P Krishna Sankar - Academia.edu (original) (raw)

Papers by P Krishna Sankar

Research paper thumbnail of Multi-Core Architectures and Programming

ARS Publications, Chennai, 2020

This book “Multi-Core Architectures and Programming” is about an introductory conceptual idea abo... more This book “Multi-Core Architectures and Programming” is about an introductory conceptual idea about Multicore Processor with Architecture and programming using OpenMP API. It gives an outline on Multicore Architecture and its functional blocks like Intercommunication, Cache and Memory. It provides an ideology of working mechanism process scheduling in Operating System is performed in a Multicore processor. Memory programming in core processor using OpenMP API and its libraries for C language is discussed.

Research paper thumbnail of Multi-Path Routing and Wavelength Assignment Algorithm (RWA) for WDM Based Optical Networks

In optical WDM networks, transmission of information along optical lines is advantageous since it... more In optical WDM networks, transmission of information along optical lines is advantageous since it has high transmission capacity, scalability, feasibility and also high reliability. But large amount of information is being carried; any problem during transmission can lead to severe damage to the data being carried. Hence it is essential to consider the routing as well as the wavelength assignment problems and then develop a combined solution for both the problems. In this paper, we propose to develop a routing and wavelength assignment algorithm for selecting the suitable alternate path for the data packets transmission. Two stages are based on the available bandwidth and the number of wavelength used in the link as construction of alternate paths, route and wavelength selection. In proposed work, Adaptive Routing and First-Fit Wavelength Assignment (AR-FFWA) algorithm to be used. For each pair of source and destination, the path with the minimum granularity values are selected as t...

Research paper thumbnail of RESEARCH ON ZIRCALOY BRAZE ALLOY DEVELOPMENT. Quarterly Report, October 1- -December 31, 1966

Research paper thumbnail of A Review on Prediction of Collective Behavior

The social media provide platform to connect peoples with each other and they can share their vie... more The social media provide platform to connect peoples with each other and they can share their views, idea, thoughts. Now a day lot of data are generated by social media. The heterogeneous peoples are like to connect with each other through the social sites such as Facebook, Twitter, Flickr, and YouTube etc, to classify this large data is also a challenging task. This paper is to study of predict collective behavior of individuals on the social network. For classification of large network into specific communities by consider pattern of social behaviour. The k-means variant edge-centric clustering algorithm is used for finding the communities of people. To classify the large network we are going to use the edge-centric clustering technique to extract the sparse social dimensions from network. The social dimension based approach has been shows beneficial for the study. With this approach we can handle millions of user data to demonstrate behavioural approach of user in social sites fo...

Research paper thumbnail of Flexible XML parsing based on p-code

Research paper thumbnail of Technical Design Specification Editor

Research paper thumbnail of Redundant file finder, remover in mobile environment through SHA-3 algorithm

2015 2nd International Conference on Electronics and Communication Systems (ICECS), 2015

Mobile environment provides storage as a main service. Data storage is a desired property when us... more Mobile environment provides storage as a main service. Data storage is a desired property when users outsource their data to be stored in a place irrespective of the locations. File systems are designed to control how files are stored and retrieved. Without knowing the context and semantics of file contents, file systems often contain duplicate copies and result in redundant consumptions of storage space and network bandwidth. It has been a complex and challenging issue for enterprises to seek deduplication technologies to reduce cost and increase the storage efficiency. To solve such problem, Hash values for files has been computed. The hash function competition to design a new cryptographic hash standard `SHA-3' is currently one of the well-known topics in cryptologic research, its outcome heavily depends on the public evaluation. Testing the finalists in the competition for a new SHA-3 standard shows generally fast, secure hashing algorithms with few collisions. Focus of computation is performed for duplicate knowledge removal. Hash computation is done by the method of comparing files initially and followed by SHA3 signature comparison. It helps to reclaim valuable disk space and improve data efficiency in mobile environment.

Research paper thumbnail of Multicasting in MANET using MAX Heap

Growing interest and big trials in designing a scalable and robust multicast routing protocol in ... more Growing interest and big trials in designing a scalable and robust multicast routing protocol in a mobile ad hoc network due to the difficulty in group membership management, multicast packet forwarding, and the maintenance of multicast structure over the dynamic network topology for a large group size or network size. In this paper, we intend a novel Robust and Scalable Geographic Multicast Protocol. Several virtual architectures are used in the protocol without need of maintaining state information for more robust and scalable membership management and packet forwarding in the presence of high network dynamics due to unstable wireless channels and node movements. Specifically, scalable and efficient group membership management is performed through a virtual-zone-based structure, and the location service for group members is integrated with the membership management. Both the control messages and data packets are forwarded along efficient tree-like paths, but there is no need to ex...

Research paper thumbnail of Biometric Authentication Based on Interactive and Somatic for Realistic User

User authentication is to prevent the unauthorized access based on username and password, but it ... more User authentication is to prevent the unauthorized access based on username and password, but it has less security because of the possibilities of hackers can easily stolen the password of the legitimate users. Biometric technologies are providing more security since they provide more reliable and efficient means of authentication and verification. We present a novel approach for user authentication based on fingerprint and the keystrokedynamics of the password entry. The authentication process is done via 3 ways. 1) Login credential based on Username and password; 2) Finger print; 3) Keystroke Dynamics (patterns of rhythm and timing created when person types via keyboard).Proposed approach is a multimodal biometric authentication system.

Research paper thumbnail of Ranking of Search Results Based on Temporal Information

The performance and capabilities of Web search engines is an important and significant area of re... more The performance and capabilities of Web search engines is an important and significant area of research. Millions of people worldwide use Web search engines every day. This paper reports the results of a study examining the overlap among results retrieved by multiple Web search engines. Previous smaller studies have discussed a lack of overlap in results returned by Web search engines for the same queries. The goal of the current study was to conduct a large-scale study to measure the overlap of search results on the first result page across the four most popular Web search engines, at specific points in time using a large number of queries. The Web search engines included in the study were Bing, Google, Yahoo! and Fazzle. Analysis of data from a major metasearch engine reveals that sponsored-link click-through rates appear lower than previously reported. Combining links in a single listing, while providing some benefits to users, does not appear to increase clicks on sponsored list...

Research paper thumbnail of Keystroke Dynamics for Authentication Based on Biometrics for Convincing User

User authentication is to prevent the unauthorized access based on username and password, but it ... more User authentication is to prevent the unauthorized access based on username and password, but it has less security because of the possibilities of hackers can easily stolen the password of the legitimate users. Biometric technologies are providing more security since they provide more reliable and efficient means of authentication and verification. We present a novel approach for user authentication based on fingerprint and the keystroke dynamics of the password entry. The authentication process is done via 3 ways. 1) Login credential based on Username and password; 2) Finger print; 3) Keystroke Dynamics (patterns of rhythm and timing created when person types via keyboard).Proposed approach is a multimodal biometric authentication system.

