and various tools of spectral analysis. The acetone phase of the D. margariticola showed promising activity indicating the presence of active fractions. The active compound, diterpenoid acylglycerol which has been isolated from the gastropod, Drupa margarüicola exhibited broad spectral activity against Salmonella typhimurium, Vibrio cholerae, Bacillus subtilis, with inhibitory zones of 8 mm, 8 and 8 mm, respectively at a concentration of 50μg. © 2014 IEEE.


Suresh V.,National Engineering College | Abudhair A.,Vel Technology Multitech Dr Rangarajan Dr Sakunthala Engineering College
Journal of Magnetics | Year: 2016

Dipole model based analytical expression is proposed to estimate the length and depth of the rectangular defect on ferromagnetic pipe. Among the three leakage profiles of Magnetic Flux Leakage (MFL), radial and axial leakage profiles are considered in this work. Permeability variation of the specimen is ignored by considering the flux density as close to saturation level of the inspected specimen. Comparing the profile of both the components, radial leakage profile furnishes the better estimation of defect parameter. This is evident from the results of error percentage of length and depth of the defect. Normalized pattern of the proposed analytical model radial leakage profile is good agreement with the experimentally obtained profile support the performance of proposed expression. © The Korean Magnetics Society. All rights reserved.


Murugaboopathi G.,Vel Technology Multitech Dr Rangarajan Dr Sakunthala Engineering College | Rajalakshmi D.,Vel Technology Multitech Dr Rangarajan Dr Sakunthala Engineering College | Jayanthan R.,SCSVMV University
Journal of Theoretical and Applied Information Technology | Year: 2014

MANETs are unplanned, self-configuring network composed of mobile nodes that utilize mesh networking principles for inter-connectivity. MANETs are IP networks made up of a collection of wireless and mobile nodes communicating via radio links that can temporarily form a network whenever they coexist in the same neighbourhood without any fixed infrastructure such as base stations for mobile switching and no centralized administration. Generally the nodes have a limited transmission range, such that each node seeks some assistance of its neighbouring nodes to forward packets. The main problem in MANETs is the security which is because of the open nature and no fixed topology of the MANET environment. One of the primary goals of designing secure routing protocols is to prevent a compromised node from disrupting the route discovery and maintenance mechanisms. However, this added security comes at the cost of performance. This paper evaluates the performance of a secure routing protocol to overcome byzantine attacks using scenario-based experiments. © 2005 - 2014 JATIT & LLS. All rights reserved.


Murugaboopathi G.,Vel Technology Multitech Dr Rangarajan Dr Sakunthala Engineering College | Jayanthan R.,Tamil University | Shanmuga Priya S.,HIGH-TECH
International Journal of Applied Engineering Research | Year: 2014

Using cloud storage; users can remotely store their data and enjoy the ondemand high-quality applications and services from a shared pool of configurable resources available over the cloud, without the need for the client to maintain local data storage. However in cloud computing, since the data is stored anywhere across the globe, the client organization has less control over the stored data. The proposed application or software will provide data integrity verification by using Merkle Hash algorithm and provide encryption/decryption using AES algorithm. With the character of low maintenance, cloud computing provides an efficient solution for sharing resources available in the cloud. But sharing data in a multi-owner group has to provide security to the data stored in order to prevent unauthorized access by data users. In this paper, we propose secure data storage with enhanced third party auditing scheme for dynamic multi owner groups in the cloud. Finally Load balancing scheme is used to retrieve the data from cloud in order to minimize overhead of cloud server. © Research India Publications.


Kalaiselvan S.A.,St Peters University | Parthasarathy V.,Vel Technology Multitech Dr Rangarajan Dr Sakunthala Engineering College | Rakesh Kumar M.,Anna University | Geetha R.,Anna University
International Journal of Control Theory and Applications | Year: 2016

Energy is one of the important major constraints in all kinds of networks. Sensor nodes meets very less energy, it causes node death, where it creates various problems in data transmission. In this paper it is aimed to improve the energy efficiency by reducing the energy consumption. To do this, a linear path is constructed between end-points, nodes mode is changed into Sleep and Awake, Awake and sleep and scheduling is applied. These three functionalities provide a very good data transmission with less energy consumption. Simulation of this proposed approach is carried out in NS2 software and the performance is verified in terms of Energy, throughput and delay. © International Science Press.


Mani P.K.,Vel Technology Multitech Dr Rangarajan Dr Sakunthala Engineering College | Siddappa Naidu K.,Vel Tech Dr.RR & Dr.SR Technical University
International Journal of Applied Engineering Research | Year: 2015

Voltage sags and swell are frequent events and are usually associated with fault in network, with energization of transformer or starting of large motors etc. Their duration is very short, but they can represent big problems of sensitive load like power electronic devices. In this paper, a fast PWM-based Dynamic Voltage Restorer (DVR) has been modelled and simulated with a Fuzzy Logic Controller (FLC) to investigate its performance and the relevant results are presented. A multifunctional control system is proposed in which the DVR protects the load voltage using Posicast and fuzzy logic controllers when the source of disturbance in the parallel feeders. On the other hand, during a downstream fault, the equipment protects the PCC voltage, limits the fault current, and protects itself from large fault current. When the fault current passes through the DVR, it acts like series variable impedance. This paper presents the digital modelling and simulation of a FLC-based DVR under voltage sag/swell phenomena. In this case, the fuzzy logic controller has been incorporated instead of conventional PI controller. The simulation tool used is the MATLAB/Simulink Power System Block set (PSB). To mitigate the voltage sag problem, a prototype model has been considered. © Research India Publications.


Adaikalam A.,Anna University | Manikandan S.,RMD Engineering College | Rajamani V.,Vel Technology Multitech Dr Rangarajan Dr Sakunthala Engineering College
Advances in Intelligent Systems and Computing | Year: 2015

In an optical network, packet scheduling is a big challenge over the communication. For the requirement to achieve high-speed communication, the network communication society needs the novel scheduler to schedule the variable length of packets in apropos method. The previous scheduling algorithms support mostly fixed size of packet, and it provides low throughput, high waiting time, and high latency. The proposed modified scheduler priority-based multischeduler (PBMS) scheduling algorithm overcomes these disadvantages through the following three methodologies: (i) prioritizer, (ii) splitter, and (iii) Round robin (RR) method; the prioritizer provides priority to the variable length of packets, queue splitter fixes the appropriate queue where the packet has been processed, and RR method assigns a fixed time unit to process the packets in queue with round drip mode. This paper proves the feasibility of our scheduler and comparative experimental results. © Springer India 2015.


Naidu S.,Vel Technology Multitech Dr Rangarajan Dr Sakunthala Engineering College
Optoelectronics and Advanced Materials, Rapid Communications | Year: 2015

For renewable power generation system wind power has become the most widely used technique. Therefore large wind turbine generators are used widely into electric power grids. The power generated by wind farm should be transmitted that can maintain large power flow. To enhance power transfer capability and the system stability, series capacitive compensation is a very cost-effective technique, since through long transmission lines large amount of power must be transmitted. This leads to occurring of sub-synchronous resonance. The phenomenon SSR can be damped by FACTS devices. In this paper, we proposed a modified IEEE Second Benchmark Model for damping SSR in hybrid system comprises of Steam and wind power generation system by using Static Synchronous Series Compensator (SSSC). Adaptive Neuro Fuzzy Inference System (ANFIS) and (FLDC) Fuzzy Logic Damping Controller are used to have a pitch angle optimal control in high speed of wind. © 2015, National Institute of Optoelectronics. All rights reserved.


Mani P.K.,Vel Technology Multitech Dr Rangarajan Dr Sakunthala Engineering College | Siddappa Naidu K.,Vel Tech Dr.RR & Dr.SR Technical University
ARPN Journal of Engineering and Applied Sciences | Year: 2015

There are many custom power devices and they are divided in two groups: network-reconfiguring type and compensating type. The network reconfiguring group includes the following devices: solid-state current limiter (SSCL), solid-state breaker (SSB) and solid-state transfer switch (SSTS). These devices are much faster than their mechanical counterparts. The compensating devices either compensate a load, correcting its power factor, unbalance etc., or improve the quality of the supply voltage. These devices are either connected in shunt or in series or a combination of both. The compensating group includes distribution static compensator (DSTATCOM) to compensate for load reactive power and current harmonics, dynamic voltage restorer (DVR) for voltage support, and unified power quality conditioner (UPQC) for both current and voltage compensation. The present work focuses on the last custom power device UPQC, which is a combination of a shunt and series device and can combine the functions of these two devices together. © 2006-2015 Asian Research Publishing Network (ARPN).

Loading Vel Technology Multitech Dr Rangarajan Dr Sakunthala Engineering College collaborators
Loading Vel Technology Multitech Dr Rangarajan Dr Sakunthala Engineering College collaborators