scispace - formally typeset
Search or ask a question
Institution

Kongu Engineering College

About: Kongu Engineering College is a based out in . It is known for research contribution in the topics: Cluster analysis & Control theory. The organization has 2001 authors who have published 1978 publications receiving 16923 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The experiment results show that the proposed approach is efficient and outperforms the existing approach and the proposed system generates optimal summary by Genetic Algorithm-based sentence extraction strategy.
Abstract: Automatic document summarisation is the process of generating a summary of the original documents with the aim of shorter reading time. Sentence extraction is a widely adopted document summarisation technique by which relevant sentences are extracted from documents. The proposed system generates optimal summary by Genetic Algorithm-based sentence extraction strategy. Based on individual word weight and other sentence-specific features sentence score is calculated. To produce optimal summary fitness function is used. Machine-generated summaries are compared against human summaries using different measures. The experiment results show that the proposed approach is efficient and outperforms the existing approach.

7 citations

Proceedings ArticleDOI
20 Jul 2011
TL;DR: In this article, neutral point clamped inverter is combined with 12 sector methodology to restrict the torque and the flux errors, within torque and flux hysteresis bands, which results in production of ripples in the flux as well as torque.
Abstract: Direct Torque Control (DTC) is an advanced computation speed control method and is possibly the best among the techniques for variable frequency drive. Because it does not need axes transformation and voltage decoupling blocks. DTC provides direct selection of voltage vectors according to the error obtained and allows direct and independent control of flux linkage and electromagnetic torque by the selection of optimum inverter switching modes. Based on the estimates of flux position and instantaneous errors in torque and stator flux magnitude, a voltage vector is selected to restrict the torque and the flux errors, within the torque and flux hysteresis bands. In the conventional DTC the circular locus is divided into 6 sectors and a total of 8 voltage vectors are used. However, the discrete inverter switching vectors cannot always generate exact stator voltage required to obtain the demanded electromagnetic torque and stator flux linkages. This results in production of ripples in the flux as well as torque. In this proposed work, neutral point clamped inverter is combined with 12 sector methodology. At present, the researchers have used all the 27 voltage vectors available in the 12 sector methodology. But in this proposed work the new switching table is constructed by using only 12 voltage vectors which includes large, medium and zero voltage vectors. The usage of 12 voltage vector gives satisfactory performance as compared to usage of all the 27 voltage vectors. The performance of the proposed work is also compared with classical DTC and 12 sector methodology with 27 voltage vectors. The simulation is performed in MATLAB / SIMULINK environment.

7 citations

Proceedings ArticleDOI
17 Jul 2019
TL;DR: This paper has presented various IDS research contribution for RPL based routing attacks, and classified the proposed IDS in the literature, according to the detection techniques.
Abstract: Routing Protocol for Low power and Lossy Network (RPL) is a light weight routing protocol designed for LLN (Low Power Lossy Networks). It is a source routing protocol. Due to constrained nature of resources in LLN, RPL is exposed to various attacks such as blackhole attack, wormhole attack, rank attack, version attack, etc. IDS (Intrusion Detection System) is one of the countermeasures for detection and prevention of attacks for RPL based loT. Traditional IDS techniques are not suitable for LLN due to certain characteristics like different protocol stack, standards and constrained resources. In this paper, we have presented various IDS research contribution for RPL based routing attacks. We have also classified the proposed IDS in the literature, according to the detection techniques. Therefore, this comparison will be an eye-opening stuff for future research in mitigating routing attacks for RPL based IoT.

7 citations

Journal ArticleDOI
TL;DR: In this article, the pre-treatment of tannery wet-blue wastewater using photo-oxidation of green synthesised iron nanocatalyst was examined, and the major variables which can influence the photooxidation process for the wet blue wastewater were discussed.
Abstract: The pre-treatment of tannery wet-blue wastewater was examined using photo-oxidation of green synthesised iron nanocatalyst. The major variables which can influence of photo-oxidation process for ta...

7 citations

Journal ArticleDOI
TL;DR: In this article, the multi-response optimization for abrasive waterjet machining (AWJM) of glass fiber reinforced plastics (GFRP) was performed. And the experiments were conducted with AWJM factors like pre...
Abstract: This work aims to perform the multi-response optimization for abrasive waterjet machining (AWJM) of glass fiber reinforced plastics (GFRP). The experiments were conducted with AWJM factors like pre...

7 citations


Authors
Network Information
Related Institutions (5)
Anna University
19.9K papers, 312.6K citations

89% related

VIT University
24.4K papers, 261.8K citations

89% related

National Institute of Technology, Rourkela
10.7K papers, 150.1K citations

88% related

SRM University
11.7K papers, 103.7K citations

88% related

Thapar University
8.5K papers, 130.3K citations

87% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202221
2021572
2020234
2019121
2018143
2017136