Time filter

Source Type

Moorthy M.,Muthayammal Engineering College | Sathiyabama S.,Thiruvalluvar Government Arts College
IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012 | Year: 2012

Every enterprise wants to protect their data from both the internal and external attackers. In this initiative firewall, encryption, and authentication serve as the first line of defense. And Intrusion Detection serves as the second line of defense. IDS may use either anomaly based approach or misuse based approach. Traditional IDS were making use of misuse based approach. The drawback of misuse based approach is that it cannot detect new type of attacks. Hence anomaly based intrusion detection were used and it is capable of detecting unknown attacks also. Anomaly based intrusion detection makes extensive use of data mining because of the advantage it provides. In this paper we try to explore the features of intrusion detection based on data mining. © 2012 Pillay Engineering College.

Sumathi N.,KS Rangasamy College of Technology | Sathiyabama S.,Thiruvalluvar Government Arts College
European Journal of Scientific Research | Year: 2012

When analysing many applications that track object movements, it can be seen that, many movements obey periodic patterns. For example, people tend to wake up at the same time and follow more or less the same path to their work each day. Discovering the hidden periodic patterns from a spatio-temporal database, if there are any, could unveil important information to a data analyst as well as facilitate data management substantially. The problem of discovering periodic patterns from historical object movements is very challenging. Existing methods for finding periodic patterns are quite time and memory consuming. In this paper, we define the problem of mining periodic patterns from spatiotemporal database and propose an algorithm called, periodic-pattern tree miner that is used for finding all the periodic patterns. We also study a variant of the periodic pattern, called the eventually periodic pattern and propose a method for finding the eventually periodic pattern. We present the experimental evaluation with the bus and truck dataset to show the effectiveness of our proposed method. Finally, the comparative analysis is made with the previous method to prove the efficiency in time and memory usage. © EuroJournals Publishing, Inc. 2012.

Dhanaraj S.,Sree Saraswathi Thyagaraja College | Karthikeyani V.,Thiruvalluvar Government Arts College
Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, PRIME 2013 | Year: 2013

Spam filters are the most used software tool used by businesses and individual to block spam mails entering into their mail boxes. Until recently, majority of research effort was expended on controlling text-based spam emails. However, the past few years have envisaged a novel approach, where the spammers embed the text message into an image. Thus, the anti-spam filtering research is forced to move from text-based techniques to image-based techniques. Spam and the spam blockers designed to combat it have spawned an upsurge in creativity and innovation. Many software developers are developing new and every more effective spam filtering software. All the methods have a common dream that is to eliminate 100% of the spam, which is still not a reality. To reduce the gap between this reality and dream, researchers have proposed many different types of spam filters and this paper provides a review of them. © 2013 IEEE.

Vanitha M.,Verizon Data Services India Pvt. Ltd. | Kavitha C.,Thiruvalluvar Government Arts College
2016 International Conference on Computer Communication and Informatics, ICCCI 2016 | Year: 2016

Enterprise Applications are big business applications. They are complex, distributed, scalable, component-based, and large and mission critical. Enterprise applications in cloud are designed to satisfy hundreds of such Enterprise customer needs, but support the same business needs. Application should be capable of supporting multi-user, multi-developer, multi-machine, multi-component that can manipulate massive data and uses parallel-processing methods for processing it. Most enterprise application has sensitive data that requires compliance to security regulations. The data also needs to me masked, in other words encrypted before moving to cloud [1]. Most of the providers today protect data in two ways. One way is to upload the cloud data and then encrypt and other way is to encrypt and then upload data. In first method the keys are maintained by the cloud provider, e.g. Dropbox, Google Drive, Microsoft Sky Drive. The proposed method in this paper is based on the second method. The Encryption mechanism and keys are maintained by the customer. The approaches in previous works will be suitable for point-of-view online back-up a write once and read many times kind of scenario. In case of Enterprise Applications where lot of transactional data is involved, data transfer rate between application and database in cloud should be really faster to have anytime anywhere seamless experience. The proposed method adds algorithms and logics to the existing HCPOD model for fine grained, high performance cloud data access and storage. © 2016 IEEE.

Parthasarathi M.,Anna University | Vajravel K.,Thiruvalluvar Government Arts College
International Journal of Control Theory and Applications | Year: 2016

Data aggregation collects sensed data from multiple sensors on sensed element in an energy efficient manner so that the network lifetime is increased. In this paper, a novel data aggregation scheme based on Bayesian Cluster in WSNs (abbreviated as BC-DA) to improve data aggregation efficiency and reduce aggregation delay is presented. The scheme adopts a Bayesian Network by forming clusters based on the similar packets to reduce energy consumption. The Bayesian Network is then combined with aggregation tree (Markov Blanket) to form cluster around the nominated cluster heads to check and minimize the aggregation delay. Finally, data aggregation is performed using transmission slot based on reduced TDMA so that greater number of packets can be aggregated in a given interval of time and therefore improving the data aggregation efficiency. Simulation results and performance analysis show that our BC-DA scheme significantly improves the data aggregation efficiency and reduces aggregation delay to prolong network lifetime with other existing WSN data aggregation schemes. © International Science Press.

