A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ganesh Kumar, P.
- Epidemic Routing with Agents in Intermittently Connected MANETs
Authors
1 Regional Centre of Anna University, Madurai, IN
2 Department of Computer Science and Engineering, Regional Centre of Anna University, Madurai, IN
3 K.L.N. College of Engineering, Sivagangai, IN
Source
Wireless Communication, Vol 5, No 1 (2013), Pagination: 12-17Abstract
Intermittently Connected Mobile Ad hoc Network (ICMANET) is a partially connected Mobile Ad hoc Network (MANET) and is a form of Delay Tolerant Network, where there never exists a complete end – to – end path between two nodes wishing to communicate. The intermittent connectivity araise when a network is sparse or highly mobile. Routing in MANET is achieved through many available traditional routing protocols like Ad hoc On demand Distance Vector (AODV), Optimized Link State Routing (OLSR), Zone Routing Protocol (ZP) etc. These protocols require a connected topology for successful data transmission. Due to the absence of constant connectivity, the traditional protocols are not suitable for routing. Routing in such a spasmodic environ is arduous too. Recent researchers have proposed many routing techniques for ICMNAET. It is evident that even though routing is possible in ICMANET, secure routing in such networks still remains an unanswerable issue. As a means of providing security in ICMANET, in this paper we proposed a secure routing technique. The secure routing is achieved by setting of agent at each node in the available Epidemic Routing Protocol. Setting agent at each node ensures a greater probability of security.Keywords
MANET, ICMANET, Delay Tolerant Networks, Epidemic Routing, Agents.- Fault Tolerance by Quartile Method with Outlier Detection in Wireless Sensor and Actor Networks
Authors
1 Information Technology at Velammal College of Engineering & Technology, Madurai, IN
2 Velammal College of Engineering and Technology, Madurai, IN
3 Anna University, Chennai, IN
4 Velammal College of Engineering & Technology, Madurai, IN
Source
Networking and Communication Engineering, Vol 4, No 5 (2012), Pagination: 300-307Abstract
In the emerging area of WSAN, sensors gather information about the real world and actor performs appropriate actions. Sensors are prone to failure due to energy depletion, hardware failure and so on. For the enhancement of fault tolerance we integrate a new heuristic approach outlier detection method. To identify the outlier's clusters based on sensor's current reading and historical reading's within a past period of time. Nowadays most research focus on the communication link fault tolerance without considering sensing fault tolerance. If the sensing data is error, then the actor may perform incorrect action. To solve this issue Fault tolerance by quartile method (FTQM) is proposed in this paper. In FTQM, it not only determines the correct data range but also sifts the correct sensors by data discreteness. Therefore actor could perform the appropriate actions. It also leads to the reasonable communication overhead and power consumption.
Keywords
Wireless Sensor and Actor Networks, Fault Tolerance, Quartile Method, Outlier Detection, Cluster.- Image Based Crack Identification in Real Concrete Surface Using Watershed Segmentation
Authors
1 Velammal College of Engineering and Technology, Madurai, IN
Source
Automation and Autonomous Systems, Vol 2, No 9 (2010), Pagination: 105-111Abstract
Crack detection is important for the inspection, diagnosis and maintenance of concrete building. However, conventional image based approaches cannot achieve precise detection since the image of concrete surface contains various types of noises like concrete blebs, stain, insufficient contrast and shading. Visual inspection and hammer sounding are the traditional tools used in concrete inspection. The condition rating assigned to a concrete surface is based largely on the results of visual inspection and on an estimate of defect size. Defects hidden from view typically are not picked up, especially defects that are more than a couple of inches from the surface. Additionally, this method is slow, qualitative and potentially hazardous for the inspector. The imaging approach proposed herein is to apply optical inspection techniques in a new way to develop accurate, global bridge inspection techniques. The proposed techniques are based on an optical inspection methods, namely:Watershed Segmentation. The watershed segmentation technique recognizes and measures defects and structural flaws by means of detection and visualization of intensity gradients on the surface of the target. Analysis of the segmented images provides a quantitative "signature" specific to various types of defects. Additionally noise reduction based on percolation model is proposed. The validity of the proposed technique has been evaluated by means of some experiments on concrete surfaces.Keywords
Watershed Segmentation, Image Processing, Percolation Process.- S-Spray Routing Protocol for Intermittently Connected Mobile Networks
Authors
1 Department of Computer Science and Engineering, Anna University Regional Centre, Madurai, IN
2 Department of Computer Science and Engineering, Anna University Regional Centre, Madurai, IS
3 Department of Electronics and Communication Engineering, KLN College of Engineering, IN
Source
ICTACT Journal on Communication Technology, Vol 4, No 3 (2013), Pagination: 761-765Abstract
