Articles

  1. AN ANALYSIS OF DIFFERENT TECHNIQUES FOR EFFECTIVE RETRIEVAL OF INFORMATION IN SOCIAL NETWORKING SITESDownload Article

    R.Sanmuga Priya1, D.Prabakar2, Dr. S.Karthik3

    Abstract

    close

    Social Networking Sites (SNS) like Facebook, Twitter, Amazon, Movie Lens etc are those sites which are able to connect different kinds of people. Those sites predict the taste of different users over different item that changes over time. Users may upload media, share information and they can make comment within social circles. It is difficult to derive the exact information on the item which they surf over social sites. Such difficulty is termed as cold start. It is overcomed by several techniques for retrieving exact information. In this paper, an survey or analysis is done on different techniques for drawing exact data in SNS. Keywords: Social Networking Sites, Cold Start, survey, Techniques

  2. ENERGY PROFICIENT METHOD BASED ON ADAPTIVE LOAD BALANCING ALGORITHM FOR WIRELESS SENSOR NETWORKSDownload Article

    B.Harish1, M.Bhuvaneshwaran2, S.Sathishkumar3, Dr.S.Karthik4

    Abstract

    close

    The wireless sensor network (WSN) has been an active research area for past few years but there is some limitations in energy and storage, it seems there is a need in a routing protocol for WSN. The energy and storage balance based on Adaptive Load Balancing Algorithm and Rainbow protocol for WSN is proposed in this paper. The Adaptive Load Balanced algorithm is define by the cross layer protocol and their main ingredients are geographic routing, load balancing and contention based relay selection. The Rainbow protocol has a mechanism with in and around the dead ends. The Adaptive load balancing algorithm and Rainbow protocol are collectively called as ALBA-R, the integration of those protocols are used for the balancing of energy and storage.

  3. CAPTCHA AS A GRAPHICAL PASSWORD –MULTILEVEL SECURITY PRIMITIVEDownload Article

    Sharanya.P1, Vijaya Sharon.A1, Vijay.S1, Dhivya.P2

    Abstract

    close

    Security plays an important role in all field nowadays, based on a hard AI problem for security is emerging as an new paradigm, but has been under explored the existing methodology which addresses this problem is captcha technology, But in this paper new system called captcha as graphical password along with this technology multilevel access authentication is also included that provides more security. This combined technology addresses a number of security problem such as, online guessing attack, relay attack, surfing attack etc, CaRP offers reasonable security that appears to fit well with all sort online security and provides efficient security.

  4. LOAD BALANCING AND SCHEDULING OF JOBS IN CLOUD DATA CENTERSDownload Article

    1N. Deebaa, 2A. Jayanthi M.E, 3Dr.S.Karthik M.E, Ph.D

    Abstract

    close

    Reducing the energy usage in data centers is mainly to be focused in cloud computing. Computational resource should be fairly allocated among different organization. Energy cost reduction and allocation of computational resource should be considered mainly. The time interval should be considered while performing the jobs in the data center. Server over heating should be reduced in the data centers to avoid server failure. The batch jobs should be scheduled in the data centers in the balanced order in the resource manager. An online scheduling algorithm Equally spread current execution load balancing algorithm is used to allocate the jobs to the data centers from the resource manager. Equally spread current execution load balancing can reduce the energy cost and servicing time can be reduced. It can reduce the cost and servicing time in the geographically distributed data centers. Keyword – Cloud Computing, Load balancing, scheduling algorithm, resource manager.

  5. A NOVEL SECURE MINING OF ASSOCIATION RULES WITH SUBGROUP DISCOVERY IN VERTICALLY DISTRIBUTED DATABASESDownload Article

    Kokilavani. K, Nandhini. V, Mohan Arvainth. V, Dr. T. Kalaikumaran, M.E., Ph.D.

    Abstract

    close

    We propose a protocol for secure mining of association rules in vertically distributed databases. The current protocol is that of Kantarcioglu and Clifton two protocols to be used. In Our protocols, are based on the Fast Distributed Mining (FDM) algorithm of Cheung et al. In order to improve the performance of the system, proposed the subgroup detection concept in this system. In this setting, all sites use the same set of attributes and the quality of every subgroup depends on all databases. The approach finds patterns in the union of the databases, without disclosing the local databases. To the best of our knowledge, this is the first secure approach that tackles any of the supervised descriptive rule discovery tasks. In proposed scenario we will do the vertical distributed database which is nothing but different columns of a table distributed to different sites. Keywords: privacy preserving data mining, vertically distributed database, association rule mining, distributed computations.

