Jomina John | Mahatma Gandhi University, Kottayam (original) (raw)

Papers by Jomina John

Research paper thumbnail of ISSN:2229-6093 Annu Anna lal et al, Int.J.Computer Technology & Applications,Vol 4 (4),698-705 A Survey on Diabetic Retinopathy Detection Techniques

— Nowadays Diabetic retinopathy has become a common eye disease in most of the developed countrie... more — Nowadays Diabetic retinopathy has become a common eye disease in most of the developed countries. it occurs in almost 80 % of all diabetic cases and is the leading cause of blindness. Diabetic macular edema (DME) is an advanced symptom of diabetic retinopathy and can lead to irreversible vision loss. So the importance of automatic assessment of macular edema increased. In this paper we have done a survey on the different techniques used for detection of macular edema. It helps the ophthalmologists to apply proper treatments that might eliminate the disease or decrease the severity of it. Diabetic retinopathy is composed of a characteristic group of lesions found in the retina of individuals having had diabetes for several years. Detecting the exudates in early stage can prevent vision loss. Many approaches have been developed so far for the assessment of macular edema. study eye diseases like diabetic retinopathy. Figure 1 shows a typical retinal image labeled with various feature...

Research paper thumbnail of A Review on Secure Data Dissemination Protocols in Wireless Sensor Networks

Rapid and widespread development of wireless communication technology has contributed in the area... more Rapid and widespread development of wireless communication technology has contributed in the area of wireless sensor networking (WSN). Sensor nodes can be deployed for communication, monitoring tasks in various fields. In comparison with wired systems wireless sensor networks have their own special features and limitations like energy, storage, computing capability. It is required to spread data and code through wireless links after the nodes are deployed in order to adjust parameters of sensors, update the sensor programs or distribute management commands to sensors. Since most of the WSN are setup in remote and hostile environments manual updating is not always possible. So we have many dissemination protocols which help to reprogram the nodes and make them consistent with each other. Traditional protocols like Drip, Deluge do not have any security measures in place due to which bogus code updates can be made by attackers. So many secure data dissemination protocols have been intr...

Research paper thumbnail of Secure Data Dissemination Protocol in Wireless Sensor Networks Using Xor Network Coding

International Journal of Research in Engineering and Technology, 2014

Wireless sensor networks (WSN) are basically distributed networks or a collection of sensor nodes... more Wireless sensor networks (WSN) are basically distributed networks or a collection of sensor nodes which collect information which are used to analyse physical or environmental conditions. WSNs are usually setup in remote and hostile areas and work in extreme conditions. Applications of WSN include habitat monitoring, industrial applications, battlefield surveillance, smart homes etc. Most of them require regular updating of software in sensor nodes through the wireless channel for efficient management and working. So it is necessary to spread data through the wireless medium after the nodes are deployed. This is known as data dissemination or network reprogramming. A good data dissemination protocol must be fast, secure, reliable and energy efficient. To achieve these we can make use of network coding techniques which reduces the number of retransmissions due to any packet drops. But network coding increases the chance of various kinds of network attacks. Also to avoid spreading of malicious code in the network, each sensor node has to authenticate its received code before propagating it further. So here a novel dissemination protocol is introduced based on simple cryptographic techniques which prevents pollution and DoS attacks and at the same time achieves fastness using the technique of network coding.

Research paper thumbnail of Cluster optimization for enhanced web usage mining using fuzzy logic

2012 World Congress on Information and Communication Technologies, 2012

Web Usage Mining is the process of extracting useful usage patterns from web data. Web personaliz... more Web Usage Mining is the process of extracting useful usage patterns from web data. Web personalization uses web usage mining technique for the process of knowledge acquisition done by analyzing the user navigational patterns. The major requirement of online industry is to fulfill the individual requirements of the user. The web page personalization involves clustering of different web pages having similar usage patterns. Clustering is an unsupervised classification of the data items into groups called clusters. There are numerous clustering algorithms based on different techniques. Most of these algorithms have some drawbacks. As the size of cluster increases due to the increase in web users, it will become inevitable need to optimize the clusters. This paper proposes a cluster optimization methodology based on fuzzy logic and is used for eliminating the redundancies occur in data after clustering done by web usage mining methods. For clustering Fuzzy C-Means (FCM) algorithm is used. Fuzzy Cluster-chase algorithm for cluster optimization is presented to personalize web page clusters of end users.

Research paper thumbnail of Major Vulnerabilities and Their Prevention Methods in Cloud Computing

Advances in Intelligent Systems and Computing, 2018

A single name for dynamic scalability and elasticity of resources is nothing but a cloud. Cloud c... more A single name for dynamic scalability and elasticity of resources is nothing but a cloud. Cloud computing is the latest business buzz in the corporate world. The benefits like capital cost reduction, globalization of the workforce, and remote accessibility attract people to introduce their business through the cloud. The nefarious users can scan, exploit, and identify different vulnerabilities and loopholes in the system because of the ease of accessing and acquiring cloud services. Data breaches and cloud service abuse are the top threats identified by Cloud Security Alliance. The major attacks are insider attacks, malware and worm attack, DOS attack, and DDOS attack. This paper analyzes major attacks in cloud and comparison of corresponding prevention methods, which are effective in different platforms along with DDoS attack implementation results.

Research paper thumbnail of ISSN:2229-6093 Annu Anna lal et al, Int.J.Computer Technology & Applications,Vol 4 (4),698-705 A Survey on Diabetic Retinopathy Detection Techniques

— Nowadays Diabetic retinopathy has become a common eye disease in most of the developed countrie... more — Nowadays Diabetic retinopathy has become a common eye disease in most of the developed countries. it occurs in almost 80 % of all diabetic cases and is the leading cause of blindness. Diabetic macular edema (DME) is an advanced symptom of diabetic retinopathy and can lead to irreversible vision loss. So the importance of automatic assessment of macular edema increased. In this paper we have done a survey on the different techniques used for detection of macular edema. It helps the ophthalmologists to apply proper treatments that might eliminate the disease or decrease the severity of it. Diabetic retinopathy is composed of a characteristic group of lesions found in the retina of individuals having had diabetes for several years. Detecting the exudates in early stage can prevent vision loss. Many approaches have been developed so far for the assessment of macular edema. study eye diseases like diabetic retinopathy. Figure 1 shows a typical retinal image labeled with various feature...

Research paper thumbnail of A Review on Secure Data Dissemination Protocols in Wireless Sensor Networks

Rapid and widespread development of wireless communication technology has contributed in the area... more Rapid and widespread development of wireless communication technology has contributed in the area of wireless sensor networking (WSN). Sensor nodes can be deployed for communication, monitoring tasks in various fields. In comparison with wired systems wireless sensor networks have their own special features and limitations like energy, storage, computing capability. It is required to spread data and code through wireless links after the nodes are deployed in order to adjust parameters of sensors, update the sensor programs or distribute management commands to sensors. Since most of the WSN are setup in remote and hostile environments manual updating is not always possible. So we have many dissemination protocols which help to reprogram the nodes and make them consistent with each other. Traditional protocols like Drip, Deluge do not have any security measures in place due to which bogus code updates can be made by attackers. So many secure data dissemination protocols have been intr...

Research paper thumbnail of Secure Data Dissemination Protocol in Wireless Sensor Networks Using Xor Network Coding

International Journal of Research in Engineering and Technology, 2014

Wireless sensor networks (WSN) are basically distributed networks or a collection of sensor nodes... more Wireless sensor networks (WSN) are basically distributed networks or a collection of sensor nodes which collect information which are used to analyse physical or environmental conditions. WSNs are usually setup in remote and hostile areas and work in extreme conditions. Applications of WSN include habitat monitoring, industrial applications, battlefield surveillance, smart homes etc. Most of them require regular updating of software in sensor nodes through the wireless channel for efficient management and working. So it is necessary to spread data through the wireless medium after the nodes are deployed. This is known as data dissemination or network reprogramming. A good data dissemination protocol must be fast, secure, reliable and energy efficient. To achieve these we can make use of network coding techniques which reduces the number of retransmissions due to any packet drops. But network coding increases the chance of various kinds of network attacks. Also to avoid spreading of malicious code in the network, each sensor node has to authenticate its received code before propagating it further. So here a novel dissemination protocol is introduced based on simple cryptographic techniques which prevents pollution and DoS attacks and at the same time achieves fastness using the technique of network coding.

Research paper thumbnail of Cluster optimization for enhanced web usage mining using fuzzy logic

2012 World Congress on Information and Communication Technologies, 2012

Web Usage Mining is the process of extracting useful usage patterns from web data. Web personaliz... more Web Usage Mining is the process of extracting useful usage patterns from web data. Web personalization uses web usage mining technique for the process of knowledge acquisition done by analyzing the user navigational patterns. The major requirement of online industry is to fulfill the individual requirements of the user. The web page personalization involves clustering of different web pages having similar usage patterns. Clustering is an unsupervised classification of the data items into groups called clusters. There are numerous clustering algorithms based on different techniques. Most of these algorithms have some drawbacks. As the size of cluster increases due to the increase in web users, it will become inevitable need to optimize the clusters. This paper proposes a cluster optimization methodology based on fuzzy logic and is used for eliminating the redundancies occur in data after clustering done by web usage mining methods. For clustering Fuzzy C-Means (FCM) algorithm is used. Fuzzy Cluster-chase algorithm for cluster optimization is presented to personalize web page clusters of end users.

Research paper thumbnail of Major Vulnerabilities and Their Prevention Methods in Cloud Computing

Advances in Intelligent Systems and Computing, 2018

A single name for dynamic scalability and elasticity of resources is nothing but a cloud. Cloud c... more A single name for dynamic scalability and elasticity of resources is nothing but a cloud. Cloud computing is the latest business buzz in the corporate world. The benefits like capital cost reduction, globalization of the workforce, and remote accessibility attract people to introduce their business through the cloud. The nefarious users can scan, exploit, and identify different vulnerabilities and loopholes in the system because of the ease of accessing and acquiring cloud services. Data breaches and cloud service abuse are the top threats identified by Cloud Security Alliance. The major attacks are insider attacks, malware and worm attack, DOS attack, and DDOS attack. This paper analyzes major attacks in cloud and comparison of corresponding prevention methods, which are effective in different platforms along with DDoS attack implementation results.