Research paper thumbnail of Biometric Authentication Based on Keystroke Dynamics for Realistic User

User authentication is to prevent the unauthorized access based on username and password, but it ... more User authentication is to prevent the unauthorized access based on username and password, but it has less security because of the possibilities of hackers can easily stolen the password of the legitimate users. Biometric technologies are providing more security since they provide more reliable and efficient means of authentication and verification. We present a novel approach for user authentication based on fingerprint and the keystrokedynamics of the password entry. The authentication process is done via 3 ways. 1) Login credential based on Username and password; 2) Finger print; 3) Keystroke Dynamics (patterns of rhythm and timing created when person types via keyboard).Proposed approach is a multimodal biometric authentication system. Index Terms – Biometric technology, finger print, keystroke dynamics, user authentication, multimodal biometric authentication I.INTRODUCTION The first and foremost step in preventing unauthorized access is user Authentication. User authentication ...

Research paper thumbnail of ICKCE-2014-PaperIndex

Research paper thumbnail of 21041110 IJCSIS Review Feedback Form 2011

In general, the paper is formatted and presented well. The references are up-to-date from authori... more In general, the paper is formatted and presented well. The references are up-to-date from authoritative sources. The technical information presented in the paper was interesting and will be useful to researchers and practitioners.

Research paper thumbnail of Analyzing E-Mailing Services and Architectures of Current Era

Use of electronic services and Internet communications are increasingly common among citizens and... more Use of electronic services and Internet communications are increasingly common among citizens and thus the demand for better services and better solutions is constantly growing. In recent years, we have seen the emergence of new infrastructures and computing platforms as well as the improvement of the existing ones. The need to improve services and electronic communications is compelling and it requires constant monitoring and studying new solutions towards new infrastructures and platforms. To cope with the increase of traffic as well as the dimension of organizations, several architectures have been evolving, such as cluster or cloud computing, promising new paradigms of service delivery, which can possibility to solve many current problems such as scalability, increased storage and processing capacity, greater rationalization of resources, cost reduction, and increase in performance. However, there it is not clear if they are suitable to host e-mail servers. In this dissertation ...

Research paper thumbnail of Dynamic multi-path RWA algorithm for WDM based optical networks

2014 International Conference on Electronics and Communication Systems (ICECS), 2014

ABSTRACT In optical WDM networks, transmission of information along optical lines is advantageous... more ABSTRACT In optical WDM networks, transmission of information along optical lines is advantageous since it has high transmission capacity, scalability, feasibility and also high reliability. But large amount of information is being carried; any problem during transmission can lead to severe damage to the data being carried. Hence it is essential to consider the routing as well as the wavelength assignment problems and then develop a combined solution for both the problems. In this paper, we propose to develop a routing and wavelength assignment algorithm for selecting the suitable alternate path for the data packets transmission. Two stages are based on the available bandwidth and the number of wavelength used in the link as construction of alternate paths, route and wavelength selection. In proposed work, Adaptive Routing and First-Fit Wavelength Assignment (AR-FFWA) algorithm to be used. For each pair of source and destination, the path with the minimum granularity values are selected as the primary path for data transmission, allocating the sufficient wavelength. This algorithm thus provides a reliable, dynamic path for the data transmission and Dynamic RMSA with HSMR algorithm to be used and the performances will be evaluated by using ns-2 simulation models. When we compared to existing system the overall blocking probability will be reduced to low.

Research paper thumbnail of A conversation with Jarod Jenson

Queue, 2006

One of the industry’s go-to guys in performance improvement for business systems is Jarod Jenson,... more One of the industry’s go-to guys in performance improvement for business systems is Jarod Jenson, the chief systems architect for a consulting company he founded called Aeysis. He received a B.S. degree in computer science from Texas A&M University in 1995, then went to work for Baylor College of Medicine as a system administrator. From there he moved to Enron, where he played a major role in developing EnronOnline. After the collapse of Enron, Jenson worked briefly for UBS Warburg Energy before setting up his own consulting company. His focus since then has been on performance and scalability with applications at numerous companies where he has earned a reputation for quickly delivering substantial performance gains. Recently, Jarod made a splash at JavaOne: he ran a booth to which attendees could bring their Java applications, and he guaranteed application performance improvements in under an hour.

Research paper thumbnail of Object-oriented analysis and design

Information and Software Technology, 1993

Let's summarize the rules of thumb for good object-oriented design. The programmer is concerned w... more Let's summarize the rules of thumb for good object-oriented design. The programmer is concerned with writing class definitions, while at run time, it is appropriate to talk of objects and their interactions: 1. Each class should be self-contained, providing a complete service of some kind. 2. Each should have a simple and small interface couched in the language of the application domain. If this is so, users of the class are able to ignore the details of its internal structure and implementation and concentrate on the interface. We call this abstraction. See Fig. 3. 3. Classes should hide their data, we call this encapsulation, only providing a small number of controlled methods or functions in the interface for accessing that data. These factors taken together enable separation of interface from implementation. The actual designs of the algorithms employed inside the classes can be changed as better, more efficient algorithms are found. After a design is complete, changes in a class implementation must not affect its interface. The effect on current and future users is then only in terms of efficiency: their applications need not be recoded to take advantage of the new class implementation. The advantages of separation of interface from implementation include rapid prototyping and graceful refinement. See Fig. 3. 4. The majority of the work at run time should be within objects, not in between objects. 5. The complexity of the system should be evenly spread amongst the objects. 6. Classes should be written with reuse in mind. This requirement impacts the interfaces, and may cause us to spend more time on design that we otherwise would. 7. Systems of classes should be written to solve a wide range of problems from the domain of the actual task at hand. We do not set out to write a program to solve a single problem, but a system of classes that solves a wide range of problems of similar type. The code that tailors the system to solve the specific problem at hand should be localized to a small number of classes. 8. Our designs should be easy to extend. We should ask how easy it is to add new data types and functionality. For example, in a 3D graphics program that deals with a small set of graphical objects, how easy is it to add graphical objects? If the program doesn't implement shadows, how easy will it be to add them (assuming the math is not too complex)? 9. We should try to minimize the number of classes in a design. This requirement may be subordinate to those of keeping the class interfaces small and simple, and of minimizing the inter-object communication.

Research paper thumbnail of Conceptual grid authorization framework and classification

… Group on Authorization …, 2004

Status of This Memo This memo provides information to the Grid community with focus on Grid secur... more Status of This Memo This memo provides information to the Grid community with focus on Grid security and authorization. Distribution is unlimited.

Research paper thumbnail of Analyzing and Comparing the Parsing Techniques of Asynchronous Message

International Journal of Computer Science

Java API for XML Processing (JAXP) provided two methods for processing XML: Document Object Model... more Java API for XML Processing (JAXP) provided two methods for processing XML: Document Object Model (DOM) and Simple API for XML (SAX). The idea is to parse the whole document and construct a complete document tree in memory before it returns control to the client. This cannot be ...

Research paper thumbnail of Multi-Core Architectures and Programming

ARS Publications, Chennai, 2020

This book “Multi-Core Architectures and Programming” is about an introductory conceptual idea abo... more This book “Multi-Core Architectures and Programming” is about an introductory conceptual idea about Multicore Processor with Architecture and programming using OpenMP API. It gives an outline on Multicore Architecture and its functional blocks like Intercommunication, Cache and Memory. It provides an ideology of working mechanism process scheduling in Operating System is performed in a Multicore processor. Memory programming in core processor using OpenMP API and its libraries for C language is discussed.

