Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 184 )

2018 ( 278 )

2017 ( 279 )

2016 ( 379 )

Custom range...

Search Results: 1 - 10 of 219543 matches for " C. Sasikumar "
All listed articles are free for downloading (OA Articles)
Page 1 /219543
Display every page Item
Performance Analysis of Fuzzy Flatness Based Speed Control of Three Phase Induction Motor
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering , 2013,
Abstract: Induction motor plays a vital role in engineering and industry. Induction motor offer a convenient means for controlling the operation of different equipment used in industry. Induction motor input supply will give from the voltage source inverter for its speed control purpose. If we connect induction motor directly to the AC supply its speed control will not applicable, so that we go inverter fed induction motor speed control. Gate pulse has been given by using FPGA processor. Fuzzy flatness program has been flashed in the FPGA processor for generating the gate pulse for VSI inverter. FPGA processor is directly fed to opto-coupler and the driver circuit and then it has given to VSI inverter. Her closed loop control has been achieved by using inductive type proximity sensor. In closed loop control when input voltage has been changed but speed of the induction motor has maintained constant. Fuzzy flatness based control is applied in the speed controller of induction motor. This method gives better efficiency of induction motor speed control. Fuzzy flatness controller method for induction motor gives better performance and reduces tracking error and reduces the torque ripple.
Gas Leakage Detection and Monitoring Based on Low Power Microcontroller and Xbee
International Journal of Engineering and Technology , 2013,
Abstract: Gas leakage detection and monitoring through wireless sensor network is considered to be more economical for industries gas leakage. Main purpose of this system model is to avoid damages and safety of gas industry. The entire control system is based on is based on low power MSP430 microcontroller and Xbee techniques. The sensor node helps in collecting data regarding gas leakage and the particular area of sensor node address is located. The collected information is sent to the monitoring client or user to update the data. Data packets are continuously transmitted from sensor nodes and communication devices. This system helps to minimizing human intervention and reduces power consumption, thus providing greater performance. This paper focus on overall modeling and design on both software and hardware part to accomplish it.
Design of Transportation Robot and Ultrasonic Obstacle Detection with Wireless Monitoring
C. Sasikumar,P. Rakeshmalhotra,M. Ragul,D. Manivannan
Journal of Artificial Intelligence , 2013,
Abstract: Robot is an economical pilotless transportation in forest and industries for detecting obstacles and for monitoring to prevent damages of robot. Avoidance of obstacle is based on PIC microcontroller, Sensor and wireless techniques. The whole system can be made functional and deployed. It stops the robot when there is an obstacle and passes the information to the client about the barrier. The system is monitored through Groupe Special Mobile (GSM) and Radio frequency identification and detection (RFID). Vehicle navigation is carried out using RFID technology and ultrasonic sensor is used to detect the obstacle. If any obstacle is detected, the information is sent to the user through GSM. Battery power and overload is monitored to indicate the worker as well as to send information to main user through GSM. Embedded system helps to minimize human power, decreases power consumption and provides greater performance.
Enhanced Path Roperties of Brownian Motion
R. Sasikumar
Journal of Engineering and Applied Sciences , 2012, DOI: 10.3923/jeasci.2010.382.387
Abstract: Human lives are full of uncertainties as with many natural phenomena. No one can precisely foresee what will happen in the next second, minute and so on. The sample realization of a stochastic process are vital from the point of view of Brownian path analysis. A Brownian Motion (BM) with drift zero and diffusion coefficient, one is defined as standard BM whose path properties are used for analysis in several physical and chemical problems. Rather than accepting the fact that the future is always uncertain, many models and algorithms have been continuously formulated for the prediction of matters involving uncertain elements. One of them is the Brownian model. In this study, we discuss the enhanced path properties of a one dimensional standard Brownian motion B(t), t≥0 on a complete probability space (Ω, F, P). The law of the iterated logarithm about how Brownian Motion (BM) oscillates in a neighbourhood of the origin is also discussed.
Network Security
Sasikumar Gurumurthy
Lecture Notes in Engineering and Computer Science , 2010,
Chaos game representation for comparison of whole genomes
Jijoy Joseph, Roschen Sasikumar
BMC Bioinformatics , 2006, DOI: 10.1186/1471-2105-7-243
