Time filter

Source Type

Erode, India

Andamuthu T.P.,Maharaja Engg College for Women | Balasubramanie P.,Kongu Engg College
Journal of Computer Science

Problem statement: In the last few years, the evolution of the mobile networks leads to the query processing in mobile computing an impressive research area. The mobile computing technology needs to offer more and different innovative services as the number of users of the mobiles were increasing. In this regard, this study proposed a new algorithm which increased the performance of the query processing system in mobile computing. Approach: We employed different servers for different job processing. The buffer was maintained in the mobile node and the cache is maintained in the query server as well as mobile server. Prioritization was given to the queries based on different parameters like priority given by the user, required bandwidth. Results and Conclusion: The parameters considered for performance measure are query efficiency, delivery ratio and average power consumption and the results show that the proposed algorithm performs better than the existing systems. The query efficiency is increased by 13%, delivery ratio is increased by 26% and average power consumption is reduced by 35% on an average. © 2011 Science Publications. Source

Dinakaran M.,Vellore Institute of Technology | Balasubramanie P.,Kongu Engg College
European Journal of Scientific Research

The world wide success of cellular technologies changed the way people communicate. The users access the internet any where, any time even when they are mobile. It is also needed to support the movement of a complete network that changes its point of attachment to the fixed infrastructure, maintaining the sessions of every device of the network. Mobile Internet Protocol version 6 (MIPv6) forms the backbone for next generation wireless Internet technology to provide consistent and reliable network service while on the move. There are various protocols introduced after MIPv6 for mobility support. We do an analysis of such protocols, so that the comparative performance analysis of Quality of Service (QoS) parameters reveals us the variations among the different Mobile IPV6 protocols. This analysis report will provides us information on how each protocol can be put to be best use and better wireless internet services and which protocol can be used for which business scenario. This analysis is implemented as simulation with the help of Network Simulator-2 (NS-2.34). © EuroJournals Publishing, Inc. 2011. Source

Vijayarani S.,Bharathiar University | Tamilarasi A.,Kongu Engg College | Sampoorna M.,Bharathiar University
Proceedings of 2010 International Conference on Communication and Computational Intelligence, INCOCCI-2010

Many applications employing the data mining techniques involve mining the data that includes private and sensitive information about the subjects. Κ-anonymity is a property that models the protection of released data against possible re-identification of the respondents to which the data refers. One of the interesting aspects of Κ-anonymity is its association with protection techniques that preserve the truthfulness of the data. It is however evident that the collection and analysis of data that include personal information may violate the privacy of the individuals to whom information refers. To guarantee the Κ-anonymity requirement, Κ-anonymity requires each quasi-identifier value in the released table to have at least Κ occurrences. In this paper, we present a survey of recent approaches that have been applied to the Κ-Anonymity problem. © 2010 Kongu Engineering College. Source

Vijayarani S.,Bharathiar University | Tamilarasi A.,Kongu Engg College
Lecture Notes in Electrical Engineering

Privacy Preserving Data mining is a new research area in the field of data mining. It greatly deals with the side effects of the data mining techniques. With the help of data mining techniques people can analyze and extract the hidden patterns from the large data set. In many situations, the retrieved hidden knowledge provides the confidential information. This confidential information may be misused for variety of purposes. This situation raises the need for privacy and security issues. The main objective of privacy preserving data mining is, extracting the knowledge available in the data; at the same time the individual's privacy should be protected. It also protects the data owner against mishandling or disclosure of the data. Several techniques and algorithms are required for maintaining the secrecy of data in order to limit the extraction of confidential patterns. There are many techniques are available for protecting the sensitive data in the database. Some of them are statistical, cryptographic, randomization methods, k-anonymity model, l-diversity and etc [2-5, 7]. In this research work, we have developed two new perturbative masking techniques known as data transformation technique and data transitive technique. These techniques are used for protecting sensitive data in the form of modifying the sensitive data. In order to find the best technique, we have compared the two techniques with the existing technique micro aggregation. Experimental result shows that the data transformation technique gives the better result. © 2013 Springer Science+Business Media. Source

Andamuthu T.P.,Maharaja Engg College for Women | Balasubramanie P.,Kongu Engg College
European Journal of Scientific Research

There has been an urgent need to provide a fast and efficient query processing algorithm for mobile computing environment. In this scheme we propose a multiserver model which uses the XQuery and the mobile server to process the queries in a more efficient way. The queries are broken down into expressions and then their scope of processing is decided depending on the availability of resources of the server. We also have introduced two highly efficient caching mechanisms which are integrated with both the servers to help in improving the efficiency and query optimization. The results and analysis shows that the scheme helps in improving the overall efficiency of query processing. © EuroJournals Publishg, Inc. 2012. Source

Discover hidden collaborations