The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where a complete connectivity never exists. The intermittent connectivity is due to the dense nature of the network. The dense nature is mainly due to the high mobility of the nodes in the network. Routing in such a sparse network is arduous. Due to the disconnected attribute of the network, the encounter of the suspicious nodes in the network also remains a tedious task. In this paper, we put forward a secure routing that aids in detecting and preventing intrusion of malicious nodes. The routing process is made adorable through Spray and Wait (SNW). Since ICMN is prompt to higher delays certain authentication series are used to enable secure communication within the network. The amalgamation of SNW with authentication series leads a novel routing protocol named S-Spray (Secured-Spray) which is highly secure.Keywords
Mobile Network, ICMN, Delay Tolerant Network, S-Spray, Spray and Wait, Authentication Series.- Effective Ant Based Routing Algorithm for Data Replication in Manets
Authors
1 Department of Computer Science and Engineering, Anna University – Regional Office, Madurai, IN
2 Department of Electronics and Communication Engineering, K. L. N College of Engineering, IN
Source
ICTACT Journal on Communication Technology, Vol 4, No 4 (2013), Pagination: 854-858Abstract
In mobile ad hoc network, the nodes often move and keep on change its topology. Data packets can be forwarded from one node to another on demand. To increase the data accessibility data are replicated at nodes and made as sharable to other nodes. Assuming that all mobile host cooperative to share their memory and allow forwarding the data packets. But in reality, all nodes do not share the resources for the benefits of others. These nodes may act selfishly to share memory and to forward the data packets. This paper focuses on selfishness of mobile nodes in replica allocation and routing protocol based on Ant colony algorithm to improve the efficiency. The Ant colony algorithm is used to reduce the overhead in the mobile network, so that it is more efficient to access the data than with other routing protocols. This result shows the efficiency of ant based routing algorithm in the replication allocation.Keywords
Selfish Node, Replica Allocation, Routing, Ant Colony Algorithm, Mobile Nodes, Selfish Node Detection.- Intrusion Detection Using Artificial Neural Network with Reduced Input Features
Authors
1 Department of Information Technology, Anna University of Technology, Coimbatore, IN
2 Department of Electrical and Electronics Engineering, Kalasalingam University, IN
Source
ICTACT Journal on Soft Computing, Vol 1, No 1 (2010), Pagination: 30-36Abstract
Intrusion Detection is the task of detecting, preventing and possibly reacting to intrusion in a network based computer systems. This paper investigates the application of the Feed Forward Neural Network trained by Back Propagation algorithm for intrusion detection. Mutual Information based Feature Selection method is used to identify the important features of the network. The developed network can be used to identify the occurrence of various types of intrusions in the system. The performance of the proposed approach is tested using KDD Cup'99 data set available in the MIT Lincoln Labs. Simulation result shows that the proposed approach detects the intrusions accurately and is well suitable for real time applications.Keywords
Intrusion Detection, Artificial Neural Network, Feature Selection, Mutual Information.- Convergence Led Livelihood Security:A Case Study in Chittoor District of Andhra Pradesh
Authors
1 Krishi Vigyan Kendra, Kalikiri (A.P.), IN
Source
Agriculture Update, Vol 12, No 4 (2017), Pagination: 581-586Abstract
Millets are small-seeded grasses that are hardy and grow well in dry areas as rain-fed crops, under marginal conditions of soil fertility and moisture. Millets have certain intrinsic quality characteristic suited for product development. The excellent and unique taste is found suitable for making variety of food products suitable for marketing. The present study was undertaken on value addition and market linkage to the various products of millets which have a commercial feasibility to enhance the income of the rural women. With this intension, the rural women of Kalikiri and Pilermandal, were extensively trained on processing, preparation of value added products, packing, branding and various possible avenues for market linkages. After acquainting with these aspects, rural women Mrs. M. Faridha, S. Thajwarsulthana and Najimunnisha with technical guidance of KrishiVigyan Kendra (KVK), Kalikiri established two small scale processing and value addition units. Registration was also done for marketing of millet value added products under Food Safety and Standards Authority of India – 2006. At present, they are involved in preparation and marketing of value added millet products viz., millet biscuits, Laddu, muruku, and mixtures under a brandname of “Arogya Millet Foods” and star healthy snacks. They are marketing the products in Chittoor district and Kurnool district of Andhra Pradesh. The monthly production all the products is on an average 350 to 400 kg with a turnover of Rs. 70,000-80,000/-.Keywords
Entrepreneurship, Processing, Value Addition, Packing, Branding, Labeling.References
- Devi, P.B., Vijayabharathi, R., Sathyabama, S., Malleshi, N.G. and Priyadarisini, V.B. (2011). Health benefits of finger millet (Eleusine coracana L.) polyphenols and dietary fiber: a review. J Food Sci. Technol. DOI: 10.1007/s13197-011-0584-9.
