Refine your search
Collections
Co-Authors
- Chetan S. Arage
- K. V. V. Satyanarayana
- P. Dhavachelvan
- R. Baskaran
- Giri Sruthy
- D. Padmashree
- N. Pazhani Raja
- M. S. Saleem Basha
- B. Bhuvaneswari
- C. Kodeeswari
- S. Jarina
- S. Jaiganesh
- R. Ilamathi
- D. Pradeepa
- Sasidevi Ganesan
- V. Brindha
- B. Anantharaj
- P. Karthikeyan
- M. Vasanthi
- D. Nivetha
- D. Vinodha
- U. Prabu
- P. Inbavalli
- N. Moganarangan
- V. Ravishankar
- D Sathian
- R. Praveen Kumar
- K. Premkumar
- S. Sampathkumar
- T. Vengattaraman
- D. Saravanan
- V. Agalya
- S. Janakiraman
- R. Vigneshwaran
- A. Janakiram
- K. Prem Kumar
- D. Sathian
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Amudhavel, J.
- Improved Cooperative Bait Detection Method using Multiple Disjoint Path Technique
Abstract Views :149 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, Koneru Lakshmaiah Education Foundation (KLU), Vaddeswaram, Guntur – 522502, Andhra Pradesh, IN
1 Department of CSE, Koneru Lakshmaiah Education Foundation (KLU), Vaddeswaram, Guntur – 522502, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 41 (2016), Pagination:Abstract
The important aim of this research is to present the bait detection method for Mobile Ad Hoc Networks (MANETs) with goal of security and routing performance improvement. Methods/Statistical analysis: The proposed method is based on recently presented technique known as CBDS (Cooperative Bait Detection Scheme) which have been introduced for defending against different types of attacks in MANET. The practical analysis of CBDS method is conferred that performance of end to end delay and packet delivery ratio is poor in presence of attacks in network. Therefore, in this paper, improved CBDS (ICBDS) method is proposed with goal improving end to end delay and PDR performances. Findings: The simulation and practical analysis of the proposed ICBDS method is done using NS2 tool by considering the different network scenarios and attacks. The results of proposed work against existing CBDS methods claim that the performance of end to end delay and PDR is improved for any numbers of attackers in network. ICBDS technique overcomes the limitations of existing CBDS technique while preserving the MANET security as it is using disjoint path method. The performance of end to end delay is minimized by approximately 22 % whereas PDR performance is increased by 17 % approximately. Application/ Improvements: The application area for this proposed method is local banking operations, military application etc. The possible improvement to ICBDS technique will be the consideration of all types of MANET attacks.Keywords
Attacks, Bait Detection, CBDS, Disjoint Path, MANET Security.- Leaf Cutter Communication Strategy, Skills and Attributes - a Novel Bio-Inspired Intelligent Communication for Computing Research
Abstract Views :191 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, SMVEC, Mannadipet Commune, Madagadipet, Puducherry - 605107 Pondicherry, IN
2 Department of CSE, Pondicherry University, Kalapet, Puducherry - 605014, Pondicherry, IN
3 Department of CSE, Anna University, Sardar Patel Road, Guindy, Chennai - 600025
1 Department of CSE, SMVEC, Mannadipet Commune, Madagadipet, Puducherry - 605107 Pondicherry, IN
2 Department of CSE, Pondicherry University, Kalapet, Puducherry - 605014, Pondicherry, IN
3 Department of CSE, Anna University, Sardar Patel Road, Guindy, Chennai - 600025
Source
Indian Journal of Science and Technology, Vol 9, No 11 (2016), Pagination:Abstract
Background/Objectives: To analyze the behaviors of Leaf Cutter Ants and develop Bio-inspired intelligent communication mechanism for Research in Computing. Findings: In this research, the decision making realizations of the foraging ants are methodologically ascertained, collected and imported. Researchers have come across streaks of emergent patterns pertaining to foraging. It can be estimated in brevity that colonial ants possess or are guided by some feedback loops - positive or negative, coupled with individual responses arbitrated by social behavior of foraging ants and justifiable integrations of effacing local information during the phase of food collection after scrutiny and analysis of colony conditions. Applications/Improvements: The behavioral demeanor of ants relies largely on community building and prosperity, rather than individual optimization. The ants can sense and act differently when they understand that they are being scrutinized. Moreover, the intriguing art of surviving amongst weird environs of harmful parasites merely with the aid of Streptomyces can also be artificially implemented for the benefit of humankind in its entirety.Keywords