Research paper thumbnail of Multi-Path Routing and Wavelength Assignment Algorithm (RWA) for WDM Based Optical Networks

In optical WDM networks, transmission of information along optical lines is advantageous since it... more In optical WDM networks, transmission of information along optical lines is advantageous since it has high transmission capacity, scalability, feasibility and also high reliability. But large amount of information is being carried; any problem during transmission can lead to severe damage to the data being carried. Hence it is essential to consider the routing as well as the wavelength assignment problems and then develop a combined solution for both the problems. In this paper, we propose to develop a routing and wavelength assignment algorithm for selecting the suitable alternate path for the data packets transmission. Two stages are based on the available bandwidth and the number of wavelength used in the link as construction of alternate paths, route and wavelength selection. In proposed work, Adaptive Routing and First-Fit Wavelength Assignment (AR-FFWA) algorithm to be used. For each pair of source and destination, the path with the minimum granularity values are selected as t...

Research paper thumbnail of RESEARCH ON ZIRCALOY BRAZE ALLOY DEVELOPMENT. Quarterly Report, October 1- -December 31, 1966

Research paper thumbnail of A Review on Prediction of Collective Behavior

The social media provide platform to connect peoples with each other and they can share their vie... more The social media provide platform to connect peoples with each other and they can share their views, idea, thoughts. Now a day lot of data are generated by social media. The heterogeneous peoples are like to connect with each other through the social sites such as Facebook, Twitter, Flickr, and YouTube etc, to classify this large data is also a challenging task. This paper is to study of predict collective behavior of individuals on the social network. For classification of large network into specific communities by consider pattern of social behaviour. The k-means variant edge-centric clustering algorithm is used for finding the communities of people. To classify the large network we are going to use the edge-centric clustering technique to extract the sparse social dimensions from network. The social dimension based approach has been shows beneficial for the study. With this approach we can handle millions of user data to demonstrate behavioural approach of user in social sites fo...

Research paper thumbnail of Flexible XML parsing based on p-code

Research paper thumbnail of Technical Design Specification Editor

Research paper thumbnail of Redundant file finder, remover in mobile environment through SHA-3 algorithm

2015 2nd International Conference on Electronics and Communication Systems (ICECS), 2015

Mobile environment provides storage as a main service. Data storage is a desired property when us... more Mobile environment provides storage as a main service. Data storage is a desired property when users outsource their data to be stored in a place irrespective of the locations. File systems are designed to control how files are stored and retrieved. Without knowing the context and semantics of file contents, file systems often contain duplicate copies and result in redundant consumptions of storage space and network bandwidth. It has been a complex and challenging issue for enterprises to seek deduplication technologies to reduce cost and increase the storage efficiency. To solve such problem, Hash values for files has been computed. The hash function competition to design a new cryptographic hash standard `SHA-3' is currently one of the well-known topics in cryptologic research, its outcome heavily depends on the public evaluation. Testing the finalists in the competition for a new SHA-3 standard shows generally fast, secure hashing algorithms with few collisions. Focus of computation is performed for duplicate knowledge removal. Hash computation is done by the method of comparing files initially and followed by SHA3 signature comparison. It helps to reclaim valuable disk space and improve data efficiency in mobile environment.

Research paper thumbnail of Multicasting in MANET using MAX Heap

Growing interest and big trials in designing a scalable and robust multicast routing protocol in ... more Growing interest and big trials in designing a scalable and robust multicast routing protocol in a mobile ad hoc network due to the difficulty in group membership management, multicast packet forwarding, and the maintenance of multicast structure over the dynamic network topology for a large group size or network size. In this paper, we intend a novel Robust and Scalable Geographic Multicast Protocol. Several virtual architectures are used in the protocol without need of maintaining state information for more robust and scalable membership management and packet forwarding in the presence of high network dynamics due to unstable wireless channels and node movements. Specifically, scalable and efficient group membership management is performed through a virtual-zone-based structure, and the location service for group members is integrated with the membership management. Both the control messages and data packets are forwarded along efficient tree-like paths, but there is no need to ex...

Research paper thumbnail of Biometric Authentication Based on Interactive and Somatic for Realistic User

User authentication is to prevent the unauthorized access based on username and password, but it ... more User authentication is to prevent the unauthorized access based on username and password, but it has less security because of the possibilities of hackers can easily stolen the password of the legitimate users. Biometric technologies are providing more security since they provide more reliable and efficient means of authentication and verification. We present a novel approach for user authentication based on fingerprint and the keystrokedynamics of the password entry. The authentication process is done via 3 ways. 1) Login credential based on Username and password; 2) Finger print; 3) Keystroke Dynamics (patterns of rhythm and timing created when person types via keyboard).Proposed approach is a multimodal biometric authentication system.

Research paper thumbnail of Ranking of Search Results Based on Temporal Information

The performance and capabilities of Web search engines is an important and significant area of re... more The performance and capabilities of Web search engines is an important and significant area of research. Millions of people worldwide use Web search engines every day. This paper reports the results of a study examining the overlap among results retrieved by multiple Web search engines. Previous smaller studies have discussed a lack of overlap in results returned by Web search engines for the same queries. The goal of the current study was to conduct a large-scale study to measure the overlap of search results on the first result page across the four most popular Web search engines, at specific points in time using a large number of queries. The Web search engines included in the study were Bing, Google, Yahoo! and Fazzle. Analysis of data from a major metasearch engine reveals that sponsored-link click-through rates appear lower than previously reported. Combining links in a single listing, while providing some benefits to users, does not appear to increase clicks on sponsored list...

Research paper thumbnail of Keystroke Dynamics for Authentication Based on Biometrics for Convincing User

User authentication is to prevent the unauthorized access based on username and password, but it ... more User authentication is to prevent the unauthorized access based on username and password, but it has less security because of the possibilities of hackers can easily stolen the password of the legitimate users. Biometric technologies are providing more security since they provide more reliable and efficient means of authentication and verification. We present a novel approach for user authentication based on fingerprint and the keystroke dynamics of the password entry. The authentication process is done via 3 ways. 1) Login credential based on Username and password; 2) Finger print; 3) Keystroke Dynamics (patterns of rhythm and timing created when person types via keyboard).Proposed approach is a multimodal biometric authentication system.

Research paper thumbnail of Biometric Authentication Based on Keystroke Dynamics for Realistic User

User authentication is to prevent the unauthorized access based on username and password, but it ... more User authentication is to prevent the unauthorized access based on username and password, but it has less security because of the possibilities of hackers can easily stolen the password of the legitimate users. Biometric technologies are providing more security since they provide more reliable and efficient means of authentication and verification. We present a novel approach for user authentication based on fingerprint and the keystrokedynamics of the password entry. The authentication process is done via 3 ways. 1) Login credential based on Username and password; 2) Finger print; 3) Keystroke Dynamics (patterns of rhythm and timing created when person types via keyboard).Proposed approach is a multimodal biometric authentication system. Index Terms – Biometric technology, finger print, keystroke dynamics, user authentication, multimodal biometric authentication I.INTRODUCTION The first and foremost step in preventing unauthorized access is user Authentication. User authentication ...

