Velammal Institute of Technology

Chennai, India

Velammal Institute of Technology

Chennai, India
Time filter
Source Type

Subashini A.,Velammal Institute of Technology | Rajarajan K.,Rajeswari Vedachalam Government Arts College | Sagadevan S.,AMET University
Materials Research Express | Year: 2017

In the present work, bulk size single crystal of tetrakis thiourea potassium bromide [K(N2H4CS)4Br]; (TTPB) has been grown from an aqueous solution using slow evaporation solution growth method. The XRD result proved that the compound crystallize in tetragonal crystal system with space group P41. The FT-IR spectrum of TTPB has clearly identified the functional groups of thiourea in the resulting compound. The TG-DTA and DSC studies have been carried out on the grown sample of TTPB and the results are reported. The etching and scanning electron microscope studies were also carried out to understand the growth pattern and surface morphology of TTPB. The spectral, optical and thermal studies of TTPB are compared with the similar thiourea complex crystal [K(N2H4CS)4I]; (TTPI) and reported. © 2017 IOP Publishing Ltd.

Lakshmi Vara Prasad G.,Bharath University | Nalini C.,Velammal Institute of Technology | Sugumar R.,Bharath University
International Journal of Civil Engineering and Technology | Year: 2017

Present key attacks in wi-fi sensor techniques Compromised hub and disavowal of management. On this challenge, the ideas conveyance tools that followed top probability prevent darkish gaps framed through those attacks can also be tested. It is contended that groovy multipath directing methodologies are powerless towards such attacks, principally as a result of their deterministic nature. So as soon as the enemy secures the steerage calculation, it will possibly determine the similar classes recognized to the supply, henceforth, making all knowledge despatched over those classes defenseless towards its attacks. On this activity methods that produce randomized multipath classes are created. Those outlines can acknowledge aggressor bearing in mind the lack of bundles at the particular hub. At no matter what aspect the assailant is prominent, it arbitrarily adjustments the directing approach among resources to purpose. Via doing this darkish openings and lack of parcels may also be minimized. Instead of arbitrariness, the created classes are likewise specially dispersive and energy talented, making them very have compatibility for evading dark gaps. © IAEME Publication.

Soundararajan S.,Velammal Institute of Technology | Bhuvaneswaran R.S.,Anna University
Journal of Computational and Theoretical Nanoscience | Year: 2017

In Mobile Ad Hoc Networks, while solving the k-local mutual exclusion problem, there may be issues related to connectivity and mobility. Also there may be very high broadcasting overhead and link failure. In order to overcome these issues, in this paper, we propose a reliable and faulttolerant k-local mutual exclusion algorithm. When the nodes are deployed in the network, a leader node is elected and it enters into critical state. When it exits the CS, it determines the expected resident time (ERT) of each requested nodes, based on the link quality, residual energy and mobility parameters using Fuzzy logic. Then it grants the token to the node with highest ERT. If there are multiple resources are free, then the nodes are sorted in the descending order of ERT and granted access accordingly. If the node does not receive any response from the leader node for tokens for a pre-defined time, then it initiates a leader election process. By simulation results, we show that the proposed technique minimizes the link failures and node dyeing due to energy drain and increases the network connectivity. Copyright © 2017 American Scientific Publishers All rights reserved.

Kumar P.S.,Velammal Institute of Technology | Sankaranarayanan G.,Sree Sastha Institute of Engineering and Technology
Ecotoxicology and Environmental Safety | Year: 2016

Rapid depletion of conventional fossil fuel resources, their rising prices and environmental issues are the major concern of alternative fuels. On the other hand waste plastics cause a very serious environmental dispute because of their disposal problems. Waste plastics are one of the promising factors for fuel production because of their high heat of combustion and their increasing availability in local communities. In this study, waste plastic oil (WPO) is tested in DI diesel engine to evaluate its performance and emission characteristics. Results showed that oxides of nitrogen (NO. x ) emission get increased with WPO when compared to diesel oil. Further, the three phase (O/W/O) plastic oil emulsion is prepared with an aid of ultrasonicater according to the %v (10, 20 & 30). Results expose that brake thermal efficiency (BTE) is found to be increased. NO. x and smoke emissions were reduced up to 247. ppm and 41% respectively, when compared to diesel at full load condition with use of 30% emulsified WPO. © 2016 Elsevier Inc.

Balasubramanian P.,Velammal Institute of Technology | Manju S.,Velammal Institute of Technology
Advances in Intelligent Systems and Computing | Year: 2016

Image Segmentation is a complicated and challenging task in detecting tumors in human brain. In diagnostic Systems, this image segmentation plays a major role for detecting brain tumors. For detecting the abnormal changes in the brain, a technique called magnetic resonance imaging (MRI) is used. MRI is based on the abundance of hydrogen nucleus in human body and there magnetic resonance activities. The proposed system consists of four stages: collecting the data by various repository systems or hospitals, preprocessing of brain images, extracting the features from the images by using k-means algorithm, and classifying the brain images with the help of neural system. In our paper, we have proposed an advanced neural network using fuzzy k-means algorithm. © Springer India 2016.

Soundararajan S.,Velammal Institute of Technology | Bhuvaneswaran R.S.,Anna University
Journal of Computer Science | Year: 2012

Problem statement: Load balancing and network congestion are the major problems in Mobile Ad-hoc Networks (MANET) routing. Most of the existing routing protocols provide solutions to load balancing or congestion or fault-tolerance, individually. Approach: We propose congestion controlled adaptive multi-path routing protocol to achieve load balancing and avoid congestion in MANETs. The algorithm for finding multi-path routes computes fail-safe multiple paths, which provide all the intermediate nodes on the primary path with multiple routes to destination. The fail-safe multiple paths include the nodes with least load and more battery power and residual energy. When the average load of a node along the route increases beyond a threshold, it distributes the traffic over disjoint multi-path routes to reduce the traffic load on a congested link. Results: The proposed work is implemented in NS2 and the performance metrics like throughput, packet delivery ratio, delay and overhead are measured and compared with existing protocol. Conclusion/Recommendations: Simulation results show that the proposed algorithm efficiently solves the problem of load balancing, network congestion and fault tolerance The proposed algorithm can alos be applied over any multipath routing protocol. © 2012 Science Publications.

Soundararajan S.,Velammal Institute of Technology | Bhuvaneswaran R.S.,Anna University
2012 2nd International Conference on Digital Information and Communication Technology and its Applications, DICTAP 2012 | Year: 2012

In mobile ad hoc network (MANET), congestion is one of the most important restrictions that deteriorate the performance of the whole network. Multipath routing can balance the load better than the single path routing in ad hoc networks, thereby reducing the congestion by dividing the traffic in several paths. This paper presents a new approach Multipath Load Balancing and Rate Based Congestion Control (MLBRBCC) based on rate control mechanism for avoiding congestion in network communication flows. The proposed approach contains an adaptive rate control based technique in which the destination node copies the estimated rate from the intermediate nodes and the feedback is forwarded to the sender through an acknowledgement packet. Since the sending rate is adjusted based on the estimated rate, this technique is better than the traditional congestion control technique. Simulation results show that proposed technique has better packet delivery ratio and improved throughput and also controls the congestion in more effective manner. © 2012 IEEE.

Reddy J.M.,Velammal Institute of Technology | Monika J.M.,Velammal Institute of Technology
Proceedings - 2012 SC Companion: High Performance Computing, Networking Storage and Analysis, SCC 2012 | Year: 2012

Cloud computing is known as a novel information technology (IT) concept, which involves facilitated and rapid access to networks, servers, data saving media, applications and services via Internet with minimum hardware requirements. Use of information systems and technologies at the battlefield is not new. Information superiority is a force multiplier and is crucial to mission success. Distributed cloud computing in the Military systems are operational today. In the near future extensive use of military clouds at the battlefield is predicted. Integrating cloud computing logic to military applications will increase the flexibility, cost-effectiveness, efficiency and accessibility capabilities. In this paper, distributed cloud computing concepts are defined. Cloud computing supported battlefield applications are analyzed. The effects of cloud computing systems on the information domain in future warfare are discussed. Battlefield opportunities and novelties which might be introduced by distributed cloud computing systems are researched. The role of military clouds in future warfare is proposed in this paper. It was concluded that military clouds will be indispensible components of the future battlefield. Military clouds have the potential of increasing situational awareness at the battlefield and facilitating the settlement of information superiority. © 2012 IEEE.

Karthikeyan R.,Velammal Institute of Technology | Sundarapandian V.,Vel Tech Dr.RR & Dr.SR Technical University
Journal of Electrical Engineering | Year: 2014

This paper investigates the hybrid chaos synchronization of identical Wang four-scroll systems (Wang, 2009), identical Liu-Chen four-scroll systems (Liu and Chen, 2004) and non-identical Wang and Liu-Chen four-scroll systems. Active control method is the method adopted to achieve the hybrid chaos synchronization of the four-scroll chaotic systems addressed in this paper and our synchronization results are established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the active control method is effective and convenient to hybrid synchronize identical and different Wang and Liu-Chen four-scroll chaotic systems. Numerical simulations are also shown to illustrate and validate the hybrid synchronization results derived in this paper. © 2014 FEI STU.

Balamurugan B.,Velammal Institute of Technology
Journal of Chemical and Pharmaceutical Sciences | Year: 2015

Queuing theory is a regularity discipline based on the influence of random factors which nurturing the phenomenon of queuing in line or congestion of the system. After a deep research on the basic ideology of queuing theory, this paper establishes the automated warehouse mathematic model of the system and has given the flabby condition constraints of the warehouse model with its application. According to this model, people can work out the parameters such as equipment utilization efficiency of automatic warehouse system, the number of goods waiting for service, the average waiting time and the average captain operation in system, etc. Finally with the system analysis, the paper provides the basis for optimization design or evaluation of the status of the warehouse system. © 2015 Journal of Chemical and Pharmaceutical Sciences.

Loading Velammal Institute of Technology collaborators
Loading Velammal Institute of Technology collaborators