N.Kannaiya Raja

Work place: Arulmigu Meenakshi Amman College of Engg, Thiruvannamalai Dt, Near Kanchipuram

E-mail: Kanniya13@hotmail.com

Website:

Research Interests: Image Compression, Image Manipulation, Computer Networks, Image Processing

Biography

N.Kannaiya Raja received degree MCA from Alagappa University and ME from Anna University Chennai in 2007 joined assistant professor in various engineering colleges in Tamil Nadu affiliated to Anna University and has eight years teaching experience. His research work in deep packet inspection. He has been session chair in major conference and workshops in computer vision on algorithm, network, mobile communication, image processing papers and pattern recognition. His current primary areas of research are packet inspection and network. Published many journals in reputed publications.He is interested to conduct guest lecturer in various engineering in Tamil Nadu.

Author Articles
Routers Sequential Comparing Two Sample Packets for Dropping Worms

By N.Kannaiya Raja Babu A.Senthamaraiselvan Arulandam

DOI: https://doi.org/10.5815/ijcnis.2012.09.05, Pub. Date: 8 Aug. 2012

Network IDS perform a vital role in protecting network connection in the worldwide from malicious attack. Nowadays the recent experiment work related to inspecting the packet for network security that is a minimal amount of process overhead. In this work, analysis the network intrusion for packet inspection that is together the testing data which inspect only group of packet selected as sample predominantly from small flows and select first two packets and comparing with each other overall packets and create tabelazied for find out different malicious debuggers. This experiment results shows that overcome the existing work.

[...] Read more.
Estimating the Video Registration Using Image Motions

By N.Kannaiya Raja K.Arulanandam R.Radha krishnan M.Nataraj

DOI: https://doi.org/10.5815/ijcnis.2012.07.08, Pub. Date: 8 Jul. 2012

In this research, we consider the problems of registering multiple video sequences dynamic scenes which are not limited non rigid objects such as fireworks, blasting, high speed car moving taken from different vantage points. In this paper we propose a simple algorithm we can create different frames on particular videos moving for matching such complex scenes. Our algorithm does not require the cameras to be synchronized, and is not based on frame-by-frame or volume-by-volume registration. Instead, we model each video as the output of a linear dynamical system and transform the task of registering the video sequences to that of registering the parameters of the corresponding dynamical models. In this paper we use of a joint frame together to form distinct frame concurrently. The joint identification and the Jordan canonical form are not only applicable to the case of registering video sequences, but also to the entire genre of algorithms based on the dynamic texture model. We have also shown that out of all the possible choices for the method of identification and canonical form, the JID using JCF performs the best.

[...] Read more.
QSWMCA - Quality of Service in Wireless Mesh Networks by Configuration Arguments

By N.Kannaiya Raja R. Saritha A.Senthamaraiselvan K.Arulanandam

DOI: https://doi.org/10.5815/ijcnis.2012.06.01, Pub. Date: 8 Jun. 2012

In this paper, we present a Quality of Experience (QoE) based upon the analyze the key Quality of Service (QoS) parameters such as delay, jitter, throughput, packet loss, packet inspection in the mesh networks which executing the better approach for reconfiguration wireless mesh networks in the routing protocol. In this system evaluates the actual QoE level for each mesh node taking into an account to calculate QoS parameters and then this response as reducing the node broadcasting rate and investigating the problems of selecting in which links would be established that all nodes are connected for cost of constructions are minimized.

[...] Read more.
Network Packet Inspection to Identify Contraband File Sharing Using Forensic Tools

By N.Kannaiya Raja K.Arulanandam R.Somasundaram

DOI: https://doi.org/10.5815/ijcnis.2012.03.04, Pub. Date: 8 Apr. 2012

This Paper discusses the digital forensic tool that uses a field Programmable Gate Array [FPGA] based software for deep packet inspection in network Router for a Bit Torrent Handshake message. Extracts the "Information Hashing" of the file being shared, compares the hash against a list of known contraband files for forensic analysis and it matches the message to a log file. Forensic analysis gives several optimization techniques for reducing the CPU time required for reducing the CPU time required to process packets are investigated along with their ability to improve packet capture performance. Experiments demonstrate that the system is able to successfully capture and process Bit Torrent Handshake message with a probability of at least 99.0% under a network traffic load of 89.6 Mbps on a 100 Mbps network.

[...] Read more.
Other Articles