Abstract: We present here a fast algorithm for identifying all local alignments between two long DNA sequences using the sequence information contained in CGR points. The local alignments can be depicted graphically in a dot-matrix plot or in text form, and the significant similarities and differences between the two sequences can be identified. We demonstrate the method through comparison of whole genomes of several microbial species. Given two closely related genomes we generate information on mismatches, insertions, deletions and shuffles that differentiate the two genomes.Addition of the possibility of large scale sequence alignment to the repertoire of alignment-free sequence analysis applications of chaos game representation, positions CGR as a powerful sequence analysis tool.Chaos game representation was proposed as a scale-independent representation for genomic sequences by H.J. Jeffrey [1]. A CGR of a DNA sequence is plotted in a unit square, the four vertices of which are labelled by the nucleotides A-(0,0), C-(0,1), G-(1,1), T-(1,0). The plotting procedure can be described by the following steps: the first nucleotide of the sequence is plotted halfway between the centre of the square and the vertex representing this nucleotide; successive nucleotides in the sequence are plotted halfway between the previous plotted point and the vertex representing the nucleotide being plotted.Mathematically coordinates of the successive points in the chaos game representation of a DNA sequence is described by an iterated function system defined by the following equations X i = 0.5 ? ( X i ? 1 + g ix ) Y i = 0.5 ? ( Y i ? 1 + g iy ) } ( 1 ) MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaadaGacaqaauaabeqaceaaaeaacqqGybawdaWgaaWcbaGaeeyAaKgabeaakiabg2
Mobile Agent Framework for Network Intrusion Detection System with Classification Algorithm
R. Sasikumar,D. Manjula
Asian Journal of Information Technology , 2012, DOI: 10.3923/ajit.2012.237.243
Abstract: Wireless computingis the delivery of computingas aservicerather than aproduct, whereby shared resources, software and information are provided to users over anetwork. Wireless computing entrusts services with a user's data, software and computation on a published Application Programming Interface (API) over a network. Wireless computing is defined in simplest terms as follows: A set of pooled computing resources, delivered over the web, powered by software. It is a form of computing that involves the interaction of several virtualized resources, meaning that many servers are connecting and sharing information that can expand and contract across servers depending on the amount of servers needed to manage the amount of traffic on various sites. Wireless allows the end users to use the application without installation and access their personal files at any computer with internet access. Apart from the advantages of wireless environment, security is the major issue. Due to the distributed nature, wireless environment is an easy target for intruders looking for the possible attacks to exploit. There are many advantages in wireless computing such as increased storage, highly automated, flexibility, mobility, etc. apart from these advantages the major issue in wireless environment is security. Due to the distributed nature of the wireless environment many users can access the wireless to utilize the service. So, there is a chance for an intruder or attacker to exploit an attack in the wireless environment. In order to address this issue in the wireless environment an Intrusion Detection System (IDS) is proposed based on the features of the mobile agent. The mobile agents are used to collect and analyze the data collected from wireless environment to identify attacks exploited by the intruders. The main objective of the proposed system is to detect the known and new attacks exploited by the intruders in the wireless environment.
Multi Agent System for Improving TCP/IP Performance over Wireless Networks
B. Sasikumar,V. Vasudevan
International Journal of Soft Computing , 2012,
Abstract: As 3rd Generation (3G) wireless networks withhigh data rate get widely deployed, optimizing TCP performance over these networks would have a broad and significant impact on data application performance. One of the biggest challenges in optimizing TCP performance over the 3G wireless networks is adapting to the significant delay and rate variations over the wireless channel. In this study, we make two main contributions. First, we present a Window Regulator algorithm that uses the receiver window field in the acknowledgment packets to convey the instantaneous wireless channel conditions to the TCP source and an ack buffer to absorb the channel variations, thereby maximizing long-lived TCP performance. It improves the performance of TCP Sack by up to 100% over a simple drop-tail algorithm for small buffer sizes at the congested router. Second, we present a wireless channel and TCP-aware scheduling and buffer sharing algorithm that reduces the latency of short TCP flows by up to 90% while still exploiting user diversity, thus allowing the wireless channel to be utilized efficiently. TCP protocols implemented in multiagent system.
Facial Expression Recognition from Global and a Combination of Local Features
Praseeda Lekshmi,Sasikumar M
IETE Technical Review , 2009,
Abstract: In this paper, facial expressions are identified using contour information, along with the Gabor features extracted from highly expression-reflected facial features. We propose a novel technique to extract Gabor features from a selected region of interests. The computational complexity is reduced by a suitable selection of Gabor filters for the representation of transformed face images. Support Vector Machine classification technique is used to identify the expression that belongs to the face images.
Image Fidelity Metrics: Future Directions
Navas K,Sasikumar M
IETE Technical Review , 2011,
Abstract: All multimedia signal processing algorithms need suitable fidelity metrics for validating the results. Audio, image, and video are the major signals associated with multimedia, and the researchers rely upon objective metrics rather than subjective metrics due to pragmatic and uneconomic aspects of the latter. This paper analyses the available human visual system (HVS)-based objective fidelity metrics for the image processing, and highlights the inadequacy of the metrics for a special set of images known as region-of-interest (ROI) images and discusses a few research directions in this area.
Page 1 /219543
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.