St Jeromes College

Nāgercoil, India

St Jeromes College

Nāgercoil, India
SEARCH FILTERS
Time filter
Source Type

Milton Joe M.,St Jeromes College | Ramakrishnan B.,St Hindu College | Das R.,Firat University
Journal of Telecommunication, Electronic and Computer Engineering | Year: 2016

Web pages are secured by one-tier security constraints based on username and password. This one-tier security module is the only way to protect the web pages from hackers. However, the one-tier security constraints on web service architecture have several flaws. It can be hacked from outside without notifying the authorised user. Further, hackers can easily obtain the username and password, which is entered on the web pages to login for further actions. When the system is connected to the internet, the system can be hacked to get the username and password that can be done by monitoring user's keystroke from a remote location. Considering the credentials of one-tier security constraints are being hacked, this paper analyses these flaws and modelled two-tier security constraints to secure the web service. In the proposed architecture pattern, recognition mechanism is used to authenticate the user. The pattern recognition architecture displays at dynamic locations for each refresh of the web page, which prevents the proposed two-tier architecture from being hacked as well as guessing attack.


Ramakrishnan B.,St Hindu College | Selvi M.,St Hindu College | Bhagavath Nishanth R.,HCL Technologies | Milton Joe M.,St Jeromes College
Wireless Personal Communications | Year: 2016

Broadcasting is the foremost crisis services of vehicular ad hoc network (VANET), because the amount of vehicles augments on a daily basis. In order to avoid traffic jam and accidents, the emergency messages will be transmitted to all the vehicles in the network. While VANETs are exposed to different sort of assault, there is require to accomplish the protection needs like message confidentiality, reliability, and validation. The validation procedure is assumed to be competent if it distinguishes negotiation nodes precisely by means of less complication, condensed validation postponement, and keying transparency. In this document, a trust-oriented validation format for cluster-oriented VANETs is projected. The presentation of the projected scheme is contrasted by existing procedure. © 2016 Springer Science+Business Media New York


Ramakrishnan B.,S T Hindu College | Bhagavath Nishanth R.,Velammal Engineering College | Milton Joe M.,St Jeromes College | Selvi M.,S T Hindu College
Wireless Networks | Year: 2015

Broadcasting is one of the major emergency services of Vehicular ad hoc network, since the number of vehicles increases every day. Because of the high density of the vehicles, it is necessary to broadcast emergency messages to all the vehicles to avoid traffic jam and vehicle accidents. Reliable broadcasting of messages in self-organizing Ad hoc networks is a promising research field. In this paper a cluster based emergency message broadcasting algorithm is proposed. In this regard we have proposed cluster based architecture for emergency message dissemination and collision avoidance in VANET. In this paper, first the formation of cluster is done in such a way that it avoids any kind of collision. Once cluster head is selected it takes the responsibility of intra cluster management to avoid interference between the clusters. To increase the reliability during emergency message dissemination two MAC layer broadcasts protocol is used. This assures that message is delivered on time without any hazards. The proposed model is simulated for DSDV, AODV, and DSR protocols with the standards 802.11 and 802.11p in SHWM, Manhattan and freeway mobility models. © 2015 Springer Science+Business Media New York


Joe M.M.,St Jeromes College | Ramakrishnan B.,St Hindu College
Wireless Networks | Year: 2015

The most ever growing research field is vehicular ad hoc network. This prominent research field has the widely known communication models such as RoadSide Unit Communication, Vehicle to Vehicle Communication, and Cluster based Communication models. In addition to that M. Milton Joe and B. Ramakrishnan et al. have proposed a new communication model known as WVANET (Web VANET) for vehicular ad hoc network communication. The authors portray that WVANET will be the everlasting research field in future. This WVANET (Web VANET) communication model is fundamentally different from other communication models as it makes use of web signals to disseminate the messages among vehicles. Of course, each communication model in VANET will have its own various pros and cons. This paper provides the overall review of all the existing communication models in VANET and in addition to that WVANET (Web VANET) communication model is also presented. Further this paper discusses the various future research that can be done in WVANET (Web VANET) communication model. © 2015 Springer Science+Business Media New York


Milton Joe M.,St Jeromes College | Ramakrishnan B.,St Hindu College
Wireless Personal Communications | Year: 2015

Vehicular Ad hoc Network (VANET) is considered as most emerging technology for the past decade of years. Research in VANET brings up new communication architecture for reliable communication. This paper proposes a novel communication architecture for vehicular ad hoc network. In the proposed architecture VANET and web technology are integrated together to form Web VANET architecture known as WVANET. WiMAX is fixed at the roadsides to transfer the web signals to vehicles and Extensible Messaging and Presence Protocol is used to transfer and receive messages among the vehicles. The proposed communication architecture is modelled and better communication performance is obtained. The web communication architecture in VANET reduces the overheads existing in the previous communication models. Message transmission is very fast in WVANET, since web technology is integrated. Overall, the proposed communication model is reliable and fast than the other communication models exist in VANET. © 2015, Springer Science+Business Media New York.