Research paper thumbnail of ICKCE-2014-PaperIndex

Research paper thumbnail of 21041110 IJCSIS Review Feedback Form 2011

In general, the paper is formatted and presented well. The references are up-to-date from authori... more In general, the paper is formatted and presented well. The references are up-to-date from authoritative sources. The technical information presented in the paper was interesting and will be useful to researchers and practitioners.

Research paper thumbnail of Analyzing E-Mailing Services and Architectures of Current Era

Use of electronic services and Internet communications are increasingly common among citizens and... more Use of electronic services and Internet communications are increasingly common among citizens and thus the demand for better services and better solutions is constantly growing. In recent years, we have seen the emergence of new infrastructures and computing platforms as well as the improvement of the existing ones. The need to improve services and electronic communications is compelling and it requires constant monitoring and studying new solutions towards new infrastructures and platforms. To cope with the increase of traffic as well as the dimension of organizations, several architectures have been evolving, such as cluster or cloud computing, promising new paradigms of service delivery, which can possibility to solve many current problems such as scalability, increased storage and processing capacity, greater rationalization of resources, cost reduction, and increase in performance. However, there it is not clear if they are suitable to host e-mail servers. In this dissertation ...

Research paper thumbnail of Dynamic multi-path RWA algorithm for WDM based optical networks

2014 International Conference on Electronics and Communication Systems (ICECS), 2014

ABSTRACT In optical WDM networks, transmission of information along optical lines is advantageous... more ABSTRACT In optical WDM networks, transmission of information along optical lines is advantageous since it has high transmission capacity, scalability, feasibility and also high reliability. But large amount of information is being carried; any problem during transmission can lead to severe damage to the data being carried. Hence it is essential to consider the routing as well as the wavelength assignment problems and then develop a combined solution for both the problems. In this paper, we propose to develop a routing and wavelength assignment algorithm for selecting the suitable alternate path for the data packets transmission. Two stages are based on the available bandwidth and the number of wavelength used in the link as construction of alternate paths, route and wavelength selection. In proposed work, Adaptive Routing and First-Fit Wavelength Assignment (AR-FFWA) algorithm to be used. For each pair of source and destination, the path with the minimum granularity values are selected as the primary path for data transmission, allocating the sufficient wavelength. This algorithm thus provides a reliable, dynamic path for the data transmission and Dynamic RMSA with HSMR algorithm to be used and the performances will be evaluated by using ns-2 simulation models. When we compared to existing system the overall blocking probability will be reduced to low.

Research paper thumbnail of A conversation with Jarod Jenson

Queue, 2006

One of the industry’s go-to guys in performance improvement for business systems is Jarod Jenson,... more One of the industry’s go-to guys in performance improvement for business systems is Jarod Jenson, the chief systems architect for a consulting company he founded called Aeysis. He received a B.S. degree in computer science from Texas A&M University in 1995, then went to work for Baylor College of Medicine as a system administrator. From there he moved to Enron, where he played a major role in developing EnronOnline. After the collapse of Enron, Jenson worked briefly for UBS Warburg Energy before setting up his own consulting company. His focus since then has been on performance and scalability with applications at numerous companies where he has earned a reputation for quickly delivering substantial performance gains. Recently, Jarod made a splash at JavaOne: he ran a booth to which attendees could bring their Java applications, and he guaranteed application performance improvements in under an hour.

Research paper thumbnail of Object-oriented analysis and design

Information and Software Technology, 1993

Let's summarize the rules of thumb for good object-oriented design. The programmer is concerned w... more Let's summarize the rules of thumb for good object-oriented design. The programmer is concerned with writing class definitions, while at run time, it is appropriate to talk of objects and their interactions: 1. Each class should be self-contained, providing a complete service of some kind. 2. Each should have a simple and small interface couched in the language of the application domain. If this is so, users of the class are able to ignore the details of its internal structure and implementation and concentrate on the interface. We call this abstraction. See Fig. 3. 3. Classes should hide their data, we call this encapsulation, only providing a small number of controlled methods or functions in the interface for accessing that data. These factors taken together enable separation of interface from implementation. The actual designs of the algorithms employed inside the classes can be changed as better, more efficient algorithms are found. After a design is complete, changes in a class implementation must not affect its interface. The effect on current and future users is then only in terms of efficiency: their applications need not be recoded to take advantage of the new class implementation. The advantages of separation of interface from implementation include rapid prototyping and graceful refinement. See Fig. 3. 4. The majority of the work at run time should be within objects, not in between objects. 5. The complexity of the system should be evenly spread amongst the objects. 6. Classes should be written with reuse in mind. This requirement impacts the interfaces, and may cause us to spend more time on design that we otherwise would. 7. Systems of classes should be written to solve a wide range of problems from the domain of the actual task at hand. We do not set out to write a program to solve a single problem, but a system of classes that solves a wide range of problems of similar type. The code that tailors the system to solve the specific problem at hand should be localized to a small number of classes. 8. Our designs should be easy to extend. We should ask how easy it is to add new data types and functionality. For example, in a 3D graphics program that deals with a small set of graphical objects, how easy is it to add graphical objects? If the program doesn't implement shadows, how easy will it be to add them (assuming the math is not too complex)? 9. We should try to minimize the number of classes in a design. This requirement may be subordinate to those of keeping the class interfaces small and simple, and of minimizing the inter-object communication.

Research paper thumbnail of Conceptual grid authorization framework and classification

… Group on Authorization …, 2004

Status of This Memo This memo provides information to the Grid community with focus on Grid secur... more Status of This Memo This memo provides information to the Grid community with focus on Grid security and authorization. Distribution is unlimited.

Research paper thumbnail of Analyzing and Comparing the Parsing Techniques of Asynchronous Message

International Journal of Computer Science

Java API for XML Processing (JAXP) provided two methods for processing XML: Document Object Model... more Java API for XML Processing (JAXP) provided two methods for processing XML: Document Object Model (DOM) and Simple API for XML (SAX). The idea is to parse the whole document and construct a complete document tree in memory before it returns control to the client. This cannot be ...

Research paper thumbnail of DYNAMIC MULTI-PATH RWA ALGORITHM FOR WDM BASED OPTICAL NETWORKS

In optical WDM networks, transmission of information along optical lines is advantageous since it... more In optical WDM networks, transmission of information along optical lines is advantageous since it has high transmission capacity, scalability, feasibility and also high reliability. But since large amount of information is being carried, any problem during transmission can lead to severe damage to the data being carried. Hence it is essential to consider the routing as well as the wavelength assignment problems and then develop a combined solution for both the problems. In this paper, we propose to develop a routing and wavelength assignment algorithm for selecting the best path. The two steps are based on the available free load and the number of wavelength used in the link as construction of pre-defined paths, route and wavelength selection. Based on these steps, two cost functions on load and wavelength are determined, which yields a combined cost function. For each pair of source and destination, the path with the minimum combined cost function is selected as the primary path for data transmission, allocating the sufficient wavelength. This algorithm thus provides a reliable, dynamic path for the data transmission. This proposed system will use Dynamic RMSA with HSMR using online path computation to be used.

Research paper thumbnail of A NOVEL APPROACH FOR CLUSTERING WEB SERVICES AND REST SERVICES USING WSDL

Today’s life style with increasing use of web for there everyday tasks is making service providin... more Today’s life style with increasing use of web for there everyday tasks is making service providing is an essential part for Internet customer’s. Web services help organizations maintain an operative presence on Internet. Service-oriented architecture (SOA) and its flagship implementation technology known as Web services have changed way software engineers design and develop enterprise applications. Clustering the services would greatly boost ability of web service search engine to retrieve relevant ones with most relevant Web services. From novel approach to new one called REST services. REST is to identify an architectural style based on a set of principles for designing network-based software architectures. The term was extended to describe a style of building web services based on the principles of REST. In our approach to cluster REST services based on function and by addressability along with some form of connectedness are embedded in WSDL definition of bindings and ports.

Research paper thumbnail of Multicasting in MANET using MAX Heap

Growing interest and big trials in designing a scalable and robust multicast routing protocol in ... more Growing interest and big trials in designing a scalable and robust multicast routing protocol in a mobile ad hoc network due to the difficulty in group membership management, multicast packet forwarding, and the maintenance of multicast structure over the dynamic network topology for a large group size or network size. In this paper, we intend a novel Robust and Scalable Geographic Multicast Protocol. Several virtual architectures are used in the protocol without need of maintaining state information for more robust and scalable membership management and packet forwarding in the presence of high network dynamics due to unstable wireless channels and node movements. Specifically, scalable and efficient group membership management is performed through a virtual-zone-based structure, and the location service for group members is integrated with the membership management. Both the control messages and data packets are forwarded along efficient tree-like paths, but there is no need to explicitly create and actively preserve a tree structure. The stateless virtual-tree-based structures significantly reduce tree management overhead, support more efficient transmissions, and make the transmissions much more robust to dynamics by constructing Max-Heap based transmission rate. Geographic forwarding is used to achieve further scalability and robustness. To avoid periodic flooding of the source information throughout the network, an efficient source tracking mechanism is designed. Furthermore, we handle the empty-zone problem faced by most zone-based routing protocols. We have studied the protocol performance by performing both quantitative analysis and extensive simulations. Our results demonstrate Robust and Scalable Geographic Multicast Protocol can scale to a large group size and a large network size, and can more efficiently support multiple multicast groups in the network. Compared to existing protocols ODMRP and SPBM, Robust and Scalable Geographic Multicast Protocol achieves a significantly higher delivery ratio under all circumstances, with different moving speeds, node densities, group sizes, number of groups, and network sizes. RSGM also has the minimum control overhead and joining delay.

Research paper thumbnail of RANKING OF SEARCH RESULTS BASED ON TEMPORAL INFORMATION

The performance and capabilities of Web search engines is an important and significant area of re... more The performance and capabilities of Web search engines is an important and significant area of research. Millions of people worldwide use Web search engines every day. This paper reports the results of a study examining the overlap among results retrieved by multiple Web search engines. Previous smaller studies have discussed a lack of overlap in results returned by Web search engines for the same queries. The goal of the current study was to conduct a large-scale study to measure the overlap of search results on the first result page across the four most popular Web search engines, at specific points in time using a large number of queries. The Web search engines included in the study were Bing, Google, Yahoo! and Fazzle. Analysis of data from a major metasearch engine reveals that sponsored-link click-through rates appear lower than previously reported. Combining links in a single listing, while providing some benefits to users, does not appear to increase clicks on sponsored listings and also based on the temporal data. This shows the significant difference in the way major Web search engines retrieve and rank results in response to given queries. Results point to the value of metasearch engines in Web retrieval to overcome the biases of individual search engines.

Research paper thumbnail of ANALYZING E-MAILING SERVICES AND ARCHITECTURES OF CURRENT ERA

Use of electronic services and Internet communications are increasingly common among citizens and... more Use of electronic services and Internet communications are increasingly common among citizens and thus the demand for better services and better solutions is constantly growing. In recent years, we have seen the emergence of new infrastructures and computing platforms as well as the improvement of the existing ones. The need to improve services and electronic communications is compelling and it requires constant monitoring and studying new solutions towards new infrastructures and platforms. To cope with the increase of traffic as well as the dimension of organizations, several architectures have been evolving, such as cluster or cloud computing, promising new paradigms of service delivery, which can possibility to solve many current problems such as scalability, increased storage and processing capacity, greater rationalization of resources, cost reduction, and increase in performance. However, there it is not clear if they are suitable to host e-mail servers. In this dissertation we perform the evaluation of the performance of e-mail servers, in different hosting architectures. Beyond computing platforms, was also analyzing different server applications. Tests were run to determine which combinations of computer platforms and applications obtained better performances for the SMTP service and for services POP3/IMAP/Cloud. We plan to perform by measuring the number of sessions per amount of time, in several test scenarios in Postfix as SMTP servers, Courier for IMAP services, and Amazon Simple Email Service in Cloud.

Research paper thumbnail of Journal of Computer Science and Information Security May 2011

The Journal of Computer Science and Information Security (IJCSIS) is a promising venue for publis... more The Journal of Computer Science and Information Security (IJCSIS) is a promising venue for publishing novel ideas, state-of-the-art research results and fundamental advances in all aspects of Computer Science and Engineering. IJCSIS is a peer reviewed international journal with a key objective to provide the academic and industrial community a medium for presenting high quality research. We are committed to timely publication of original research, surveying and tutorial contributions on the analysis and development of computing and information engineering. The journal is designed mainly to serve researchers and developers, dealing with information security and computing. Papers that can provide both theoretical analysis, along with carefully designed computational experiments, are particularly welcome.

IJCSIS editorial board consists of several internationally recognized experts and guest editors. Wide circulation is assured because libraries and individuals, worldwide, subscribe and reference to IJCSIS. The Journal has grown rapidly to its currently level of over 1,000 articles published and indexed; with distribution to librarians, universities, research centers, researchers in computing, and computer scientists.

Other field coverage includes: security infrastructures, network security: Internet security, content protection, cryptography, steganography and formal methods in information security; multimedia systems, software, information systems, intelligent systems, web services, data mining, wireless communication, networking and technologies, innovation technology and management.

https://sites.google.com/site/ijcsis/Home

Research paper thumbnail of Object Oriented Programming (Java)

AR Publications, Chennai, 2018

This book “Object Oriented Programming” is about basic idea towards object oriented programming w... more This book “Object Oriented Programming” is about basic idea towards object oriented programming with Java. It provides clear view towards object oriented mechanism adapted in programming languages. It provides a preliminary study on understanding Java with several illustration program. It affords procedural footsteps from command-line to graphical user interface.

Research paper thumbnail of Design and Analysis of Algorithms

ARS Publications, Chennai, 2018

This book “Design and Analysis of Algorithms”, covering various algorithm and analyzing the real ... more This book “Design and Analysis of Algorithms”, covering various algorithm and analyzing the real word problems. It delivers various types of algorithm and its problem solving techniques. It stretches an outline on analyzing the algorithm and identifying the efficiency based on the time and space complexity. It contributes an idea over analyzing the real world problems to representing the data of the problem and applying the next level algorithm to achieve the goal of the problem.

Research paper thumbnail of Object Oriented Analysis and Design

ARS Publications, Chennai, 2019

This book "Object Oriented Analysis and Design" is about an introductory idea on pattern design a... more This book "Object Oriented Analysis and Design" is about an introductory idea on pattern design and implement the projects on Object Oriented concepts. It emphasizes on the basic idea of design UML Diagrams with notations. In OOP, intended by construction those out of objects that interact with one another were based on UML notation and all recent programming languages follows based Object-Oriented pattern. It helps to map design to code and to perform the object-oriented testing by various standard testing techniques. It provides an idea for the readers towards the domain model on Next POS Systems, Logical Architecture and GOF with GRASP patterns. Unit I: Introduction towards Object Oriented Analysis and Design to develop real-time systems has the potential to produce safer, more reliable and maintainable code. UML is the successor to trend of objectoriented analysis and design methods. Unified Process is an example iterative process for projects. Unit II: Design patterns that describes simple and elegant solutions to specific problems in object-oriented software design. Class diagram plays a vital role in object relational mapping which is widely used across the current application development. Class diagram features association, attributes and relationship between the classes are depicted to visualize. Unit III: Introduction to dynamic and implementation diagrams. Towards the data flow across the user interface as a step by step business process, which has been expressed as sequence and collaboration diagram. Parallel process execution was represented through the activity diagram. Implementation diagrams like Package, Component and Deployment are briefed with business flow. Unit IV: Introduction towards the basic notation, designing UML diagrams and also the relationship between the Sequence and use case diagrams. UML package diagrams may illustrate the Logical Architecture as part of the Design Model and Logical architecture. It emphasis how to apply the Gang-of-Four (GOF) and the more basic GRASP pattern. Unit V: Introduction to object-oriented methodologies and testing. By examine class testing, integration, GUI Testing, system testing, and the application of data flow testing to object-oriented software by maintaining the software quality.

Research paper thumbnail of Artificial Intelligence - Second Edition

ARS Publications, Chennai, 2019

This book "Artificial Intelligence" is to understand the various characteristics of Intelligent a... more This book "Artificial Intelligence" is to understand the various characteristics of Intelligent agents and their search strategies. It contributes an impression towards representing knowledge in solving AI problems. It provides a preliminary study to design and implement the different ways of software agents with Prolog. Unit I: Introduction towards future of Artificial Intelligence and characteristics of Intelligent agents. Outline about the typical AI problem and its solving approach. Unit II: Outline towards search strategies through Uninformed, Informed and Heuristics along with optimization problems. Constraint satisfaction problem was demonstrated with straight forward and backtracking approach. Awareness towards the game playing based designing strategies. Unit III: Transient awareness on knowledge representation and First Order Predict Logic. Brief knowledge over Unification, Forward and Backward chaining, Ontological Engineering and Events with Prolog programming. Unit IV: Contributes a knowledge on architecture for Intelligent agents and its communication. Real world based Multiagent systems have knowledge base of Negotiation, Bargaining and Argumentation. Unit V: Provides a study over various AI application and Information Retrieval. It provides introduction towards Natural Language Processing, Speech Recognition, Perception and Planning.

Research paper thumbnail of Big Data Analytics

ARS Publications, Chennai, 2019

This book "Big Data Analytics" is to know about the fundamental concepts of big data, streams and... more This book "Big Data Analytics" is to know about the fundamental concepts of big data, streams and analytics, with various tools and practices in real world. It contributes an impression towards big data programming concepts of R and Python. It provides a preliminary study to access and perform analytics on huge volume of data. It affords procedural footsteps and study over NoSQL, Twitter data analytics and Wikipedia blog. Unit I: Introduction towards evolution, best practices and characteristics of Big Data. Outline about use cases on Bigdata storage and architecture, real world Hadoop analytics mechanism available currently. Unit II: Outline towards clustering, K-means and procedural steps in cluster construction. Classification and its core mechanism decision tree, Naïve Bayes are systematically briefed with R program. Unit III: Transient awareness on association rules, Apriori algorithm and recommendation system. Brief knowledge over detecting candidate rules and collaborative, Content based, Knowledge based and Hybrid Recommendation with applications. Unit IV: Contributes a knowledge on trendy Stream computing and its architecture. Real world analytics like Sentiment analysis on Twitter, Stock market prediction and Graph analytics are briefed with understanding them over stream computing. Unit V: Provides a study over NoSQL and various real-world methodology. Various case studies on Hive and Hadoop architecture used in Twitter, E-Commerce and Blogs are briefed. It provides introduction towards R programming and its available function to perform data analytics.

Research paper thumbnail of SOCIAL NETWORK SECURITY

A.R.S. Publications, Chennai, 2023

(CCS363 - SOCIAL NETWORK SECURITY - As per the Latest Syllabus of Anna University, Chennai - Regu... more (CCS363 - SOCIAL NETWORK SECURITY - As per the Latest Syllabus of Anna University, Chennai - Regulation 2021 – VERTICAL 4: CYBER SECURITY AND DATA PRIVACY – Common to all Branch) This book "Social Network Security", covering various concept of semantic and social web along with its applications. It gives an outline on understanding human behavior in social web and their relating communities. It provides fundamentals of ontology and semantic web. It delivers a visualization of social networks and its tremendous utilization in business scenarios. Unit I: Primer towards the Semantic web and Social web along with its evolutions. Affords a sketch towards Social Network and its analysis along with applications. Unit II: Delivers the ontology and their role for Semantic web. It covenants with the web ontology language based modelling and aggregating over social network. Unit III: It gives an outline towards web community and their applications in social networks. Preliminary idea on various community mining algorithm along with its tools in online social networks. Unit IV: Overview towards the human behaviour for social communities along with User profile management in real-world. Outline about trust and its network analysis with transitivity on online environment. Unit V: It provides about the applicability of graph theory and visualizing using various representation on the online social networks. Finally, summarizing the applications of network like cover, collaboration and co-citation was discussed.

Research paper thumbnail of KNOWLEDGE MANAGEMENT(Second Edition)

A.R.S. Publications, Chennai, 2023

(GE3755 - KNOWLEDGE MANAGEMENT - As per the Latest Syllabus of Anna University, Chennai - Regulat... more (GE3755 - KNOWLEDGE MANAGEMENT - As per the Latest Syllabus of Anna University, Chennai - Regulation 2021 – Elective - Management Courses – Common to all Branch) This book “Knowledge Management” is almost providing a detailed outline towards evolution of Knowledge Management with its applicability on real world as case studies. It provides a preliminary study on understanding creation of knowledge, framing rules and applicability in business fields. It affords procedural paths and study over converting the Information into Knowledge. It provides you extensive scope of applicability of knowledge management involves in various cross platform to support in decision making. Unit I: Introduction, Foundation and Evolution towards the Knowledge Management. Outline about the Knowledge organization and Management challenges along with ethics. Unit II: Outline for building a learning organization and knowledge types was briefed. Technical flow of cooperation among distributed technical specialists. Unit III: Transitory awareness on knowledge management over the information technology field of Telecommunications, Networks, Internet Search Engines. It gives overview on Information Retrieval in Internet, Intranet and various level of Information Storages. Unit IV: Provides a detail about Knowledge Strategy and its components. Provide us idea on knowledge management and identifying strategy in the field of Health sciences and Developing countries. Unit V: Affords a study over development of a map or plan in an organization which provides a business plan on Knowledge management with earlier information as knowledge.

Research paper thumbnail of DISASTER RISK REDUCTION AND MANAGEMENT

A.R.S. Publications, Chennai, 2023

(MX3084 - DISASTER RISK REDUCTION AND MANAGEMENT - As per the Latest Syllabus of Anna University,... more (MX3084 - DISASTER RISK REDUCTION AND MANAGEMENT - As per the Latest Syllabus of Anna University, Chennai - Regulation 2021 – Mandatory Course I – Common to all Branch) This book "DISASTER RISK REDUCTION AND MANAGEMENT" provides a detailed skeleton towards disaster, its types along with real world as case studies and recovery planning. It provides a preliminary study on understanding the do's and don'ts of disasters happening in real world. It gives a detailed initiative towards protecting, preventing and recovering the citizen of India from disaster. It provides an extensive idea on Disaster Management Act 2005 and 2009 and other initiatives taken by Government of India. Unit I: Introduction to disaster and its types, impacts along with global trends in managing. Provides dos and don'ts while preventing and recovering from disasters. Unit II: Outline for reducing disaster risk was briefed. It gives an overview of cooperation among various government sectors like Panchayati Raj, Urban Local, state and central bodies in precluding and providing methods to reduce the risk. Unit III: Brief awareness on interrelationship between disasters and development with their impacts over construction of dams, canals, … etc. It gives an overview on Climate change and IPCC recommendation to world and concern towards India to adapt it. Unit IV: Provides a detail about information about disaster risk management in India, their Act and Policy. Provide us idea on various components of disaster relief and role of GIS in disaster risk management.

Research paper thumbnail of Full Stack Web Development with Hands-On Lab

A.R.S. Publications, Chennai, 2023

(IT3501–Full Stack Web Development & IT3511–Full Stack Web Development Lab - As per the Latest Sy... more (IT3501–Full Stack Web Development & IT3511–Full Stack Web Development Lab - As per the Latest Syllabus of Anna University, Chennai - Regulation 2021) This book “Full Stack Web Development with Hands-On Lab” is about basic idea towards web development framework with MEAN and MERN stack. It provides hands on experience on Node.js, MongoDB, Express, Angular and React. It affords procedural footsteps for developing a full stack application using MEAN and MERN stack. Unit I: Provides an introductory idea towards Full stack, Web development framework, Web, Web Browser and Web Server. Contributes knowledge on MVC Architecture and components of MEAN & MERN stack. Unit II: Outline on NodeJS Installation, handling Node packages, usage of Events, Listeners, Timers, Callbacks and I/O handling. Illustrative idea on developing a simple NodeJs application and implementing HTTP services using NodeJS. Unit III: Provides an descriptive idea on NoSQL, MongoDB, User management, Database management and installing MongoDB. Hands-on experience over the creating the user, database and collections. Simple Node.js application has been developed to connect with MongoDB to provide a practical idea. Unit IV: Brief knowledge over Express in Node.js, TypeScript and Angular. It provides detailed understanding and procedures to configuring routes, expression, data binding and usage of Built-in directives. Unit V: Provides a study over MERN stack and React application development. Understanding towards React components, state, modularization, webpack and routing. Illustrative idea on developing EXPRESS REST API, simple MERN stack application and optimizing the Server-side rendering. Unit VI: It provides an idea on full-stack application development using MERN and MEAN stack.

Research paper thumbnail of Algorithms

A.R.S. Publications, Chennai, 2022

(CS3401 – Algorithms - As per the Latest Syllabus of Anna University, Chennai - Regulation 2021) ... more (CS3401 – Algorithms - As per the Latest Syllabus of Anna University, Chennai - Regulation 2021) This book "Algorithms" is about analysis of algorithm and its complexity techniques. It helps to analyse the efficiency of various graph traversal algorithms. It provides the ability to solve various problems using linear and state space tree approach. It gives an understanding towards various classes of problems in polynomial and non-polynomial approaches. Unit I: Introduction towards algorithm analysis with time and space complexities. It provides an understanding towards asymptotic notations. Contributes a knowledge on several search and sort algorithms with its efficiency notation. Unit II: Outline on representing and traversing on graphs. It provides the practical approach towards the construction of minimum spanning tree and shortest path detection along with network flow. Unit III: Transitory awareness on divide and conquer methodology adapted to perform merge and quick sort. Provides a procedure to perform dynamic programming on matrix-multiplication, multi-stage graph and optimal binary search trees. Able to understand the greedy approach and its applicability on problem solving techniques. Unit IV: Brief knowledge over state space tree approach on the backtracking and branch and bound techniques. It provides detailed procedures for solving problems n-Queens, Hamiltonian, Subset sum, Graph colouring, 15-Puzzle, Assignment, Knapsack and Travelling salesman. Unit V: Provides a study over tractable and intractable problems with bin packing problem. Understanding towards problem reduction, approximation and randomized algorithms with travelling salesman.

Research paper thumbnail of Artificial Intelligence and Machine Learning

A.R.S. Publications, Chennai, 2022

(CS3491 – Artificial Intelligence and Machine Learning - As per the Latest Syllabus of Anna Unive... more (CS3491 – Artificial Intelligence and Machine Learning - As per the Latest Syllabus of Anna University, Chennai - Regulation 2021 - Common to All Branch) This book “Artificial Intelligence and Machine Learning” is about basic idea towards machines are working intelligently and its designing. It provides clear view towards uniformed and heuristic search techniques. It provides a preliminary study on reasoning under uncertainty with several illustration. It affords procedural footsteps from artificial intelligence to machine learning. Unit I: Introduction towards artificial intelligence and working of agents. Contributes a knowledge on several search algorithms and constraint satisfaction problem solving techniques with optimization. Unit II: Outline on how machines intelligently reasoning with Bayesian based knowledge relevance detection. Unit III: Transitory awareness on Machine learning, regression and classification models. Provides a procedure to perform classification and regression on data’s. Unit IV: Brief knowledge over combining multiple learners and various ensemble techniques. It provides detailed understanding and procedures for unsupervised learning. Unit V: Provides a study over perceptron and its various mechanisms. Understanding towards Unit saturation and Reinforcement learning unit.