  6. GEOGRAPHIC ROUTING FOR MOBILE LOCATION UPDATE USING MANETDownload Article

    N.VAITHEEKA1, R.INDUPOORNIMA2, C.B.SIVAPARTHIPAN3, M.BALAANAND4

    Abstract

    close

    In geographic routing, nodes need to maintain up-to-date positions of their immediate neighbors for making effective forwarding decisions. Periodic broadcasting of beacon packets is a popular method used by most geographic routing protocols to maintain neighbor positions. But it will increase the update cost and reduce the performance of the router. To eliminate this problem we propose this Mobile Location Update (MLU),MLU works on two principles ,1.Nodes whose movements are harder to predict, update their positions more frequently (and vice versa).2.Nodes which are static and closer to the forwarded path, update their positions more frequently (and vice versa). Keywords: Mobile Location Update, Personal Digital Assistants

  7. HUMAN WORKING DAY MODEL IN DELAY TOLERANT NETWORKING VIA QUEUING PETRI NETSDownload Article

    Sowbaranika.S1,Shobana.S1,Vignesh.S1, Dr.Karthik.S2

    Abstract

    close

    The project provides a systematic framework in providing such services. First, user behavioral profiles are constructed based on traces collected from two large wireless networks, and their spatio-temporal stability is analyzed. The implicit relationship discovered between mobile users could be utilized to provide a service for message delivery and discovery in various network environments. As an example application, we provide a detailed design of such a service in challenged opportunistic network architecture, named CSI. We provide a fully distributed solution using behavioral profile space gradients and small world structures recognition. This can improve the system performance and make the system more efficient by taking relevant samples. The objective of proposed system behavior-oriented services as a new paradigm of communication in mobile human networks. Our study is motivated by the tight user-network coupling in future mobile societies. In such a paradigm, messages are sent to inferred behavioral profiles, instead of explicit IDs. Keywords: Delay-Tolerant net works, modeling, queuing Petri nets, performance evaluation, buffer dimensioning, bundle fragmentation

  8. Efficient Data Retrieval by using AES for Disruption Tolerant Military NetworksDownload Article

    1P.Sobiyaa, 2R.M.Bhavadharini, 3S.Karthik

    Abstract

    close

    Disruption Tolerant Military Networks are designed to provide communication in the most unstable and stressed environment, where security and privacy are often critical in military application. Due to this, any attack can disrupt the operations in any part of the network. Cipher text Policy Attribute Based Encryption is a scalable cryptographic solution to the control access and secure data retrieval issues, where multiple key authorities manage their attributes independently. Key escrow problem is inherent such that the key authority can decrypt every cipher text by generating their secret keys. The system uses symmetric key encryption for ensuing end-to-end secure communication. Therefore, the system generates random 256 bit keys using AES (Advanced Encryption Standard). The main goal of DTN architecture is to provide interoperability between different kinds of networks in wide-ranging regions. This architecture originated from the Interplanetary Internet architecture then it is spread to the challenged networks more generally. Moreover, implementation of DTN is a good solution to supply people in remote military areas with the less Internet service for their communication. Key Words: Disruption Tolerant Military Network, Cipher text Policy Attribute based Encryption, Advance Encryption Standard.

  9. ENERGY EFFICIENT DATA TRANSMISSION IN CLUSTERED WIRELESS SENSOR NETWORKS WITH SENSOR SCHEDULING ALGORITHMDownload Article

    1K.Swaathi, 2Prof.B.Vinodhini, 3Dr.S.Karthik

    Abstract

    close

    Coverage preservation and prolonging lifetime are the fundamental issues in Clustered Wireless Sensor Networks. Sensor nodes have limited power, computational capabilities and memory. Sensing, transmitting and receiving activities consume battery energy of a sensor, and also limit the network lifetime. Applying the identity based cryptography in CWSN ensures only security and it leads to quick energy drain. To save energy, it should be necessary to schedule the sensor activity such that to allow redundant sensors to enter the sleep mode as often and for as long as possible. The statute of all the deployed sensors should be determined to be either active or sleep based on their capabilities as well as the state durations, such that the network lifetime is maximized. Cluster-based efficient-energy coverage scheme called CSA is proposed to ensure the full coverage of a monitored area while saving energy. CSA uses a sensor scheduling scheme based on the k-density and the remaining energy of each sensor to determine the state of all the deployed sensors as well as the state durations. It aims to provide a better performance in terms of the energy consumption and network lifetime. Keywords- CWSN, Cluster-Head, Key management, Identity based cryptography

  10. ENERGY EFFICIENT METHOD BASED ON RAINBOW ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORKSDownload Article

    S.Sathishkumar1, S.Karthik2

    Abstract

    close

    The wireless sensor network (WSN) has been an active research area for past few years but there is some limitations in the consumption of energy and storage , it seems there is a need in a routing protocol in the Wireless Sensor Networks Field. The energy and storage balance based on Rainbow Routing protocol for WSN is proposed in this paper. The Rainbow routing algorithm is define by the cross layer protocol and their main ingredients is geographic routing, load balancing and contention based relay selection. The Rainbow protocol has a mechanism with in and around the dead ends, the integration of the protocols are used for the balancing of energy and storage.