Karthikeyan K.,Bharathiyar University | Karthikeyani V.,Thiruvalluvar Government Arts College
Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, PRIME 2013 | Year: 2013

Anaphora is one of the mostly attractive phenomenons in computational linguistics for resolving anaphora with preceding and succeeding referent. The ability to perform Anaphora Resolution is important in NLP application. Traditional research focus on resolving particular type of anaphora only, no one integrates methods or procedure to resolve all type of anaphora. In this paper, we identify all type of anaphora with layered or step by step approach so that everyone utilize anaphora paradigm in their application. We proposed a new enhanced framework in which all required rules of resolution are perform, the new system extract most accuracy antecedents of anaphora. © 2013 IEEE.

Selvapandiyan M.,Bharathiar University | Arumugam J.,Sri Vidya Mandir Arts and Science College | Sundaramoorthi P.,Thiruvalluvar Government Arts College | Sudhakar S.,National Physical Laboratory India
Journal of Alloys and Compounds | Year: 2013

Single crystals of zinc tris thiourea sulphate (ZTS) and sodium chloride (NaCl) doped zinc tris thiourea sulphate, a semiorganic nonlinear optical material were successfully grown from aqueous solution by the slow evaporation technique at room temperature. The structural, optical and thermal properties of grown crystals were studied. Structural analysis was carried out by X-ray diffractometer and observed that the grown crystals belong to orthorhombic system. Fourier transform infrared spectrum was obtained to confirm the functional groups. Thermal behaviour of the grown crystals was investigated by TGA and DSC. Second harmonic generation (SHG) efficiency measurements of Pure and NaCl doped ZTS single crystals were carried out by Kurtz powder technique. The UV-visible spectrum showed that the material possessed wide transparency in the entire visible region. The Vicker's microhardness number was found to increase with the increased sodium chloride substitution. © 2012 Elsevier B.V. All rights reserved.

Selvapandiyan M.,Sri Vidya Mandir Arts and Science College | Arumugam J.,Sri Vidya Mandir Arts and Science College | Sundaramoorthi P.,Thiruvalluvar Government Arts College | Sudhakar S.,National Physical Laboratory India
Journal of Alloys and Compounds | Year: 2013

The influence of MgSO4 doping on the properties of zinc tris-thiourea sulphate single crystals grown at room temperature by slow evaporation solution growth technique was studied. Powder XRD analysis confirmed the orthorhombic crystal structure with noncentrosymmetric space group Pca21. The mechanical properties of the grown crystals were analysed by Vicker's microhardness method. Functional groups present in the materials were identified by FTIR spectral analysis in the range between 4000 and 400 cm1. The UV-Vis spectrum indicates that the UV cut-off wavelength of the crystals has less than 297 nm. The thermal stability of the grown crystals was determined with the aid of thermo-gravimetric analysis (TGA) and differential scanning calorimetry (DSC). Second order nonlinear optical behaviour of the grown crystals have been confirmed by Kurtz powder second harmonic generation (SHG) test. © 2013 Elsevier B.V. All rights reserved.

Selvapandiyan M.,Bharathiar University | Sudhakar S.,Chonbuk National University | Sundaramoorthi P.,Thiruvalluvar Government Arts College
Journal of Alloys and Compounds | Year: 2012

Pure and KI doped single crystals of ZTS were grown by slow evaporation technique. The grown crystals were subjected to X-ray diffraction, UV-visible spectrum, FTIR analysis, micro hardness studies, TGA/DSC and SHG. X-ray diffraction analysis revealed that the structure of grown crystal belongs to orthorhombic system. The mechanical property of the grown crystals has been analyzed by Vickers microhardness method. Optical transparency of the grown crystals was studied by UV-visible spectroscopic method. The functional groups and modes of vibrational frequencies have been identified by using FTIR spectral data. The thermal stability of the grown crystal was investigated using thermo gravimetric analysis and differential scanning calorimetry (TGA/DSC) studies. Second harmonic generation was confirmed by using Nd: YAG laser. The analysis results confirmed that these crystals have better nonlinearity and good mechanical strength than KDP. © 2012 Elsevier B.V.

Shaik Parveen S.,Bharathiar University | Kavitha C.,Thiruvalluvar Government Arts College
ICIIECS 2015 - 2015 IEEE International Conference on Innovations in Information, Embedded and Communication Systems | Year: 2015

Computed Tomography (CT) lung nodules segmentation is a challenging task for detecting the nodules from images. Medical experts segment the medical images manually, that is almost not clear which leads to false detection. Conventional Fuzzy c-means is unsupervised method that has been implemented for clustering of the CT images still suffers with as low convergence rate, getting stuck in the local minima and vulnerable to initialization sensitivity. Firefly algorithm is a new population-based optimization method is used for solving many complex problems. The proposed system presents a dynamic and intelligent clustering approach called Firefly Search with Fuzzy C-Means (FSFCM) to segment the lung nodules automatically. This approach uses the capability of firefly search to find optimal initial cluster centers for the FCM and thus improve the segmentation results. The performance of proposed system is compared with other state-of-art algorithms. Experiment is carried out using real time images to investigate the proposed method. © 2015 IEEE.

Loading Thiruvalluvar Government Arts College collaborators
Loading Thiruvalluvar Government Arts College collaborators