- Gopalan, C., Ramashastri, B.V. and Balasubramanian, S.C. (2004). Nutritive value of Indian Foods. NIN. Hyderabad, pp. 47-91.
- Gupta, N., Srivastava, A.K. and Pandey, V.N. (2012). Biodiversity and nutraceutical quality of some indian millets. Proc. National Acad. Sci., India Section B: Biol. Sci. [DOI: 10.1007/s40011-012-0035-z].
- Holvoet, N. (2005). The impact of microfinance on decision-making agency: Evidence from South India. Dev. & Change, 36(1) : 75-102.
- Mal, B., Padulosi, S. and Ravi, S.B. (2010)M. inor millets in South Asia: learnings from IFAD-NUS Project in India and Nepal. Maccarese, Rome, Italy: Bioversity Intl and Chennai, India: M.S. Swaminathan Research Foundation. p 1–185.
- Parameswaran, K. and Sadasivam, S. (1994). Changes in the carbohydrates and nitrogenous components during germination of proso millet (Panicum miliaceum). Plant Foods Hum. Nutr., 45 : 97–102.
- Singh, K.P., Mishra, A. and Mishra HN. (2012). Fuzzy analysis of sensory attributes of bread prepared from millet-based composite flours. LWT—Food Sci. Technol., 48:276–282.
- Tesoriero, F. (2006). Strengthening communities through women’s self-help groups in South India. Community Dev. J., 41 : 321-333.
- Truswell, A.S. (2002). Cereal grain and coronary heart disease. Eur. J. Clin. Nutr., 56(1):1–4.
- Yenagi, N.B., Handigol, J.A., Bala Ravi, S. and Padulosi, Bhag Mal (2010). Nutritional and technological advancements inthe promotion of ethnic and novel foods using the geneticdiversity of minor millets in India. Indian J. Plant Genetics Resour., 23(1) : 82-86.
- Major Issues of Tomato Growers in Madanapalli Division of Andhra Pradesh
Authors
1 Krishi Vigyan Kendra, Kalikiri, Chittoor (A.P.), IN
Source
Agriculture Update, Vol 13, No 3 (2018), Pagination: 373-378Abstract
Tomato is one of the most popular vegetable crop in India. It is a high value crop, providing a good source of income to small scale farmers. In Chittoor district of Andhra Pradesh tomato is grown in an area of 20,000 ha throughout the year. Of which, 75% of tomato area is in Madanapalli division which is one among biggest revenue divisions in India. Despite of huge market facilities in the division, farmers are facing series of constraints during cultivation and marketing. Non-availability of quality seedlings, pest incidence throughout the year, increase in cost of cultivation, fluctuations in market price and malpractices in regulated markets are the major constraints faced by farmers in the division despite farmers are reaping good yields.Keywords
Tomato Production, Constraints, Madanapalli Division.References
- Area and production of horticultural crops during 2016-17. National Horticultural Board report.
- Baliyan, Som Pal (2009). Production and marketing problems in small scale horticultural farming in Botswana. Acta Hort., 831: 31-40.
- Bull, D.A. (1989). Growing problem: Pesticides and third world poor, Oxford: OXFAM.
- Durga Prasad, M.V. (2015). Supply chain management of tomato production at Madanapalli region: A Case Study submitted to Institute of Rural Management, Anand, Gujarat.
- Ellis, W.O., Olympio, N.S., Mensah, E., Adu-Amankwa, P. and Tetteh, A.Y. (1998). Postharvest problems of tomato production in Ghana - Field studies of some selected major growing areas in Ghana. J. Ghana Sci. Associ., 1 (1) : 55-59.
- Matungul, P.M., Ortmann, G.F. and Paper, M.C.L. (2002). Marketing methods and income generation amongst small-scale farmers in two communal areas of Kwazulu-Natal, South Africa. Paper prepared for presentation at the 13th International Farm Management Congress, Wageningen, The Netherlands, pp. 7-12.
- Mohd. Asmatoddin, Ghulghule, J.N., Maske, V.S. and Patil, M.M. (2009). Constraints in tomato production in western Maharashtra. Internat. J. Agric. Sci., 5(2) : 518-520.
- Report of World Vegetable Centre (2016). India Processing Tomato Segment - Current Status, Trends and Opportunities for Engagement.
- Sharma, P.K., Choudhary, M.K., Shekhawat, B.S. and Prajapati, K.A. (2016). Socio-economic status and constraints faced by tomato growers in Kheda district. J. Krishi Vigyan, 5(1): 114-116.