George Amalarethinam | Jamal Mohamed College (original) (raw)
Uploads
Papers by George Amalarethinam
Design Engineering, May 11, 2021
Lecture notes on data engineering and communications technologies, Dec 21, 2018
Cloud computing is a service based and internet-oriented way of providing IT services on request.... more Cloud computing is a service based and internet-oriented way of providing IT services on request. It contains all the computing resources from hardware infrastructure to software platform with software applications in distributed environment. To process a task with remote resources, Scheduling is a primary process. It comes under NP-Complete problem. A perfect task scheduling strategy handles the scheduling issues like makespan, cost, load balancing, resources utilization, fault tolerant and energy efficiency. This paper proposes a new REMM algorithm. This strategy decides the allocation of tasks in Meta task set based on speed of resources in cloud environment.
nternational journal of advanced research in computer and communication engineering, Dec 27, 2014
Indian journal of science and technology, Jul 30, 2015
International journal of engineering trends and technology, Mar 25, 2021
Shanghai Ligong Daxue xuebao, May 27, 2021
The Internet of Things (IoT) is a network that includes physical things capable of aggregating an... more The Internet of Things (IoT) is a network that includes physical things capable of aggregating and communicating the electronic information. With the advancement in Wireless sensor network, IoT provides highly efficient communication for various real-time applications. IoT networks are a large-scale network where routing can be improved by focusing on Quality of Service (QoS) Parameter. Network coverage can be enhanced by hierarchical clustering of the nodes which increases the network lifetime. The proposed algorithm Enhanced Fuzzy Based Clustering and Routing Algorithm (EFCRA) performs distance and energy-based cluster head selection to find a new path from source to destination. The algorithm uses Fuzzy c-means clustering to provide optimization in forming cluster centres. The cluster head (CH) is identified based on the minimum distance and maximum energy of the sensor node. The cluster head is updated when its energy is lesser than the threshold value. The distance between sensor nodes and its CH node and then to the destination is computed using Dijkstra's algorithm. The proposed routing strategy provides improved network coverage and throughput which extends the lifetime of the IoT network.
International journal of computer applications, Oct 20, 2012
The need for scheduling algorithms arise from the requirement to perform multitasking, essentiall... more The need for scheduling algorithms arise from the requirement to perform multitasking, essentially for modern computing systems. Scheduling is the greatest cause that optimizes the objective function that involved with the selection of resources. In scheduling, every aspect of execution is based on decision(s). The general objective of scheduling algorithms is to effectively use the available processors to execute parallel programs, possibly in the least utilization of time. A group of interdependent jobs/tasks forms the workflow application. Scheduling is to map the jobs/tasks on to the collection of heterogeneous resources available in a massive geographic spread. Most complicated applications consist of interdependent jobs that coordinate to solve a problem. The completion of a particular job is the criterion function that has to be essentially met in order to start the execution of those jobs that depend upon it [1]. This kind of workflow application may be represented in the form of a Directed Acyclic Graph (DAG). Grid Workflow is such an application and is modeled by DAG. DAGitizer could generate DAG in a random fashion [2]. This paper proposes a tool (developed using Java) which is an enhanced form of DAGitizer that could find the least cost path between source and destination nodes.
Grid computing harnesses unused processing cycles of all computers in a network for solving probl... more Grid computing harnesses unused processing cycles of all computers in a network for solving problems too intensive for any stand-alone machine. Task scheduling is a fundamental issue in achieving high performance in grid computing systems because of its heterogeneity and availability. An efficient algorithm is needed to effectively utilize the resources and reduce the makespan. In this book various scheduling strategies have been proposed to effectively utilize the resources through load balancing. The strategies proposed uses Min-Min algorithm and Ant Colony Optimization to reduce the makespan and optimize the memory requirements. This book has also proposed two tools, first one to generate ETC matrix with different consistencies of resources and different heterogeneity of tasks. The second tool proposed for Metatask Scheduling can be used as a simulation tool for researchers doing their research in metatask scheduling algorithms. This book will be very helpful for researchers working in Grid and Cloud Environment.
Advances in intelligent systems and computing, 2018
Cloud computing is a centralized network which enables the movement of data and application softw... more Cloud computing is a centralized network which enables the movement of data and application software and access the resources on demand. Although this type of computing meets the need of the users, various issues present in the cloud decreases the usage of resources. Among them, security is one of the major issues. The users move to the cloud for storing their sensitive data. Thus, data protection is a key concern. Cryptography is the conventional method applied for securing data in an efficient way. Encryption and decryption processes of cryptography proposed by various predefined algorithms take much time. Thus, the concentration must be given to reduce the time of these processes. Many methodologies exist for reducing the time which is more mathematical in nature. One among them is the concept of addition chaining method. The proposed asymmetric cryptographic algorithm uses the concept of addition chaining to reduce the time spent both in encryption and decryption processes.
Cloud Computing is an innovative paradigm that offers computing resources such as network, storag... more Cloud Computing is an innovative paradigm that offers computing resources such as network, storage, servers, applications and services when there is a demand, based on pay-as-you go principle. In Cloud computing, the resources are shared by Cloud consumers. Cloud provides computing infrastructure with a development platform on which users can develop their own applications. It diminishes the capital expenditures to be spent on applications development. The cloud consumers can avail the resources from anywhere at any time with an internet service. Though Cloud has several advantages, it has certain security challenges to be resolved. In this paper, the Security Challenges of Cloud Computing in various aspects are discussed.
International Journal of Advanced Research in Computer Science, 2017
2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2018
From Electronic Numerical Integrator And Computer (ENIAC) through desktops to mobile devices, tec... more From Electronic Numerical Integrator And Computer (ENIAC) through desktops to mobile devices, technology has evolved throughout the years. Data storage has become transparent after the commencement of the internet. The emergence of cloud computing allows data stored at different locations with different servers using internet and central remote servers. The advantage of cloud computing has transformed the method distributed computing used in the past. Data security is totally maintained by means of encryption. Encryption and decryption are the key elements where hidden data is transformed into an undecipherable code, while decryption is the exact opposite resulting in the original data. The proposed algorithm is performed prior to the arrival of data in the cloud storage. Here the real plain text undergoes different types of splitting and dividing techniques. Three keys are employed at different stages to get highly encrypted data. This paper presents to protect data in the Public C...
2017 World Congress on Computing and Communication Technologies (WCCCT), 2017
Sentiment analysis, also called opinion mining is a technique that has been adopted by most organ... more Sentiment analysis, also called opinion mining is a technique that has been adopted by most organizations for market research, product analysis and customer feedback analysis. Social networking data provides a huge promise by providing the most accurate of the reviews. However, it was identified that the huge nature of the data and the velocity at which the data is generated is on the downside. This is due to the unavailability of techniques used to process them. This paper presents a Spark based sentiment analysis technique that operates on streaming data to provide fast and most accurate results. A comparison of accuracy of the proposed technique was also carried out and it was identified that the proposed parallelized Naïve Bayes technique provides both faster and more accurate results compared to sequential Naïve Bayes technique and SVM technique.
International Journal of Computer Theory and Engineering, 2020
International Journal of Research in Advent Technology, 2019
Cloud computing environment assures to provide on demand computing services through internet on p... more Cloud computing environment assures to provide on demand computing services through internet on pay-as-you-use basis. Even though there are several issues existing, scheduling is the main issue in cloud. Scheduling of tasks is difficult because of sole elements in cloud computing such as resource heterogeneity, task heterogeneity and user priority. This paper proposes a new Priority based Resource Allocation (PRA) for metatask scheduling in cloud. This algorithm thinks about priority given to meta-task by the users. The instances of high speed resource will be used for scheduling the meta-task set with user priority and heterogeneous resources are allocated for non-priority meta-task set. The PRA algorithm minimizes the makespan and cost, and increases the utilization of resources over the existing algorithm.
International Journal of Computer Applications, 2015
Fourth International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom2012), 2012
The process of allocating fragments into the appropriate sites is a crucial step in the design of... more The process of allocating fragments into the appropriate sites is a crucial step in the design of Peerto-Peer Distributed Databases. Accessibility of data influences the Quality of Service for requests. This paper proposes a methodology for fragment reallocation by using Hungarian Assignment algorithm of optimization principle. The objective of the work is to reduce the number of un-successful queries that are forwarded to other sites of the network. The results show that re-allocation of fragments to suitable sites cause significant part in the communication cost while transaction.
Design Engineering, May 11, 2021
Lecture notes on data engineering and communications technologies, Dec 21, 2018
Cloud computing is a service based and internet-oriented way of providing IT services on request.... more Cloud computing is a service based and internet-oriented way of providing IT services on request. It contains all the computing resources from hardware infrastructure to software platform with software applications in distributed environment. To process a task with remote resources, Scheduling is a primary process. It comes under NP-Complete problem. A perfect task scheduling strategy handles the scheduling issues like makespan, cost, load balancing, resources utilization, fault tolerant and energy efficiency. This paper proposes a new REMM algorithm. This strategy decides the allocation of tasks in Meta task set based on speed of resources in cloud environment.
nternational journal of advanced research in computer and communication engineering, Dec 27, 2014
Indian journal of science and technology, Jul 30, 2015
International journal of engineering trends and technology, Mar 25, 2021
Shanghai Ligong Daxue xuebao, May 27, 2021
The Internet of Things (IoT) is a network that includes physical things capable of aggregating an... more The Internet of Things (IoT) is a network that includes physical things capable of aggregating and communicating the electronic information. With the advancement in Wireless sensor network, IoT provides highly efficient communication for various real-time applications. IoT networks are a large-scale network where routing can be improved by focusing on Quality of Service (QoS) Parameter. Network coverage can be enhanced by hierarchical clustering of the nodes which increases the network lifetime. The proposed algorithm Enhanced Fuzzy Based Clustering and Routing Algorithm (EFCRA) performs distance and energy-based cluster head selection to find a new path from source to destination. The algorithm uses Fuzzy c-means clustering to provide optimization in forming cluster centres. The cluster head (CH) is identified based on the minimum distance and maximum energy of the sensor node. The cluster head is updated when its energy is lesser than the threshold value. The distance between sensor nodes and its CH node and then to the destination is computed using Dijkstra's algorithm. The proposed routing strategy provides improved network coverage and throughput which extends the lifetime of the IoT network.
International journal of computer applications, Oct 20, 2012
The need for scheduling algorithms arise from the requirement to perform multitasking, essentiall... more The need for scheduling algorithms arise from the requirement to perform multitasking, essentially for modern computing systems. Scheduling is the greatest cause that optimizes the objective function that involved with the selection of resources. In scheduling, every aspect of execution is based on decision(s). The general objective of scheduling algorithms is to effectively use the available processors to execute parallel programs, possibly in the least utilization of time. A group of interdependent jobs/tasks forms the workflow application. Scheduling is to map the jobs/tasks on to the collection of heterogeneous resources available in a massive geographic spread. Most complicated applications consist of interdependent jobs that coordinate to solve a problem. The completion of a particular job is the criterion function that has to be essentially met in order to start the execution of those jobs that depend upon it [1]. This kind of workflow application may be represented in the form of a Directed Acyclic Graph (DAG). Grid Workflow is such an application and is modeled by DAG. DAGitizer could generate DAG in a random fashion [2]. This paper proposes a tool (developed using Java) which is an enhanced form of DAGitizer that could find the least cost path between source and destination nodes.
Grid computing harnesses unused processing cycles of all computers in a network for solving probl... more Grid computing harnesses unused processing cycles of all computers in a network for solving problems too intensive for any stand-alone machine. Task scheduling is a fundamental issue in achieving high performance in grid computing systems because of its heterogeneity and availability. An efficient algorithm is needed to effectively utilize the resources and reduce the makespan. In this book various scheduling strategies have been proposed to effectively utilize the resources through load balancing. The strategies proposed uses Min-Min algorithm and Ant Colony Optimization to reduce the makespan and optimize the memory requirements. This book has also proposed two tools, first one to generate ETC matrix with different consistencies of resources and different heterogeneity of tasks. The second tool proposed for Metatask Scheduling can be used as a simulation tool for researchers doing their research in metatask scheduling algorithms. This book will be very helpful for researchers working in Grid and Cloud Environment.
