Institution
Kongu Engineering College
About: Kongu Engineering College is a based out in . It is known for research contribution in the topics: Cluster analysis & Control theory. The organization has 2001 authors who have published 1978 publications receiving 16923 citations.
Topics: Cluster analysis, Control theory, Response surface methodology, Wireless sensor network, Ultimate tensile strength
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this article, the authors used space-borne optical and synthetic aperture radar (SAR) imagery to measure the ice surface velocity at high spatial resolution for a part of the central Dronning Maud Land (cDML), East Antarctica.
5 citations
••
TL;DR: A twofold collaborative mechanism, wherein the intermediate routers are engaged in markings and the victim uses these markings for detecting and filtering the flooding attacks, and the effectiveness of the proposed system in distinguishing the legitimate traffic from the spoofed is shown.
Abstract: The basis of denial of service (DoS)/distributed DoS (DDoS) attacks lies in overwhelming a victim's computer resources by flooding them with enormous traffic. This is done by compromising multiple systems that send a high volume of traffic. The traffic is often formulated in such a way that it consumes finite resources at abnormal rates either at victim or network level. In addition, spoofing of source addresses makes it difficult to combat such attacks. This paper adopts a twofold collaborative mechanism, wherein the intermediate routers are engaged in markings and the victim uses these markings for detecting and filtering the flooding attacks. The markings are used to distinguish the legitimate network traffic from the attack so as to enable the routers near the victim to filter the attack packets. The marked packets are also helpful to backtrack the true origin of the spoofed traffic, thus dropping them at the source rather than allowing them to traverse the network. To further aid in the detection of spoofed traffic, Time to Live (TTL) in the IP header is used. The mappings between the IP addresses and the markings along with the TTLs are used to find the spurious traffic. We provide numerical and simulated experimental results to show the effectiveness of the proposed system in distinguishing the legitimate traffic from the spoofed. We also give a statistical report showing the performance of our system.
5 citations
•
04 Jun 2009TL;DR: In this article, a low cost power parameter monitor based on PIC16F877A is proposed as a low-cost alternative for power quality analyzers, which measures voltage and current in three phase supply and display the power parameters like RMS voltage, RMS current, active power, Reactive power, Apparent power, Power factor, Harmonics(THD).
Abstract: This paper proposes a low cost power parameter monitor based on PIC16F877A. It is developed as a low cost alternative for power quality analyzers. The device measures voltage and current in three phase supply and display the power parameters like RMS voltage, RMS current, Active power, Reactive power, Apparent power, Power factor, Harmonics(THD). To measure voltages and currents from power distribution lines signal conditioning circuits are used and to display the power parameters a 2×16 LCD display is used. By using RS232 interface data can be transmitted to the computer system and it can be used for further analysis. To handle more number of data during processes using I2C serial EEPROM increases memory.
5 citations
••
TL;DR: A method for symmetric trapezoidal fuzzy number approximation which preserves the expected interval is proposed and some properties of approximation are proved and a fuzzy partition is generated by using the proposed method.
Abstract: Fuzzy number approximation has been investigated by many researchers. It is still useful to develop new approximations in order to better fit real world problems. This paper proposes a method for symmetric trapezoidal fuzzy number approximation which preserves the expected interval. Some properties of approximation are proved and a fuzzy partition is generated by using the proposed method.
5 citations
•
TL;DR: In this paper, an attempt has been made to study the effect of fundamental and operating variables on liquid holdup and solid holdup in a three-phase fluidizing bed using Newtonian and non-Newtonian systems.
Abstract: Three-phase fluidizing beds have emerged in recent years as one of the most promising devices for three-phase operations. Such a device is of considerable industrial importance in chemical and biochemical industries, wastewater treatment and other biochemical processes. For the design and development of three-phase fluidized bed reactors, knowledge of hydrodynamic parameters viz., liquid holdup and solid holdup is essential. Hence, in this paper, an attempt has been made to study the effect of fundamental and operating variables on liquid holdup and solid holdup. Besides, on the basis of the experimental results, the correlations were developed to predict these holdups in a three-phase fluidized bed using Newtonian and non-Newtonian systems covering a wide range of operating and fundamental variables. The statistical analysis showed that the predictive ability of the present proposed correlations is found to be a good fit with present experimental data and literature data.
5 citations
Authors
Showing all 2001 results
Name | H-index | Papers | Citations |
---|---|---|---|
Thalappil Pradeep | 76 | 581 | 24664 |
Kumarasamy Thangaraj | 47 | 361 | 11869 |
Pagavathigounder Balasubramaniam | 46 | 268 | 6935 |
J. Prakash Maran | 34 | 56 | 3636 |
S. Saravanan | 30 | 209 | 3308 |
Rathanasamy Rajasekar | 23 | 86 | 2142 |
V. Sivakumar | 23 | 93 | 2265 |
K. Thirugnanasambandham | 21 | 31 | 1759 |
Subramaniam Shankar | 20 | 104 | 1510 |
P. Sivakumar | 19 | 132 | 1464 |
N. Sivarajasekar | 18 | 60 | 1025 |
S. Selvakumar | 18 | 68 | 1155 |
Zaharias D. Zaharis | 17 | 128 | 1179 |
P. Balasubramanie | 16 | 27 | 469 |
P. N. Palanisamy | 16 | 47 | 754 |