Research paper thumbnail of Object Oriented Programming (Java)

A.R.S. Publications, Chennai, 2022

(CS3391 - Object Oriented Programming - As per the Latest Syllabus of Anna University, Chennai - ... more (CS3391 - Object Oriented Programming - As per the Latest Syllabus of Anna University, Chennai - Regulation 2021 - Common to all Branches) This book “Object Oriented Programming” is about basic idea towards object oriented programming with Java. It provides clear view towards object oriented mechanism adapted in programming languages. It provides a preliminary study on understanding Java with several illustration program. It affords procedural footsteps from command-line to graphical user interface. Unit I: Introduction towards Object Oriented Programming concepts in Java. Provides a procedure for writing, compiling and executing a Java program. Contributes a knowledge on datatypes, variables, arrays, operators, control flow and structure statement, Class and Constructors. Unit II: Outline on Java Overloading, Inheritance, Interface and Package with understanding to distinct access specifiers. Unit III: Transitory awareness on Wrappers, Exception handling and Multithreading. Provides a procedure for writing a multithreading application with priority, daemon threads, synchronizing of thread and inter thread communication. Unit IV: A preliminary confab over Generic programming through classes, methods and its limitations in Java. Brief knowledge over basic Input / Output operations performed through streams on Console and File. It provides detailed understanding to object cloning and String manipulation. Unit V: Provides a study over graphical user interfacing JavaFX. Understanding towards window development and its components. Building up desktop application with simple form designing with several layout using the JavaFX.

Research paper thumbnail of Data Structures and Algorithms (Python)

A.R.S. Publications, Chennai, 2022

(CD3291 – Data Structures and Algorithms & CD3281 – Data Structures and Algorithm Laboratory - B.... more (CD3291 – Data Structures and Algorithms & CD3281 – Data Structures and Algorithm Laboratory - B. Tech. – Information Technology - As per the Latest Syllabus of Anna University, Chennai - Regulation 2021) This book "Data Structures and Algorithms" is about basic idea towards data representation in program and its manipulation. It provides a clear view towards Abstract Data Type and Object-Oriented Programming on Python. It provides a preliminary study on linear data structures, sorting, searching, hashing, Tree and Graph Structures along with Python implementation. Unit I: Introduction towards Abstract Data Types and Object-Oriented Programming. Contributes a knowledge on analysis of algorithm, asymptotic notations, divide & conquer and recursion with example. Unit II: Summary on Linear structures and its working mechanism. Provides an hands on understanding towards the Array List, Linked List, Stack and Queue. Linked list were represented with singly, doubly, circularly, stack and queue through Python. Unit III: Brief knowledge over sorting and searching. Bubble, Selection, Insertion, Merge, Quick sort implemented through Python. It provides detailed understanding and procedures for linear search, binary search, hash functions and collision handling. Unit IV: Transitory awareness on Tree and its traversal. Provides a procedure in Python to construct Binary Tree, AVL Tree, Heap, B Tree & B+ Tree and Tree Traversal. Unit V: Provides a study over graph and its traversal mechanisms. Python hands on experience over estimating shortest path and constructing minimum spanning tree over a graph. Understanding towards problem complexity and its classes. Unit VI: It provides an implementation idea over recursive algorithm, List, Stack and Queue. Understanding towards the several sorting and searching algorithm using python. Detailed implementation to construct tree traversal, minimum spanning tree and estimate the shortest path on graph through Python.

Research paper thumbnail of Computational Intelligence

ARS Publication, Chennai, 2019

This book "Computational Intelligence" is to understand the various characteristics of Intelligen... more This book "Computational Intelligence" is to understand the various characteristics of Intelligent agents and their search strategies. It contributes an impression towards representing knowledge in solving AI problems, reasoning, natural language understand, computer vision, automatic programming and machine learning. It provides a preliminary study to design and implement the different ways of software agents for problem solving.
Unit I: Introduction towards future of Artificial Intelligence and characteristics of Intelligent agents. Outline towards search strategies through Uninformed, Informed and Heuristics along with optimization problems. Summary about the typical expert system and its functional models.
Unit II: Introduction to Proposition logic and First order predicate logic was demonstrated with straight forward and backtracking approach. Awareness towards the ontology and reasoning based on knowledge availability. Demonstrated the Unification, Forward and Backward chaining, Ontological Engineering and Events with Prolog programming.
Unit III: Brief awareness on uncertainty, non-monotonic reasoning, fuzzy, temporal and neural networks.
Unit IV: Contributes a knowledge on learning with understanding towards Bayesian network and Hidden Markov Models. An Illustration on Supervised learning, Decision Tree, Regression, Neural Networks, Support vector machines and Reinforcement learning were briefed in this section.
Unit V: Provides a study over Natural Language Processing and Machine Learning. It provides illustration towards Information extraction, Information retrieval, Machine Translation, Symbol-Based an Connectionist.

Research paper thumbnail of Agricultural Finance, Banking and Cooperation

ARS Publications. Chennai, 2020

This book “Agricultural Finance, Banking and Cooperation” is about an introductory idea on Agricu... more This book “Agricultural Finance, Banking and Cooperation” is about an introductory idea on Agricultural Finance, Banking and Cooperation concepts. It emphasizes on the basic idea of agricultural based financial investment and promotion strategies adopted along with management hierarchy in India. It gives understanding towards the Cooperation, Banking and Insurance supporting the Agriculture and it employee.

Research paper thumbnail of CLOUD COMPUTING

ARS Publications, Chennai, 2020

This book “Cloud Computing” is to understand the concepts, key technologies, strengths and limita... more This book “Cloud Computing” is to understand the concepts, key technologies, strengths and limitations of Cloud Computing. It contributes an impression towards enabling the technologies, in the development of cloud. It provides a preliminary study to understand and use architecture of compute and storage cloud, service and delivery models. It will help the beginner to understand and have hands-on experience in implementing the Cloud with resource management and security.

Research paper thumbnail of MULTI-CORE ARCHITECTURES AND PROGRAMMING

ARS Publications, Chennai, 2020

This book “Multi-Core Architectures and Programming” is about an introductory conceptual idea abo... more This book “Multi-Core Architectures and Programming” is about an introductory conceptual idea about Multicore Processor with Architecture and programming using OpenMP API. It gives an outline on Multicore Architecture and its functional blocks like Intercommunication, Cache and Memory. It provides an ideology of working mechanism process scheduling in Operating System is performed in a Multicore processor. Memory programming in core processor using OpenMP API and its libraries for C language is discussed.

Research paper thumbnail of HUMAN COMPUTER INTERACTION

ARS Publications, Chennai, 2020

This book “Human Computer Interaction”, covering various design technologies for folks and person... more This book “Human Computer Interaction”, covering various design technologies for folks and person with disabilities. It gives an outline on guiding principle for User interface and mindful of Mobile Human Computer Interaction. It provides a belief of fundamentals of Human Computer Interaction. It delivers an interactive idea towards HCI suggestions for designing multimedia, e-commerce and e-learning websites.

Research paper thumbnail of INFORMATION MANAGEMENT

This book “Information Management” provides a exposure towards basics of information, database de... more This book “Information Management” provides a exposure towards basics of information, database design and modelling, addresses the issues in information governance and integration. It provides a maiden study on core relational database design and modelling. It provides a pervasive over creating, maintaining and performance evaluation of Bigdata environments like master data management, data warehouse.

Research paper thumbnail of Social Network Analysis

ARS Publications, Feb 2017

This book “Social Network Analysis”, covering various concept of semantic and social web along wi... more This book “Social Network Analysis”, covering various concept of semantic and social web along with its applications. It gives an outline on understanding human behavior in social web and their relating communities. It provides fundamentals of ontology and semantic web. It delivers a visualization of social networks and its tremendous utilization in business scenarios.