A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Antony Prakash, A.
- Intrusion Forbearance Routing for a Wireless Sensor Network Using Dismissal Supervision of Multipath Routing (IFROST)
Authors
1 Shri Angalamman College of Engineering and Technology, Trichy, IN
2 Department of Information Technology, St. Joseph's College (Autonomous), Tiruchirappalli, Tamil Nadu, IN
Source
Wireless Communication, Vol 7, No 3 (2015), Pagination: 68-71Abstract
In the multipath routing, there occurs a number of intermediate nodes between source and destination. Each node will maintain information about another node and during any need of information the voting algorithm is used and each node vote about the other node. So during voting there may occur a chance of misjudging of good node as bad node and bad node as good node. This is bad mouthing attack which may lead to loss of packet transmission in wireless network. An algorithm called weighted voting is used to overcome this problem. Trust metrics is calculated based on direct trust and indirect trust. Using the trust metrics value the node is selected and the main aim is to identify the intruder and to provide solution for bad mouthing attack.
Keywords
Network Security, Wireless Sensor Network, Bad Mouthing Attack, Reliability, Weighted Voting.- An Experimental Study for the Comparison of LCOM Values and IQ Based on Time Analysis
Authors
1 St Joseph's College, Tiruchirappalli, IN
Source
Software Engineering, Vol 4, No 3 (2012), Pagination: 81-85Abstract
An experiment was conducted to perceive the comparison between lcom values and IQ based on time analysis. One of themost important and significant software attributes for assessing objectoriented software quality. In this experiment many strategies andmethods were used to perform lcom. To implement the strategy a test was conducted for 60 students undergoing their post graduation in computer applications and a program comprehension was performed with individual groups. The correlation value of the comprehension time for each of the program was calculated. From the study it was found that when in the case of intersection and when values are high it will lead to less complexity and in other cases if no intersection is found between one to n methods it will certainly lead to high complexity.
Keywords
Cognitive Science, IQ, Debugging, Statistical Test.- A Review on Lack of Cohesion in Method
Authors
1 St Joseph's College, Tiruchirappalli, IN
Source
Software Engineering, Vol 4, No 2 (2012), Pagination: 76-79Abstract
Cohesion is an important software attribute; it is one of the significant criterions for assessing object oriented software quality. Modules with high cohesion have a propensity to be preferable because high cohesion is associated with several desirable traits of software including robustness, reliability, reusability, and understandability while in the other case low cohesion is associated with undesirable traits such as being difficult to maintain, difficult to test, difficult to reuse, and even difficult to understand. This paper puts together the various techniques of lcom which has been proposed by various authors and this will give the overview about Lcom. This paper incorporates an assortment of aspects of lcom, which allows the reader to get a clear perspective on lcom. A selected choice of research articles were fused into this paper to facilitate the ease of a researcher searching for articles related to cohesion which in event makes the study of that researcher more competent.Keywords
Cognitive Science, Cohesion, LCOM, LCOM1, LCOM2, LCOM3, TCC.- An Analysis of Dependency between Personality Traits and Debugging Ability in Component Based System (CBS)
Authors
1 Computer Science, St. Joseph’s College, Tiruchirappalli, IN
Source
Software Engineering, Vol 3, No 7 (2011), Pagination: 288-292Abstract
In recent years, the winds of cognitive science is gently ushering changes in the latest software technologies. Also the traditional software complexity measures focuses only on addressing the complexity of the procedure oriented and object oriented software development. Thus envisioning new areas like component based system would lead to better utilization of resources and make the end user’s task easier. Thus an experiment has been conducted to study the link between personality traits and program debugging in component based systems. In our experimental setting, the debugging test was conducted in java bean programs and Personality test in Eysenck's personality inventory and the results were correlated. From the results, it is observed that there is a positive correlation between the personality traits and debugging. Psychoticism personality people performed better in debugging compared to the other two personality traits students.Keywords
Cognitive Science, Personality Traits, Debugging, Statistical Test, Component Based Programming.- A Survey on Big Data-Concepts, Analytics and its Tools
Authors
1 Department of Information Technology, St Joseph’s College - Tiruchirappalli, IN
Source
Data Mining and Knowledge Engineering, Vol 10, No 4 (2018), Pagination: 61-64Abstract
Big data is related with another age of innovations and structures, which can outfit the estimation of greatly substantial volumes of extremely fluctuated information through ongoing preparing and investigation. It includes changes in information composes, aggregation speed, and information volume, Size is the first, and at times, the only dimension that leaps out at the mention of big data. This paper attempts to offer a broader definition of big data that captures its other unique and defining characteristics. Academic journals in numerous disciplines, which will benefit from a relevant discussion of big data, have yet to cover the topic. This paper presents a consolidated description of big data by integrating definitions from practitioners and academics. The paper’s primary focus is on the analytic methods used for big data. A particular distinguishing feature of this paper is its focus on analytics related to unstructured data, which constitute 95% of big data. This paper also reinforces the need to devise new tools for predictive analytics for structured big data. In this paper, focus on concepts, methods and analytics used in big data.
Keywords
Big Data, Hadoop, Map Reduce, Security.References
- Pang, B., & Lee, L. (2008). Opinion mining and sentiment analysis. Foundations and Trends in Information Retrieval, 2(1–2), 1–135.
- Tekiner F. and Keane J.A., Systems, Man and Cybernetics (SMC), “Big Data Framework” 2013 IEEE International Conference on 13–16 Oct. 2013, 1494–1499.
- Nguyen T.D., Gondree M.A., Khosalim, J.; Irvine, “Towards a Cross Domain MapReduce Framework “IEEE C.E. Military Communications Conference, MILCOM 2013, 1436 – 1441.
- Kyuseok Shim, MapReduce Algorithms for Big Data Analysis, DNIS 2013, LNCS 7813, pp. 44–48, 2013
- M. Aharon, M. Elad, and A. Bruckstein, “K-SVD:An algorithm for designing overcomplete dictionaries for sparse representation,” IEEE Trans. Signal Processing, vol.54, no. 11, pp. 4311–4322, Nov. 2006.
- M. Zaharia et al. “Delay scheduling: A simple technique for achieving locality and fairness in cluster scheduling”. In EuroSys,2010.
- M. Zaharia, D. Borthakur, J. S. Sarma, K. Elmeleegy, S. Shenker, and I. Stoica, “Job scheduling for multi-user mapreduce clusters,” EECS Department, University of California, Berkeley, Tech. Rep.,Apr 2009.
- J. Gantz, D. Reinsel, "Extracting value from chaos", IDC iView, 2011, pp 1–12.
- Canada Inforoute, "Big Data Analytics in health", White Paper, Full Report, April 2013.
- Gartner, "IT glossary: big data" [webpage on the Internet]. Stamford, CT; 2012. Retrieved from: http://www.gartner.com/it-glossary/big-data.
- E. Mcnulty, "Understanding Big Data: The Seven V’s", Dataconomy, May 22, 2014, Retrieved from: http://dataconomy.com/seven-vs-bigdata/.
- A. Alexandru, D. Coardos, "BD in Tackling Energy Efficiency in Smart City", Scientific Bulletin of the Electrical Engineering Faculty, vol. 28, no. 4, pp. 14-20, 2014, Bibliotheca Publishing House, ISSN 1843-6188.
- Frost & Sullivan White Paper, "Drowning in Big Data? Reducing Information Technology Complexities and Costs For Healthcare Organizations", 2012,
- Watson, H.J. (2013a) “All about Analytics", International Journal of Business Intelligence Research, 2, pp.13-28.
- Power, D.J. (2007) “A Brief History of Decision Support Systems", DSSResources.com, http://DSSResources.COM/history/dsshistory.html, version 4.0 (current March 7, 2014).
- Watson, H. J. (2009a) “Tutorial: Business Intelligence – Past, Present, and Future", Communications of the Association for Information Systems, (25)39 (current March 7, 2014).