- P. K. Singh
- K. K. Singh
- L. S. Rathore
- A. K. Baxla
- S. C. Bhan
- Akhilesh Gupta
- G. B. Gohain
- R. S. Singh
- R. K. Mall
- S. SriramSunther
- S. Ramalakshmi
- G. Thilip Kumar
- T. Abdul Razak
- B. Gayathri Devi
- M. Vanitha
- K. Karpagam
- R. Karthiyayini
- V. Rajalakshmi
- G. S. Anandha Mala
- V. Vidyaa
- Gladys Sheba Chandrakumari
- S. Hosimin Thilagar
- M. Kanthababu
- V. K. Suri
- D. Kesavaraja
- R. S. Rajesh
- D. Sasireka
- K. Ramachandra
- D. Jeyabharathi
- N. Karpagavalli
- P. Revathi
- Priyamvad Srivastav
- N. Chattopadhyay
- A. K. Sahai
- P. Guhathakurta
- S. Dutta
- A. K. Srivastava
- S. D. Attri
- K. Malathi
- Swati Chandras
- Current Science
- Wireless Communication
- Networking and Communication Engineering
- Digital Image Processing
- Data Mining and Knowledge Engineering
- Manufacturing Technology Today
- ICTACT Journal on Image and Video Processing
- The Journal of the Indian Mathematical Society
- International Journal of Advanced Networking and Applications
- Journal of the Ramanujan Mathematical Society
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Balasubramanian, R.
- Rice (Oryza sativa L.) Yield Gap Using the CERSE-Rice Model of Climate Variability for Different Agroclimatic Zones of India
Authors
1 Agromet Service Cell, India Meteorological Department, Lodhi Road, New Delhi 110 003, IN
2 Deparment of Science and Technology, New Delhi 110 016, IN
3 Agrimet Pune, New Delhi 411 005, IN
4 Banaras Hindu University, Varanasi 221 005, IN
Source
Current Science, Vol 110, No 3 (2016), Pagination: 405-413Abstract
The CERES (crop estimation through resource and Environment Synthesis)-rice model incorporated in DSSAT version 4.5 was calibrated for genetic coefficients of rice cultivars by conducting field experiments during the kharif season at Jorhat, Kalyani, Ranchi and Bhagalpur, the results of which were used to estimate the gap in rice yield. The trend of potential yield was found to be positive and with a rate of change of 26, 36.9, 57.6 and 3.7 kg ha-1 year-1 at Jorhat, Kalyani, Ranchi and Bhagalpur districts respectively. Delayed sowing in these districts resulted in a decrease in rice yield to the tune of 35.3, 1.9, 48.6 and 17.1 kg ha-1 day-1 respectively. Finding reveals that DSSAT crop simulation model is an effective tool for decision support system. Estimation of yield gap based on the past crop data and subsequent adjustment of appropriate sowing window may help to obtain the potential yields.Keywords
Agroclimatic Zones, Genetic Coefficients, Rice Model, Yield Gap.References
- Patel, H. R. and Shekh, A. M., Yield gap and trend analysis of wheat using CERES-wheat model in three districts of Gujarat state. J. Agrometeorol., 2006, 8(1), 28–39.
- Patel, V. J., Patel, H. R. and Pandey, V., Estimation of wheat yield gap in Anand and Panchmahal districts using CERES-wheat model. J. Agrometeorology. (Spec. Issue-part-2), 2008, 393–397.
- Bell, M. A. and Fischer, R. A., Using yield predication to assess yield grains: a case study for wheat. Field Crops Res., 1994, 36, 161–166.
- Aggarwal, P. K. and Kalra, N., Analysing the limitation set by climatic factors, genotype and water and nitrogen availability on productivity of wheat II. Climatic potential yield and management strategies. Field Crops Res., 1994, 38, 93–103.
- Aggarwal, P. K., Hebbar, K. B., Venugopalan, M. V., Rani, S., Bala, A., Biswal, A. and Wani, S. P., Quantification of yield gaps in rain-fed rice, wheat, cotton and mustard in India. Global theme on agro ecosystems, report no. 43 and page 36, ICRISAT, Hyderabad, 2008.
