P. E. Sankaranarayanan

Learn More
In country like India the electricity board to read the meter readings from remote energy meters uses human agents. To overcome the disadvantage of using human agents, our initial works proposed mobile agents for accessing the remote energy meters from the electricity board .But with a single mobile agent, problems like load, lack of memory space and(More)
Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defense to supplement the existing methods. One of these methods involves the use of honeypots. A honeypot is a security resource whose value lies in being probed, attacked or compromised. In this paper we(More)
In this paper, we discuss the details of a Code Division Multiple Access (CDMA)-based multiple-casting system in a wired Local Area Network (LAN). This technique enables multiple users to transmit and receive data simultaneously among themselves using a single serial wire link at any given time, hence, called multiplecasting. This is unlike the method(More)
In recent years, the availability of wireless technologies has become prominent solution for next generation wireless networks (NGWN). Hence the demand for secure communication is an important research issue. Cryptography is recognized as the best method of data protection against active and passive attacks. Therefore a novel chaotic cryptographic scheme is(More)
Size is one of the important parameters in grading of fruits. Also quantifying the fruit's shape gives value addition to the fruits. This paper describes analytical methods to estimate the size and shape of citrus fruits to grade them based on single view fruit images. Sweet-lime and orange fruits are taken for case study of size and shape determination(More)
The key performance metrics in wireless sensor networks are both network lifetime and an average time required to report an event reliably. The optimal solution must be taken into account to meet these metrics. Considering energy-latency constraints in sensor networks, we have developed a cluster architecture using mobile agents to detect the yarn break in(More)
The Random Early Detection (RED) mechanism, attempts to control the congestion level at a bottleneck by monitoring and updating the average queue size. The RED algorithm calculates the average queue size using a low pass filter with an exponential weighted moving average. The average queue size is compared to two thresholds: a minimum and a maximum(More)
  • 1