Joe M.M.,St Jeromes College | Ramakrishnan B.,St Hindu College
Peer-to-Peer Networking and Applications | Year: 2016

Online Social Network (OSN) is the most widely used platform to communicate with one another. It is fast and cheap when compared to other modes of communication. However, Online Social Network profiles are being hacked often by employing various types of malicious attacks. Most of the times the attackers are successful in accessing the OSN account which illustrates that the present authentication mechanisms are not efficient enough. Once an online social network account is being hacked, it can be misused widely and the hacker makes the authorized user unable to login to the account by changing the login credentials. Security in OSN must be provided and it must prevent the attacks aimed by the attackers. However, to prevent unauthorized access in OSN a novel authentication procedure is needed and the novel authentication mechanism must abide the social network platform’s characteristics. This paper considers the attackers who aim to access the OSN account in an unauthorized manner and presents two novel authentication mechanisms to prevent the OSN platform. The proposed procedures make use of users’ chatting module statistics and relationship circle statistics to authenticate the users in Online Social Networks. This can be done by Multi kernel Fuzzy C-Means (MKFCM) Algorithm and Group Search Optimizer (GSO). These novel authentication procedures abide the OSN characteristics, as it makes use of Chatting and Relationship module. © 2016 Springer Science+Business Media New York


Ramakrishan B.,Sthindu College | Milton Joe M.,St Jeromes College | Bhagavath Nishanth R.,Velammal Engineering College
Journal of Emerging Technologies in Web Intelligence | Year: 2014

Pattern design plays a vital role in establishing network communication in Ad-hoc network scenario. The real challenge to the researchers is designing the communication architecture to vehicular network. Vehicular network architecture design is difficult, since the movement of the vehicle speed is high. The existing vehicular network architecture forms the network communication but the communication is not reliable and the message transmission time is high. However a new architecture design is required to establish fair network communication among vehicles. This paper presents a novel cluster based vehicular network architecture for Manhattan Mobility Model and the proposed model is analyzed with various routing protocols. The result and analysis of the proposed model show clearly that the Cluster based Manhattan Mobility Model produces reliable communication. The proposed Cluster scheme reduces the message transmission time obviously. © 2014 Academy Publisher.


Milton Joe M.,St Jeromes College | Ramakrishan B.,Sthindu College
Journal of Emerging Technologies in Web Intelligence | Year: 2014

Online Social Network (ONS) is the easiest platform to connect with one another. There are many Online Social Networking websites exist to bring up the reliable communication among the users. Facebook, Orkut, Google+, Twitter, MySpace, etc are some of the Online Social Networking websites. All the social networking websites provide the interface formally known as profile, to share their willingness with others. The users of these websites could share their feelings, photos, text file and even whatever the user wishes to provide. All the Online Social Networking websites bring the friends, family members and relatives together to share their desires in a fast track manner, however still it lacks in security module. The shared photos and information are freely open access to all the users of social networking websites. When the photos are freely available, the unauthorized users can easily access the photos of others and download it. Once the photo is downloaded, that image can be misused widely such as creation of fake profile and the photo can be sold to other nuisance websites. This kind of data hacking activities in online social networks even leads the life to death. In this paper, data hacking in online social network is considered and a novel mechanism is presented to prevent the data hacking. © 2014 Academy Publisher.


Milton Joe M.,St Jeromes College | Ramakrishnan B.,St Hindu College | Shaji R.S.,Noorul Islam University
Journal of Emerging Technologies in Web Intelligence | Year: 2013

The blooming development of internet technologies, lead to the growth of Online Social Networks (OSNs) day by day. There are many Online Social Networks (OSNs) came on internet but still very few could get the attraction of the users forever. The most attracted and world level leading Online Social Networks (OSNs) is Facebook, Twitter, and Google Plus and so on. All these Online Social Networks (OSNs) allow its users to create profiles and share any information on their profile, which could be viewed by other users of the same network user. These Social Networks allow users to form friendship with other people and make them to get connected in an easiest way. The major advantages of these Online Social Networks (OSNs) are getting connected with friends (wherever they are in the world), thoughts and ideas can be shared on online and feedback could be obtained as soon as possible. Every user of Social Networking sites will have many more confidential and private data on their account. However the Security and Quality of Service (QoS) are the major constraints must be always maintained in all the social networks. Most of the Online Social Networks (OSNs) provides security to the data available on the user account and provides good Quality of Service (Qos). Obviously the security constraint must be maintained not only the data available on user account but also must be maintained to the user account completely, which ultimately improves the efficiency of Quality of Service (Qos). In this paper, we evaluate and propose a new model to enhance the security for improving quality of service in online social networks. ©2013 Academy Publisher.


Raj A.A.,St Jeromes College | Louis C.N.,Holy Cross College | Rejila V.,Madurai Kamaraj University | Iyakutti K.,Madurai Kamaraj University
Journal of Theoretical and Computational Chemistry | Year: 2012

The electronic band structure, structural phase transition, metallization and superconducting transition of cubic zinc blende type indium phosphide (InP) and indium nitride (InN), under pressure, are studied using FP-LMTO method. These indium compounds become metals and superconductors under high pressure but before that they undergo structural phase transition from ZnS to NaCl structure. The ground state properties and band gap values are compared with the experimental and previous theoretical results. From our analysis, it is found that the metallization pressure increases with increase of lattice constant. The superconducting transition temperatures (T c) of InP and InN are obtained as a function of pressure for both the ZnS and NaCl structures and these compounds are identified as pressure induced superconductors. When pressure is increased T c increases in both the normal (ZnS) and high pressure (NaCl) structures. The dependence of T c on electronphonon mass enhancement factor λ shows that InP and InN are electronphonon mediated superconductors. The non-occurrence of metallization, phase transition and onset of superconductivity simultaneously in InP and InN is confirmed. © 2012 World Scientific Publishing Company.

Loading St Jeromes College collaborators
Loading St Jeromes College collaborators