- Pathak, H. et al., Trend of climatic potential and on-farm yield of rice and wheat in the Indo-Gangetic Plains. Field Crops Res., 2003, 80, 223–234.
- Wickham, T. H., Predicting yield in lowland rice through a water balance model in Philippine irrigation systems: research and operations. International Rice Research Institute (IRRI), Los Banos, Philippines, 1973, pp. 155–181.
- Ahuja, S. P., Computer simulation of primary production of semiaquatic system using rice (Oryza sativa). Analysis and modeling of the physics of biological–climatological coupling. Ph D thesis, University of California, Devis, 1974.
- Angus, J. F. and Zandstra, H. G., Climatic factors and the modeling of rice growth and yield. In Agrometeorology of the Rice Crop, IRRI, Los Banos, Philippines, 1979, pp. 189–199.
- Kropff, M. J., Van Laar, H. H. and Mathews, R. B. (eds), ORYZA1, an ecophysiological model for irrigated rice production. In SARP Research Proceedings, AB-DLO and TPE-WAU, Wageningen and IRRI, Los Banos, 1994, p. 110.
- Penning de Vries, F. W. T., Jnasen, D. M., Ten Berge, H. F. M. and Bakema, A. H., Simulation of Ecophysiological Processes of Growth of Several Annual Crops, PUDOC, Wageningen, 1989, p. 271.
- Whisler, F. D., Sensitivity test of the crop variables in RICEMOD, IRRI, Res., Pap. Ser., 1983, pp. 89–103.
- Attachai, J., A decision support system for rapid assessment of low land rice-based alternative in Thailand. Agric. Syst., 1995, 47, 245–258.
- Diwakar, M. C. (ed.), Rice in India during 10th Plan, Directorate of Rice Development, Patna, 2009.
- Ritchie, J. T., Wheat phasic development, In Modelling Plant and Soil System (eds Hanks, J. and Ritchie, J. T.), Agron. Mongr., ASA, CSSA, Madison, WI, USA, 1991, p. 31.
- Singh, K. K., Baxla, A. K., Singh, P. K. and Balasubramanian, R., A report on database for rice cultivars used in CERES-rice crop simulation model in different agroclimatic zones of India, Agromet Service Cell, New Delhi, 2010.
- Singh, P. K., Singh, K. K., Baxla, A. K., Rathore, L. S., Kumar, B., Balasubramanian, R. and Tyagi, B. S., Crop yield prediction using CERES-rice model for the climate variability of South Bihar alluvial zone of Bihar (India). AP Chapter of Association of Agrometeorologists National Symposium on Agro Meteorology, at Central Research Institute for Dry land Agriculture (CRIDA), Hyderabad, 2013, pp. 22–23.
- Singh, P. K., Singh, K. K., Baxla, A. K. and Rathore, L. S., Impact of climatic variability on Rice productivity using CERES-rice models Eastern plain zone of Uttar Pradesh. In Third International Agronomy Congress on ‘Agriculture Diversification, Climate Change Management and Livelihoods’, IARI, New Delhi, 26–30 November 2012 and extended summaries vol. (2), 2012, pp. 236– 237.
- Sinha, S. K., Singh, G. B. and Rai, M., Decline in Crop Productivity in Harayana and Punjab: Myth or Reality? Indian Council of Agricultural Research, New Delhi, 1998, p. 89.
- Bhandari, A. L., Ladha, J. K., Pathak, H., Padre, A. T., Dawe, D. and Gupta, R. K., Trend of yield and soil nutrient status in longterm rice–wheat experiment in the Indo-Gangetic Plains of India. Soil Sci. Soc. Am. J., 2002, 66, 162–170.
- Yadav, R. L., Diwivedi, B. S., Orsad, K., Tomar, O. K., Shurapali, N. J. and Pandey, P. S., Yield trends and changes in soil organic-C and available NPK in a long-term rice–wheat system under integrated use of manures and fertilizers. Field Crops Res., 2000, 68, 219–246.
- Akula, B., Estimating wheat yields in Gujarat using WTGROWS and INFOCROP models. Ph D thesis, Anand Agriculture University, Sardar Krishinagar, Anand, Gujarat, India, 2003.