  11. MINIMIZING THE NETWORK TRAFFIC USING SHORTCUT TREE ROUTING PROTOCOL IN ZIGBEE WIRELESS NETWORKDownload Article

    P.Karthik1, M.Kavitha2 , Dr.S.Karthik3

    Abstract

    close

    Mobile Adhoc Networks (MANETs) plays an important role in emergency communications where network can be constructed temporarily and quickly. The nodes move randomly, ZigBee is one of the newest technologies developed by ZigBee Alliance and it enabling Wireless Personal Area works (WPAN). ZigBee tree routing (ZTR) protocol is used in many electronic devices and applications. Parent devices calculate addresses of their child devices by a tree concepts. It does not require any routing table and route discovery overhead to send a packet to the destination. It transmit the packets from source to destination through nodes, if path breaks during the transmission it sends the original data packets to the sender. For that purpose we uses the shortcut tree routing (STR) protocol they calculate remaining hops from an source to the destination. And it occupies large amount of memory for storing the tables for each nodes and time delay occurs due to calculating tables for each path, traffic will remains constant in their paths during the transmission of packets in shortcut tree routing protocol and it changes the path if they have an very high network traffic. Comparing to the zigbee tree routing protocol it overcomes the network density and the network traffic. Key words— ZigBee, tree routing, shortcut tree routing, neighbor table, MANET, Wireless Sensor Network.

  12. EDGE PRESERVING GLOBAL CONSTRAST ENHANCEMENT FOR MULTISCALE TURBULENCE MITIGATIONDownload Article

    M.Pavithra Devi.1, T.Maragatham2, Karthik.S3

    Abstract

    close

    The aim of image enhancement is to improve the interpretability or perception of information in images for human viewers, or to provide 'better' input for another automated image processing techniques. The Contrast Enhancement Turbulence Mitigation (CETM) techniques can manage the vagueness and ambiguity efficiently. Contrast enhancement is a powerful tool to represent and process human knowledge in form of image enhancement. The CETM algorithm enhances image contrast very effectively. Over the years, many researchers have provided insight into the physics of either the fog or turbulence but not both. Researchers have proposed methods to remove fog in images fast enough for real-time processing. In addition methods have been proposed by other researchers that address the atmospheric turbulence problem. In this paper, provide an analysis that incorporates both physics models: 1) fog and 2) turbulence. It is observed how contrast enhancements (fog removal) can affect image alignment and image averaging. In this paper, a new joint contrast enhancement and turbulence mitigation (CETM) method that utilizes estimations from the contrast enhancement algorithm to improve the turbulence removal algorithm. It provides a new turbulent mitigation object metric that measures temporal consistency.

  13. SECURING MULTI OWNER DATA SHARING THROUGH SECRET KEY GENERATION FOR DYNAMIC GROUPS IN THE CLOUDDownload Article

    1R.Gowthami, 1S.Hemambika, 1N.Jayaprakash, 1B.Santhosh Kumar

    Abstract

    close

    Cloud computing provides an cost-effective and competent solution for sharing group resource among cloud consumers. Inappropriately, data sharing in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a perplexing issue, due to the recurrent change of the participation. In this paper, we propose a secure multi owner data sharing scheme, named Mona, for dynamic groups in the cloud. With help of generating a unique secrete keys, it provides more security. Our ultimate aim is to provide more confidential access among the dynamic users. Meanwhile, the storage overhead and encryption computation cost are independent with the number of repealed users. Index terms: Privacy preservation, Secret key generation, Revocation, Confidential access.

  14. IMPACT ON PERFORMANCE OF TCP RENO BASED ON BANDWIDTH UTILISATIONDownload Article

    Sindhu.S1, Suganya.V1, Vijayakumar.M1, Bhavadharani.R.M2

    Abstract

    close

    This article analyzes the mechanisms of TCP Reno and TCP Veno algorithm with its existing problems, the reasons of packet transmission loss cannot be distinguished accurately, and we propose a comparison of TCP Reno with Veno in order to distinguish the cause of the transmission loss more accurately, and achieve higher network resources utilization .In order to control the congestion and to reduce the packet loss we use Veno algorithm and to achieve high throughput and user friendliness even in the case of high packet loss.

  15. USER BASED ENCRYPTOR TO PROVIDE HIGH DATA PRIVACY IN CLOUD Download Article

    Sathish kumar.A1, Sathyapriya.G1, Vasanthkumar.U1, Kavitha.M2

    Abstract

    close

    Data privacy in cloud has become a more complicated task with the increasing number of cloud users. Privacy can be attained in cloud through many ways but they come with the sacrifice of accessibility or performance. Encryption may be said to one of the most significant process to maintain data privacy. The main problem with the encryption and various methods that uses encryption to provide data privacy is that they are time consuming. Several encryptions provide a high level privacy with cost of time. In current circumstances performance is as important as security. This paper focuses on this to provide a high level privacy along with the performance. In this paper a new method of carrying out this encryption process is focused. According to this paper a single encryption can not be as efficient as a proper combination of some algorithms. Clustering of data is also carried out to increase the efficiency and privacy of confidential data. Several algorithms like Modified Blowfish, AES and RSA are used in this methodology. The main objective focused is to provide a user based encryption which gives a fair range of Security and Speed. Keywords: Data privacy, Cloud, Encryption, Security, Speed, Clustering, Blowfish, AES, RSA.

Sign in

Registered and Approved by National Science Library (NSL),National Institute of Science Communication And Information Resources(NISCAIR),
Council of Scientific and Industrial Research,New Delhi, India"