Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Arivazhagan, D.
- A Survey on Query Processing in Mobile Database
Abstract Views :281 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, AMET University, Chennai, IN
1 Department of Information Technology, AMET University, Chennai, IN
Source
Indian Journal of Science and Technology, Vol 7, No S6 (2014), Pagination: 32-34Abstract
A mobile computing device connected through wireless network then it is called as mobile database. The main objective of this paper proposes a survey on mobile database requirements, architecture of Mobile database Query processing, and its various challenges. Data-driven application is best method of enabling access to any kind of information retrieval from anywhere at any time. In Database query processing linear search, index based search algorithms are mainly used. This survey shows various existing algorithm used in mobile database query processing like CNFS, Flooding algorithm and their issues.Keywords
Architecture, CNFS, Database, Data-driven, Query Processing- Ontology based Semantic Web Technologies in E-learning Environment using Protégé
Abstract Views :195 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, AMET University, Chennai, IN
1 Department of Information Technology, AMET University, Chennai, IN
Source
Indian Journal of Science and Technology, Vol 7, No S6 (2014), Pagination: 64-67Abstract
The rapid advanced development of mobile phone usage has been increased very sharply. A semantic web is major concept about creation of Meta data. Most of the web page oriented application like HTML and XML uses the concept of Meta data. This paper proposes class concept hierarchy method for implementing and retrieving information about e-learning domain through PROTÉGÉ tools and also shows RDFS and OWL based samples method implementation for e-learning domains in these tools. It produced the result like number of course material prepared by tutor, total number of student registration and number of exam, quiz, assignment conducted by particular tutor using SPARQL query language.Keywords
No Keywords- Power Saving Mechanism for Ad-Hoc Network using 3G Fast Dormancy Technology
Abstract Views :236 |
PDF Views:0
Authors
D. Helen
1,
D. Arivazhagan
1
Affiliations
1 Department of Information Technology, AMET University, Chennai, IN
1 Department of Information Technology, AMET University, Chennai, IN
Source
Indian Journal of Science and Technology, Vol 7, No S6 (2014), Pagination: 74-77Abstract
The 3G devices known for higher energy consumption. The energy demand can be minimized by avoiding unnecessary listening between the nodes using fast dormancy. The fast dormancy mechanism has been implemented in ad-hoc network. Thus the channel access done by introducing Ad-hoc Traffic Indication Window(ATIM) in ad-hoc network. The ATIM window size is defined in an optimal way. According to the ATIM window behavior the node may enter into awake / sleep state. Making the node in sleep state avoid the nodes overhearing in the network traffic as a result node failure will be avoided and network topology may maintain. The stimulation has been done with 100 nodes based on nodes throughput, energy and delay. The result shows long lived nodes in the network. Thus, the network structure has been maintained by saving nodes energy by implementing fast dormancy. The fast dormancy release the ad-hoc network channel when they no longer needed. The 90 % of nodes alive active to maintain network topology.Keywords
Channel, Energy, Fast Dormancy, Transmission- Hash based Technique to Identify the Selfish Node in Mobile Ad-hoc Network
Abstract Views :196 |
PDF Views:0
Authors
G. Vennila
1,
D. Arivazhagan
1
Affiliations
1 Department of Information Technology, AMET University, Chennai - 603112, IN
1 Department of Information Technology, AMET University, Chennai - 603112, IN
Source
Indian Journal of Science and Technology, Vol 8, No 14 (2015), Pagination:Abstract
Mobile Ad-hoc NETwork (MANET) is a collection of mobile nodes that communicate with other node without any defined network. The node which decline to share its resource with other nodes is a selfish node. The main idea of selfish node is to drop the data packets and preserve the resource for its own use. The co-operation between the nodes is not guaranteed when the node behaves as selfish nodes. Most of the existing techniques use cryptographic algorithm such as Message Authentication Code (MAC), Rivest Shamir Adelman (RSA) etc, in identifying the selfish node. All of those techniques are take more time to find out the selfish node behavior. This paper applies hash function to identify the misbehaving node. The Hash function is a technique used in the Route Reply (RREP) to authenticate the message, which works in an efficient way. The result shows the better performance in terms of packet delivery ratio up to 70% and time delay has been reduced up to 80% compared to the existing Dynamic Source Routing (DSR) protocol.Keywords
Hash Function, Mobile Ad-hoc Network, Rrep, Rreq, Selfish Node.- An Intelligent Energy Efficient Routing Protocol for Mobile Ad-Hoc Network
Abstract Views :174 |
PDF Views:0
Authors
D. Helen
1,
D. Arivazhagan
1
Affiliations
1 Department of Information Technology, Academy of Maritime Education and Training (AMET), AMET University 135 East Coast Road, Kanathur, Chennai - 603112, IN
1 Department of Information Technology, Academy of Maritime Education and Training (AMET), AMET University 135 East Coast Road, Kanathur, Chennai - 603112, IN
Source
Indian Journal of Science and Technology, Vol 9, No 45 (2016), Pagination:Abstract
Objectives: To develop an energy-efficient routing protocol for Mobile Ad Hoc Network (MANET). Methods: The research work includes the Bee Colony Optimization (BCO) technique for evolving energy efficient routing algorithm. The Intelligent Cross-Layer approach based Bee Routing (ICLBR) is inspired by BCO in order to discover the optimal path for data transmission. The ICLBR Intelligent Cross Layer Approach based Bee Routing algorithm is used to overcome the congestion problem, link failure and energy loss using cross layer approach. The effectiveness of the route has been evolved with the parameter of node degree and connectivity ratio. Findings: This paper proposes an ICLBR algorithm to discover the energy efficient route in order to increase the network lifetime for MANET. The ICLBR is experimented in NS2.34, to systematically validate the routing algorithm. The experimental results show that the ICLBR improves the packet delivery ratio by 9.08% and minimizes the average end-to-end delay is by 5.16% over the Ad hoc On-Demand Distance Vector (AODV) routing protocol. Improvement: The proposed ICLBR mechanism able to enhance the network resource and also improves the network lifetime as compared to the state-of-art works.Keywords
Connectivity, Mobility, Node Degree, Optimization, Systematically.- Survey on Encryption Techniques used to Secure Cloud Storage System
Abstract Views :173 |
PDF Views:0
Authors
Affiliations
1 AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
1 AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 36 (2015), Pagination:Abstract
Cloud Computing is very flexible in nature that helps to quickly access the resources efficiently from the third party service provider to expand the business with low capitalization cost. A cloud storage system stores large number of data in its storage server. Since the data is stored for a long term over the internet it does not provide the data confidentiality and make the hackers to steal the data provided in the storage system and even when data forwarded to cloud environment, it lacks data integrity and makes the cloud user unsatisfied. In this paper, we study about different encryption technique to protect the cloud storage environment. This paper concisely covers some of the existing cryptographic approaches that can be used to improve the security in cloud environment.Keywords
Cryptographic Approaches, Cloud Storage System- An Inception of DDoS Attacks for Popular Websites - Identifying on Application-Layer
Abstract Views :220 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, Academy of Maritime Education and Training (AMET), 135,East Coast Road, Kanathur – 603112, Chennai, Tamil Nadu, IN
2 Department of E-Governance, Academy of Maritime Education and Training (AMET), 135,East Coast Road, Kanathur – 603112, Chennai, Tamil Nadu, IN
3 Research and Development Division, AMET University135, ECR, Kannathur – 603112, Chennai, Tamil Nadu, IN
1 Department of Information Technology, Academy of Maritime Education and Training (AMET), 135,East Coast Road, Kanathur – 603112, Chennai, Tamil Nadu, IN
2 Department of E-Governance, Academy of Maritime Education and Training (AMET), 135,East Coast Road, Kanathur – 603112, Chennai, Tamil Nadu, IN
3 Research and Development Division, AMET University135, ECR, Kannathur – 603112, Chennai, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 47 (2016), Pagination:Abstract
The later tide from claiming conveyed refusal about management strike Distributed Denial of Service (DDOS) towards excessive-profile net sites, exhibit how harming the ones DDOS strike are added to entryway uncovered the web could be underneath such strike. The advantages for those web destinations had been inaccessibility to hours or indeed going days in addition as an after effect of the strike. In this strike the same time as ship an extensive quantity approximately movement will an exploited character group or arrange. The exploited character can be overpowered subsequently time perusing to such an extent motion that it got here to gatherings deliver minimal alternately no management to its actual clients utility(App)-DDOS strike may a danger to be stealthier also a more amount risky for the normal websites. The blast motion also secondary volume are the as a relatable point qualities for App-DDoS strike additionally streak crowds, it may be no longer difficult for present systems will recognize them simply through measurable elements from claiming movement. The display really worth of effort characterizes the entry grid (AM) to catch fleeting examples of regular streak swarm moreover with screen App-DDoS strike in the course of streak swarm off danger stowed away Semi-Markov version will be used to portray those progress of am will also accomplish an numerical additionally programmed identity.Keywords
Application Layer, Distributed Denial of Service, Hidden Semi-Markov Model and Access Matrix.- New Cryptography Algorithm with Fuzzy Logic for Effective Data Communication
Abstract Views :165 |
PDF Views:0
Authors
Affiliations
1 IT Department, AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
2 Department of E-Governance, AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
1 IT Department, AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
2 Department of E-Governance, AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
In this communicative world, people forget to care about the security when the data communication gets the importance than the privacy most of the time. There the data theft takes place effortlessly. Many methodologies have been devised for making the effective communication either over the internet or intranet. However, the hackers enrich themselves than the new technologies whenever are launched. As need arises for cultivate the security key generation while secure data communication has to be ensured, we propose a new cryptography algorithm along with the fuzzy logic through this paper that materializes the secure communication possible. Firstly, we observed the flaw that causes for hacking effortlessly by the intruder during the data transmission over the network. Then the evaluation part could be done with the same context without losing data because of this proposed algorithm. This algorithm concentrates on image and text data encryption using fuzzy logic and on secured sharing theme which provides highly authenticated data transferring. The existing security algorithms had nod in many ways only for the secure data transmission rather than the complexity in which they have when need to be executed. Henceforth the aspirants who want to have the communication have to spend more time than the actual. Obviously the precious algorithms should have less processing time and high secure in nature. With keeps it as a main aspect the New Cryptography algorithm with fuzzy logic is proposed and has low process time and high security logics using various key for encryption and decryption. The results which produced by this proposed algorithm have been compared with exist algorithms and finally could arrive the conclusion that the proposed is highly effective in security aspects and needs minimum amount of time to be executed.Keywords
Cryptography, Fuzzy Logic, Private Key, Public Key, RSA Algorithm, Security Key- Implementing Inference Revelation System for a Database
Abstract Views :149 |
PDF Views:0
Authors
Affiliations
1 Information Technology, AMET University, Chennai - 603112, Tamil Nadu, IN
2 Department of E-Governance, AMET University, Chennai - 603112, Tamil Nadu,, IN
3 Information Technology, AMET University, Chennai - 603112, Tamil Nadu,, IN
1 Information Technology, AMET University, Chennai - 603112, Tamil Nadu, IN
2 Department of E-Governance, AMET University, Chennai - 603112, Tamil Nadu,, IN
3 Information Technology, AMET University, Chennai - 603112, Tamil Nadu,, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Dispatched client of the database may endeavour change those relationship «around the data so as will derive or understand those fragile information beginning with those threatening data get. Acceptance will be a system a client could use ought to whip right control instruments to database structure. An enlistment recognizable proof structure might be required to make sense of whether customers could utilize charged got to data with interpret sensitive information. In perspective of the space of the database semantic acceptance distinguishing proof system will be framed. That probability about getting access to span of the season of the customer is registered when each shot the customer acts those request. That client requests a will an opportunity to be blocked in the acceptance probability quality outperforms those pre-indicated edge restrain. By this, those will be abstained from beginning with surmising the fragile data. Thusly we make a model for evaluating acceptance subordinate upon those request progressions.Keywords
Access, Database, Framework, Information, Security- Analysis of Cloud Computing Technology
Abstract Views :127 |
PDF Views:0
Authors
Affiliations
1 AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
1 AMET University, Kanathur, Chennai - 603112, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 21 (2015), Pagination:Abstract
Cloud computing is the good delivery model of cloud service over the internet. In this global world everyone used cloud computing. The technology was economically accepted because of less expensive. Internet is backbone for cloud computing technology. The cloud computing applied in Business, IT sector, social network sites, web mail etc. cloud is a 24X7 nonstop service element. Previous year back if any communication to other people from one place to another place only believes post mail and telephone link. Example, post mail is a late process to send to specific area. But there is a question how much person using letter mail today. In this system is totally changed and peoples are depend upon modern technology. Cloud is a tremendously developing technology in global world Cloud is an extreme benefit and good deployment model. Logically it is outsourced from the third-party, Example Google Drive is a world largest online storage. Till large amount of people nervous while they are using cloud computing, they are concern about the security risk. The paper discusses various risk threat and vulnerabilities located in cloud.Keywords
Backbone, Cloud, Google Drive, Security, Tremendously.- Interactive Trial Room – A Solution to Reduce the Problem of Rampant Return of Sold Merchandise in Fashion E-Commerce Business
Abstract Views :174 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, Academy of Maritime Education and Training (AMET) University, 135 East Coast Road, Kanathur, Chennai – 603112, Tamil Nadu, IN
2 E-Governance, Academy of Maritime Education and Training (AMET) University, 135 East Coast Road, Kanathur, Chennai – 603112, Tamil Nadu, IN
1 Department of Information Technology, Academy of Maritime Education and Training (AMET) University, 135 East Coast Road, Kanathur, Chennai – 603112, Tamil Nadu, IN
2 E-Governance, Academy of Maritime Education and Training (AMET) University, 135 East Coast Road, Kanathur, Chennai – 603112, Tamil Nadu, IN