- Mall, R. K. and Srivastava, M. K., Prediction of potential and attainable yield of wheat: a case study on yield gap. Mausam, 2002, 53, 45–52.
- Performance Evaluation of Standard and Security Extended Protocols in MANET
Authors
1 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, Tirunelveli, Tamilnadu, IN
2 Infant Jesus College of Engineering, Thothukudi District, Tamilnadu, IN
Source
Wireless Communication, Vol 4, No 11 (2012), Pagination: 648-655Abstract
An ad hoc network is a group of wireless mobile nodes, in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. There are many protocols are there routing compare to standard protocols security enabled protocols are few. There are lot of security types one of the types is secure the route which packets flow through. Secure routing protocols extended from standard protocols. This paper compares four protocols, two standard and two secure protocols that are extended from the standard protocols. The two standard protocols are AODV, DSR and two security extended protocols are Ariadne and FACES by using NS2 simulator. AODV and DSR are basic protocols and they are already implemented and compared in many situation. FACES algorithm works by sending challenges and sharing friend Lists to provide a list of trusted nodes to the source node through which data transmission finally takes place. Ariadne is a secure on-demand ad hoc network routing protocol. Ariadne prevents attackers or compromised nodes from tampering with uncompromised routes consisting of uncompromised nodes. Two scenarios are consider in MANET and at last conclusion will be presented, that the efficiency of the secure protocols over standard protocols.Keywords
Secure Routing, AODV, DSR, MANET, FACES, Ariadne, NS2.- Improved Congestion Control for Packet Switched Networks and the Web Servers
Authors
1 J.J. College of Arts and Science, Bharathidasan University, Trichy, IN
Source
Networking and Communication Engineering, Vol 7, No 5 (2015), Pagination: 224-227Abstract
Cluster based web server has become a critical issue in various concert. Since user-level communication is an effective technique to reduce the intra-cluster communication overhead, cluster-based Web server design utilizing user-level communication mechanisms has been a popular research focus in recent times. In this context, the overall objective of this research is to explore several design issues in order to enhance the performance of cluster-based network servers based on user-level communication mechanisms. Due to their complexity, the performance of cluster-based Web servers is dependent on various design choices and demands imposed on the systems. Therefore, we investigate several design issues with different system environments as explained below. First, we propose a coscheduled server model, which coschedules the communication processes of a request. Its main objective is to minimize the response time of requests that need intra-cluster communication. It has two familiar techniques called Dynamic Coscheduling and DCS with immediate blocking. Secondly, SSL is providing the cluster-based application servers and it proposes a SSL with BF. Hence, improving the concert of SSL-enabled application servers is serious for designing scalable and high concert data center. Finally, it proposes a NIC data caching scheme, and it improves the distributed Web server’s performance. Although NIC memory is traditionally used for communication, it can be used for improving performance as well because modern NICs are equipped with much larger amounts of memory.
To investigate these techniques, it develops a widespread recreation testbed that captures the underlying communication layer in a cluster, the coscheduling algorithms, and the characteristics of a distributed Web server model. Extensive experiments of three proposed schemes using this testbed show that performance of cluster-based Web servers can significantly increase by employing these techniques.
