Dr.S. Ravimaran AI&DS - Academia.edu (original) (raw)
Papers by Dr.S. Ravimaran AI&DS
A crisis occasion is an abrupt, pressing, generally unforeseen episode or event that requires a q... more A crisis occasion is an abrupt, pressing, generally unforeseen episode or event that requires a quick response or help for crisis circumstances, which assumes an undeniably critical job in the worldwide economy and in our day-by-day lives. As of late, the web is turning into an imperative occasion data supplier and storehouse because of its continuous, open, and dynamic highlights. In this paper, web assets based states recognizing calculation of an occasion is created to tell the general population of a crisis occasion unmistakably and help the social gathering or government process the crisis occasions adequately. The connection among web and crisis occasions is first presented, which is the establishment of utilizing web assets to identify the highly sensitive situation occasions imaged on the web. Second, five worldly highlights of crisis occasions are created to give the premise to state discovery. Moreover, the episode control and the vacillation control are displayed to incor...
In this paper, a modified Wilkinson power divider for GSM application is presented. The quarter–w... more In this paper, a modified Wilkinson power divider for GSM application is presented. The quarter–wavelength microstrip lines in the conventional Wilkinson power divider (WPD) are replaced by one-eighth wavelength transmission line. Wilkinson power divider is designed using λ/4 and λ/8 transmission line. It has the operating frequency of 915 MHz which is used in the GSM standard. The proposed Wilkinson Power Divider is designed using the simulation tool Advanced Design System. The results of λ/8 transmission line are very close to the results of λ/4 transmission line. The isolation loss of λ/8 transmission line is improved by introducing a capacitor between the output ports. The proposed Wilkinson power divider has the best return loss of greater than -10 dB and isolation loss of -15.25 dB. The λ/8 transmission line Wilkinson power divider has the reduced size of 53.9 percentages than λ/4 transmission line WPD. The proposed design has simple structure, better isolation loss and good i...
Innovations in Computer Science and Engineering, 2020
As cloud computing ends up common, increasingly touchier data are being concentrated into the clo... more As cloud computing ends up common, increasingly touchier data are being concentrated into the cloud. For the refuge of information protection, delicate information more often than need not to be mixed before redistributing, which makes viable information use a difficult assignment. The proposed structure gives the protection to information in order. In this structure, cloud service provider (CSP) chooses the best host utilizing wake–sleep algorithm. After server choice, client encrypts their information utilizing homomorphic encryption. But it is lagging to reduce computation time and needs an additional security so we adopt and utilize elliptic curve digital signature algorithm (ECDSA). This additional encryption method gives the high security during transmission of data and also avoids bandwidth, less computation time and finally less storage space attained on both the sides.
Security in Mobile Ad-Hoc Network is the most important concern for the basic functionality of ne... more Security in Mobile Ad-Hoc Network is the most important concern for the basic functionality of network. Routing is an important component in mobile ad hoc networks and several routing protocols in MANET, which are affected from attacker/malicious nodes. Dynamic Source Routing (DSR) is one of the most suitable routing protocols for the MANETs and it is more vulnerable to gray hole, black hole attack by the malicious nodes. This project presents Trust-based Dynamic Source Routing Protocol (TDSR) that enable a node to reason about trustworthiness of other node based on past interactions and recommendations also uses the concept of MDSR for initial transaction. Two contexts of trust are service and recommendation. Recommendation context rests on satisfaction value and satisfaction value depends on packet transmission rate and time taken to send packets. Service context rests on link weight, channel fading effect and satisfaction value. IDS maintain the service value and nearby nodes mai...
J. Inf. Sci. Eng., 2019
Even though open stack boosts business agility, availability, and efficiency by providing a platf... more Even though open stack boosts business agility, availability, and efficiency by providing a platform with on-demand, resource pooling, self-service, highly elastic, and measured services capabilities, it needs improvisation in the following blocks of open stack such as Neutron which provides the networking capability for Open Stack and Cinder Block acts as a storage component; due to centralized administration in the open stack cloud environment. The problem with these components is that more susceptible to external attacks, unpredictable responses depending on the network load and lack of maintaining the integrity since cinder block shares simultaneous access to the same data. In order to meet the above requirements this work has proposed a AutoSec SDN-XTR (Automated end to end Security in Software Defined Networks – Efficient and Compact Subgroup Trace Representation).In order to rectify the security challenges additionally an efficient security algorithm XTR is proposed for provi...
International Review on Computers and Software, 2014
Advancement in wireless and mobile communication with ubiquity of devices in cloud has the potent... more Advancement in wireless and mobile communication with ubiquity of devices in cloud has the potential in storing incredible volumes of knowledge provided by data in the mobile devices. Knowledge provided by high volume of data stored in virtually infinite computing infrastructure, namely, the mobile cloud has become very essential in many day to day applications. However, mobile cloud faces many challenges such as dependency on continuous network connections, data placement problems, limitation and issues in data mining and knowledge discovery with multiple service providers. In this paper a novel data placement and knowledge discovery technique, SD2-Kd (Surrogate object based Dynamic Data placement and Knowledge discovery) is proposed, which interacts two or more service providers for the purpose of load balancing and data placement in cloud replication for fast and easy access. The proposed model provides a real-time data placement from different service providers using surrogat...
International Review on Computers and Software, 2013
The advancement in wireless technology and rapid growth in the use of mobile devices in mobile pa... more The advancement in wireless technology and rapid growth in the use of mobile devices in mobile paradigm have the potential to revolutionize computing by the illusion of a virtually infinite computing infrastructure. This new mobile paradigm enabled mobile devices to support data and transaction management in addition to the static nodes. A mobile device from anywhere in the wireless environment could utilize seamlessly a large computing power or any other resources in order to provide effective data and transaction process. In addition, advancement in wireless network together with ubiquity of devices has resulted in storing and retrieving incredible volumes of knowledge provided by data in the mobile devices. Knowledge provided by data from mobile system has become very essential in many day-to-day applications. However, transaction management and knowledge discovery in mobile environment faces several challenges such as scarce bandwidth, limited battery resources, asymmetry in wir...
Journal of Organizational and End User Computing, 2021
In the mobile cloud computing era, the sharing of secured large-scale data which have major chall... more In the mobile cloud computing era, the sharing of secured large-scale data which have major challenges. From an existing quantum based security mechanism randomly chosen the photon detector which creates small length of qubits so it cannot provide much security in MCC also data storage in the cloud server doesn’t guarantees the lossless back up and data recovery as well attains more computation complex during secure access of stored data. Therefore to solve those issues a unique combination of the Trefoil Congruity framework is proposed which consist Quantum Key Fibo Privacy Approach (QKFPA) performing the quantum key generation for encrypt and decrypt the data with the aid of Fibonacci chain-slanting matrix. Based on that quantum key data is uploaded, then secured data should be stored, ultra-widely distributed data transfer mechanism does the scrambling with sorting the stored data by implementing novel HS-DRT technique that improves the lossless backup and recovery of data storage.
Computer Modeling in Engineering & Sciences, 2020
Nowadays, succeeding safe communication and protection-sensitive data from unauthorized access ab... more Nowadays, succeeding safe communication and protection-sensitive data from unauthorized access above public networks are the main worries in cloud servers. Hence, to secure both data and keys ensuring secured data storage and access, our proposed work designs a Novel Quantum Key Distribution (QKD) relying upon a non-commutative encryption framework. It makes use of a Novel Quantum Key Distribution approach, which guarantees high level secured data transmission. Along with this, a shared secret is generated using Diffie Hellman (DH) to certify secured key generation at reduced time complexity. Moreover, a non-commutative approach is used, which effectively allows the users to store and access the encrypted data into the cloud server. Also, to prevent data loss or corruption caused by the insiders in the cloud, Optimized Genetic Algorithm (OGA) is utilized, which effectively recovers the data and retrieve it if the missed data without loss. It is then followed with the decryption process as if requested by the user. Thus our proposed framework ensures authentication and paves way for secure data access, with enhanced performance and reduced complexities experienced with the prior works.
International Journal of Distributed Sensor Networks, 2020
Nowadays, smart farming involves the integration of advanced technologies that incorporate low-co... more Nowadays, smart farming involves the integration of advanced technologies that incorporate low-cost robots to meet the required knowledge and maintain the health of plants in farming. Technologies like precision agriculture are also used to optimize resources based on the field condition. Internet of Green Things is also one of the technologies to integrate and share the information between people and healthy farm things. Internet of Green Things gives the information like soil moisture, temperature, humidity, and nutrient level by means of respective sensors. Monitoring and information gathering in green houses with the help of robots is a tedious and expensive process. In this connection, information is shared among low-cost robots encouraging data availability of the current state of a plant with other robots. This will emphasize the monitoring of green houses in a well-organized way. In this article, a Flask-based framework through Raspberry Pi is proposed for interoperability a...
Journal of Nanoelectronics and Optoelectronics, 2018
Journal of Computational and Theoretical Nanoscience, 2018
This article has been withdrawn at the request of the publisher in December 2020.
Wireless Personal Communications, 2020
In the era of cloud computing, any mobile device can augment its capabilities by using Cloud comp... more In the era of cloud computing, any mobile device can augment its capabilities by using Cloud computation service. There are different services provided by different cloud service providers. The mobile device has to access the cloud service with minimum response time. So many a times, instead of a distant cloud, nearest cloudlet is chosen to access the service. But according to the mobility of the user, choosing the right service provider is a herculean task. Hence this paper suggests a framework to choose a cloudlet service provider in a multiuser computation offloading environment and accommodate the service that is adaptive based on the movement of the mobile device. This paper defines a framework which comprises of basically two components. The foremost one is Fuzzy KNN component which classifies the mobile device based on the access range of the device with a nearby cloudlet. The later component provides a dynamic service depending on the changes in the mobile device location. The framework exploits Fuzzy K nearest neighbour (KNN) and Hidden Markov Model to enhance the Dynamic computation-offloading service selection (EDCOSS) framework. The EDCOSS framework is analysed and tested in a simulation environment to verify the efficiency of the framework in terms of convergence of the algorithm towards computation cost with respect to different number of clients and communication channels.
International Journal of Web Services Research, 2020
With the rapid developments occurring in cloud computing and services, there has been a growing t... more With the rapid developments occurring in cloud computing and services, there has been a growing trend of using the cloud for large-scale data storage. This has led to a major security dispute on data handling. Thus, the process can be overcome by utilizing an efficient shielded access on a key propagation (ESAKP) technique along with an adaptive optimization algorithm for password generation and performing double permutation. The password generation is done by adaptive ant lion optimization (AALO) which tackles the problem of ineffiency. This build has stronger security which needs an efficient selection property by eliminating the worst fit in each iteration. The optimized password is utilized by an adaptive vignere cipher for efficient key generation in which adaptiveness is employed to prevent the dilemma of choosing the first letter of alphabet which in turn reduces the computation time and improves the security. Additionally, there is a need to encrypte the symmetric key asymme...
Cluster Computing, 2017
Cloud Computing has become the preferred choice of performing scientific applications over the cl... more Cloud Computing has become the preferred choice of performing scientific applications over the cloud since the computing has become as a utility. Cloud-based services have evolved exponentially and also the sophistication of Cloud infrastructure supporting these services has grown. Running traditional applications such as scientific data processing on Cloud, needs to consider the suitability of the could for the compliance of the Cloud critical metrics. This article aims to study the performance of public clouds to support the scientific computing, which were performed on Grid computing, High performance computing or cluster computing. This article tries to address the issue by designing and developing a framework to measure the critical metrics. The performance of the public clouds was assessed through probing, simulation and historic data. The results indicate that only a few provide heterogeneous cloud services. Performance of some of the clouds services can be improved by tweaking the critical metrics.
The Journal of Supercomputing, 2019
Aspect-based opinion mining aims to provide results that aid in effective business decision makin... more Aspect-based opinion mining aims to provide results that aid in effective business decision making. Identifying the aspects, their major and minor causes proves to be the major challenge in this domain. This paper presents a cause-related aspect formulation technique (CRAFT) to perform opinion mining. The CRAFT model incorporates an enhanced aspect extraction module, ontology creation based on aspect and aspect categories, aspect and aspect category metadata repository creation and maintenance and a decision tree-based parallelized boosted ensemble. The proposed CRAFT model is implemented in Spark to incorporate parallelism in the architecture. The process of ontology creation and metadata repository creation aids in effective identification of both implicit and explicit aspects. Experiments were conducted using a customer review benchmark dataset incorporating reviews about five varied products. Comparisons were performed with state-of-the-art models CNN+LP, Popscu and TF-RBM. Comparisons indicate improved performances ranging up to 4% in terms of precision, up to 18% in terms of recall and up to 11% on F1 Scores, indicating the effectiveness of the proposed CRAFT model.
Superlattices and Microstructures, 2017
In this article, we present the DC and microwave characteristics of a novel 30nm Tgate InAlN/AlN/... more In this article, we present the DC and microwave characteristics of a novel 30nm Tgate InAlN/AlN/GaN HEMT with AlGaN back-barrier. The device structure is simulated by using Synopsys Sentaurus TCAD Drift-Diffusion transport model at room temperature. The device features are heavily doped (n++ GaN) source/drain regions with Si 3 N 4 passivated device surface for reducing the contact resistances and gate capacitances of the device, which uplift the microwave characteristics of the HEMTs. 30 nm gate length D-mode (E-mode) HEMT exhibited a peak drain current density I dmax of 2.3 (2.42) A/mm, transconductance g m of 1.24(1.65) S/mm, current gain cutoff frequency f t of 262 (246) GHz, power gain cutoff frequency f max of 246(290) GHz and the three terminal off-state breakdown voltage V BR of 40(38) V. The preeminent microwave characteristics with the higher breakdown voltage of the proposed GaN-based HEMT are the expected to be the most optimistic applicant for future high power millimeter wave applications.
Journal of Semiconductors, 2017
The DC and RF performance of 30 nm gate length enhancement mode (E-mode) InAlN/AlN/GaN high elect... more The DC and RF performance of 30 nm gate length enhancement mode (E-mode) InAlN/AlN/GaN high electron mobility transistor (HEMT) on SiC substrate with heavily doped source and drain region have been investigated using the Synopsys TCAD tool. The proposed device has the features of a recessed T-gate structure, InGaN back barrier and Al 2 O 3 passivated device surface. The proposed HEMT exhibits a maximum drain current density of 2.1 A/mm, transconductance g m of 1050 mS/mm, current gain cut-off frequency f t of 350 GHz and power gain cut-off frequency f max of 340 GHz. At room temperature the measured carrier mobility ( μ ), sheet charge carrier density ( n s ) and breakdown voltage are 1580 cm 2 /(V·s), 1.9×10 13 cm -2 , and 10.7 V respectively. The superlatives of the proposed HEMTs are bewitching competitor or future sub-millimeter wave high power RF VLSI circuit applications.
Superlattices and Microstructures, 2017
The DC and microwave characteristics of 20nm gate length (L g) InAlN/GaN High electron mobility t... more The DC and microwave characteristics of 20nm gate length (L g) InAlN/GaN High electron mobility transistor (HEMT) on SiC substrate with heavily doped source and drain region have investigated for both depletion mode (D-mode) and Enhancement mode (E-mode) operation using Synopsys TCAD tool. The simulation is performed at room temperature by using drift-diffusion model. The device having the features of recessed T-gate structure, InGaN back barrier and Al 2 O 3 passivated device surface. The proposed novel Lg=20 nm, W=2X40 µm D-mode (E-mode) HEMT exhibited a peak drain current density (I dmax) of 2.7 (2.6) A/mm, transconductance (g m) of 1.04 (1.63) S/mm , current gain cutoff frequency (f t) of 310 (343) GHz and power gain cutoff frequency (f max) of 364(236) GHz. The measured carrier mobility (µ), sheet charge carrier density (n s) and breakdown voltage are 1580 (1615) cm 2 /V-s, 1.9X10 13 (1.93) cm-2 and 10.7 (12.8) V respectively. The superlatives of the proposed HEMTs are bewitching competitor for future sub-millimeter wave high power RF VLSI circuit applications.
A crisis occasion is an abrupt, pressing, generally unforeseen episode or event that requires a q... more A crisis occasion is an abrupt, pressing, generally unforeseen episode or event that requires a quick response or help for crisis circumstances, which assumes an undeniably critical job in the worldwide economy and in our day-by-day lives. As of late, the web is turning into an imperative occasion data supplier and storehouse because of its continuous, open, and dynamic highlights. In this paper, web assets based states recognizing calculation of an occasion is created to tell the general population of a crisis occasion unmistakably and help the social gathering or government process the crisis occasions adequately. The connection among web and crisis occasions is first presented, which is the establishment of utilizing web assets to identify the highly sensitive situation occasions imaged on the web. Second, five worldly highlights of crisis occasions are created to give the premise to state discovery. Moreover, the episode control and the vacillation control are displayed to incor...
In this paper, a modified Wilkinson power divider for GSM application is presented. The quarter–w... more In this paper, a modified Wilkinson power divider for GSM application is presented. The quarter–wavelength microstrip lines in the conventional Wilkinson power divider (WPD) are replaced by one-eighth wavelength transmission line. Wilkinson power divider is designed using λ/4 and λ/8 transmission line. It has the operating frequency of 915 MHz which is used in the GSM standard. The proposed Wilkinson Power Divider is designed using the simulation tool Advanced Design System. The results of λ/8 transmission line are very close to the results of λ/4 transmission line. The isolation loss of λ/8 transmission line is improved by introducing a capacitor between the output ports. The proposed Wilkinson power divider has the best return loss of greater than -10 dB and isolation loss of -15.25 dB. The λ/8 transmission line Wilkinson power divider has the reduced size of 53.9 percentages than λ/4 transmission line WPD. The proposed design has simple structure, better isolation loss and good i...
Innovations in Computer Science and Engineering, 2020
As cloud computing ends up common, increasingly touchier data are being concentrated into the clo... more As cloud computing ends up common, increasingly touchier data are being concentrated into the cloud. For the refuge of information protection, delicate information more often than need not to be mixed before redistributing, which makes viable information use a difficult assignment. The proposed structure gives the protection to information in order. In this structure, cloud service provider (CSP) chooses the best host utilizing wake–sleep algorithm. After server choice, client encrypts their information utilizing homomorphic encryption. But it is lagging to reduce computation time and needs an additional security so we adopt and utilize elliptic curve digital signature algorithm (ECDSA). This additional encryption method gives the high security during transmission of data and also avoids bandwidth, less computation time and finally less storage space attained on both the sides.
Security in Mobile Ad-Hoc Network is the most important concern for the basic functionality of ne... more Security in Mobile Ad-Hoc Network is the most important concern for the basic functionality of network. Routing is an important component in mobile ad hoc networks and several routing protocols in MANET, which are affected from attacker/malicious nodes. Dynamic Source Routing (DSR) is one of the most suitable routing protocols for the MANETs and it is more vulnerable to gray hole, black hole attack by the malicious nodes. This project presents Trust-based Dynamic Source Routing Protocol (TDSR) that enable a node to reason about trustworthiness of other node based on past interactions and recommendations also uses the concept of MDSR for initial transaction. Two contexts of trust are service and recommendation. Recommendation context rests on satisfaction value and satisfaction value depends on packet transmission rate and time taken to send packets. Service context rests on link weight, channel fading effect and satisfaction value. IDS maintain the service value and nearby nodes mai...
J. Inf. Sci. Eng., 2019
Even though open stack boosts business agility, availability, and efficiency by providing a platf... more Even though open stack boosts business agility, availability, and efficiency by providing a platform with on-demand, resource pooling, self-service, highly elastic, and measured services capabilities, it needs improvisation in the following blocks of open stack such as Neutron which provides the networking capability for Open Stack and Cinder Block acts as a storage component; due to centralized administration in the open stack cloud environment. The problem with these components is that more susceptible to external attacks, unpredictable responses depending on the network load and lack of maintaining the integrity since cinder block shares simultaneous access to the same data. In order to meet the above requirements this work has proposed a AutoSec SDN-XTR (Automated end to end Security in Software Defined Networks – Efficient and Compact Subgroup Trace Representation).In order to rectify the security challenges additionally an efficient security algorithm XTR is proposed for provi...
International Review on Computers and Software, 2014
Advancement in wireless and mobile communication with ubiquity of devices in cloud has the potent... more Advancement in wireless and mobile communication with ubiquity of devices in cloud has the potential in storing incredible volumes of knowledge provided by data in the mobile devices. Knowledge provided by high volume of data stored in virtually infinite computing infrastructure, namely, the mobile cloud has become very essential in many day to day applications. However, mobile cloud faces many challenges such as dependency on continuous network connections, data placement problems, limitation and issues in data mining and knowledge discovery with multiple service providers. In this paper a novel data placement and knowledge discovery technique, SD2-Kd (Surrogate object based Dynamic Data placement and Knowledge discovery) is proposed, which interacts two or more service providers for the purpose of load balancing and data placement in cloud replication for fast and easy access. The proposed model provides a real-time data placement from different service providers using surrogat...
International Review on Computers and Software, 2013
The advancement in wireless technology and rapid growth in the use of mobile devices in mobile pa... more The advancement in wireless technology and rapid growth in the use of mobile devices in mobile paradigm have the potential to revolutionize computing by the illusion of a virtually infinite computing infrastructure. This new mobile paradigm enabled mobile devices to support data and transaction management in addition to the static nodes. A mobile device from anywhere in the wireless environment could utilize seamlessly a large computing power or any other resources in order to provide effective data and transaction process. In addition, advancement in wireless network together with ubiquity of devices has resulted in storing and retrieving incredible volumes of knowledge provided by data in the mobile devices. Knowledge provided by data from mobile system has become very essential in many day-to-day applications. However, transaction management and knowledge discovery in mobile environment faces several challenges such as scarce bandwidth, limited battery resources, asymmetry in wir...
Journal of Organizational and End User Computing, 2021
In the mobile cloud computing era, the sharing of secured large-scale data which have major chall... more In the mobile cloud computing era, the sharing of secured large-scale data which have major challenges. From an existing quantum based security mechanism randomly chosen the photon detector which creates small length of qubits so it cannot provide much security in MCC also data storage in the cloud server doesn’t guarantees the lossless back up and data recovery as well attains more computation complex during secure access of stored data. Therefore to solve those issues a unique combination of the Trefoil Congruity framework is proposed which consist Quantum Key Fibo Privacy Approach (QKFPA) performing the quantum key generation for encrypt and decrypt the data with the aid of Fibonacci chain-slanting matrix. Based on that quantum key data is uploaded, then secured data should be stored, ultra-widely distributed data transfer mechanism does the scrambling with sorting the stored data by implementing novel HS-DRT technique that improves the lossless backup and recovery of data storage.
Computer Modeling in Engineering & Sciences, 2020
Nowadays, succeeding safe communication and protection-sensitive data from unauthorized access ab... more Nowadays, succeeding safe communication and protection-sensitive data from unauthorized access above public networks are the main worries in cloud servers. Hence, to secure both data and keys ensuring secured data storage and access, our proposed work designs a Novel Quantum Key Distribution (QKD) relying upon a non-commutative encryption framework. It makes use of a Novel Quantum Key Distribution approach, which guarantees high level secured data transmission. Along with this, a shared secret is generated using Diffie Hellman (DH) to certify secured key generation at reduced time complexity. Moreover, a non-commutative approach is used, which effectively allows the users to store and access the encrypted data into the cloud server. Also, to prevent data loss or corruption caused by the insiders in the cloud, Optimized Genetic Algorithm (OGA) is utilized, which effectively recovers the data and retrieve it if the missed data without loss. It is then followed with the decryption process as if requested by the user. Thus our proposed framework ensures authentication and paves way for secure data access, with enhanced performance and reduced complexities experienced with the prior works.
International Journal of Distributed Sensor Networks, 2020
Nowadays, smart farming involves the integration of advanced technologies that incorporate low-co... more Nowadays, smart farming involves the integration of advanced technologies that incorporate low-cost robots to meet the required knowledge and maintain the health of plants in farming. Technologies like precision agriculture are also used to optimize resources based on the field condition. Internet of Green Things is also one of the technologies to integrate and share the information between people and healthy farm things. Internet of Green Things gives the information like soil moisture, temperature, humidity, and nutrient level by means of respective sensors. Monitoring and information gathering in green houses with the help of robots is a tedious and expensive process. In this connection, information is shared among low-cost robots encouraging data availability of the current state of a plant with other robots. This will emphasize the monitoring of green houses in a well-organized way. In this article, a Flask-based framework through Raspberry Pi is proposed for interoperability a...
Journal of Nanoelectronics and Optoelectronics, 2018
Journal of Computational and Theoretical Nanoscience, 2018
This article has been withdrawn at the request of the publisher in December 2020.
Wireless Personal Communications, 2020
In the era of cloud computing, any mobile device can augment its capabilities by using Cloud comp... more In the era of cloud computing, any mobile device can augment its capabilities by using Cloud computation service. There are different services provided by different cloud service providers. The mobile device has to access the cloud service with minimum response time. So many a times, instead of a distant cloud, nearest cloudlet is chosen to access the service. But according to the mobility of the user, choosing the right service provider is a herculean task. Hence this paper suggests a framework to choose a cloudlet service provider in a multiuser computation offloading environment and accommodate the service that is adaptive based on the movement of the mobile device. This paper defines a framework which comprises of basically two components. The foremost one is Fuzzy KNN component which classifies the mobile device based on the access range of the device with a nearby cloudlet. The later component provides a dynamic service depending on the changes in the mobile device location. The framework exploits Fuzzy K nearest neighbour (KNN) and Hidden Markov Model to enhance the Dynamic computation-offloading service selection (EDCOSS) framework. The EDCOSS framework is analysed and tested in a simulation environment to verify the efficiency of the framework in terms of convergence of the algorithm towards computation cost with respect to different number of clients and communication channels.
International Journal of Web Services Research, 2020
With the rapid developments occurring in cloud computing and services, there has been a growing t... more With the rapid developments occurring in cloud computing and services, there has been a growing trend of using the cloud for large-scale data storage. This has led to a major security dispute on data handling. Thus, the process can be overcome by utilizing an efficient shielded access on a key propagation (ESAKP) technique along with an adaptive optimization algorithm for password generation and performing double permutation. The password generation is done by adaptive ant lion optimization (AALO) which tackles the problem of ineffiency. This build has stronger security which needs an efficient selection property by eliminating the worst fit in each iteration. The optimized password is utilized by an adaptive vignere cipher for efficient key generation in which adaptiveness is employed to prevent the dilemma of choosing the first letter of alphabet which in turn reduces the computation time and improves the security. Additionally, there is a need to encrypte the symmetric key asymme...
Cluster Computing, 2017
Cloud Computing has become the preferred choice of performing scientific applications over the cl... more Cloud Computing has become the preferred choice of performing scientific applications over the cloud since the computing has become as a utility. Cloud-based services have evolved exponentially and also the sophistication of Cloud infrastructure supporting these services has grown. Running traditional applications such as scientific data processing on Cloud, needs to consider the suitability of the could for the compliance of the Cloud critical metrics. This article aims to study the performance of public clouds to support the scientific computing, which were performed on Grid computing, High performance computing or cluster computing. This article tries to address the issue by designing and developing a framework to measure the critical metrics. The performance of the public clouds was assessed through probing, simulation and historic data. The results indicate that only a few provide heterogeneous cloud services. Performance of some of the clouds services can be improved by tweaking the critical metrics.
The Journal of Supercomputing, 2019
Aspect-based opinion mining aims to provide results that aid in effective business decision makin... more Aspect-based opinion mining aims to provide results that aid in effective business decision making. Identifying the aspects, their major and minor causes proves to be the major challenge in this domain. This paper presents a cause-related aspect formulation technique (CRAFT) to perform opinion mining. The CRAFT model incorporates an enhanced aspect extraction module, ontology creation based on aspect and aspect categories, aspect and aspect category metadata repository creation and maintenance and a decision tree-based parallelized boosted ensemble. The proposed CRAFT model is implemented in Spark to incorporate parallelism in the architecture. The process of ontology creation and metadata repository creation aids in effective identification of both implicit and explicit aspects. Experiments were conducted using a customer review benchmark dataset incorporating reviews about five varied products. Comparisons were performed with state-of-the-art models CNN+LP, Popscu and TF-RBM. Comparisons indicate improved performances ranging up to 4% in terms of precision, up to 18% in terms of recall and up to 11% on F1 Scores, indicating the effectiveness of the proposed CRAFT model.
Superlattices and Microstructures, 2017
In this article, we present the DC and microwave characteristics of a novel 30nm Tgate InAlN/AlN/... more In this article, we present the DC and microwave characteristics of a novel 30nm Tgate InAlN/AlN/GaN HEMT with AlGaN back-barrier. The device structure is simulated by using Synopsys Sentaurus TCAD Drift-Diffusion transport model at room temperature. The device features are heavily doped (n++ GaN) source/drain regions with Si 3 N 4 passivated device surface for reducing the contact resistances and gate capacitances of the device, which uplift the microwave characteristics of the HEMTs. 30 nm gate length D-mode (E-mode) HEMT exhibited a peak drain current density I dmax of 2.3 (2.42) A/mm, transconductance g m of 1.24(1.65) S/mm, current gain cutoff frequency f t of 262 (246) GHz, power gain cutoff frequency f max of 246(290) GHz and the three terminal off-state breakdown voltage V BR of 40(38) V. The preeminent microwave characteristics with the higher breakdown voltage of the proposed GaN-based HEMT are the expected to be the most optimistic applicant for future high power millimeter wave applications.
Journal of Semiconductors, 2017
The DC and RF performance of 30 nm gate length enhancement mode (E-mode) InAlN/AlN/GaN high elect... more The DC and RF performance of 30 nm gate length enhancement mode (E-mode) InAlN/AlN/GaN high electron mobility transistor (HEMT) on SiC substrate with heavily doped source and drain region have been investigated using the Synopsys TCAD tool. The proposed device has the features of a recessed T-gate structure, InGaN back barrier and Al 2 O 3 passivated device surface. The proposed HEMT exhibits a maximum drain current density of 2.1 A/mm, transconductance g m of 1050 mS/mm, current gain cut-off frequency f t of 350 GHz and power gain cut-off frequency f max of 340 GHz. At room temperature the measured carrier mobility ( μ ), sheet charge carrier density ( n s ) and breakdown voltage are 1580 cm 2 /(V·s), 1.9×10 13 cm -2 , and 10.7 V respectively. The superlatives of the proposed HEMTs are bewitching competitor or future sub-millimeter wave high power RF VLSI circuit applications.
Superlattices and Microstructures, 2017
The DC and microwave characteristics of 20nm gate length (L g) InAlN/GaN High electron mobility t... more The DC and microwave characteristics of 20nm gate length (L g) InAlN/GaN High electron mobility transistor (HEMT) on SiC substrate with heavily doped source and drain region have investigated for both depletion mode (D-mode) and Enhancement mode (E-mode) operation using Synopsys TCAD tool. The simulation is performed at room temperature by using drift-diffusion model. The device having the features of recessed T-gate structure, InGaN back barrier and Al 2 O 3 passivated device surface. The proposed novel Lg=20 nm, W=2X40 µm D-mode (E-mode) HEMT exhibited a peak drain current density (I dmax) of 2.7 (2.6) A/mm, transconductance (g m) of 1.04 (1.63) S/mm , current gain cutoff frequency (f t) of 310 (343) GHz and power gain cutoff frequency (f max) of 364(236) GHz. The measured carrier mobility (µ), sheet charge carrier density (n s) and breakdown voltage are 1580 (1615) cm 2 /V-s, 1.9X10 13 (1.93) cm-2 and 10.7 (12.8) V respectively. The superlatives of the proposed HEMTs are bewitching competitor for future sub-millimeter wave high power RF VLSI circuit applications.