Bio Inspired, Communication, Computing, Intelligence, Leaf Cutter Ant- A Comprehensive Analysis on Multi Agent Decision Making Systems
Abstract Views :215 |
PDF Views:0
Authors
J. Amudhavel
1,
Giri Sruthy
2,
D. Padmashree
2,
N. Pazhani Raja
3,
M. S. Saleem Basha
4,
B. Bhuvaneswari
5
Affiliations
1 Department of CSE,Mannadipet Commune, Madagadipet, Puducherry – 605107, Pondicherry, IN
2 Department of CSE, Mannadipet Commune, Madagadipet, Puducherry – 605107, Pondicherry, IN
3 Department of IT, SMVEC, Mannadipet Commune, Madagadipet, Puducherry – 605107, Pondicherry, IN
4 Department of CSE, Mazoon University College, Muscat
5 Department of CSE, Pondicherry University, Kalapet, Puducherry – 605014, Pondicherry, IN
1 Department of CSE,Mannadipet Commune, Madagadipet, Puducherry – 605107, Pondicherry, IN
2 Department of CSE, Mannadipet Commune, Madagadipet, Puducherry – 605107, Pondicherry, IN
3 Department of IT, SMVEC, Mannadipet Commune, Madagadipet, Puducherry – 605107, Pondicherry, IN
4 Department of CSE, Mazoon University College, Muscat
5 Department of CSE, Pondicherry University, Kalapet, Puducherry – 605014, Pondicherry, IN
Source
Indian Journal of Science and Technology, Vol 9, No 11 (2016), Pagination:Abstract
Background/Objectives: To analyze and find the decision making systems in multi agent capable of solving complex problems. Method/Statistical Analysis: Multi agent systems are the collection of many individual intelligent systems. Decision making is important because a multi agent system consists of many agents that may be homogeneous or heterogeneous. In heterogeneous network agent must trust another agents in the network for sharing of messages. Hence an agent must be capable to make decision towards trusting of neighbor agents. Decision making technique plays an important role to make decision in such a situation. This is one scenario. Multiple scenarios are discussed in this paper towards the decision making capability of multi agent systems. Findings: In this research, the study of multi agent system, problem solving and decision making are considered as the two important concepts. Multi agent systems are capable of interacting with different environments like virtual environment or real time environment. In this paper a survey is done towards the decision making capability of multi agent systems. Applications/Improvements: The results from this work serve as the motivation to apply the future implementation of multi agent decision making in the complex problem solving.Keywords
Multi Agent Systems, Decision Making, Environment, Agents, Trust, Problem Solving- Mathematical Modelling on Avoidance-to- Acceptance Transition in Leaf Cutting Ant Colonies
Abstract Views :180 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, IN
2 Department of CSE, R&D Centre, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
3 Department of CSE, Pondicherry University, Pondicherry - 605014, Tamil Nadu, IN
1 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, IN
2 Department of CSE, R&D Centre, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
3 Department of CSE, Pondicherry University, Pondicherry - 605014, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 11 (2016), Pagination:Abstract
Background/Objectives: To analyze the behaviors of Forager ants and to utilize some form of memory as a warning system of possible harm to all other members of a colony. Methods/Statistical Analysis: Ants acquire experiential memory within a generation. Experience is shared among members of the colony. For instance, knowledge about an unsuitable leaf is shared by means of avoidance, which is subsequently reinforced by autocatalysis. The loss of avoidance thus marks the loss of past knowledge of the unsuitability of a set of leaves. Findings: In this research, the highly social behavior of ants, a colony appears to act as a collective entity that is more than the sum of its parts. An individual ant to possess the level of intelligence that enables complex decision-making, the colony made up of such individuals appear to exhibit such complex task. The interactions between individual ants in the colony seem to synchronize with each other and align with group tasks. Ants interact with one another by means of basic signaling protocols, such as trophallaxis among leaf-cutting ants. Applications/Improvements: The system has capacity of the ant colony to exhibit transitions from one collective decision and colony memory to the next. The colony of leaf-cutting antscan switch from avoidance to acceptance of leaves which had been deemed unsuitable due to the presence of unwarranted chemical compounds. The transition is not as gradual as one would expect but rather abrupt as evident in the intake rates measured.Keywords
Ant Colonies, Decision-Making, Leaf-Cutting- Mathematical Modelling on Nutrient Transmission in a Colony of Leaf-Cutting Ants
Abstract Views :143 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, IN
2 Department of CSE, Pondicherry University, Pondicherry - 605014, Tamil Nadu, ID
1 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, IN
2 Department of CSE, Pondicherry University, Pondicherry - 605014, Tamil Nadu, ID
Source
Indian Journal of Science and Technology, Vol 9, No 11 (2016), Pagination:Abstract
Background/Objectives: To analyze the Nutrient diffusion through an ant colony is a complex process of transmitting information from one node to another. Methods/Statistical Analysis: Ants have a special mode of transmission known as trophallaxis, which involves the transfer of liquid-based food from one ant's mouth to another. The worker ants may be categorized into two types: forager and non-forager, both of which are involved in the food transfer. Findings: In this research, by considering trophallaxis, the diffusion of the food signal through the ant colony is modelled as a two-type branching process. Analytic results based on asymptotic estimates of the branching process are here shown to be consistent with empirical results gathered from mini-colony experiments. The division of labor in worker ants is an important feature that exhibits the sociality of the colony. Indeed, resource allocation becomes more efficient if each worker ant is able to focus on one particular task only throughout its lifetime. Applications/Improvements: The division of labor, forager ants tends to be the more “aggressive” type in terms of seeking ants from which food can be received and subsequently exchanged. Meanwhile, the non-forager ants are more specialized in nest-maintenance activities and because of their relatively smaller size are more likely to obtain nourishment by another means. The trophallactic transmission process is investigated by Moreira et al. by conducting an experiment on a mini-colony of ants consisting of a mixture of the two classes3.Keywords
Leaf-Cutting, Nutrient, Trophallaxis- A Survey on Intrusion Detection System: State of the Art Review
Abstract Views :191 |
PDF Views:0
Authors
J. Amudhavel
1,
V. Brindha
1,
B. Anantharaj
2,
P. Karthikeyan
1,
B. Bhuvaneswari
3,
M. Vasanthi
1,
D. Nivetha
1,
D. Vinodha
4
Affiliations
1 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, IN
2 Department of CSE, TCET, Vandavasi - 627425, Tamil Nadu, IN
3 Department of CSE, Pondicherry University, Pondicherry - 605014, Tamil Nadu, IN
4 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu
1 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, IN
2 Department of CSE, TCET, Vandavasi - 627425, Tamil Nadu, IN
3 Department of CSE, Pondicherry University, Pondicherry - 605014, Tamil Nadu, IN
4 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu
Source
Indian Journal of Science and Technology, Vol 9, No 11 (2016), Pagination:Abstract
Background/Objectives: To analyze and monitoring the activity of nodes using an IDS Intrusion Detection System which provide security to the system. Findings: In this research, a network building was made with simple node formation with a fitting technique. So that it is easy for a user or beginner to understand the asymptotic dominion factors, due to the wide growth of nodes on network. Intrusion detection system is made of several nodes. These nodes are grouped and combined as a network. Since each node in a network has unique characteristics they may have high chance of attack from malware during the communication between systems. Applications/Improvements: Network of topology is done by creating and connecting various sub networks. Sub networks traffic is cleared and monitored with the package of IDS. It works on synchronous message transfer mode which provides acknowledgement to sender and receiver. All sub networks is managed by its corresponding system and further provide update to the master node on the network. Due to this broadcast of messages all other nodes may be in safe state of avoidance from attacker.Keywords
Ad-Hoc Network, Conversation Exchange Dynamics, Intrusion Detection System, Intrusion Prevention System, Network Security- Survey and Analysis of Web Service Composition Strategies: A State of Art Performance Study
Abstract Views :183 |
PDF Views:0
Authors
J. Amudhavel
1,
U. Prabu
1,
P. Inbavalli
1,
N. Moganarangan
2,
V. Ravishankar
3,
R. Baskaran
4,
P. Dhavachelvan
5
Affiliations
1 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, IN
2 Department of CSE, RGCET, Pondicherry - 607403, Tamil Nadu, IN
3 Department of CSE, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
4 Department of CSE, Anna University, Chennai - 600025, Tamil Nadu, IN
5 Department of CSE, Pondicherry University, Pondicherry - 605014, Tamil Nadu, IN
1 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, IN
2 Department of CSE, RGCET, Pondicherry - 607403, Tamil Nadu, IN
3 Department of CSE, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
4 Department of CSE, Anna University, Chennai - 600025, Tamil Nadu, IN
5 Department of CSE, Pondicherry University, Pondicherry - 605014, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 11 (2016), Pagination:Abstract
Background/Objectives: To analyze the functions and merits of web service composition and provide services to many number of users at a time. Methods/Statistical Analysis: The standard-based approach whichused to connects the web service to create the business processes which are of higher level. There are various approaches for composing the web services.Web service integrates various web applications by using languages namely WSDL, XML, WSFL etc. Findings: In this research, Web Service Composition (WSC) aims to organize numerous services to fulfill the user needs. It is one of the flexible way of integration of applications and resource sharing. The algorithm used by web service composition are Evolutionary algorithm, Ant Colony Optimization, Genetic algorithm, Particle Swarm algorithm, Branch and Bound for Execution Plan Selection (BB4EPS) algorithm, Join-Idle-Queue (JIQ) algorithm and Two-phase algorithm. Through the web service leads to provide services to more than single user. Applications/Improvements: When solving the web service composition problem, composing a sequence of web services is converted into finding a chain of actions. Automated planning technique uses two steps for web service composition dynamically. In this approach, WSC problem is taken as input and translated into WSC planning problem. Web service composition explore their functions through the online process and business needs.Keywords
Web Service Composition- Approaches- A Comprehensive Survey on Taxonomy and Challenges of Distributed File Systems
Abstract Views :213 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, Pondicherry University, Kalapet, Puducherry - 605014, Pondicherry, IN
2 Department of CSE,SMVEC, Mannadipet Commune, Madagadipet, Pondicherry - 605107,, IN
3 Department of CSE,Mannadipet Commune, Madagadipet, Puducherry - 605107, IN
4 Pondicherry University, Pondicherry – 605014, Tamil Nadu, IN
1 Department of CSE, Pondicherry University, Kalapet, Puducherry - 605014, Pondicherry, IN
2 Department of CSE,SMVEC, Mannadipet Commune, Madagadipet, Pondicherry - 605107,, IN
3 Department of CSE,Mannadipet Commune, Madagadipet, Puducherry - 605107, IN
4 Pondicherry University, Pondicherry – 605014, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 11 (2016), Pagination:Abstract
Background/Objectives: To analyze, find and interpret the current challenges in Distributed File Systems for research. Method/Statistical Analysis: With the immense growth of network applications a large amount of data existence is managed and stored. To process a huge amount data that is to be stored, a backend framework is required and for that DFS provides a central store for those data. As the amount of data being increased, the issue of proving efficient and easy to use solution arises and this issue is overcome using distributed file systems. Findings: In this research, an overview about various evolution of file system and how distributed file system is being used effectively in wide variety of network applications. DFS aims at sharing data and storing resources which is physically distributed on computers with a common file system. The main issues concerning the design of DFS such as fault tolerance, architecture, synchronization, consistency and replication and few others are also discussed in detail. It alsogives a comprehensive taxonomy of DFS in detail. Applications/Improvements: The encouraging results observed from this work serve as the motivation to apply future implementation of DFS within the context of current developments in distributed computing.Keywords
Challenges, Distributed File System, Fault Tolerance, Scalability, Transparency- Performance Analysis of Collision Avoidance Frame Works in Vanets
Abstract Views :193 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
2 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, IN
3 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, ID
4 Department of ECE, MIT, Pondicherry, Tamil Nadu, IN
5 Department of CSE, Pondicherry University, Pondicherry - 605014, Tamil Nadu, IN
1 Department of CSE, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
2 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, IN
3 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, ID
4 Department of ECE, MIT, Pondicherry, Tamil Nadu, IN
5 Department of CSE, Pondicherry University, Pondicherry - 605014, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 11 (2016), Pagination:Abstract
Background/Objectives: To analyse the performance in VANET and to suggest a framework for collision avoidance in VANET. Methods/Statistical Analysis: A Vehicular Ad hoc Network (VANET) has emerged to be one of the novel and powerful technologies providing safety for the persons driving the vehicles and also provides reliable communication between the vehicles. In this VANET technology, each vehicles act as a mobile node that communicates with each other using the Road Side Units (RSU). There are numerous protocols employed in the VANET. The different routing technique such as geographic, hybrid, topology and clustered routing helps in the reliable delivery of the packets from the origin to the target nodes by determining their geographical location. Findings: To facilitate efficient transfer of data we need to improve the QOS parameters such as jitter, delay, congestion, energy efficiency and latency. In order to eradicate the frequent occurrence of accident, the implementation of VANET technology is being used in various modes of transportation. Here, we had made an accumulative study of various routing protocols and collision avoidance techniques that are used in the field of navigation, human robot and biological collision avoidance. Applications/Improvements: The result observed from this work will motivate to develop a collision avoidance framework in VANET.Keywords
Collision Avoidance, Forwarding, Routing, VANET- A Brief Survey on Performance Analysis and Routing Strategies on Vanets
Abstract Views :251 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, SMVEC, Pondicherry - 605107, Tamil Nadu, IN
2 Department of Banking Technology, Pondicherry University, Pondicherry - 605014, Tamil Nadu, IN
1 Department of Computer Science and Engineering, SMVEC, Pondicherry - 605107, Tamil Nadu, IN
2 Department of Banking Technology, Pondicherry University, Pondicherry - 605014, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 11 (2016), Pagination:Abstract
Background/Objectives: To analyze the performance and find the challenges of routing in VANET. Findings: VANET protocols should be designed in such a way that a link should be established between the nodules in a nexus for efficient communication. Routing protocols are developed usually based on the two types of communication (i.e.) Vehicle to Vehicle (V2V) communication and Vehicle to Infrastructures (V2I) irrespective of their environment. This paper gives a survey of about the various routing protocols in VANETs, their main characteristics and their pros and cons which help for the further enrichment of the same. Applications/Improvements: The results observed from this work will motivate to improve the issues in VANET and to enhance the routing protocols.Keywords
Greedy Forwarding, Issues in VANET, Routing Protocols, VANET- An Empirical Analysis on Quality of Service (QoS) in Cloud Computing
Abstract Views :139 |
PDF Views:0
Authors
J. Amudhavel
1,
R. Vigneshwaran
1,
A. Janakiram
1,
S. Jarina
1,
K. Prem Kumar
1,
B. Anantharaj
2,
D. Sathian
3
Affiliations
1 Department of CSE, SMVEC, Pondicherry - 605107, IN
2 Department of CSE, TCET, Vandavasi - 604505, Tamil Nadu, IN
3 Department of CSE, Pondicherry University, Pondicherry - 605014, IN
1 Department of CSE, SMVEC, Pondicherry - 605107, IN
2 Department of CSE, TCET, Vandavasi - 604505, Tamil Nadu, IN
3 Department of CSE, Pondicherry University, Pondicherry - 605014, IN