Perunthalaivar Kamarajar Institute of Engineering and Technology

Kāraikāl, India

Perunthalaivar Kamarajar Institute of Engineering and Technology

Kāraikāl, India
SEARCH FILTERS
Time filter
Source Type

Boopathi M.,Vellore Institute of Technology | Aramudhan M.,Perunthalaivar Kamarajar Institute of Engineering and Technology
Cybernetics and Systems | Year: 2017

This paper proposes a dual-stage biometrics-based authentication mechanism using smart card. It is considered the improvement over the conventional single-stage biometrics-based authentication mechanism, which exploits only one server for authentication, whereas the proposed scheme exploits two servers. The user authentication is performed in one server and hence it is called an authentication server. The credentials of the authentication server are stored in the second server, called the master server. The master server facilitates the authentication by providing required credentials to the authentication server. Both the security analysis and complexity analysis are conducted between the proposed and the conventional schemes. The analysis results show that the proposed scheme is secure than the conventional schemes with negligible computational complexity. © 2017 Taylor & Francis Group, LLC


Boopathi M.,Vellore Institute of Technology | Aramudhan M.,Perunthalaivar Kamarajar Institute of Engineering and Technology
Alexandria Engineering Journal | Year: 2016

The distributed environment insists the protection of servers, while information sharing is achieved. The conventional biometrics-based password authentication mechanisms use single server, which can be compromised easily. The dual stage authentication mechanism has been already proved for its security over the single stage authentication mechanism in our previous work. In this paper, the protocol is improved to establish communication between the authentication server and the master server through a secure link. Since the hashed messages are prone to collision attacks, the proposed scheme uses elliptic curve cryptography-based ciphers for establishing connection at the initial stage. The security analysis of the proposed authentication scheme with secure server - server communication link reveals the robustness and the security features, which are offered over our previous as well as the conventional authentication mechanisms. © 2017 Faculty of Engineering, Alexandria University.


Saravanan M.,Periyar Maniammai University | Aramudhan M.,Perunthalaivar Kamarajar Institute of Engineering and Technology
Advances in Intelligent Systems and Computing | Year: 2017

Cloud Computing is an inevitable technology using by the internet users for their day to day usage, Various cloud service providers offering different services (like Software, Platform, Infrastructure, Storage etc.,..) to various customers through the Internet. Users are confused to choose best and cost reduction service provider. Our frame work designed based on user concerned, this will aid to user to select suitable and optimized cost service provider based on the necessary key performance indicators. We proposed frame work will address the key issues like User categorization, Trust analysis, Cost analysis, ranking the service providers, and Priority based selection. Hence Cost analysis based on the Service Level Agreement (SLA) cost of components, Ranking to be done based on grade values, and Priority Feedback Decision Tree applied to select best service provider from similar highest rank list. © Springer Nature Singapore Pte Ltd. 2017.


Vigneshwari S.,Sathyabama University | Aramudhan M.,Perunthalaivar Kamarajar Institute of Engineering and Technology
International Journal of Engineering and Technology | Year: 2013

Ontological way of knowledge representation is very much useful to the semantic web. In the modernized computer era, there is a need of a special technique for personalization. XML plays an important role in information retrieval systems and XML being a common format for information interpretation, it will be easy to understand as well as easy to construct. In this paper, a framework has been proposed for personalizing the web using XML based ontologies. This framework needs integration between global ontology and locally generated ontology based on user profiles. The relevant concepts between both the ontologies are identified, grouped together and ranked. Finally, the generated ontologies are evaluated using standard datasets, based on their semantic structures. The clustered concepts and query pairs are being analyzed with varying threshold limits. In addition, the performance metrics show that the ontology based techniques show a good precision, recall values for the user given data, when compared to text-based approaches.


Vigneshwari S.,Sathyabama University | Aramudhan M.,Perunthalaivar Kamarajar Institute of Engineering and Technology
National Academy Science Letters | Year: 2015

Personalization is crucial in the prevailing internet scenario. An efficient information retrieval relies not only on personalization but also upon security. For this, a semantic association is needed for document retrieval, to further boost the search quality. In this paper, multiple ontologies are used, for mining the semantic associations. Multiple ontologies can share a variety of concepts and automatic merging is also feasible. With semantic association any input query is matched for finding relevant words. Semantic similarity measure is proposed to match the semantic association of query therewith of the documents, based on the query expansion technique. A user profiling model is constructed which is trained for personalization. This model ensures secure retrieval of the documents. A novel framework is proposed for providing secured document retrieval based on cross ontology mining. The results show good MAP and F-Measure rate of document retrieval when compared to the existing techniques. © 2015, The National Academy of Sciences, India.


Vijayalakshmy G.,Perunthalaivar Kamarajar Institute of Engineering and Technology | Sivaradje G.,Pondicherry Engineering College
2013 International Conference on Computer Communication and Informatics, ICCCI 2013 | Year: 2013

The IP Multimedia Subsystem (IMS) seems to be the technology that will prevail in Next Generation Networks (NGN s), since the interworking environment and the service flexibility that this technology offers to the currently deployed wireless broadband technologies makes it appealing to users, service developers and network operators. In this paper a heterogeneous network model based on the IMS that integrates the Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) technologies is proposed and provides it provides guaranteed QoS. The proposed Tight coupled WiMAX-UMTS-WLAN convergence architecture using IMS QoS provisioning algorithm is compared with interworking of WiMAX-UMTS interworking architecture using IMS QoS provisioning algorithm. The QoS performance metrics such as Email upload and download response time, Email traffic received, RIP (routing information protocol) traffic received and sent, TCP delay, TCP retransmission count, Transmission delay, Processing delay and Queuing delay were simulated using Opnet 14.5. © 2013 IEEE.


Vasudevan G.,Perunthalaivar Kamarajar Institute of Engineering and Technology | Kothandaraman S.,Pondicherry Engineering College
IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012 | Year: 2012

This paper presents the experimental and Finite Element Analysis results of the RC beams tested and analysed under four-point bending. For FE modeling of RC beams using ANSYS 12.0, IS 456: 2000 codal provisions are used and the critical values of the test and FE Analysis results are compared with the calculated values using the IS code provisions. © 2012 Pillay Engineering College.


Vasudevan G.,Perunthalaivar Kamarajar Institute of Engineering and Technology | Kothandaraman S.,Pondicherry Engineering College
Materials and Structures/Materiaux et Constructions | Year: 2014

This paper presents the findings of the comprehensive experimental investigation on the use of non-prestressed external reinforcing bars at soffit of the RC beams for enhancing the flexural strength. Based on the encouraging results of the preliminary experimental study conducted by the authors, a comprehensive experimental investigation was carried out by testing 20 numbers of RC beams with varying internal and external bar ratio in order to further explore the viability of this technique. External reinforcing bars technique has already been used by keeping the reinforcement at the sides of the beam using deflectors, mechanical anchoring devices and with strengthening end anchorage zones. The reported technique uses external reinforcing bars at the soffit, which eliminates the need of deflectors, and the anchoring was done by adopting a very simple technique, which eliminates the use of mechanical anchoring devices. The proposed technique is found to be cost effective, easy to execute, enhances moment carrying capacity and effective in deflection and crack control. © 2013 RILEM.


Kothandaraman S.,Pondicherry Engineering College | Vasudevan G.,Perunthalaivar Kamarajar Institute of Engineering and Technology
Construction and Building Materials | Year: 2010

Throughout the globe, huge stock of buildings become vulnerable to damage due to aging, rebar corrosion, and natural hazards, particularly earthquake. Section enlargement, bonded steel plating, external post-tensioning and FRP composites wrapping are some of the techniques being widely followed to retrofit various structural elements. Each technique has at least one or more number of limitations. High cost, difficulty in execution, reduction in headroom, loss of aesthetic value, increase in self-weight, careful surface preparation, de-bonding failure are some of the innate limitations of these techniques. A maiden attempt has been made by the authors to devise a new technique to retrofit RC beams with external reinforcement. The proposed method overcomes most of the drawbacks of the above said existing methods. Some work has already been reported on external reinforcement by keeping the reinforcement at the sides of the beam using deflectors, mechanical anchoring devices and strengthening end anchorage zones. The reported technique in the present work overcomes all the drawbacks of the above method. The authors propose the external bars to be kept at the soffit level of the beam section, thus eliminating the use of deflectors, mechanical anchoring devices and making it amenable, simple and effective. Additional advantages of the present technique are the enhanced moment carrying capacity, reduced deflection and crack width and improved ductility. © 2010 Elsevier Ltd. All rights reserved.


Kumar A.,Perunthalaivar Kamarajar Institute of Engineering and Technology
International Journal on Communications Antenna and Propagation | Year: 2014

Currently the use of web recommendation techniques is growing worldwide with aim of providing the custom-made required data to end users. Most of the web users complain about finding useful information on web sites. Web recommender systems predict the information needs of users and provide them with recommendations to facilitate their navigation. Recommender systems have been extensively explored in web mining. The web recommendation systems are split into two main categories such as collaborative recommendation system and content based recommendation system. However, the quality of recommendations and the user satisfaction with such systems are still not optimal. In adaptive association recommender systems based on web mining techniques have strengths and weaknesses. One of these weaknesses is lack of consideration of an appropriate measure to calculate the user’s interest degree of pages. Applying Fuzzy Association Rule Mining (FARM) algorithm to a recommender system leads to calculate user’s interest of pages more accurately. Consequently generated recommendations will be more desirable when compared to other association rule mining techniques. Copyright © 2014 Praise Worthy Prize S.r.l. - All rights reserved. © 2014 Praise Worthy Prize S.r.l. - All rights reserved

Loading Perunthalaivar Kamarajar Institute of Engineering and Technology collaborators
Loading Perunthalaivar Kamarajar Institute of Engineering and Technology collaborators