Vincent Kumar | Anna University (original) (raw)
Papers by Vincent Kumar
Journal of Intelligent & Fuzzy Systems
Journal of Intelligent & Fuzzy Systems
Intelligent Automation and Soft Computing
International Journal of Grid and High Performance Computing
In data mining, people require feature selection to select relevant features and to remove unimpo... more In data mining, people require feature selection to select relevant features and to remove unimportant irrelevant features from a original data set based on some evolution criteria. Filter and wrapper are the two methods used but here the authors have proposed a hybrid feature selection method to take advantage of both methods. The proposed method uses symmetrical uncertainty and genetic algorithms for selecting the optimal feature subset. This has been done so as to improve processing time by reducing the dimension of the data set without compromising the classification accuracy. This proposed hybrid algorithm is much faster and scales well to the data set in terms of selected features, classification accuracy and running time than most existing algorithms.
Research Journal of Applied Sciences, Engineering and Technology, 2014
2010 Second International conference on Computing, Communication and Networking Technologies, 2010
... B. Routing over MANET Routing in MANET is a challenging task because of dynamic network ... W... more ... B. Routing over MANET Routing in MANET is a challenging task because of dynamic network ... We plan to apply some composite key management process using existing techniques such as certificate ... In the first phase, the protocol uses mechanisms to detect the trust level of ...
Procedia Computer Science, 2015
2013 International Conference on Communication and Signal Processing, 2013
Advances in Intelligent Systems and Computing, 2014
... as the key of cluster head changes continuously with respect to it's trust value... more ... as the key of cluster head changes continuously with respect to it's trust value. Keywords-Ad hoc network, key management, hierarchical clustering, mobile agent, certification authority, fuzzy ... Mobile Ad hoc Network (MANET) do not have any fixed infrastructure and consists if ...
Communications in Computer and Information Science, 2012
International Journal of Physical Sciences, 2013
Routing in mobile ad hoc network is the challenging task due to the dynamic nature and resource l... more Routing in mobile ad hoc network is the challenging task due to the dynamic nature and resource limitations of network. Network clustering deals with partitioning network into clusters based on some rules. Clustering guarantees limited resource utilization and network scalability. In this paper, we mainly focused on using mobile agents for collecting information about cluster members and cluster maintenance. Ensuring security of mobile agent is a difficult task. In this work, the authorization of mobile agent is achieved using session key or secret key shared between mobile agent owner and node. We applied a distributed private key generation scheme, which generates secret key of cluster members based on 'n' key shares. The session key is generated based on past frequent traffic pattern that exist between the nodes. The behavior of mobile agent with respect to various security issues such as replay attack, non repudiation, denial of service and unauthorized access was discussed. The performance of the proposed scheme is evaluated under presence of varying number of malicious nodes. According to the observed results, the proposed protocol guarantees high packet delivery ratio and low delay, compared to cluster based routing protocol.
Procedia Engineering, 2012
Nonlinear Analysis: Theory, Methods & Applications, 2009
In this paper, by using fractional power of operators and Sadovskii fixed point theorem, the exis... more In this paper, by using fractional power of operators and Sadovskii fixed point theorem, the existence of mild and strong solutions of semilinear neutral functional differential evolution equations with nonlocal conditions is studied. The results are a generalization and continuation of the recent results on this issue. An example is provided to illustrate the theory.
Mathematical Problems in Engineering, 2013
Cloud computing started a new era in getting variety of information puddles through various inter... more Cloud computing started a new era in getting variety of information puddles through various internet connections by any connective devices. It provides pay and use method for grasping the services by the clients. Data center is a sophisticated high definition server, which runs applications virtually in cloud computing. It moves the application, services, and data to a large data center. Data center provides more service level, which covers maximum of users. In order to find the overall load efficiency, the utilization service in data center is a definite task. Hence, we propose a novel method to find the efficiency of the data center in cloud computing. The goal is to optimize date center utilization in terms of three big factors—Bandwidth, Memory, and Central Processing Unit (CPU) cycle. We constructed a fuzzy expert system model to obtain maximum Data Center Load Efficiency (DCLE) in cloud computing environments. The advantage of the proposed system lies in DCLE computing. While ...
Journal of Applied Mathematics, 2014
This paper introduces a new framework for image coding that uses image inpainting method. In the ... more This paper introduces a new framework for image coding that uses image inpainting method. In the proposed algorithm, the input image is subjected to image analysis to remove some of the portions purposefully. At the same time, edges are extracted from the input image and they are passed to the decoder in the compressed manner. The edges which are transmitted to decoder act as assistant information and they help inpainting process fill the missing regions at the decoder. Textural synthesis and a new shearlet inpainting scheme based on the theory ofp-Laplacian operator are proposed for image restoration at the decoder. Shearlets have been mathematically proven to represent distributed discontinuities such as edges better than traditional wavelets and are a suitable tool for edge characterization. This novel shearletp-Laplacian inpainting model can effectively reduce the staircase effect in Total Variation (TV) inpainting model whereas it can still keep edges as well as TV model. In th...
IET Information Security, 2014
Applied Mathematics and Computation, 2007
In this paper, optimal control for linear singular system with quadratic performance is obtained ... more In this paper, optimal control for linear singular system with quadratic performance is obtained using genetic programming (GP). The goal is to provide optimal control with reduced calculus effort by comparing the solutions of the matrix Riccati differential equation (MRDE), obtained from well known traditional Runge-Kutta (RK) method and genetic programming method. To obtain the optimal control, the solution of MRDE is computed based on grammatical evolution. Accuracy of the solution of the GP approach to the problem is qualitatively better. An illustrative numerical example is presented for the proposed method.
Journal of Intelligent & Fuzzy Systems
Journal of Intelligent & Fuzzy Systems
Intelligent Automation and Soft Computing
International Journal of Grid and High Performance Computing
In data mining, people require feature selection to select relevant features and to remove unimpo... more In data mining, people require feature selection to select relevant features and to remove unimportant irrelevant features from a original data set based on some evolution criteria. Filter and wrapper are the two methods used but here the authors have proposed a hybrid feature selection method to take advantage of both methods. The proposed method uses symmetrical uncertainty and genetic algorithms for selecting the optimal feature subset. This has been done so as to improve processing time by reducing the dimension of the data set without compromising the classification accuracy. This proposed hybrid algorithm is much faster and scales well to the data set in terms of selected features, classification accuracy and running time than most existing algorithms.
Research Journal of Applied Sciences, Engineering and Technology, 2014
2010 Second International conference on Computing, Communication and Networking Technologies, 2010
... B. Routing over MANET Routing in MANET is a challenging task because of dynamic network ... W... more ... B. Routing over MANET Routing in MANET is a challenging task because of dynamic network ... We plan to apply some composite key management process using existing techniques such as certificate ... In the first phase, the protocol uses mechanisms to detect the trust level of ...
Procedia Computer Science, 2015
2013 International Conference on Communication and Signal Processing, 2013
Advances in Intelligent Systems and Computing, 2014
... as the key of cluster head changes continuously with respect to it's trust value... more ... as the key of cluster head changes continuously with respect to it's trust value. Keywords-Ad hoc network, key management, hierarchical clustering, mobile agent, certification authority, fuzzy ... Mobile Ad hoc Network (MANET) do not have any fixed infrastructure and consists if ...
Communications in Computer and Information Science, 2012
International Journal of Physical Sciences, 2013
Routing in mobile ad hoc network is the challenging task due to the dynamic nature and resource l... more Routing in mobile ad hoc network is the challenging task due to the dynamic nature and resource limitations of network. Network clustering deals with partitioning network into clusters based on some rules. Clustering guarantees limited resource utilization and network scalability. In this paper, we mainly focused on using mobile agents for collecting information about cluster members and cluster maintenance. Ensuring security of mobile agent is a difficult task. In this work, the authorization of mobile agent is achieved using session key or secret key shared between mobile agent owner and node. We applied a distributed private key generation scheme, which generates secret key of cluster members based on 'n' key shares. The session key is generated based on past frequent traffic pattern that exist between the nodes. The behavior of mobile agent with respect to various security issues such as replay attack, non repudiation, denial of service and unauthorized access was discussed. The performance of the proposed scheme is evaluated under presence of varying number of malicious nodes. According to the observed results, the proposed protocol guarantees high packet delivery ratio and low delay, compared to cluster based routing protocol.
Procedia Engineering, 2012
Nonlinear Analysis: Theory, Methods & Applications, 2009
In this paper, by using fractional power of operators and Sadovskii fixed point theorem, the exis... more In this paper, by using fractional power of operators and Sadovskii fixed point theorem, the existence of mild and strong solutions of semilinear neutral functional differential evolution equations with nonlocal conditions is studied. The results are a generalization and continuation of the recent results on this issue. An example is provided to illustrate the theory.
Mathematical Problems in Engineering, 2013
Cloud computing started a new era in getting variety of information puddles through various inter... more Cloud computing started a new era in getting variety of information puddles through various internet connections by any connective devices. It provides pay and use method for grasping the services by the clients. Data center is a sophisticated high definition server, which runs applications virtually in cloud computing. It moves the application, services, and data to a large data center. Data center provides more service level, which covers maximum of users. In order to find the overall load efficiency, the utilization service in data center is a definite task. Hence, we propose a novel method to find the efficiency of the data center in cloud computing. The goal is to optimize date center utilization in terms of three big factors—Bandwidth, Memory, and Central Processing Unit (CPU) cycle. We constructed a fuzzy expert system model to obtain maximum Data Center Load Efficiency (DCLE) in cloud computing environments. The advantage of the proposed system lies in DCLE computing. While ...
Journal of Applied Mathematics, 2014
This paper introduces a new framework for image coding that uses image inpainting method. In the ... more This paper introduces a new framework for image coding that uses image inpainting method. In the proposed algorithm, the input image is subjected to image analysis to remove some of the portions purposefully. At the same time, edges are extracted from the input image and they are passed to the decoder in the compressed manner. The edges which are transmitted to decoder act as assistant information and they help inpainting process fill the missing regions at the decoder. Textural synthesis and a new shearlet inpainting scheme based on the theory ofp-Laplacian operator are proposed for image restoration at the decoder. Shearlets have been mathematically proven to represent distributed discontinuities such as edges better than traditional wavelets and are a suitable tool for edge characterization. This novel shearletp-Laplacian inpainting model can effectively reduce the staircase effect in Total Variation (TV) inpainting model whereas it can still keep edges as well as TV model. In th...
IET Information Security, 2014
Applied Mathematics and Computation, 2007
In this paper, optimal control for linear singular system with quadratic performance is obtained ... more In this paper, optimal control for linear singular system with quadratic performance is obtained using genetic programming (GP). The goal is to provide optimal control with reduced calculus effort by comparing the solutions of the matrix Riccati differential equation (MRDE), obtained from well known traditional Runge-Kutta (RK) method and genetic programming method. To obtain the optimal control, the solution of MRDE is computed based on grammatical evolution. Accuracy of the solution of the GP approach to the problem is qualitatively better. An illustrative numerical example is presented for the proposed method.