Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by P. Yogesh
Total Records ( 5 ) for P. Yogesh
  P. Yogesh , S. Bose and A. Kannan
  Rate control is an important issue in video streaming application for both wired and wireless networks. A widely accepted rate control method in wired networks is TCP Friendly Rate Control (TFRC). TFRC assumes that packet loss in wired networks is primarily due to congestion and as such is not be applicable to wireless networks in which the bulk of packet loss is at the physical layer. Hence the multiple TFRC Connections (MULTFRC) are being used as an existing approach, which is an end-to-end based solution to this problem. By opening appropriate number of TFRC connections, MULTFRC not only avoids modifications to the network infrastructure but also results in full utilization of the wireless bandwidth. However MULTFRC suffers form underutilization of resources and loss of granularity in number of connections. To address these drawbacks, we propose a modified TFRC rate control scheme that combines multiple connections to one connection and improves the performance of streaming over wireless networks. We name our rate control scheme as CTFRC (Consolidated TFRC) with loss handling mechanism. We carried out NS-2 simulations to compare the performance of MULTFRC and our own rate control scheme.
  S. Sujatha , P. Vivekanandan , P. Yogesh and A. Kannan
  Mobile Ad hoc network (MANET) is gaining more importance and popularity due to the proliferation of miniature yet powerful mobile computing devices. MANET is more vulnerable due to its networks characteristics, such as dynamic topology, distributed cooperation and open medium. Ad hoc On demand Distance Vector (AODV) protocol is the most popular reactive routing protocol designed for the MANET. AODV is vulnerable to both external and internal security attacks. In this study, we analyze the vulnerabilities of AODV protocol, specifically the internal attacks and we propose solutions to monitor the attack by using an Intrusion Detection System (IDS). Our solution is based on a Fuzzy Based Response Model (FBRM).
  S. Bose , P. Yogesh and A. Kannan
  This study proposes a distributed intrusion detection system for adhoc wireless networks using self organizing maps and mobile agents. In this research, we efficiently use log file data obtained from the local host for training the neural network, to analyze the adhoc wireless network for detecting intrusions. Security agents are used to monitor multiple clients of the wireless network to determine the correlation among the observed anomalous patterns and to report such abnormal behavior to the administrator and the user in order to take possible actions. From the system developed in this research, we obtained high intrusion-detection rates (99.2%) and low false-alarm rates. The main contribution of this paper is the provision of an agent based framework that is capable of detecting intruders and to forecast the anomalies using the neural classifier, self organizing maps.
  K.L. Shunmuganathan , V.V. Asudevan and P. Yogesh
  Road traffic is very much affected by time based traffic light controllers. When waiting for a traffic light, the driver looses time and the vehicle uses fuel. Hence, reducing waiting times before traffic lights can save billions of dollars annually. Agent is a concept derived from Artificial intelligence. Agent is a computer system capable of autonomous action in some environment. In certain applications like web browsing, single agent canít do a task. In such situations we go for multiple agents. For many computer environments, witness the Internet, Social ability in agents is the ability to interact with other agents through Agent Communication Language (ACL). In this study, a multi-agent based traffic light controller system is simulated and its efficiency is tested against ordinary time based traffic controller system and human traffic controlling system.
  K. Kulothungan , S. Ganapathy , S. Indira Gandhi , P. Yogesh and A. Kannan
  In wireless sensor networks, the nodes are deployed randomly over a large geographical region for monitor and collect the data. These nodes are powered by battery and are impossible to get recharged after deployment. Thus, minimizing the energy consumption of the sensor nodes is a challenging issue in wireless sensor networks for guaranteeing the network’s lifetime. Clustering is one of way to maintain an effective topology in wireless sensor networks in order to reduce the overall network’s energy consumption. In wireless sensor network providing an energy efficient in sensor networks is more difficult due to lack of infrastructure in the predicting the location of each node in the network. In this study, researchers propose a new clustering scheme that optimizes energy using a clustering algorithm to enhance the performance of the network. In addition, fault tolerant routing is proposed in this research by considering cluster sub heads. Therefore, we have modified the AODV with a clustering and security features to reduce the number of nodes involved in routing and to avoid denial of service attacks. We compare the performance of this proposed protocol with AODV with respect to distance and energy metrics. This modified AODV with clustering improves the QoS in terms of packet loss, packet delivery ratio and end-to-end delay.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility