P.Sivasankar

@nitttrc.ac.in

Associate Professor in Electronics Engineering, Department of Electrical, Electronics and Communication Engineering
National Institute of Technical Teachers Training and Research (NITTTR), Chennai



                 

https://researchid.co/sivasankar

Dr. P. Sivasankar, is working as Associate Professor in Electronics Engineering, Department of Electrical, Electronics and Communication Engineering, National Institute of Technical Teachers Training and Research, Chennai, (Ministry of Education, Government of India) India, since 2006. He was born on 23rd July 1980 at Tiruvannamalai, Tamilnadu, India. He published around 36 articles like papers / book chapters etc. in various reputed International, National Journals and Conferences; published two books titled "LabVIEW Programming Concepts with Examples", Co-authored by G.A.Rathy, in Sci Tech publications, Year : 2015 and "NG Smartphone Users Activity and Direction Detection using MQTT in IoT" with the authors of Kothandaraman, D, and Nagendar, in LAMBERT Academic Publisher, Year : 2019. He coordinated around 130 Faculty Development Programmes, serving as Member of various committees and professional bodies; Evaluated UG, PG, and PHD Thesis works.

EDUCATION

B.E. in Electronics and Communication Engineering at Thanthai Periyar Govt. Inst. of Tech, Vellore-2, UNIVERSITY OF MADRAS, Average marks: 66.13%, completed at 2001

M.E. in Applied Electronics at College of Engineering Guindy, Chennai –25, ANNA UNIVERSITY, CHENNAI, CGPA: 7.804 in 10 point scale completed at 2005

Ph.D. in the Major area of Wireless Communication, with the title "Studying and Improving Energy Efficient On-Demand Routing Protocols in MANET", College of Engineering Guindy, Chennai –25, ANNA UNIVERSITY, CHENNAI, Guide : , 2013

RESEARCH INTERESTS

Wireless Communication, Signal Processing, Embedded Systems, Developing or Applying Bio-inspired Optimization Algorithms in various Engineering Domain according to its scope, Industry 4.0, Society 5.0, Cyber Physical System, Engineering Education by Blooms Taxonomy, Outcome Based Education and CDIO

20

Scopus Publications

212

Scholar Citations

9

Scholar h-index

9

Scholar i10-index

Scopus Publications

  • CDS-Based Routing in MANET Using Q Learning with Extended Episodic Length
    D. S. John Deva Prasanna, D. John Aravindhar, and P. Sivasankar

    Springer Singapore

  • Block Chain based Grey Hole Detection Q Learning based CDS Environment in Cloud - MANET
    D.S. John Deva Prasanna, Dr.D. John Aravindhar, and Dr.P. Sivasankar

    NeuroQuantology Journal
    Cloud MANET is a latest technique in which individual smart devices joins the Cloud MANET and can communicate in a distributed fashion. This is advantageous, as the Smart device does not need any infrastructural establishments. These nodes communicate together. Several MANETS formed in manner can be connected to cloud and can avail cloud services in real time. In this paper we attempt to establish a virtual backbone of Cloud MANET nodes using the concept Connected Dominating Sets, we also introduced a lightweight security scheme in order to avoid blackhole and greyhole attacks. The algorithm uses Q learning technique for learning about the capacity of nodes and establishes the CDS in Cloud MANET. The entire set up is established with public key infrastructure to emulate block chain based security. The concept of smart contract is used to ensure that every transaction is recorded and any compromised nodes in the CDS is discovered and eliminated.

  • 3-Axis Robot Arm Using Micro-Stepping with Closed-Loop Control
    G. A. Rathy, P. Sivasankar, Aravind Balaji, and K. Gunasekaran

    Springer Singapore
    Robot arm is one of the most buzzing words in industrial automation. The challenge of designing a robot arm is anticipating and controlling its system dynamics. This paper focuses on developing of robot arm with 3 degrees of freedom (DoF) with high speed and precision. The position of the robotic arm is determined from the accelerometer using closed-loop feedback system. The stepper motor in the arm of the robot decides the direction; the desired movements will be controlled by PWM pulses through the controller, as per the requirement of the user. A4988 stepper motor driver is used instead of rotary encoder to control the movements of robotic arm by stepper motor. The step angle of the arm is controlled by micro-stepping using 200 steps to 3200 steps resolution which provides a smooth movement and precision degree of accuracy. A graphical user interface is designed using LabVIEW to display and control the position of arm. Finally, 3-axis robot arm with micro-stepping is developed by integrating the electronic circuitry and mechanical parts.

  • Hybrid PSO-HSA and PSO-GA algorithm for 3D path planning in autonomous UAVs
    B. Abhishek, S. Ranjit, T. Shankar, Geoffrey Eappen, P. Sivasankar, and A. Rajesh

    Springer Science and Business Media LLC
    Unmanned aerial vehicles (UAVs) are a quintessential example of automation in the field of avionics. UAVs provide a platform for performing a wide variety of tasks, but in each case the concept of path planning plays an integral role. It helps to generate a pathway free of obstacles, having minimum length leading to lesser fuel consumption, lesser traversal time and helps in steering the aircraft and its corresponding antenna power signature safely around the hostile antenna to avoid detection. To optimize path planning to incorporate all the above-mentioned constraints, this paper presents two new hybrid algorithms particle swarm optimization (PSO) with harmony search algorithm and PSO with genetic algorithm. The hybrid algorithms perform both an exploratory and exploitative search, unlike the existing algorithms which are biased, towards either an exploitative search or an exploratory search. Furthermore, the hybrid algorithms are compared to the existing optimization algorithms and in all cases the hybrid algorithms give a minimum of 7% better result against PSO with up to a 40% better result against Invasive Weed optimization algorithm for a fixed computational time, suggesting better real-time applications.

  • Developing a knowledge structure using Outcome based Education in Power Electronics Engineering
    Rathy G.A., Sivasankar P, and Gnanasambandhan T.G.

    Elsevier BV
    Abstract Outcome based education (OBE) is student-centered instruction model that stresses on judging student performance through outcomes. Outcomes include knowledge, skills and behavior. Outcome-Based Education model is being adopted at a fast pace at Technical institutions all over the world. It is considered as a massive leap forward to convalesce technical education and help Engineers compete with their global counterparts. OBE gives more weightage on what the students will be able to ‘do instead of what they will ‘know’. Hence it is important to develop the instructional model to improve knowledge, skill, behaviour of the students. Knowledge structure is the micro level component and the part of the course outcome which will enable the student to gain the confidence of ‘doing’ instead of ‘knowing’. This paper proposes an Instructional Model by developing a knowledge structure in Power Electronics Engineering.

  • Reinforcement learning based virtual backbone construction in manet using connected dominating sets
    D. Prasanna, D. Aravindhar, P. Sivasankar and Karthickeyan Perumal

    SynthesisHub Advance Scientific Research
    Construction of virtual backbones in MANETs for establishing the routes using Connected Dominating Set (CDS), is an prominent area of research in wireless networks. In addition, Reinforcement Learning (RL) is becoming popular due to its effective exploration process. MANET routing is highly challenging, as the network topology is highly dynamic. The broadcast of route request packet creates broadcast storm due to multiple retransmission of the packet. Due to the constant movement of the nodes, routing decisions are harder to resolve. Hence, this paper proposes an efficient routing technique in MANET using Graph Connected Dominating Sets and Reinforcement Learning. The Q Learning algorithm is used to measure and find the best nodes for constructing the CDS. Link stability and residual energy are the parameters used for estimating the reward values. The algorithm is implemented in NS2 and results are found to be promising and improve the performance of the network.

  • Treatment of Textile Wastewater by Coagulation–Flocculation Process Using Gossypium herbaceum and Polyaniline Coagulants
    Prakasam Arulmathi, Chellappa Jeyaprabha, Periandavan Sivasankar, and Vadivel Rajkumar

    Wiley

  • Context-aware energy conserving routing algorithm for internet of things
    Kothandaraman D, Chellappan C, Sivasankar P, and Syed Nawaz Pasha

    Academy and Industry Research Collaboration Center (AIRCC)
    Internet of Things (IoT) is the fast- growing technology, mostly used in smart mobile devices such as notebooks, tablets, personal digital assistants (PDA), smartphones, etc. Due to its dynamic nature and the limited battery power of the IoT enabled smart mobile nodes, the communication links between intermediate relay nodes may fail frequently, thus affecting the routing performance of the network and also the availability of the nodes. Existing algorithm does not concentrate about communication links and battery power/energy, but these node links are a very important factor for improving the quality of routing in IoT. In this paper, Context-aware Energy Conserving Algorithm for routing (CECA) was proposed which employs QoS routing metrics like Inter-Meeting Time and residual energy and has been applied to IoT enabled smart mobile devices using different technologies with different microcontroller which resulted in an increased network lifetime, throughput and reduced control overhead and the end to end delay. Simulation results show that, with respect to the speed of the mobile nodes from 2 to 10m/s, CECA increases the network lifetime, thereby increasing the average residual energy by 11.1% and increasing throughput there by reduces the average end to end delay by 14.1% over the Energy-Efficient Probabilistic Routing (EEPR) algorithm. With respect to the number of nodes increases from 10 to 100 nodes, CECA algorithms increase the average residual energy by16.1 % reduces the average end to end delay by 15.9% and control overhead by 23.7% over the existing EEPR.

  • An energy-efficient new approach for cluster head selection algorithm in wireless sensor network


  • Successful computer forensics analysis on the cyber attack botnet
    Kavisankar Leelasankar, Chellappan C., and Sivasankar P.

    IGI Global
    The success of computer forensics lies in the complete analysis of the evidence that is available. This is done by not only analyzing the evidence which is available but also searching for new concrete evidence. The evidence is obtained through the logs of the data during the cyberattack. When performing analysis of the cyberattack especially the botnet attacks, there are many challenges. First and the foremost is that it hides the identity of the mastermind, the botmaster. It issues the command to be executed using its subordinate, the command and control (C&C). The traceback of C&C itself is a complex task. Secondly, it victimizes the innocent compromised device zombies. This chapter discusses the analysis done in both proactive and reactive ways to resolve these challenges. The chapter ends by discussing the analysis to find the real mastermind to protect the innocent compromised system and to protect the victim system/organization affected by the botnet cyberattack.

  • Enhanced efficient SYN spoofing detection and mitigation scheme for DDoS attacks
    L. Kavisankar, C. Chellappan, S. Venkatesan, and P. Sivasankar

    Inderscience Publishers

  • Efficient SYN spoofing detection and mitigation scheme for ddos attack
    L. Kavisankar, C. Chellappan, S. Venkatesan, and P. Sivasankar

    IEEE
    Protection of critical server from cyber attacks is vital, especially in the case of active attacks like Distributed Denial of Service (DDoS). Seamless services are provided by the constant availability of the server which plays an important factor in providing the customer good Quality of Service (QoS). Monitoring and rate limiting the flow of packets will protect the victim systems by allowing only trusted users during the DDoS attack. The job of the security professionals becomes complex, when the attacks are launched from trusted IP addresses, using Synchronization (SYN) spoofing. The work presented in this paper is experimented with Efficient Spoofed Mitigation Scheme (ESMS) which uses the TCP probing method along with the bloom filter trust model. The proposed scheme provides accurate and robust information for the detection and controlling of the spoofed packets, during the DDoS attacks.

  • Hybrid approach for optimal cluster head selection in wsn using leach and monkey search algorithms


  • Ppssm:push/pull smooth video streaming multicast protocol design and implementation for an overlay network
    T. Ruso, C. Chellappan, and P. Sivasankar

    Springer Science and Business Media LLC
    IP multicast is one of the best techniques for video streaming on the Internet. It faces issues with respect to address allocation, routing, authorization, group management, security, and scalability. By default, local Internet Service Providers did not enable IP multicast services, because of the cost incurred in using multicast-enabled routers. To solve these issues some of the IP layer functionalities have been shifted to the Application Layer, thus leading to Application Layer Multicast (ALM) protocols. However, ALM protocols face issues related to synchronous data delivery, scalability, link stress, link stretch and node failures. Some of the existing protocols are CoolStreaming, and mTreebone. A novel ALM protocol based Push/Pull Smooth video Streaming Multicast (PPSSM) protocol is proposed in this paper, to increase the throughput and reduce the packet loss rate. The PPSSM protocol involves three stages, such as tree-mesh construction, dynamic buffer management and network coding techniques. In the tree-mesh construction, a tree consists of stable nodes and a mesh consists of unstable nodes. The proposed PPSSM optimizes the stable nodes in the tree, which minimizes or eliminates the pull operations from the unstable mesh overlay nodes, by exploring the potential of the stable nodes. Dynamic buffer management is achieved by setting the optimal buffer threshold value, using the optimization of the sensitivity parameters, such as packet loss and packet workload/delay by the Infinitesimal Perturbation Analysis and Stochastic Approximation algorithms. In addition to the tree-mesh construction and buffer management, the introduction of the network coding technique will enhance the throughput and minimize the packet loss and delay. Finally, the performance of the proposed PPSSM protocol is compared with those of CoolStreaming, and mTreebone, and it shows improvement in respect of throughput, packet loss, and average decoding time.

  • Energy efficient life time in wireless sensor network using cluster head election based on hit set
    P. Thiruvannamalai Sivasankar and M Ramakrishnan

    IEEE
    In Wireless Sensor Networks (WSN), the cluster head based methods are very efficient to communication and scalability. In this system the whole network is separated in to clusters and cluster head node is selected, with maximum residual energy. In this paper, cluster head based election method is proposed. There are determining parameters are consider for cluster head selection. The model is simulated and the response is studied.

  • Invulnerable cluster head election model to handle selfishness in wireless sensor network
    P. Thiruvannamalai Sivasankar and M. Ramakrishnan

    Maxwell Scientific Publication Corp.
    Wireless Sensor Networks have found a vital place in current rapid moving world. Clustering is one of the most efficient and traditional methods for routing in such sensor networks. This study aims to propose an efficient cluster head election model to handle selfishness in the wireless sensor network. Clustering plays a very important role to increase the lifetime of the wireless sensor networks. In clustering techniques, every group called a cluster is controlled by the cluster head. Each sensor transmits its collected information to the base station via the cluster head. The load to the cluster head is higher than its members because it requires performing tasks like data aggregation, control and reporting to base station. In this case, the sensor nodes may act selfishly to participate in the cluster head selection process. To avoid selfishness in the cluster head selection process, the proposed scheme uses rate analysis method. In the proposed scheme, the load of the cluster head is shared among its members. The rate analysis value is updated for each and every round. So, all the sensors can honestly participate in the election without selfishness. The proposed scheme is gauged by using the QoS metrics through simulation results obtained by Network Simulator.

  • A pioneer scheme in the detection and defense of DrDoS attack involving spoofed flooding packets
    L. Kavisankar, C. Chellappan, P. Sivasankar, A. Karthi and A. Srinivas

    Korean Society for Internet Information (KSII)
    DDoS (Distributed Denial of Service) has been a continuous threat to the cyber world with the growth in cyber technology. This technical evolution has given rise to a number of ultra-sophisticated ways for the attackers to perform their DDoS attack. In general, the attackers who generate the denial of service, use the vulnerabilities of the TCP. Some of the vulnerabilities like SYN (synchronization) flooding, and IP spoofing are used by the attacker to create these Distributed Reflected Denial of Service (DrDoS) attacks. An attacker, with the assistance of IP spoofing creates a number of attack packets, which reflects the flooded packets to an attacker’s intended victim system, known as the primary target. The proposed scheme, Efficient Spoofed Flooding Defense (ESFD) provides two level checks which, consist of probing and non-repudiation, before allocating a service to the clients. The probing is used to determine the availability of the requested client. Non-repudiation is taken care of by the timestamp enabled in the packet, which is our major contribution. The real time experimental results showed the efficiency of our proposed ESFD scheme, by increasing the performance of the CPU up to 40%, the memory up to 52% and the network bandwidth up to 67%. This proves the fact that the proposed ESFD scheme is fast and efficient, negating the impact on the network, victim and primary target.

  • Active key management scheme to avoid clone attack in wireless sensor network
    P. Thiruvannamalai Sivasankar and M. Ramakrishnan

    IEEE
    In Wireless sensor Network, the sensor nodes transmit critical information over the network; therefore, security services, such as, authentication and pair wise key establishment between sensor nodes and mobile sinks, are important. However, the problem of authentication and pair wise key establishment in sensor networks with MSs is still not solved in the face of mobile sink replication attacks. For the basic probabilistic and q-composite key pre distribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of the network sensor nodes, making it possible for the attacker to take control of the entire network by deploying a replicated mobile sink, preloaded with some compromised keys to authenticate and then initiate data communication with any sensor node. To solve this problem, we have developed a general framework that permits the use of any pair wise key pre distribution scheme as its basic component, to provide authentication and pair wise key establishment between sensor nodes and MSs. The new framework requires two separate key pools, one for the mobile sink to access the network, and one for pair wise key establishment between the sensors.

  • Performance evaluation of energy efficient on-demand routing algorithms for MANET
    P. Sivasankar, C. Chellappan, and S. Balaji

    IEEE
    Mobile ad hoc networks are a class of dynamic networks without any centralized administration. A major bottleneck in mobile ad hoc networks (MANETs) is the energy consumption since nodes are usually mobile and battery operated. To maximize the lifetime of mobile ad hoc networks (i.e., the lifetime of the nodes themselves) the power depletion of network must be evenly distributed, i.e., there must be a uniform drain of energy from the nodes, and the overall transmission power requirement for each connection request must be minimized. This paper proposes two algorithms called energy efficient delay time routing (EEDTR) and maximised energy efficient routing (MEER), which try to increase the operational lifetime of mobile ad hoc networks. These algorithms are modified versions of the existing dynamic source routing (DSR) algorithm. These algorithms select fully distributed routes, thus balancing power consumption of the entire network. The first algorithm(EEDTR) introduces a delay in forwarding the packets by nodes, which is inversely proportional to the remaining energy level of the node. The second algorithm includes energy information on the route request packet and select the routes based on this information (MEER). These algorithms are designed and implemented using global mobile simulator (GloMoSim), a scalable, simulation environment for network simulation. Based on the results obtained, this paper concludes that the proposed algorithms increase the lifetime of mobile ad hoc networks, at the expense of end to end delay and control overhead.

  • Cache based energy efficient strategies in mobile ad hoc networks


RECENT SCHOLAR PUBLICATIONS

  • A Novel Technique to Improve Latency and Response Time of AI Models using Serverless Infrastructure
    BS Ravi, C Madhukanthi, P Sivasankar, JD Prasanna
    2023 International Conference on Inventive Computation Technologies (ICICT 2023

  • A Battery Monitoring System based on IoT for Electric Vehicles
    P Sasirekha, E Sneka, B Velmurugan, MS Hameed, P Sivasankar
    2023 5th International Conference on Smart Systems and Inventive Technology 2023

  • Vulnerabilities Detection in Cybersecurity Using Deep Learning–Based Information Security and Event Management
    D Kothandaraman, SS Prasad, P Sivasankar
    Artificial Intelligence and Deep Learning for Computer Network, 81-98 2023

  • CDS-Based Routing in MANET Using Q Learning with Extended Episodic Length
    DS John Deva Prasanna, D John Aravindhar, P Sivasankar
    Inventive Computation and Information Technologies: Proceedings of ICICIT 2021

  • Block Chain based Grey Hole Detection Q Learning based CDS Environment in Cloud-MANET.
    DSJD Prasanna, DJ Aravindhar, P Sivasankar
    Webology 18 (SI01), 88-106 2021

  • Successful Computer Forensics Analysis on the Cyber Attack Botnet
    K Leelasankar, C Chellappan, P Sivasankar
    Research Anthology on Combating Denial-of-Service Attacks, 151-166 2021

  • An efficient IoT based biomedical health monitoring and diagnosing system using myRIO
    GA Rathy, P Sivasankar, TZ Fadhil
    TELKOMNIKA (Telecommunication Computing Electronics and Control) 18 (6 2020

  • Hybrid PSO-HSA and PSO-GA algorithm for 3D path planning in autonomous UAVs
    B Abhishek, S Ranjit, T Shankar, G Eappen, P Sivasankar, A Rajesh
    SN Applied Sciences 2, 1-16 2020

  • IoT Based Smart Controlled Inverter
    SP GA Rathy , Gunasekaran K, Karthekeyan Perumal
    International Journal of Computer Trends and Technology 68 (4) 2020

  • Reinforcement Learning Based Virtual Backbone Construction in MANET using Connected Dominating Sets
    Sivasankar. P, John Deva Prasanna. D. S, John Aravindhar, Karthikeyan Perumal
    Journal of Critical Reviews 7 (9), 146-152 2020

  • Estimation of SoC using SVM regression technique for an Efficient Electric Vehicle Battery Management System using c-RIO DAQ
    GK P.Sivasankar, G.A.Rathy, Karthikeyan Perumal
    American Journal of Research, 89-103 2020

  • A Study on Charging Infrastructure and the Topologies of Fast Charging Techniques in Electric Vehicle
    GAR P.Sivasankar
    International Journal of Engineering Applied Sciences and Technology 5 (2 2020

  • Developing a knowledge structure using Outcome based Education in Power Electronics Engineering
    GA Rathy, P Sivasankar, TG Gnanasambandhan
    Elsevier Procedia Computer Science 172, 1026-1032 2020

  • 3-Axis Robot Arm Using Micro-Stepping with Closed-Loop Control
    GA Rathy, P Sivasankar, A Balaji, K Gunasekaran
    International Conference on Advanced Communication and Computational 2019

  • Context-aware energy conserving routing algorithm for internet of things
    D Kothandaraman, C Chellappan, P Sivasankar, SN Pasha
    International Journal of Computer Networks & Communications (IJCNC) Vol 11 2019

  • 3 axis robot arm using micro-stepping with closed loop control
    P Sivasankar, GA Rathy, AB Gunasekaran.K
    ICACCT 2019 2019

  • IoT based Classroom Automation using Zigbee
    GA Rathy, P and Sivasankar
    International Journal of Innovative Science, Engineering & Technology 6 (3) 2019

  • NG Smartphone Users Activity and Direction Detection using MQTT in IoT
    Y Kothandaraman, D, P.Sivasankar, and Nagendar
    2019

  • Dual Connected Dominating Sets for load balancing in MANETS
    P Sivasankar, AG John Deva Prasanna. D. S, John Aravindhar. D
    Journal of Adv Research in Dynamical & Control Systems 10 (3) 2018

  • Enhanced efficient SYN spoofing detection and mitigation scheme for DDoS attacks
    L Kavisankar, C Chellappan, S Venkatesan, P Sivasankar
    International Journal of Internet Technology and Secured Transactions 8 (4 2018

MOST CITED SCHOLAR PUBLICATIONS

  • Hybrid PSO-HSA and PSO-GA algorithm for 3D path planning in autonomous UAVs
    B Abhishek, S Ranjit, T Shankar, G Eappen, P Sivasankar, A Rajesh
    SN Applied Sciences 2, 1-16 2020
    Citations: 46

  • Developing a knowledge structure using Outcome based Education in Power Electronics Engineering
    GA Rathy, P Sivasankar, TG Gnanasambandhan
    Elsevier Procedia Computer Science 172, 1026-1032 2020
    Citations: 19

  • Performance evaluation of energy efficient on-demand routing algorithms for MANET
    P Sivasankar, C Chellappan, S Balaji
    2008 IEEE Region 10 and the Third international Conference on Industrial and 2008
    Citations: 18

  • Hybrid approach for optimal cluster head selection in WSN using leach and monkey search algorithms
    T Shankar, A Karthikeyan, P Sivasankar, A Rajesh
    Journal of Engineering Science and Technology 12 (2), 506-517 2017
    Citations: 15

  • Context-aware energy conserving routing algorithm for internet of things
    D Kothandaraman, C Chellappan, P Sivasankar, SN Pasha
    International Journal of Computer Networks & Communications (IJCNC) Vol 11 2019
    Citations: 14

  • Performance evaluation of energy efficient routing protocols for MANET
    P Sivasankar, C Chellappan, S Balaji
    International Journal of Computer Applications 975, 8887 2011
    Citations: 14

  • An efficient IoT based biomedical health monitoring and diagnosing system using myRIO
    GA Rathy, P Sivasankar, TZ Fadhil
    TELKOMNIKA (Telecommunication Computing Electronics and Control) 18 (6 2020
    Citations: 13

  • Efficient syn spoofing detection and mitigation scheme for ddos attack
    L Kavisankar, C Chellappan, S Venkatesan, P Sivasankar
    2017 second international conference on recent trends and challenges in 2017
    Citations: 12

  • Implementation of Smart Sleep Mechanism and Hybrid Data Collection Technique for Maximizing Network Lifetime in WSN's
    T Shankar, A Karthikeyan, P Sivasankar, RR Neha
    Indian Journal of Science and Technology 8, 1 2015
    Citations: 10

  • Cache based energy efficient strategies in mobile ad hoc networks
    K Murugan, S Balaji, P Sivasankar, S Shanmugavel
    2005 IEEE International Conference on Personal Wireless Communications, 2005 2005
    Citations: 9

  • 3-Axis Robot Arm Using Micro-Stepping with Closed-Loop Control
    GA Rathy, P Sivasankar, A Balaji, K Gunasekaran
    International Conference on Advanced Communication and Computational 2019
    Citations: 5

  • Ppssm: push/pull smooth video streaming multicast protocol design and implementation for an overlay network
    T Ruso, C Chellappan, P Sivasankar
    Multimedia Tools and Applications 75, 17097-17119 2016
    Citations: 5

  • IOT based traffic monitoring using raspberry Pi
    P Sivasankar, B Brindhavathy
    Int. J. Res. Eng. Sci. Technol.(IJRESTs) 1 (7) 2016
    Citations: 5

  • A pioneer scheme in the detection and defense of DrDoS attack involving spoofed flooding packets
    L Kavisankar, C Chellappan, P Sivasankar, A Karthi, A Srinivas
    KSII Transactions on Internet and Information Systems (TIIS) 8 (5), 1726-1743 2014
    Citations: 4

  • Optimized energy efficient routing protocols and their performance comparison for MANET
    P Sivasankar, C Chellappan, S Balaji
    Eur. J. Sci. Res 90 (1), 136-148 2012
    Citations: 4

  • A Battery Monitoring System based on IoT for Electric Vehicles
    P Sasirekha, E Sneka, B Velmurugan, MS Hameed, P Sivasankar
    2023 5th International Conference on Smart Systems and Inventive Technology 2023
    Citations: 3

  • Block Chain based Grey Hole Detection Q Learning based CDS Environment in Cloud-MANET.
    DSJD Prasanna, DJ Aravindhar, P Sivasankar
    Webology 18 (SI01), 88-106 2021
    Citations: 3

  • A Study on Charging Infrastructure and the Topologies of Fast Charging Techniques in Electric Vehicle
    GAR P.Sivasankar
    International Journal of Engineering Applied Sciences and Technology 5 (2 2020
    Citations: 3

  • IoT based Classroom Automation using Zigbee
    GA Rathy, P and Sivasankar
    International Journal of Innovative Science, Engineering & Technology 6 (3) 2019
    Citations: 3

  • Reinforcement Learning Based Virtual Backbone Construction in MANET using Connected Dominating Sets
    Sivasankar. P, John Deva Prasanna. D. S, John Aravindhar, Karthikeyan Perumal
    Journal of Critical Reviews 7 (9), 146-152 2020
    Citations: 2

Publications

Books Published : 2 , Title of the Book : LabVIEW Programming Concepts with Examples, Authors : P.Sivasankar, G.A.Rathy, Publisher: Sci Tech publications, Year : 2015
Title of the Book : NG Smartphone Users Activity and Direction Detection using MQTT in IoT, Authors : Kothandaraman, D, P.Sivasankar, and Nagendar, Y Publisher: LAMBERT Academic Publishing, Year : 2019