Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
 
Articles by P. Ganesh Kumar
Total Records ( 4 ) for P. Ganesh Kumar
  P. Uma Maheswari and P. Ganesh Kumar
  Nodes of Wireless Sensor Network (WSN) are often deployed in the antagonistic environment and many nodes are unattended. Due to this nature, nodes are easily tracked by the adversary to initiate clone attack. The clone attack is taken through obtaining the credentials of a node in the WSN. They capture and compromise the node and make replicas of them to launch various attacks through the replicated nodes. The cloned nodes are referred as the clones. The clone attack acts as the basic method to mount a huge insider attack. Therefore, it becomes necessary to detect the cloned nodes that are introduced by the adversary in a sensor network. Many techniques and protocols have been proposed to identify the replicated nodes that are presented in the literature review section. Nevertheless they do not meet the requirements in detecting the attack. To address this issue, researchers of this study have proposed a protocol named Intensified Randomized Efficient Distributed (IRED). The proposed research is carried out in two folds. First, researchers have analyzed the properties of the mechanism for detecting cloned nodes. Second, the researchers have proposed the IRED protocol. The proposed protocol is the enhancement of RED protocol. Here, researchers have focused on preventing the clone attack to pervade. Though the protocol prevents the attack, some attack penetrates into the network. In that scenario, the replicated nodes are detected by IRED. The empirical results show that the proposed protocol IRED has higher resistance against the attack and also performs better in terms of computation, memory and communication.
  I.S. Hephzi Punithavathi and P. Ganesh Kumar
  In this study, an automated screening system to diagnose the severity of diabetic retinopathy is recommended. The proposed system consists of 3 stages; the preprocessing being the first one is done to make it reliable for extracting features. In the second stage, features like area of blood vessels, exudates, micro aneurysms and texture features are extracted from the retinal images and classification, the last stage is done using the ELM classifier. The above procedures were implemented and evaluated using images available in DIARETDB1 and DRIVE database. Our proposed method shows a high accuracy of 95% and overcomes the slow training speed when compared with other classifiers.
  P. Ganesh Kumar , S. Karthik , R. Nidhya and R.M. Bhavadharini
  Real-road shortest-path finding algorithms involve large set of geographical data which include geo-tagged nodes and edges of the road network. Practical shortest path finding algorithms need minimized search-space for performing these computations by keeping these data in the computer’s conventional memory. The hierarchical pruning methods for minimizing the search-space to support real-road shortest algorithms are more suitable for connecting multiple cities and towns via highways. This study is to present a new suitable pruning method for intra-city shortest path finding, called elliptical pruning to bring the geo-tagged nodes and edges in to the memory for the subsequent shortest path finding process for the complex city road-transport networks.
  S. Karthikeyan , Geethu Prakash and P. Ganesh Kumar
  In this study, researchers proposed a system inspired by endocrine cellular communication which simplifies the rerouting process in two ways by lowering the hardware overhead along with the increasing size of the circuit and by reducing the hardware unutilized for fault recovery while maintaining good fault coverage. The proposed system is composed of a structural layer and a gene control layer. The structural layer consists of novel modules and their interconnections.
 
 
 
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility