Vincent Kumar | Anna University (original) (raw)

Papers by Vincent Kumar

Research paper thumbnail of Inpainting for satellite imagery using thin plate spline radial basis function neural networks in shearlet domain

Journal of Intelligent & Fuzzy Systems

Research paper thumbnail of A fuzzy based secure QoS routing protocol using ant colony optimization for mobile Ad hoc network

Journal of Intelligent & Fuzzy Systems

Research paper thumbnail of Effective and Efficient Ranking and Re-Ranking Feature Selector for Healthcare Analytics

Intelligent Automation and Soft Computing

Research paper thumbnail of Secure isolation of cloud consumers legitimacy using fuzzy analytical hierarchy process (AHP)

Research paper thumbnail of Improving medical diagnosis performance using hybrid feature selection via relieff and entropy based genetic search (RF-EGA) approach: application to breast cancer prediction

Research paper thumbnail of A Hybrid Feature Selection Method for Effective Data Classification in Data Mining Applications

International Journal of Grid and High Performance Computing

In data mining, people require feature selection to select relevant features and to remove unimpo... more In data mining, people require feature selection to select relevant features and to remove unimportant irrelevant features from a original data set based on some evolution criteria. Filter and wrapper are the two methods used but here the authors have proposed a hybrid feature selection method to take advantage of both methods. The proposed method uses symmetrical uncertainty and genetic algorithms for selecting the optimal feature subset. This has been done so as to improve processing time by reducing the dimension of the data set without compromising the classification accuracy. This proposed hybrid algorithm is much faster and scales well to the data set in terms of selected features, classification accuracy and running time than most existing algorithms.

Research paper thumbnail of An Efficient Multi-resolution Video Compression Approach with Inpainting Algorithm

Research Journal of Applied Sciences, Engineering and Technology, 2014

Research paper thumbnail of Security aware minimized dominating set based routing in MANET

2010 Second International conference on Computing, Communication and Networking Technologies, 2010

... B. Routing over MANET Routing in MANET is a challenging task because of dynamic network ... W... more ... B. Routing over MANET Routing in MANET is a challenging task because of dynamic network ... We plan to apply some composite key management process using existing techniques such as certificate ... In the first phase, the protocol uses mechanisms to detect the trust level of ...

Research paper thumbnail of Performance Evaluation of Cloud Services with Profit Optimization

Procedia Computer Science, 2015

Research paper thumbnail of Particle swarm optimization based secure QoS clustering for mobile ad hoc network

2013 International Conference on Communication and Signal Processing, 2013

Research paper thumbnail of Fuzzy ART-Based User Behavior Trust in Cloud Computing

Advances in Intelligent Systems and Computing, 2014

Research paper thumbnail of Mobile agent based composite key management scheme for MANET

... as the key of cluster head changes continuously with respect to it's trust value... more ... as the key of cluster head changes continuously with respect to it's trust value. Keywords-Ad hoc network, key management, hierarchical clustering, mobile agent, certification authority, fuzzy ... Mobile Ad hoc Network (MANET) do not have any fixed infrastructure and consists if ...

Research paper thumbnail of JNLP based secure software as a service implementation in cloud computing

Communications in Computer and Information Science, 2012

Research paper thumbnail of Mobile agent based clustering and maintenance using secure routing protocol for mobile ad hoc network

International Journal of Physical Sciences, 2013

Routing in mobile ad hoc network is the challenging task due to the dynamic nature and resource l... more Routing in mobile ad hoc network is the challenging task due to the dynamic nature and resource limitations of network. Network clustering deals with partitioning network into clusters based on some rules. Clustering guarantees limited resource utilization and network scalability. In this paper, we mainly focused on using mobile agents for collecting information about cluster members and cluster maintenance. Ensuring security of mobile agent is a difficult task. In this work, the authorization of mobile agent is achieved using session key or secret key shared between mobile agent owner and node. We applied a distributed private key generation scheme, which generates secret key of cluster members based on 'n' key shares. The session key is generated based on past frequent traffic pattern that exist between the nodes. The behavior of mobile agent with respect to various security issues such as replay attack, non repudiation, denial of service and unauthorized access was discussed. The performance of the proposed scheme is evaluated under presence of varying number of malicious nodes. According to the observed results, the proposed protocol guarantees high packet delivery ratio and low delay, compared to cluster based routing protocol.

Research paper thumbnail of ACDP: Prediction of Application Cloud Data center Proficiency Using Fuzzy Modeling

Procedia Engineering, 2012

Research paper thumbnail of Existence of solutions for semilinear neutral stochastic functional differential equations with nonlocal conditions

Nonlinear Analysis: Theory, Methods & Applications, 2009

In this paper, by using fractional power of operators and Sadovskii fixed point theorem, the exis... more In this paper, by using fractional power of operators and Sadovskii fixed point theorem, the existence of mild and strong solutions of semilinear neutral functional differential evolution equations with nonlocal conditions is studied. The results are a generalization and continuation of the recent results on this issue. An example is provided to illustrate the theory.

Research paper thumbnail of B3: Fuzzy-Based Data Center Load Optimization in Cloud Computing

Mathematical Problems in Engineering, 2013

Cloud computing started a new era in getting variety of information puddles through various inter... more Cloud computing started a new era in getting variety of information puddles through various internet connections by any connective devices. It provides pay and use method for grasping the services by the clients. Data center is a sophisticated high definition server, which runs applications virtually in cloud computing. It moves the application, services, and data to a large data center. Data center provides more service level, which covers maximum of users. In order to find the overall load efficiency, the utilization service in data center is a definite task. Hence, we propose a novel method to find the efficiency of the data center in cloud computing. The goal is to optimize date center utilization in terms of three big factors—Bandwidth, Memory, and Central Processing Unit (CPU) cycle. We constructed a fuzzy expert system model to obtain maximum Data Center Load Efficiency (DCLE) in cloud computing environments. The advantage of the proposed system lies in DCLE computing. While ...

Research paper thumbnail of A Multiresolution Image Completion Algorithm for Compressing Digital Color Images

Journal of Applied Mathematics, 2014

This paper introduces a new framework for image coding that uses image inpainting method. In the ... more This paper introduces a new framework for image coding that uses image inpainting method. In the proposed algorithm, the input image is subjected to image analysis to remove some of the portions purposefully. At the same time, edges are extracted from the input image and they are passed to the decoder in the compressed manner. The edges which are transmitted to decoder act as assistant information and they help inpainting process fill the missing regions at the decoder. Textural synthesis and a new shearlet inpainting scheme based on the theory ofp-Laplacian operator are proposed for image restoration at the decoder. Shearlets have been mathematically proven to represent distributed discontinuities such as edges better than traditional wavelets and are a suitable tool for edge characterization. This novel shearletp-Laplacian inpainting model can effectively reduce the staircase effect in Total Variation (TV) inpainting model whereas it can still keep edges as well as TV model. In th...

Research paper thumbnail of Parallel key management scheme for mobile ad hoc network based on traffic mining

IET Information Security, 2014

Research paper thumbnail of Optimal control for linear singular system using genetic programming

Applied Mathematics and Computation, 2007

In this paper, optimal control for linear singular system with quadratic performance is obtained ... more In this paper, optimal control for linear singular system with quadratic performance is obtained using genetic programming (GP). The goal is to provide optimal control with reduced calculus effort by comparing the solutions of the matrix Riccati differential equation (MRDE), obtained from well known traditional Runge-Kutta (RK) method and genetic programming method. To obtain the optimal control, the solution of MRDE is computed based on grammatical evolution. Accuracy of the solution of the GP approach to the problem is qualitatively better. An illustrative numerical example is presented for the proposed method.

Research paper thumbnail of Inpainting for satellite imagery using thin plate spline radial basis function neural networks in shearlet domain

Journal of Intelligent & Fuzzy Systems

Research paper thumbnail of A fuzzy based secure QoS routing protocol using ant colony optimization for mobile Ad hoc network

Journal of Intelligent & Fuzzy Systems

Research paper thumbnail of Effective and Efficient Ranking and Re-Ranking Feature Selector for Healthcare Analytics

Intelligent Automation and Soft Computing

Research paper thumbnail of Secure isolation of cloud consumers legitimacy using fuzzy analytical hierarchy process (AHP)

Research paper thumbnail of Improving medical diagnosis performance using hybrid feature selection via relieff and entropy based genetic search (RF-EGA) approach: application to breast cancer prediction

Research paper thumbnail of A Hybrid Feature Selection Method for Effective Data Classification in Data Mining Applications

International Journal of Grid and High Performance Computing

In data mining, people require feature selection to select relevant features and to remove unimpo... more In data mining, people require feature selection to select relevant features and to remove unimportant irrelevant features from a original data set based on some evolution criteria. Filter and wrapper are the two methods used but here the authors have proposed a hybrid feature selection method to take advantage of both methods. The proposed method uses symmetrical uncertainty and genetic algorithms for selecting the optimal feature subset. This has been done so as to improve processing time by reducing the dimension of the data set without compromising the classification accuracy. This proposed hybrid algorithm is much faster and scales well to the data set in terms of selected features, classification accuracy and running time than most existing algorithms.

Research paper thumbnail of An Efficient Multi-resolution Video Compression Approach with Inpainting Algorithm

Research Journal of Applied Sciences, Engineering and Technology, 2014

Research paper thumbnail of Security aware minimized dominating set based routing in MANET

2010 Second International conference on Computing, Communication and Networking Technologies, 2010

... B. Routing over MANET Routing in MANET is a challenging task because of dynamic network ... W... more ... B. Routing over MANET Routing in MANET is a challenging task because of dynamic network ... We plan to apply some composite key management process using existing techniques such as certificate ... In the first phase, the protocol uses mechanisms to detect the trust level of ...

Research paper thumbnail of Performance Evaluation of Cloud Services with Profit Optimization

Procedia Computer Science, 2015

Research paper thumbnail of Particle swarm optimization based secure QoS clustering for mobile ad hoc network

2013 International Conference on Communication and Signal Processing, 2013

Research paper thumbnail of Fuzzy ART-Based User Behavior Trust in Cloud Computing

Advances in Intelligent Systems and Computing, 2014

Research paper thumbnail of Mobile agent based composite key management scheme for MANET

... as the key of cluster head changes continuously with respect to it's trust value... more ... as the key of cluster head changes continuously with respect to it's trust value. Keywords-Ad hoc network, key management, hierarchical clustering, mobile agent, certification authority, fuzzy ... Mobile Ad hoc Network (MANET) do not have any fixed infrastructure and consists if ...

Research paper thumbnail of JNLP based secure software as a service implementation in cloud computing

Communications in Computer and Information Science, 2012

Research paper thumbnail of Mobile agent based clustering and maintenance using secure routing protocol for mobile ad hoc network

International Journal of Physical Sciences, 2013

Routing in mobile ad hoc network is the challenging task due to the dynamic nature and resource l... more Routing in mobile ad hoc network is the challenging task due to the dynamic nature and resource limitations of network. Network clustering deals with partitioning network into clusters based on some rules. Clustering guarantees limited resource utilization and network scalability. In this paper, we mainly focused on using mobile agents for collecting information about cluster members and cluster maintenance. Ensuring security of mobile agent is a difficult task. In this work, the authorization of mobile agent is achieved using session key or secret key shared between mobile agent owner and node. We applied a distributed private key generation scheme, which generates secret key of cluster members based on 'n' key shares. The session key is generated based on past frequent traffic pattern that exist between the nodes. The behavior of mobile agent with respect to various security issues such as replay attack, non repudiation, denial of service and unauthorized access was discussed. The performance of the proposed scheme is evaluated under presence of varying number of malicious nodes. According to the observed results, the proposed protocol guarantees high packet delivery ratio and low delay, compared to cluster based routing protocol.

Research paper thumbnail of ACDP: Prediction of Application Cloud Data center Proficiency Using Fuzzy Modeling

Procedia Engineering, 2012

Research paper thumbnail of Existence of solutions for semilinear neutral stochastic functional differential equations with nonlocal conditions

Nonlinear Analysis: Theory, Methods & Applications, 2009

In this paper, by using fractional power of operators and Sadovskii fixed point theorem, the exis... more In this paper, by using fractional power of operators and Sadovskii fixed point theorem, the existence of mild and strong solutions of semilinear neutral functional differential evolution equations with nonlocal conditions is studied. The results are a generalization and continuation of the recent results on this issue. An example is provided to illustrate the theory.

Research paper thumbnail of B3: Fuzzy-Based Data Center Load Optimization in Cloud Computing

Mathematical Problems in Engineering, 2013

Cloud computing started a new era in getting variety of information puddles through various inter... more Cloud computing started a new era in getting variety of information puddles through various internet connections by any connective devices. It provides pay and use method for grasping the services by the clients. Data center is a sophisticated high definition server, which runs applications virtually in cloud computing. It moves the application, services, and data to a large data center. Data center provides more service level, which covers maximum of users. In order to find the overall load efficiency, the utilization service in data center is a definite task. Hence, we propose a novel method to find the efficiency of the data center in cloud computing. The goal is to optimize date center utilization in terms of three big factors—Bandwidth, Memory, and Central Processing Unit (CPU) cycle. We constructed a fuzzy expert system model to obtain maximum Data Center Load Efficiency (DCLE) in cloud computing environments. The advantage of the proposed system lies in DCLE computing. While ...

Research paper thumbnail of A Multiresolution Image Completion Algorithm for Compressing Digital Color Images

Journal of Applied Mathematics, 2014

This paper introduces a new framework for image coding that uses image inpainting method. In the ... more This paper introduces a new framework for image coding that uses image inpainting method. In the proposed algorithm, the input image is subjected to image analysis to remove some of the portions purposefully. At the same time, edges are extracted from the input image and they are passed to the decoder in the compressed manner. The edges which are transmitted to decoder act as assistant information and they help inpainting process fill the missing regions at the decoder. Textural synthesis and a new shearlet inpainting scheme based on the theory ofp-Laplacian operator are proposed for image restoration at the decoder. Shearlets have been mathematically proven to represent distributed discontinuities such as edges better than traditional wavelets and are a suitable tool for edge characterization. This novel shearletp-Laplacian inpainting model can effectively reduce the staircase effect in Total Variation (TV) inpainting model whereas it can still keep edges as well as TV model. In th...

Research paper thumbnail of Parallel key management scheme for mobile ad hoc network based on traffic mining

IET Information Security, 2014

Research paper thumbnail of Optimal control for linear singular system using genetic programming

Applied Mathematics and Computation, 2007

In this paper, optimal control for linear singular system with quadratic performance is obtained ... more In this paper, optimal control for linear singular system with quadratic performance is obtained using genetic programming (GP). The goal is to provide optimal control with reduced calculus effort by comparing the solutions of the matrix Riccati differential equation (MRDE), obtained from well known traditional Runge-Kutta (RK) method and genetic programming method. To obtain the optimal control, the solution of MRDE is computed based on grammatical evolution. Accuracy of the solution of the GP approach to the problem is qualitatively better. An illustrative numerical example is presented for the proposed method.