Keywords
Cluster Based Web, Dynamic Coscheduling, NIC, Secure Socket Layer.- Middleware Architectural Framework for Secured Services in MANETs
Authors
1 Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, IN
2 Alagappa University, Karaikudi, Tamil Nadu, IN
Source
Networking and Communication Engineering, Vol 3, No 3 (2011), Pagination: 172-176Abstract
One of the major challenges in Mobile Ad hoc Networks is the deployment of consistent end-to-end Quality of Service (QoS) for streaming media services. Conferencing and content delivery are few specific applications which require multicasting over MANETs. They also have a great impact on mobility, quality of service support, and security. Since Mobile Ad hoc Networks neither possess fixed topology nor any in-built architecture, the security threats for media streaming data are on the high edge. So, it is necessary to develop a secured multicasting protocol. This paper focuses on the design and development of a secured session-based QoS guaranteed middleware framework MAFSS (Middleware Architectural Framework for Secured Services in Mobile Ad hoc Network), interoperating with the middleware policy manager.Keywords
MANETs, Quality of Service, Media Streaming, Bandwidth, Route.- A Heuristic Profile Based Intruder Detection Scheme on MANET
Authors
1 Department of Computer Science, Jamal Mohamed College, IN
Source
Networking and Communication Engineering, Vol 2, No 10 (2010), Pagination: 416-422Abstract
The major challenge in the design of MANETs is their vulnerability to security attacks. The rapid proliferation of multiple heterogeneous mobile/wireless networks and mobile computing applications attribute for the change in security architecture. The major obstacle for the detection of an internal intrusion is that the nodes are under consistent mobility. Nodes move constantly within the internal domain of MANET. In such cases, the traditional intrusion detection approach has to be allocated to several strategic points to identify an intrusion or attempted attack at the moment it occurs. A number of algorithms and schemes for detecting intruders in MANET exist, but all systems suffer from performance penalties and high false alarm rates. This research work concentrates on the development of an architectural model for identifying intruders using profile based anomaly or misuse detection mining approach. The proposed architecture aims to minimize the costs involved in monolithic intrusion detection and works on identifying intruders based on XML/ontology setup in mobile nodes. The model is simulated using ns2 simulator.Keywords
Intrusion Detection, Wireless Networks, Profile, Mobile Ad Hoc Networks, AODV.- Segmention of Optic Disk from Fundus Images
Authors
1 Computer Science and Engineering, Manonmaniam Sundaranar University, Tiruneveli, IN
2 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, Tiruneveli, IN
Source
Digital Image Processing, Vol 4, No 13 (2012), Pagination: 729-731Abstract
The optic disk (OD) can be used for the diagnosis of fundus disorders. The main goal of the system is to segment the optic disk. In this, the first technique is C-V (Chan-Vese) Method, using which OD is segmented. The second technique used for the segmentation of OD is based on Active contours using region-based information. Comparing the results of the C-V Method and the Active contour Method the analysis has made.Keywords
Area, Active Contour, Boundary Distance, C-V Method, Diagnosis, Fundus Image, F-Score, Iteration, Optic Disk, Segmentation, Snake, Time.- Textural Analysis for the Accuracy in Diagnosis of Medical Scan/CT Images
Authors
1 Mother Teresa University, Kodaikannel, IN
2 EBET Knowledge Park, Tirupur, IN
Source
Digital Image Processing, Vol 2, No 5 (2010), Pagination: 157-160Abstract
To determine the accuracy of normal tissue scan images from the abnormal cases, the GLCM (Grey-Level Co-occurrence matrix) and their derived parameters such as homogeneity of the images and energy level calculations were approached. These structural and textural parameters were calculated by using mathematical formulae. In each case 20 abdominal scan images of both normal and abnormal patients were employed. The data generated out of this present investigation was tabulated and statistically analyzed. The analysis for energy level on the images disclosed that there was a clear distinguish between normal tissue and abnormal tissue. The above results are discussed with relation to the accuracy.Keywords
Textural Features of CT Images, Statistical Design For Image Studies, Medical Image Textural Analysis.- Enhanced Association Rule Mining Algorithm to Extract High Utility Itemsets from a Large Dataset
Authors
1 H.H. The Rajah's College (Autonomous), Pudukkottai, Tamil Nadu, IN
2 Dept. of Computer Applications, Karpaga Vinayaga College of Engineering and Technology, Kancheepuram, Tamil Nadu, IN
Source
Data Mining and Knowledge Engineering, Vol 7, No 7 (2015), Pagination: 238-241Abstract
Data mining aims at bringing out the hidden information from a large data set using data mining techniques according to the requirements. Association rule mining identifies itemsets that occur frequently in data set and frames association rules by taking all items equally. But many differences exist among the items that play a vital role in decision making. By taking one or more values of items as utilities, the utility mining technique works on finding the itemsets with greater utilities. In the proposed paper we present a utility mining algorithm named IUM (Improved Utility Mining) algorithm that finds high utility itemsets and also low utility itemsets from a large data set and the experiments states that the proposed algorithm performs better than existing algorithms in case of running time.Keywords
Association Rules, Frequent Itemsets, Low Utility Itemset, High Utility Itemset.- A Survey in Health Care Data Using Data Mining Techniques
Authors
1 Bharathidasan University, Department of Computer Applications, Anna University, Tiruchirappalli, IN
2 J.J. College of Arts and Science, Affiliated to Bharathidasan University, Pudukkottai, IN
Source
Data Mining and Knowledge Engineering, Vol 7, No 2 (2015), Pagination: 99-103Abstract
Data mining is the process of analyzing the enormous set of data. Data mining techniques have been used in healthcare research and known to be effective. Medical data has much information that needs to be exploited in order to get intelligence on medical events. Medical information is various in range and very large in content and its size is voluminous that conventional diagnostic technique disclose very little of the potential conclusion. Medical data mining can help to obtain latent patterns or actionable knowledge. It plays a significant function can spot trends and anomalies in their data in healthcare organization and disclose invaluable knowledge which in turn more useful for the healthcare professionals for decision making. In this paper we survey the effectiveness of diverse techniques in data mining such as classification, clustering, association, regression. These techniques can be applied to medical data to recognize trends and profiles hidden in mounds of data which may be essential to effective treatment for patients, management of healthcare organization and clinical feature of healthcare. This survey also highlights healthcare domain, requisite of data mining in Medicare field, algorithms used in today's healthcare domains.Keywords
Data Mining, Contemporary Data Mining Techniques, Medical Data Mining.- An Estimation of Privacy in Incremental Data Mining
Authors
1 Department of Information Technology, Sathyabama University, Chennai, IN
2 Department of Computer Science and Engineering, St. Joseph’s College of Engineering, Chennai, IN
3 Tata Consultancy Services, Chennai, IN
Source
Data Mining and Knowledge Engineering, Vol 2, No 4 (2010), Pagination:Abstract
Data are values of qualitative or quantitative variables, belonging to a set of items. In recent years, advances in hardware technology have lead to an increase in the capability to store and record personal data about consumers and individuals. This has lead to concerns that the personal data may be misused for a variety of purposes. Data explains a business transaction, a medical record, bank details, educational details etc., Use of technology for data collection and analysis has seen an unprecedented growth in the last couple of decades. Such information includes private details, which the owner doesn’t want to disclose. Such data are the sources for data mining. Data mining gives us “facts” that are not obvious to human analysts of the data. When such sensitive data are given directly for mining, the security of the individual is highly affected. So the data are modified and presented for data mining. But the problem is that the altered data should also produce a similar mining result. This has lead an area called privacy preservation in datamining which is an intersection of data mining and information security. The fact in this area is the additional task which is used to implement the privacy degrades the performance of the data mining algorithm, which results in incorrect mining results. This crucial situation has led to the development of this paper which deals with the data metrics that determines the quality of the following existing privacy preserving algorithms viz., Correlation- aware Anonymization of High-dimensional Data (CAHD) [1], Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion (PRND) [2], Privacy-Preserving Data Aggregation(PPDA) [3], Privacy-Preserving Incremental Data sets( PRID) [4] which defines various methods for implementing privacy in incremental data. Major metrics like data utility, privacy and computational time are considered for evaluation and their detailed performance is discussed.
Keywords
Datamining, Privacy Preservation, Perturbation, Quality Metrics, Anonymization.- Design and Analysis of Electro-Thermal Grippers for Holding Micro-Components
Authors
1 Dept. of Mechanical Engg., Jawahar Engg. College, Chennai, IN
2 Dept. of Manufacturing Engg., Anna University, Chennai, IN
3 Dept. of Electrical and Electronics Engg., Anna University, Chennai, IN
4 Precision Engg. Division, Bhabha Atomic Research Center, Mumbai, IN
Source
Manufacturing Technology Today, Vol 13, No 12 (2014), Pagination: 20-23Abstract
Grippers are used to pick, hold and place macro/micro-components, which are widely used in the field of assembly. In this work, for the first time an electro-thermal gripper (collet) is designed and analysed using two thermal actuator structures with reverse currents in order to reduce the out-of-plane actuation for holding micro-components in a narrow range of sizes between 100 μm to 1000 μm. The electro-thermal gripper is designed and analyzed using Comsol Multiphysics Design and Analysis Software. The materials considered for the electro-thermal gripper are alluminium and steel. From the analysis, it is observed that in the case of alluminium electro-thermal gripper at 0.1 V, the in-plane displacement is found to be 22 μm and the out-of-plane displacement is found to be 0.1 μm. In the case of steel electro-thermal gripper at 0.1V, the in-plane displacement is found to be 0.1 μm and out-of-plane displacement is found to be 0.00005 μm. It is observed that alluminium results in better displacement compared to steel.Keywords
Microgripper, Electro-Thermal Gripper, Microactuator, Comsol Multiphysics.- Advanced Cluster Based Image Segmentation
Authors
1 Department of Computer Science and Engineering, Dr. Sivanthi Aditanar College of Engineering, Tamil Nadu, IN
2 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, Tamil Nadu, IN
3 Department of Information Technology, Jayamatha Engineering College, Tamil Nadu, IN
Source
ICTACT Journal on Image and Video Processing, Vol 2, No 2 (2011), Pagination: 307-318Abstract
This paper presents efficient and portable implementations of a useful image segmentation technique which makes use of the faster and a variant of the conventional connected components algorithm which we call parallel Components. In the Modern world majority of the doctors are need image segmentation as the service for various purposes and also they expect this system is run faster and secure. Usually Image segmentation Algorithms are not working faster. In spite of several ongoing researches in Conventional Segmentation and its Algorithms might not be able to run faster. So we propose a cluster computing environment for parallel image Segmentation to provide faster result. This paper is the real time implementation of Distributed Image Segmentation in Clustering of Nodes. We demonstrate the effectiveness and feasibility of our method on a set of Medical CT Scan Images. Our general framework is a single address space, distributed memory programming model. We use efficient techniques for distributing and coalescing data as well as efficient combinations of task and data parallelism. The image segmentation algorithm makes use of an efficient cluster process which uses a novel approach for parallel merging. Our experimental results are consistent with the theoretical analysis and practical results. It provides the faster execution time for segmentation, when compared with Conventional method. Our test data is different CT scan images from the Medical database. More efficient implementations of Image Segmentation will likely result in even faster execution times.Keywords
Parallel Algorithms, Region Growing, Image Enhancement, Image Segmentation, Parallel Performance.- Two Remarks on a Result of Ramachandra
Authors
1 Tata Institute of Fundamental Research, Bombay 400 005, IN
Source
The Journal of the Indian Mathematical Society, Vol 38, No 1-4 (1974), Pagination: 395-397Abstract
Improving on the results of Montgomery [3] and Huxley [1], Ramachandra proved (see Lemma 4 of [5]) the following large value theorem:
THEOREM 1. Let an = an(N) (n = N+1, . . . , 2N) be complex numbers subject to the condition max |an| = O(Nε) for every ε > 0. Suppose that n N does not exceed a fixed power of T to be defined. Let V be a positive number such that V+1/v= O(Tε)for every ε > 0. Let Sr (r = 1, 2, ...,R; R≥2) be a set of distinct complex numbers Sr = σr + itr and let min σr = σ, 3/4 ≤ σ ≤ 1,
max tr - min tr + 20 = T, min |tr - tr|≥(log T)2.
