Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 55 )

2018 ( 274 )

2017 ( 292 )

2016 ( 459 )

Custom range...

Search Results: 1 - 10 of 223663 matches for " R. Jeevarathinam "
All listed articles are free for downloading (OA Articles)
Page 1 /223663
Display every page Item
R. Jeevarathinam,,Dr. Antony Selvadoss Thanamani
International Journal of Engineering Science and Technology , 2010,
Abstract: Verification and Validation of software systems often consumes up to 70% of the development resources. Testing is one of the most frequently used Verification and Validation techniques for verifyingsystems. Many agencies that certify software systems for use require that the software be tested to certain specified levels of coverage. Currently, developing test cases to meet these requirements takes a major portion of the resources. Automating this task would result in significant time and cost savings. This testing research is aimed at the generation of such test cases. In the proposed approach a formal model of the required software behavior (a formal specification) is used for test-case generation and as an oracle to determine if theimplementation produced the correct output during testing. This is referred to as Specification Based Testing. Specification based testing offers several advantages to traditional code based testing. The formal specification can be used as the source artifact to generate functional tests for the final product and since the test cases are produced at an earlier stage in the software development, they are available before the implementation is completed. Central to this approach is the use of model checkers as test case generation engines. Model checking is a technique for exploring the reachable state-space of a system model to verify properties of interest.There are several research challenges that must be addressed to realize this test generation approach.
Test Case Generation using Mutation Operators and Fault Classification
Mrs. R. Jeevarathinam,Dr. Antony Selvadoss Thanamani
Computer Science , 2010,
Abstract: Software testing is the important phase of software development process. But, this phase can be easily missed by software developers because of their limited time to complete the project. Since, software developers finish their software nearer to the delivery time; they dont get enough time to test their program by creating effective test cases. . One of the major difficulties in software testing is the generation of test cases that satisfy the given adequacy criterion Moreover, creating manual test cases is a tedious work for software developers in the final rush hours. A new approach which generates test cases can help the software developers to create test cases from software specifications in early stage of software development (before coding) and as well as from program execution traces from after software development (after coding). Heuristic techniques can be applied for creating quality test cases. Mutation testing is a technique for testing software units that has great potential for improving the quality of testing, and to assure the high reliability of software. In this paper, a mutation testing based test cases generation technique has been proposed to generate test cases from program execution trace, so that the test cases can be generated after coding. The paper details about the mutation testing implementation to generate test cases. The proposed algorithm has been demonstrated for an example.
Realization of Unified Power Quality Conditioner for Mitigating All Voltage Collapse Issues  [PDF]
Parthasarathy Pugazhendiran, Jeevarathinam Baskaran
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.76067
Abstract: This paper proposes about a powerful control mechanism of UPQC (Unified Power Quality Conditioner) work on voltage source inverter which can effectively compensate source current harmonics and also mitigate all voltage collapse such as dip, swell, voltage unbalances and harmonics. The consolidation of series and parallel active power filters sharing mutual DC bus capacitor forms UPQC. PI (Proportional Integral) controller is mainly used in order to maintain continual DC voltage along with the hysteresis current controller. The parallel and series power filters were designed using 3-phase voltage source inverter. The reference signals for shunt and series active power filters were obtained by Synchronous Reference Frame (SRF) theory and Power Reactive (PQ) theory respectively. By using these theories, reference signals were obtained which was fed to the controllers for generating switching pulses for parallel and series active filters. The UPQC dynamic performance is obtained through testing terms like the compensation of voltage, current harmonics and all voltage distortion associated with 3-phase 3-wire power system which is simulated using MATLAB-Simulink software.
Overview Of Tenet: Architecture For Tiered Sensor Networks
International Journal of Engineering Science and Technology , 2011,
Abstract: Most sensor network research and software design has been guided by an architectural principle that permits multi-node data fusion on small-form-factor, resource-poor nodes, or motes. We argue that this principle leads to fragile and unmanageable systems and explore an alternative. The Tenet architecture is motivated by the observation that future large-scale sensor network deployments will be tiered, consisting of motes in the lower tier and masters, relatively unconstrained 32-bit platform nodes, in the upper tier. Masters provide increased network capacity. Tenet constrains multimode fusion to the master tier while allowing motes to process locallygeneratedsensor data. This simplifies application development and allows mote-tier software to be reused. Applications running on masters task motes by composing task descriptions from a novel tasklet library. OurTenet implementation also contains a robust and scalable networking subsystem for disseminating tasks and reliably delivering responses. We show that a Tenet pursuit-evasion application exhibits performancecomparable to a mote-native implementation while being considerably more compact.
International Journal of Engineering Science and Technology , 2011,
Abstract: Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, eg., images, audio, and video files. The remarkable growth in computational power, increase in current security approaches and techniques are often used together to ensures security of the secret message. Steganography’s ultimate objectives, which are capacity and invisibility, are the main factors that separate it from related techniques. In this paper we focus on 3D models of steganography and conclude with some review analysis of high capacity data hiding and low-distortion 3D models.
Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET
K. Lakshmi,K.Thilagam,K. Rama,A.Jeevarathinam
International Journal of Computer Technology and Applications , 2012,
Abstract: VANETs (Vehicular Ad hoc Networks) are highlymobile wireless ad hoc networks and will play animportant role in public safety communicationsand commercial applications. In VANET nodeswhich are vehicles can move safety with highspeed and must communicate quickly andreliably. When an accident occurs in a road orhighway, alarm messages must be disseminated,instead of ad hoc routed, to inform all othervehicles. Vehicular ad hoc network architectureand cellular technology to achieve intelligentcommunication and improve road traffic safetyand efficiency . VANET can perform effectivecommunication by utilizing routing information.In this paper, we have discussed about threegreedy routing algorithms, and have comparedto show which one is efficient in deliveringpackets in terms of mobility, nodes andtransmission range
Vibrational Resonance in the Duffing Oscillator with Distributed Time-Delayed Feedback
C. Jeevarathinam,S. Rajasekar,M. A. F. Sanjuan
Physics , 2015,
Abstract: We analyze the vibrational resonance in the Duffing oscillator system in the presence of (i) a gamma distributed time-delayed feedback and (ii) integrative time-delayed (uniformly distributed time delays over a finite interval) feedback. Particularly, applying a theoretical procedure we obtain an expression for the response amplitude $Q$ at the low-frequency of the driving biharmonic force. For both double-well potential and single-well potential cases we are able to identify the regions in parameter space where either (i) two resonances, (ii) a single resonance or (iii) no resonance occur. Theoretically predicted values of $Q$ and the values of a control parameter at which resonance occurs are in good agreement with our numerical simulation. The analysis shows a strong influence of both types of time-delayed feedback on vibrational resonance.
Vibrational resonance in groundwater-dependent plant ecosystems
C. Jeevarathinam,S. Rajasekar,Miguel A. F. Sanjuan
Quantitative Biology , 2013,
Abstract: We report the phenomenon of vibrational resonance in a single species and a two species models of groundwater-dependent plant ecosystems with a biharmonic oscillation (with two widely different frequencies \omega and \Omega, \Omega >> \omega) of the water table depth. In these two systems, the response amplitude of the species biomass shows multiple resonances with different mechanisms. The resonance occurs at both low- and high-frequencies of the biharmonic force. In the single species bistable system, the resonance occurs at discrete values of the amplitude g of the high-frequency component of the water table. Furthermore, the best synchronization of biomass and its carrying capacity with the biharmonic force occurs at the resonance. In the two species excitable and time-delay model, the response amplitude (Q) profile shows several plateau regions of resonance, where the period of evolution of the species biomass remains the same and the value of Q is inversely proportional to it. The response amplitude is highly sensitive to the time-delay parameter \tau and shows two distinct sequences of resonance intervals with a decreasing amplitude with \tau.
Modified AODV Protocol against Blackhole Attacks in MANET
K. Lakshmi,S.Manju Priya,,A.Jeevarathinam,,K.Rama
International Journal of Engineering and Technology , 2010,
Abstract: Mobile Adhoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly vulnerabledue to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and constrained capability. So security in MANET is a complex issue. There are many routing protocols that establish the routes between the nodes in the network. The control towards the management of the nodes in the MANET is distributed. This features does not give assurance towards the security aspects of the network. There are many routing attacks caused due to lack of security. In this paper, therefore, we attempt to focus on analyzing and improving the security of one of the popularrouting protocol for MANET viz. the Adhoc On Demand Distance Vector (AODV) routing protocol. Our focus specifically, is on ensuring the security against the Blackhole Attack. The proposed solution is that capable of detecting and removing black hole nodes in the MANET at the initial stage itself without any delay.
A Novel approach for identifying greedy nodes in wireless sensor network by using EEGN algorithm
S.Manju Priya,K.Thilagam,,K.Rama,,A.Jeevarathinam
International Journal on Computer Science and Engineering , 2010,
Abstract: WSN have attracted a great deal of research attention due to then wide range of applications. The life span of the sensor network is limited to its residual power. In order to increase the energy of the nodes it is necessary to implement energy algorithms. Current work is focused on two main issues: the problem which occurs in the multipath routing and how to identify and remove the greedy node which causes energy loss. In this paper, we propose an energy efficient algorithm by removing greedy node (EEGN) which helps to increase the energy of the nodes and its lifetime.
Page 1 /223663
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.