Advances in intelligent systems and computing, 2018
Cloud computing is a centralized network which enables the movement of data and application softw... more Cloud computing is a centralized network which enables the movement of data and application software and access the resources on demand. Although this type of computing meets the need of the users, various issues present in the cloud decreases the usage of resources. Among them, security is one of the major issues. The users move to the cloud for storing their sensitive data. Thus, data protection is a key concern. Cryptography is the conventional method applied for securing data in an efficient way. Encryption and decryption processes of cryptography proposed by various predefined algorithms take much time. Thus, the concentration must be given to reduce the time of these processes. Many methodologies exist for reducing the time which is more mathematical in nature. One among them is the concept of addition chaining method. The proposed asymmetric cryptographic algorithm uses the concept of addition chaining to reduce the time spent both in encryption and decryption processes.
Cloud Computing is an innovative paradigm that offers computing resources such as network, storag... more Cloud Computing is an innovative paradigm that offers computing resources such as network, storage, servers, applications and services when there is a demand, based on pay-as-you go principle. In Cloud computing, the resources are shared by Cloud consumers. Cloud provides computing infrastructure with a development platform on which users can develop their own applications. It diminishes the capital expenditures to be spent on applications development. The cloud consumers can avail the resources from anywhere at any time with an internet service. Though Cloud has several advantages, it has certain security challenges to be resolved. In this paper, the Security Challenges of Cloud Computing in various aspects are discussed.
International Journal of Advanced Research in Computer Science, 2017
2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2018
From Electronic Numerical Integrator And Computer (ENIAC) through desktops to mobile devices, tec... more From Electronic Numerical Integrator And Computer (ENIAC) through desktops to mobile devices, technology has evolved throughout the years. Data storage has become transparent after the commencement of the internet. The emergence of cloud computing allows data stored at different locations with different servers using internet and central remote servers. The advantage of cloud computing has transformed the method distributed computing used in the past. Data security is totally maintained by means of encryption. Encryption and decryption are the key elements where hidden data is transformed into an undecipherable code, while decryption is the exact opposite resulting in the original data. The proposed algorithm is performed prior to the arrival of data in the cloud storage. Here the real plain text undergoes different types of splitting and dividing techniques. Three keys are employed at different stages to get highly encrypted data. This paper presents to protect data in the Public C...
2017 World Congress on Computing and Communication Technologies (WCCCT), 2017
Sentiment analysis, also called opinion mining is a technique that has been adopted by most organ... more Sentiment analysis, also called opinion mining is a technique that has been adopted by most organizations for market research, product analysis and customer feedback analysis. Social networking data provides a huge promise by providing the most accurate of the reviews. However, it was identified that the huge nature of the data and the velocity at which the data is generated is on the downside. This is due to the unavailability of techniques used to process them. This paper presents a Spark based sentiment analysis technique that operates on streaming data to provide fast and most accurate results. A comparison of accuracy of the proposed technique was also carried out and it was identified that the proposed parallelized Naïve Bayes technique provides both faster and more accurate results compared to sequential Naïve Bayes technique and SVM technique.
International Journal of Computer Theory and Engineering, 2020
International Journal of Research in Advent Technology, 2019
Cloud computing environment assures to provide on demand computing services through internet on p... more Cloud computing environment assures to provide on demand computing services through internet on pay-as-you-use basis. Even though there are several issues existing, scheduling is the main issue in cloud. Scheduling of tasks is difficult because of sole elements in cloud computing such as resource heterogeneity, task heterogeneity and user priority. This paper proposes a new Priority based Resource Allocation (PRA) for metatask scheduling in cloud. This algorithm thinks about priority given to meta-task by the users. The instances of high speed resource will be used for scheduling the meta-task set with user priority and heterogeneous resources are allocated for non-priority meta-task set. The PRA algorithm minimizes the makespan and cost, and increases the utilization of resources over the existing algorithm.
International Journal of Computer Applications, 2015
Fourth International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom2012), 2012
The process of allocating fragments into the appropriate sites is a crucial step in the design of... more The process of allocating fragments into the appropriate sites is a crucial step in the design of Peerto-Peer Distributed Databases. Accessibility of data influences the Quality of Service for requests. This paper proposes a methodology for fragment reallocation by using Hungarian Assignment algorithm of optimization principle. The objective of the work is to reduce the number of un-successful queries that are forwarded to other sites of the network. The results show that re-allocation of fragments to suitable sites cause significant part in the communication cost while transaction.