|
|
Articles
by
P. Narayanasamy |
Total Records (
7 ) for
P. Narayanasamy |
|
 |
|
|
|
P. Vetrivelan
and
P. Narayanasamy
|
|
The next generation mobile communication system called as
4G/NGWN is expected to include heterogeneous wireless networks that will offer
high data rate multimedia services to end users at lowest cost. In present Wireless
Systems the capability of broader coverage is available but has the limitation
of bandwidth and network cost. In addition to the coverage, need to ensure the
higher quality of content-delivery at lower cost. This study proposes Centralized
Media Independent Soft Handover Decision (CMISHD) which uses Nash-equilibrium
based handover for quality oriented content delivery. The primary idea is based
upon SASHA which is a Smooth Adaptive Soft Handover Algorithm for wireless networks.
The study predominantly focuses on optimizing the ideas that were proposed by
SASHA. Simulation based testing for data/video traffic transmissions are presented,
depicting the performance of CMISHD in various complex scenarios involving large
number of mobile nodes, activities like node movement-velocity have also been
simulated which is not addressed in SASHA. The results also show how CMISHD
scheme can take content delivery, a step ahead, by its quality calculations
and considerations which were optimized from SASHA. |
|
|
|
|
S. Rajasoundaran
,
P. Narayanasamy
and
S. Janakiraman
|
|
Wireless sensor networks are widely applied in rang fields to provide responsive information. The secrecy of the data must be maintained over the open communication medium between the wireless sensor nodes. To provide security for the sensor nodes and the network data, the watchdog sensor nodes have been chosen randomly or hierarchically to detect the adversaries. The previous methods deal with static wireless sensor network to detect the intrusions where the sensor nodes are deployed randomly and dont move anywhere. In Wireless Adhoc Sensor Networks (WASNs), the sensor nodes are always in motion through different transmission regions with various levels of velocities. To select the watchdog sensor nodes or guard nodes in this type of sensor network is really, a challenging task for recent researches. At the same time, here, also the adversaries are moving from one location to another location around the network to do their jobs. To provide flexible security in this Wireless Adhoc Sensor Networks (WASNs), here the secure routing and monitoring protocol has been proposed with multi-variant sigryption using Advanced Encryption Standard (AES) and Digital Signature Authentication (DSA) approach to detect and prevent the moving global adversaries. Based on this approach, the sensor guard nodes are selected randomly and invisibly using complex key management approaches. This will give resilient protection to the Wireless Adhoc Sensor Networks (WASNs) against multiple adhoc adversaries. |
|
|
|
|
|
N. Thangaraj
and
P. Narayanasamy
|
|
In this study, two intelligent routing protocols namely Intelligent
Quality of Service (QoS) aware adhoc on demand distance vector routing scheme
and a rule based QoS aware AODV protocol for effective routing in mobile ad
hoc networks have been proposed and implemented. The first protocol which focuses
on the improvement of QoS relies on the information it receives from the network
and application layers to calculate the network bandwidth consumption and operates
independently of the Media Access Control (MAC) layer. Using this proposed intelligent
QoS based AODV scheme, the network layer provides feedback on network congestion
to the application layer. Therefore, the source node adapts the real-time data
transmission rate based on the network congestion feedback it receives through
intelligent rules. In addition to this, researchers propose a new routing protocol
which focuses on both QoS and rule based route management. The simulation results
obtained from this work demonstrate that the schemes proposed in this work are
effective for both QoS requirements and also for making intelligent routing
decisions with multiple QoS constraints. The proposed schemes reduce the packet
loss, network overload, optimizes the delivery path, packet overhead, packet
delivery ratio and delay. |
|
|
|
|
P. Vetrivelan
,
P. Narayanasamy
,
B. Anitha
,
G. Anusha
,
T.A. Arvindan
and
S. Ganesh
|
|
A vehicular ad-hoc network is a technology for implementing
Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communications.
The present vehicular mobility framework is not considering real-time constraints
such as vehicle priority, congestion, group-communications, etc. The proposed
Nash-Equilibrium and Ranking approaches for Media Independent Soft Handover
Decision (NRMISHD) framework is equipped with important criterion like congestion
avoidance between vehicles, QoS based (bandwidth, delay, jitter, velocity and
bit-error rate) and cost. The optimal and sub-optimal decision for selecting
the network is based on Nash-Equilibrium and Ranking Method, respectively. Hence,
enabling QoS for differentiating the services according to vehicular priorities
and providing group communications, alongside vehicular collision avoidance
will be implemented. |
|
|
|
|
|
P. Sakthivel
,
R. Delhi Babu
and
P. Narayanasamy
|
|
Problem statement: This study presented the optimized test scheduling and test access for ITC-02 SOC benchmark circuits using genetic algorithm. In the scheduling procedure of SOC, scheduling problem was formulated as a sequence of two problems and solved. Approach: Test access mechanism width was partitioned into two and three partitions and the applications of test vectors and test vector assignments for different partitions were scheduled using different operators of genetic algorithm. Results: The test application time was calculated in terms of CPU time cycles for two and three partitions of twelve ITC-02 SOC benchmark circuits and the results were compared with the integer linear programming approach. Conclusion: The results showed that the genetic algorithm based approach gives better results. |
|
|
|
|
V. Sumathy
,
P. Narayanasamy
and
R. Prabhu
|
|
In wireless Ad-hoc network, power consumption becomes an important issue due to limited battery power. One of the reasons for energy expenditure in this network is irregularly distributed node pattern, which impose large interference range in certain area. To maximize the lifetime of ad-hoc mobile network, the power consumption rate of each node must be evenly distributed and the over all transmission range of each node must be minimized. Our protocol, Location based throughput maximization routing in energy constrained Ad–hoc network finds routing paths, which maximize the lifetime of individual nodes and minimize the total transmission energy consumption. The life of the entire network is increased and the network throughput is also increased. The reliability of the path is also increased. Location based energy constrained routing finds the distance between the nodes. Based on the distance the transmission power required is calculated and dynamically reduces the total transmission energy. |
|
|
|
|
K. Indra Gandhi
and
P. Narayanasamy
|
|
Problem statement: Wireless Sensor Networks (WSN) has become a very interesting field of research and has been deployed for various applications. The data sensed by the sensors need to be transmitted over to a Base Station (BS) where the data processing is done. Approach: The existing systems generally employ Multi-hop routing for data aggregation at the BS, where several nodes may forward data packets to the BS. This will lead to the reduced lifetime of the network and reduced battery life for sensor nodes near the BS, as they have to relay data from all parts of the network to the BS. Results: A simple yet efficient method to improve the network lifetime is designed with the help of Mobile Element (ME). The MEs act as mechanical carriers which move around in the sensing field, collecting the data from the sensors and transmitting them to the BS. In a relatively larger network, a single mobile element might not serve the purpose. So Rendezvous Points (RP) can be used in the network, to enhance the performance of the WSN. Conclusion/Recommendations: This article discusses the state of the art and major research challenges in scheduling these ME and the arising need for multiple MEs also being outlined. |
|
|
|
|
|
|