- Secure and Faster Clustering Environment for Advanced Image Compression
Authors
1 Department of Computer Science and Engineering, Dr Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu, IN
2 Department of Computer Science and Engineering, Manonmaniam Sundarnar University, Abishekapatti, Tirunelveli, Tamilnadu, IN
3 Department of Computer Science and Engineering, Einstein College of Engineering, Tirunelveli, Tamilnadu, IN
4 Department of Information Technology, PSN College of Engineering and Technology, Tirunelveli, Tamilnadu, IN
Source
International Journal of Advanced Networking and Applications, Vol 2, No 3 (2010), Pagination: 671-678Abstract
Cloud computing provides ample opportunity in many areas such as fastest image transmission, secure and efficient imaging as a service. In general users needs faster and secure service. Usually Image Compression Algorithms are not working faster. In spite of several ongoing researches, Conventional Compression and its Algorithms might not be able to run faster. So, we perform comparative study of three image compression algorithm and their variety of features and factors to choose best among them for cluster processing. After choosing a best one it can be applied for a cluster computing environment to run parallel image compression for faster processing. This paper is the real time implementation of a Distributed Image Compression in Clustering of Nodes. In cluster computing, security is also more important factor. So, we propose a Distributed Intrusion Detection System to monitors all the nodes in cluster . If an intrusion occur in node processing then take an prevention step based on RIC (Robust Intrusion Control) Method. We demonstrate the effectiveness and feasibility of our method on a set of satellite images for defense forces. The efficiency ratio of this computation process is 91.20.Keywords
Compression, Cluster, JPEG, Distributed Computing, Security.- An Analytical Performance Measure for Smooth Handoff in Mobile IPv6
Authors
1 Holy Cross College (Autonomous), Tiruchirappalli-620002, Tamilnadu, IN
2 Raja Duraisingam Government Arts College, Sivagangai, Tamil Nadu, IN
Source
International Journal of Advanced Networking and Applications, Vol 1, No 3 (2009), Pagination: 175-180Abstract
Mobility is the most important feature of a wireless communication system. The mobile device needs to connect multiple points of connection and perhaps multiple networks as it moves from one location to another. Handover management is the way a network uses to maintain connection to a mobile user as it moves and changes its access point to the network. The IETF’s mobile IP that uses mobile agents to support seamless handoffs, making it possible for mobile hosts to roam from subnet to subnet without changing IP addresses. To reduce the impact on the performance and the signaling overheads, hierarchical mobility management schemes define protocols that allow movements within a domain to be handled locally, without involvement of the mobile node’s home network. To reduce the packet losses during handoff, new schemes have been defined, such as smooth handoff. This paper surveys basic handover mechanisms with an analytical model of mobile Internet protocols and also we have propose a novel performance model to evaluate the packet loss and packet delay for UDP streams that is involved in a handoff. The reason for this loss is identified and solutions to this problem are projected. This paper proposes methodology include mathematical models which is able to predict the handoff latency with empirical study.Keywords
Mobility Management, Mobile IP, IPv4, IPv6, Smooth Handoff.- Estimated Bandwidth Distribution with Admission Control for Enhanced QoS Multicast Routing in MANETs
Authors
1 Holy Cross College (Autonomous), Tiruchirappalli-620002, IN
2 Rajah Duraisingam Government Arts College, Sivagangai, IN
Source
International Journal of Advanced Networking and Applications, Vol 1, No 2 (2009), Pagination: 69-75Abstract
Wireless networks become more widely used to support advanced services. Traditional approaches to guarantee quality of service (QoS) work well only with predictable channel and network access. The Multicast transmission is a more efficient mechanism when compared to uni-casting in supporting group communication applications and hence is an important aspect of future network developments. To enable high QoS for all admitted traffic, the Admission Control monitors the wireless channel and dynamically adapts admission control decisions to enable high network utilization while preventing congestion. Mobile Adhoc networks can provide multimedia users with mobility, if efficient QoS multicast strategies were developed. In load balancing QoS Multicast Routing QMR, constant available bandwidth for the link is assumed. A cross-layer framework to support QoS multicasting is extended for more effective than QMR. The extension reflects good packet delivery ratios associated with lower control overhead and lower packet delivery delay. If minimum real-time requirements are not met, these unusable packets waste scarce bandwidth and hinder other traffic, compounding the problem. Whereas the dynamically adapted mobility with control overhead monitors the high QoS for all admitted traffic, and the bandwidth for each node is enhanced to reflect the good packet delivery ratio associated with lower control overhead and lower packet delivery delay.Keywords
Admission Control, Bandwidth Estimation, Control Overhead (OH), Delivery Ratio, Load Balancing, QoS, QMR.- On the Number of Factorizations of an Integer
Authors
1 Institute of Mathematical Sciences, Taramani, Chennai, 600 113, IN
2 Homi Bhabha National Institute, Training School Complex, Anushakti Nagar, Mumbai, 400 094, IN
Source
Journal of the Ramanujan Mathematical Society, Vol 32, No 4 (2017), Pagination: 417–430Abstract
Let f (n) denote the number of unordered factorizations of a positive integer n into factors larger than 1. We show that the number of distinct values of f (n), less than or equal to x, is at most exp (C √log x / loglog x (1+o(1))), where C = 2π √ 2/3 and x is sufficiently large. This improves upon a previous result of the first author and F. Luca.- Impact of Observed Climate Change on the Classification of Agroclimatic Zones in India
Authors
1 India Meteorological Department, Shivajinagar, Pune 411 005, IN
2 India Meteorological Department, New Delhi 110 003, IN
Source
Current Science, Vol 117, No 3 (2019), Pagination: 480-486Abstract
The classification of agroclimatic zones in India was made in the 1990s for identifying priorities and developing strategies for location-specific and need-based research as well as overall agricultural development in the country. Long-term climatic parameters, particularly temperature and rainfall along with soil and crop information were used for the classification of agroclimatic zones. It has been documented with a fair degree of accuracy that overall climate is changing, particularly with respect to temperature over the Indian region. Thus it is anticipated that in the recent past, climate change may be reflected in the agroclimatic zones as well and ultimately affect the criteria of their classification based on climatic parameters. The objective of the present study is to examine the trends and spatial/temporal variability of temperature, rainfall, rainy days, and heavy rainfall in different agroclimatic zones of the country, which may help in better understanding of the further initiatives on reclassification of agroclimatic zones, if required. Using various long-term gridded data from 1985 and instrumental datasets starting from 1951 to 1980, studies have been made to observe changes in different components of the climatic variables, i.e. temperature and rainfall. It has been observed that there are significant changes in temperature and rainfall, both temporally and spatially, across India and there is a definite shift in temperature and rainfall patterns in the recent past compared to 1951–1980. It has also been inferred that there is a need to reconsider the classification of agroclimatic zones in India under the scenario of observed climate changes in the country.Keywords
Agroclimatic Zones, Classification, Climatic Parameters, Climate Change.References
- ICAR, agroclimatic zone specific research. In Indian Perspectives under NARP, Indian Council of Agricultural Research, New Delhi, 1991.
- Kothawale, D. R., Munot, A. A. and Krishna Kumar, K., Surface air temperature variability over India during 1901–2007 and its association with ENSO. Climate Res., 2010, 42, 89–104; doi:10.3354/ cr00857.
- Srivastava, A. K., Kothawale, D. R. and Rajeevan, M. N., Variability and long-term changes in surface air temperatures over the Indian subcontinent. In Observed Climate Variability and Change over the Indian Region, Springer, Singapore, 22 November 2016, 2017, 1st edn, pp. 17–36.
- Naidu, C. V., Srinivasa Rao, B. R. and Bhaskar Rao, D. V., Climatic trends and periodicities of annual rainfall over India. Meteorol. Appl., 1999, 6, 395–404; doi:10.1017/S1350482799001358.
- Chung, C. E. and Ramanathan, V., Weakening of North Indian SST gradients and the monsoon rainfall in India and the Sahel. J. Climate, 2006, 19, 2036–2045.
- Parthasarathy, B. and Dhar, O. N., Climate fluctuations over Indian region – rainfall: a review. Research Report No. RR-025. Indian Institute of Tropical Meteorology, Pune, 1978, p. 14.
- Rupa Kumar, K., Pant, G. B., Parthasarathy, B. and Sontakke, N. A., Spatial and sub-seasonal patterns of the long-term trends of Indian summer monsoon rainfall. Int. J. Climatol., 1992, 12, 257–268.
- Guhathakurta, P. and Rajeevan, M., Trends in rainfall pattern over India. Int. J. Climatol., 2008, 28, 1453–1469.
- Vijay Kumar, S. and Jain, K., Trends in rainfall amount and number of rainy days in river basins of India (1951–2004). Hydrol. Res., 2011, 42(4), 290–306; doi:10.2166/nh.2011.067.