Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ponmuthuramalingam, P.
- Students and Software Testing Professional’s Web Based Learning Standards, Styles and UI:A Case Study
Abstract Views :123 |
PDF Views:4
Authors
Affiliations
1 Government Arts College, Coimbatore, IN
2 Department of Computer Science, Government Arts College (Autonomous), Coimbatore, IN
1 Government Arts College, Coimbatore, IN
2 Department of Computer Science, Government Arts College (Autonomous), Coimbatore, IN
Source
Software Engineering, Vol 4, No 5 (2012), Pagination: 198-201Abstract
The World Wide Web has become firmly entrenched in our common life. Not only it is a space where people can speak, employment, and trade but it has also increasingly become a place to learn. The purpose of this paper was to examine how a particular technique of education can impact the helpfulness of an on-line or web based course in delivering subject content. The learning is supported into software testing professionals and students. The learning interfaces are spitted into six factors. Also the data show the infesting phenomena with respect to motivation, research and social aspects. The system filtered web pages based on the relevance of their contents and assisted to users for their learning style and recommending pages based on the page relevancy. This paper proposes the methodology of conducting a wiki websites in an improvement process.Keywords
Web Based Learning, Web Learning Standards, Web Learning Styles, User Interface, Wiki Web Site, Web Learning Functionalities.- Interactive Image Segmentation using Improved Adaptive Markov Random Field Approach
Abstract Views :175 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Governments Arts College, Coimbatore – 641046, Tamil Nadu, IN
1 Department of Computer Science, Governments Arts College, Coimbatore – 641046, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 10, No 6 (2017), Pagination:Abstract
Background/Objectives: To interactively split an object of interest from the remaining image with better smoothing by introducing improved adaptive Markov Random field resolving the problem of much noise. Methods/Statistical analysis: By utilizing a Dirichlet process multiple - view learning scheme, the unlabelled pixel labels are calculated by using the seed pixels. It is used for supporting the multiple-view learning in order to incorporate the constraints of both appearance and boundary constraint, and the Dirichlet process mixture-based nonlinear classification for concurrently modelling the image features and distinguishing the differences between the classes of object and background. The MRF field is utilized for providing the smoothness in segment labels. Findings: In Markov Random Field (MRF) based scheme, only the pixel and the surrounding pixels relationships are considered. The microscopic image processing result along with low noise is bad. To solve this problem, the adaptive MRF method based on region; it exploits Graph Cuts for inference. The different type of images produces the different pre-segmentation results. The connection degree between current and its linked regional blocks is denoted by connection parameter. If the connection parameter value is high, large connection degree between regional block and neighbouring regional blocks is defined. Otherwise lower connection degree between regional block and neighbourhood regional blocks. The adaptive MRF smoothing is more accurate and efficient segmentation result than the traditional MRF based Smoothing method. However, the appropriate parameter selection is a difficult task for practical image segmentation which can be solved by introducing an improved adaptive MRF model by using a modified graph cutter. Thus, the image segmentation is achieved based on modified graph-cut model using a novel energy function without the regularizing parameter. Improvements/Applications: The improved adaptive Markov Random Field approach interactively segment images with better smoothness than most of the current approaches.Keywords
Boundary Constraints, Interactive Segmentation, Markov Random Field.- Erudite Fish Swarm Optimization Based Routing Protocol to Maximize Wireless Sensor Network Lifetime
Abstract Views :183 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science, Government Arts College, Coimbatore, Tamil Nadu, IN
2 Regional Joint Directorate of Collegiate Education, Madurai Region, Madurai, Tamil Nadu, IN
1 Department of Computer Science, Government Arts College, Coimbatore, Tamil Nadu, IN
2 Regional Joint Directorate of Collegiate Education, Madurai Region, Madurai, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 9, No 3 (2022), Pagination: 305-315Abstract
Wireless Sensor Networks (WSNs) are an influential network form that comprises remote nodes having sensing, processing, and communication capabilities. WSN is a unique ad-hoc network with a wireless telecommunications infrastructure that effectively supports, observes, and responds to natural and artificial events. It is impossible to employ the ad-hoc network routing methods in sensor networks since they are not scalable. WSN relies on the routing protocol to get data from sensors to their final destination in a timely way. If the routing protocol fails to work, then it is expected that a significant amount of time and effort will be spent finding the most efficient route, increasing the likelihood that the worst possible option will be selected. Because of this, WSN routing protocols must include the concept of "erudite" features, which refers to a high degree of sensing of the nodes around them to determine the optimum path. Fish swarm optimization is the basis of the new WSN routing protocol proposed in this paper, namely the Erudite Fish Swarm Optimization Based Routing Protocol (EFSORP). In EFSORP, nodes are treated as fishes. Nodes having prior knowledge about routes are selected at random. Foraging, following, swarming, and random movement is four of the most common behaviors of fishes while seeking food. These behaviors are mimicked to identify the best routes in WSN. EFSORP’s performance is evaluated in NS3. A wide range of necessary computer network performance measures are used to assess EFSORP against existing routing protocols. EFSORP's results show that it outperforms the current routing protocols on all measures.Keywords
Routing, WSN, Energy, Delay, Fish, Optimization.References
- Pathak and M. G. Bhatt, “Synergetic manufacturing systems anchored by cloud computing: A classified review of trends and perspective,” Mater. Today Proc., 2020, doi: https://doi.org/10.1016/j.matpr.2020.07.435.
- T. A. Alghamdi, “Enhanced QoS routing protocol using maximum flow technique,” Comput. Electr. Eng., vol. 89, p. 106950, 2021, doi: https://doi.org/10.1016/j.compeleceng.2020.106950.
- T. M. Behera, S. K. Mohapatra, P. Mukjerjee, and H. K. Sahoo, “Work-In-Progress: DEEC-VD: A Hybrid Energy Utilization Cluster-Based Routing Protocol for WSN for Application in IoT,” in 2017 International Conference on Information Technology (ICIT), 2017, pp. 97–100, doi: 10.1109/ICIT.2017.42.
- B. Chakraborty and P. Mukherjee, “WAL: An Energy Efficient Hybrid Routing Protocol in Co-operative Communication,” in 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), 2018, pp. 1317–1322, doi: 10.1109/ICECA.2018.8474708.
- A. Mathur, T. Newe, W. Elgenaidi, M. Rao, G. Dooly, and D. Toal, “A secure end-to-end IoT solution,” Sensors Actuators A Phys., vol. 263, pp. 291–299, 2017, doi: https://doi.org/10.1016/j.sna.2017.06.019.
- M. Elappila, S. Chinara, and D. R. Parhi, “Survivable Path Routing in WSN for IoT applications,” Pervasive Mob. Comput., vol. 43, pp. 49– 63, Jan. 2018, doi: 10.1016/j.pmcj.2017.11.004.
- J. John, G. S. Kasbekar, and M. S. Baghini, “Maximum lifetime convergecast tree in wireless sensor networks,” Ad Hoc Networks, vol. 120, p. 102564, 2021, doi: https://doi.org/10.1016/j.adhoc.2021.102564.
- M. C. Domingo and R. Prior, “Energy analysis of routing protocols for underwater wireless sensor networks,” Comput. Commun., vol. 31, no. 6, pp. 1227–1238, 2008, doi: https://doi.org/10.1016/j.comcom.2007.11.005.
- T. N. Sugumar and N. R. Ramasamy, “mDesk: a scalable and reliable hypervisor framework for effective provisioning of resource and downtime reduction,” J. Supercomput., vol. 76, no. 2, pp. 1277–1292, Feb. 2020, doi: 10.1007/s11227-018-2662-5.
- G. D. O’Mahony, K. G. McCarthy, P. J. Harris, and C. C. Murphy, “Developing novel low complexity models using received in-phase and quadrature-phase samples for interference detection and classification in Wireless Sensor Network and GPS edge devices,” Ad Hoc Networks, vol. 120, p. 102562, 2021, doi: https://doi.org/10.1016/j.adhoc.2021.102562.
- A. Arena, P. Perazzo, C. Vallati, G. Dini, and G. Anastasi, “Evaluating and improving the scalability of RPL security in the Internet of Things,” Comput. Commun., vol. 151, pp. 119–132, 2020, doi: https://doi.org/10.1016/j.comcom.2019.12.062.
- D. Gopika and R. Panjanathan, “Energy efficient routing protocols for WSN based IoT applications: A review,” Mater. Today Proc., 2020, doi: https://doi.org/10.1016/j.matpr.2020.10.137.
- J. Ramkumar and R. Vadivel, “Performance Modeling of Bio-Inspired Routing Protocols in Cognitive Radio Ad Hoc Network to Reduce End-to-End Delay,” Int. J. Intell. Eng. Syst., vol. 12, no. 1, pp. 221– 231, 2019, doi: 10.22266/ijies2019.0228.22.
- J. Ramkumar and R. Vadivel, “Meticulous elephant herding optimization based protocol for detecting intrusions in cognitive radio ad hoc networks,” Int. J. Emerg. Trends Eng. Res., vol. 8, no. 8, pp. 4549–4554, 2020, doi: 10.30534/ijeter/2020/82882020.
- J. Ramkumar and R. Vadivel, “CSIP—cuckoo search inspired protocol for routing in cognitive radio ad hoc networks,” in Advances in Intelligent Systems and Computing, 2017, vol. 556, pp. 145–153, doi: 10.1007/978-981-10-3874-7_14.
- J. Ramkumar and R. Vadivel, “Multi-Adaptive Routing Protocol for Internet of Things based Ad-hoc Networks,” Wirel. Pers. Commun., pp. 1–23, Apr. 2021, doi: 10.1007/s11277-021-08495-z.
- J. Ramkumar and R. Vadivel, “Bee inspired secured protocol for routing in cognitive radio ad hoc networks,” INDIAN J. Sci. Technol., vol. 13, no. 30, pp. 3059–3069, 2020, doi: 10.17485/IJST/v13i30.1152.
- J. Ramkumar and R. Vadivel, “FLIP: Frog Leap Inspired Protocol for Routing in Cognitive Radio Ad Hoc Networks,” in International Conference on Recent Trends in Engineering and Material Sciences (ICEMS - 2016), 2016, p. 248.
- J. Ramkumar and R. Vadivel, “Intelligent Fish Swarm Inspired Protocol (IFSIP) For Dynamic Ideal Routing in Cognitive Radio Ad-Hoc Networks,” Int. J. Comput. Digit. Syst., vol. 10, no. 1, pp. 1063– 1074, 2020, doi: http://dx.doi.org/10.12785/ijcds/100196.
- J. Ramkumar and R. Vadivel, “Improved frog leap inspired protocol (IFLIP) – for routing in cognitive radio ad hoc networks (CRAHN),” World J. Eng., vol. 15, no. 2, pp. 306–311, 2018, doi: 10.1108/WJE-08-2017-0260.
- J. Ramkumar, C. Kumuthini, B. Narasimhan, and S. Boopalan, “Energy Consumption Minimization in Cognitive Radio Mobile Ad-Hoc Networks using Enriched Ad-hoc On-demand Distance Vector Protocol,” 2022 Int. Conf. Adv. Comput. Technol. Appl., pp. 1–6, Mar. 2022, doi: 10.1109/ICACTA54488.2022.9752899.
- P. Menakadevi and J. Ramkumar, “Robust Optimization Based Extreme Learning Machine for Sentiment Analysis in Big Data,” 2022 Int. Conf. Adv. Comput. Technol. Appl., pp. 1–5, Mar. 2022, doi: 10.1109/ICACTA54488.2022.9753203.
- O. C. Ghica, C. Nita-Rotaru, G. Trajcevski, and P. Scheuermann, “Security of electrostatic field persistent routing: Attacks and defense mechanisms,” Ad Hoc Networks, vol. 36, pp. 270–295, 2016, doi: https://doi.org/10.1016/j.adhoc.2015.07.016.
- S. Gopinath, K. Vinoth Kumar, P. Elayaraja, A. Parameswari, S. Balakrishnan, and M. Thiruppathi, “SCEER: Secure cluster based efficient energy routing scheme for wireless sensor networks,” Mater. Today Proc., vol. 45, pp. 3579–3584, 2021, doi: https://doi.org/10.1016/j.matpr.2020.12.1096.
- Y. Yang, X. Shi, Q. Ma, Y. Li, X. Yin, and Z. Wang, “Path stability in partially deployed secure BGP routing,” Comput. Networks, vol. 206, p. 108762, 2022, doi: https://doi.org/10.1016/j.comnet.2022.108762.
- Y. Lin, Y. Mao, Y. Zhang, and S. Zhong, “Secure deduplication schemes for content delivery in mobile edge computing,” Comput. Secur., vol. 114, p. 102602, 2022, doi: https://doi.org/10.1016/j.cose.2022.102602.
- R. Fotohi, E. Nazemi, and F. Shams Aliee, “An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks,” Veh. Commun., vol. 26, p. 100267, 2020, doi: https://doi.org/10.1016/j.vehcom.2020.100267.
- T. Yang, X. Xiangyang, L. Peng, L. Tonghui, and P. Leina, “A securerouting of wireless sensor networks based on trust evaluation model,” Procedia Comput. Sci., vol. 131, pp. 1156–1163, Jan. 2018, doi: 10.1016/J.PROCS.2018.04.289.
- G. A. E. Satish Kumar and P. Rama Devi, “A novel proactive routing strategy to defend node isolation attack in MANETS,” Mater. TodayProc., 2021, doi: https://doi.org/10.1016/j.matpr.2020.11.361.
- M. A. Cheema et al., “Blockchain-based secure delivery of medical supplies using drones,” Comput. Networks, vol. 204, p. 108706, 2022, doi: https://doi.org/10.1016/j.comnet.2021.108706.
- M. P. Lokhande and D. D. Patil, “Secured energy efficient machine -to-machine communication for telerobotic system,” Informatics Med. Unlocked, vol. 26, p. 100731, 2021, doi: https://doi.org/10.1016/j.imu.2021.100731.
- N. Nasser and Y. Chen, “SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks,” Comput. Commun., vol. 30, no. 11, pp. 2401–2412, 2007, doi:https://doi.org/10.1016/j.comcom.2007.04.014.
- G. Rathee, A. Sharma, R. Kumar, F. Ahmad, and R. Iqbal, “A trust management scheme to secure mobile information centric networks,” Comput. Commun., vol. 151, pp. 66–75, 2020, doi: https://doi.org/10.1016/j.comcom.2019.12.024.
- M. Kuchaki Rafsanjani and H. Fatemidokht, “FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs,” AEU - Int. J. Electron. Commun., vol. 69, no. 11, pp. 1613–1621, 2015, doi: https://doi.org/10.1016/j.aeue.2015.07.013.
- A. Chowdhury and D. De, “FIS-RGSO: Dynamic Fuzzy Inference System Based Reverse Glowworm Swarm Optimization of energy and coverage in green mobile wireless sensor networks,” Comput. Commun., vol. 163, pp. 12–34, 2020, doi: https://doi.org/10.1016/j.comcom.2020.09.002.
- X. Zhang, X. Lu, and X. Zhang, “Mobile wireless sensor network lifetime maximization by using evolutionary computing methods,” Ad Hoc Networks, vol. 101, p. 102094, 2020, doi: https://doi.org/10.1016/j.adhoc.2020.102094.