Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by M. Anand
Total Records ( 4 ) for M. Anand
  S. Manikandan , S. Ganesapandian , Manoj Singh , M. Anand and A.K. Kumaraguru
  Coral reef ecosystem in the Gulf of Mannar and Palk bay have been extensively damaged due to over fishing, sedimentation, dynamite fishing etc. Coral bleaching is an usual phenomena in summer and at extreme case the bleaching response is fatal to the coral. Bottom temperature during the months of April and May 2010 had significant change in both GoM and Palk bay and ranged between 31 to 31.9°C. Massive corals Porites solida, Porites lutea and Favia spp. and branch corals Acropora cytherea, A. intermedia, A. formosa, A. nobilis and Mantipora digitata were affected. Percentage of coral bleaching during April 2010 was 72 and 75% in GoM and Palk bay, further this level increased to 85.1 and 87.2%, respectively. Coral recovery was found during June to August 2010 in GoM and Palk Bay region. The phenomenon of coral bleaching has been taking place periodically all over the world. Therefore, in spite of the odds, the corals will resurge under the sea, which we need to protect and conserve for our benefit.
  R.M. Kumaresh Babu and M. Anand
  An overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream into blocks, associate each block with a signature and spread the effect of the signature across, all the packets in the block through hash graphs or coding algorithms. The correlation among packets makes them vulnerable to packet loss which is inherent in the internet and wireless networks. Moreover, the lack of Denial of Service (DoS) resilience renders most of them vulnerable to packet injection in hostile environments. In this study, researchers propose a novel multicast authentication protocol, namely MABS, including two schemes. The basic scheme (MABS-B) eliminates the correlation among packets and thus, provides the perfect resilience to packet loss and it is also efficient in terms of latency, computation and communication overhead due to an efficient cryptographic primitive called batch signature which supports the authentication of any number of packets simultaneously. Researchers, also present an enhanced scheme MABS-E which combines the basic scheme with a packet filtering mechanism to alleviate the DoS impact while preserving the perfect resilience to packet loss.
  G. Manikandan and M. Anand
  Fast Fourier Transform (FFT) is one of the major operations in any communication system. The efficiency of the communication system is depends on the internal process (FFT/IFFT) of the system. In this study, designed a VLSI based 128-point mixed radix with combined Single path Delay Feedback (SDF) Single path Delay Commutator (SDC) FFT structure. The mixed Radix-2 and Radix-4 FFT architecture provide fast computation during the process. Combined SDF-SDC dataflow structure has different advantages, SDF structure is used to improving the speed of the process and the SDC structure is used to reducing the area (LUTs and slices) utilization and also reducing the power consumed by the processor. Because of these advantages only combined the both structure and get the efficient performance of the FFT architecture. The proposed architecture is applied into the OFDM communication system for speed transmission. Simulation of the proposed architecture is done by using ModelSim simulation environment. The performance can be analyzed and validated by Xilinx plan-ahead 12.4 tool.
  K. Sudhaman , M. Anand and M. Janakirani
  Individual nodes of a Wireless Sensor Network (WSN) could be easily compromised by the adversary due to the constraints such as limited battery lifetime, memory space and computing capability deployed in a hostile environment. It is critical to detect and isolate the compromised nodes in order to avoid being misled by the falsified information injected by the adversary through compromised nodes. There are large numbers of studys that describe the adversary detection scheme in wireless sensor networks. Each study has its own disadvantages. In this study, a Quality of Service (QoS) and Angle based adversary detection scheme is proposed for wireless sensor networks. Simulation results show that the proposed QADS scheme is better compared to the existing scheme.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility