scispace - formally typeset
Search or ask a question
Institution

KCG College of Technology

About: KCG College of Technology is a based out in . It is known for research contribution in the topics: Computer science & The Internet. The organization has 427 authors who have published 381 publications receiving 2193 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A new set of delay dependent sufficient conditions is derived in terms of linear matrix inequalities, which guarantees that all agents asymptotically converge to the convex hull with the prescribed H∞ and passive performance.
Abstract: This paper studies the consensus problem of a second-order nonlinear multi-agent system with directed topologies. A distributed control protocol is proposed for each agent using the relative states among neighboring agents. A mixed H∞ and passivity-based control is maneuvered to deal the bounded disturbances enduring in the system. Based on the theory of the sampled-data control technique and Lyapunov stability theory, some novel conditions are given to realize the consensus of a class of second-order multi-agent nonlinear systems. A new set of delay dependent sufficient conditions is derived in terms of linear matrix inequalities, which guarantees that all agents asymptotically converge to the convex hull with the prescribed H∞ and passive performance. Finally, an example with simulation results is given to verify the theoretical results.

7 citations

Journal ArticleDOI
TL;DR: The novelty of this proposed work is the implementation of a modified security algorithm along with the dedicated hardware key using embedded system which allows secure transmission and monitoring of process parameters through the internet.
Abstract: Embedded devices used in process industries are vulnerable to a variety of attacks due to its large number of deployments to reduce the measurement and process complexity. The security threats incr...

7 citations

Proceedings ArticleDOI
01 Dec 2012
TL;DR: This analysis was carried out on images of 187 apple fruits and shows that classification done based on median of PDF, shows that HSI model provides a highly effective color evaluation particularly for analyzing biological products.
Abstract: Fruits like apples are valued based on their appearance (i.e. color, sizes, shapes, presence of surface defects) and hence classified into different grades. Grading process helps in achieving better standards and quality of fruits. Of the many available color models, HSI model provides a highly effective color evaluation particularly for analyzing biological products. Human assessment furnishes only qualitative data and such inspection is time consuming and cost-intensive. Machine vision systems with specialized image processing software provide a solution that may satisfy the demand. The analysis was carried out on images of 187 apple fruits, shows that classification done based on median of PDF. In order to avoid the mismatch in grading the same it has been classified further using Histogram Intersection, which determines the closeness between two images i.e. 1 if two images are similar and 0 if they are dissimilar.

7 citations

Proceedings ArticleDOI
28 Dec 2009
TL;DR: The main focus in this work is to arrive at a matrix model for determining the numbers of visitors from various domains who expect to get the most recent and updated correct information content what they searching for.
Abstract: The objective of this paper is to propose new web metrics based on its usability and effectiveness for different web domain users of the page through the available utilities and its visual appearance. The earlier metrics concentrated on the number of visits, cost per visit and clicks to download ratio are not sufficient enough to fully assess the web quality and the impact of the page features on the number of visitors. To satisfy the small group of visitors of different business views and expectations, the web content and the provision for navigating within the site is playing a vital role The efficiency of a web page is viewed as the ratio of the relative cost of page features and network resources to the number of visits and the effectiveness is the ratio of the actual user expectation to the desired number of web users. The different classes of the web pages based on their domains are considered and new metrics are proposed. A visual simulator has been developed to determine the impact of the individual utility metrics on the total number of hit count values based on the survey results. The main focus in this work is to arrive at a matrix model for determining the numbers of visitors from various domains who expect to get the most recent and updated correct information content what they searching for.

7 citations

Journal ArticleDOI
TL;DR: The simulation results proved the efficiency of the proposed trust based framework on detecting dishonest nodes, the malicious data transmitted by the honest/dishonest nodes and also detecting the colluding attacks that destroys the network resources in a short period.
Abstract: This paper proposes a new Trust based DDoS Attack Removal Framework (T-DARF) for effective trust management in VANETs. Based on a newly developed data centric validation unit and intrusion detection unit, all the misbehaving nodes are removed and allows the framework to prevent DDoS attacks in a distributed and collaborative manner. In other words, our proposed framework ensures a trusted, reliable communication between vehicles and delivering reduced network overhead by handling the DDoS attacks. T-DARF is built of three elements: (1) for the detection of dishonest nodes it includes a collaborative and distributed elements, (2) to filter the malicious data it includes a data-centric validation element, and (3) a delay checking element for the detection and prevention against DoS and DDoS attacks. Also, a new trust-based routing protocol is developed that uses the idea of companions (i.e. integrating the notions of link quality and trust value of neighbors) to select the trusted vehicles and to select the optimal path we imposed a hybrid Dragonfly based particle swarm optimization (DPSO) algorithm. The simulation results proved the efficiency of our proposed trust based framework on detecting dishonest nodes, the malicious data transmitted by the honest/dishonest nodes and also detecting the colluding attacks that destroys the network resources in a short period. Also, T-DARF in a worst case scenario can sustain its performance degrees and outperforms the effectiveness of existing schemes such as TRIP, AECFV and T-CLAIDS.

7 citations


Authors

Showing all 427 results

NameH-indexPapersCitations
G. Nagarajan462757004
Raghavan Murugan331263838
B. Nagalingam22292255
G. V. Uma201081357
V. Edwin Geo18631023
R. Lakshmipathy1230442
Sellappan Palaniappan1129803
M. Kannan1028309
B. Vidhya1046399
S. Ramesh948503
R. Gladwin Pradeep921190
T. Ravi823153
K. Vijayaraja815133
C. Clement Raj78212
Maya Joby712309
Network Information
Related Institutions (5)
Amrita Vishwa Vidyapeetham
11K papers, 76.1K citations

79% related

National Institute of Technology, Rourkela
10.7K papers, 150.1K citations

78% related

Thapar University
8.5K papers, 130.3K citations

77% related

National Institute of Technology, Karnataka
7K papers, 70.3K citations

77% related

National Institute of Technology, Tiruchirappalli
8K papers, 111.9K citations

77% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20221
2021102
202039
201957
201839
201741