Samukutty Annadurai

Learn More
Target tracking sensor networks monitor and track the movement of a target object. Energy management in these sensor networks is crucial to prolong the network lifetime. We propose a new protocol EST (energy saving schedule for target tracking sensor networks) that provides a dynamic sleep schedule for the radios such that maximum energy is saved without(More)
Dimensionality reduction methods have been successfully employed for face recognition. Among the various dimensionality reduction algorithms, Linear Discriminant Analysis (LDA) is one of the popular supervised dimensionality reduction methods, and many LDA-based face recognition algorithms/ systems have been reported in the last decade. However, the LDA(More)
Wireless sensor-actor networks can provide remote sensing and actuation services in a variety of applications. Depending on the application, the network should rapidly respond to critical variations in sensor input and take appropriate control action by the actor nodes without any delay. In order to prolong the lifetime of sensor networks, energy saving is(More)
Multicast communication is going to be the communication paradigm of all future networks. Secure multicasting is a very vital problem in today’s networks. In secure multicasting, the group members share a common key called the group key. Whenever the group members change, the group key must be changed. Therefore, many multicast security problems are(More)
In this paper, a new fast vector quantization encoding technique for transform coding of RGB color images that does not require a color coordinate conversion matrix is proposed. The proposed work directly applies the orthogonal polynomials transformation on the input image and transformed training set with reduced dimension is obtained for the vector(More)
Multicast communication will be the communication paradigm of future networks. Secure multicasting is a challenging issue. The main objective of secure multicasting is to distribute the group key to the current members of the group in a scalable manner with minimum overheads. The key distribution methods can be either centralized or distributed. Of these,(More)
  • 1