Skip to main content

Showing 1–11 of 11 results for author: Duraiswamy, K

Searching in archive cs. Search in all archives.
.
  1. Improved Packet Forwarding Approach in Vehicular Ad Hoc Networks Using RDGR Algorithm

    Authors: K. Prasanth, Dr. K. Duraiswamy, K. Jayasudha, Dr. C. Chandrasekar

    Abstract: VANETs (Vehicular Ad hoc Networks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. Routing of data in VANETs is a challenging task due to rapidly changing topology and high speed mobility of vehicles. Position based routing protocols are becoming popular due to advancement and availability of GPS devices. One o… ▽ More

    Submitted 29 March, 2010; originally announced March 2010.

    Comments: 14 Pages, IJNGN Journal

    Journal ref: International Journal of Next-Generation Networks 2.1 (2010) 64-77

  2. arXiv:1003.4076  [pdf

    cs.DB

    Similarity Data Item Set Approach: An Encoded Temporal Data Base Technique

    Authors: M. S. Danessh, C. Balasubramanian, K. Duraiswamy

    Abstract: Data mining has been widely recognized as a powerful tool to explore added value from large-scale databases. Finding frequent item sets in databases is a crucial in data mining process of extracting association rules. Many algorithms were developed to find the frequent item sets. This paper presents a summary and a comparative study of the available FP-growth algorithm variations produced for mini… ▽ More

    Submitted 22 March, 2010; originally announced March 2010.

    Journal ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/

  3. arXiv:1003.1458  [pdf

    cs.CR cs.CV

    Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris

    Authors: A. Jagadeesan, K. Duraiswamy

    Abstract: Human users have a tough time remembering long cryptographic keys. Hence, researchers, for so long, have been examining ways to utilize biometric features of the user instead of a memorable password or passphrase, in an effort to generate strong and repeatable cryptographic keys. Our objective is to incorporate the volatility of the user's biometric features into the generated key, so as to make t… ▽ More

    Submitted 7 March, 2010; originally announced March 2010.

    Comments: Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS February 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Computer Science ISSN 19475500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 2, pp. 028-037, February 2010, USA

  4. arXiv:1002.2527  [pdf

    cs.CR

    Secured Cryptographic Key Generation From Multimodal Biometrics Feature Level Fusion Of Fingerprint And Iris

    Authors: A. Jagadeesan, K. Duraiswamy

    Abstract: Human users have a tough time remembering long cryptographic keys. Hence, researchers, for so long, have been examining ways to utilize biometric features of the user instead of a memorable password or passphrase, in an effort to generate strong and repeatable cryptographic keys. Our objective is to incorporate the volatility of the users biometric features into the generated key, so as to make… ▽ More

    Submitted 12 February, 2010; originally announced February 2010.

    Comments: Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Journal of Computer Science, ISSN 19475500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 296-305, January 2010, USA

  5. arXiv:1002.1186  [pdf

    cs.NI

    Efficient Packet Forwarding Approach in Vehicular Ad Hoc Networks Using EBGR Algorithm

    Authors: K. Prasanth, K. Duraiswamy, K. Jayasudha, C. Chandrasekar

    Abstract: VANETs (Vehicular Ad hoc Networks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. Routing of data in VANETs is a challenging task due to rapidly changing topology and high speed mobility of vehicles. Conventional routing protocols in MANETs (Mobile Ad hoc Networks) are unable to fully address the unique char… ▽ More

    Submitted 5 February, 2010; originally announced February 2010.

    Comments: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 3, January 2010, http://ijcsi.org/articles/Efficient-Packet-Forwarding-Approach-in-Vehicular-Ad-Hoc-Networks-Using-EBGR-Algorithm.php

    Journal ref: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 3, January 2010, http://ijcsi.org/articles/Efficient-Packet-Forwarding-Approach-in-Vehicular-Ad-Hoc-Networks-Using-EBGR-Algorithm.php

  6. arXiv:1001.4197  [pdf

    cs.DC

    Optimization of Multiple Vehicle Routing Problems using Approximation Algorithms

    Authors: R. Nallusamy, K. Duraiswamy, R. Dhanalaksmi, P. Parthiban

    Abstract: This paper deals with generating of an optimized route for multiple Vehicle routing Problems (mVRP). We used a methodology of clustering the given cities depending upon the number of vehicles and each cluster is allotted to a vehicle. k- Means clustering algorithm has been used for easy clustering of the cities. In this way the mVRP has been converted into VRP which is simple in computation comp… ▽ More

    Submitted 23 January, 2010; originally announced January 2010.

    Comments: 7 Pages

    Report number: IJEST09-01-03-04

    Journal ref: IJEST Volume 1 Issue 3 2009 129-135

  7. arXiv:0912.2843   

    cs.NE cs.CR cs.LG

    Intrusion Detection In Mobile Ad Hoc Networks Using GA Based Feature Selection

    Authors: R. Nallusamy, K. Jayarajan, K. Duraiswamy

    Abstract: Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing network topology and lack of centralized monitoring point. It is important to search new architecture and mechanisms to protect the wireless networks and mobile… ▽ More

    Submitted 30 May, 2010; v1 submitted 15 December, 2009; originally announced December 2009.

    Comments: This paper has been withdrawn by the authors. To improve the quality of the paper

  8. arXiv:0912.0984  [pdf

    cs.NI

    Ant Based Adaptive Multicast Routing Protocol (AAMRP) for Mobile Ad Hoc Networks

    Authors: A. Sabari, K. Duraiswamy

    Abstract: Multicasting is effective when its group members are sparse and the speed is low. On the other hand, broadcasting is effective when the group members dense and the speed are high. Since mobile ad hoc networks are highly dynamic in nature, either of the above two strategies can be adopted at different scenarios. In this paper, we propose an ant agent based adaptive, multicast protocol that exploi… ▽ More

    Submitted 5 December, 2009; originally announced December 2009.

    Comments: 9 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 199-207, November 2009, USA

  9. arXiv:0912.0607  [pdf

    cs.CR cs.CV

    Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform

    Authors: P. Meenakshi Devi, M. Venkatesan, K. Duraiswamy

    Abstract: In this paper, a new reversible image authentication technique with tamper localization based on watermarking in integer wavelet transform is proposed. If the image authenticity is verified, then the distortion due to embedding the watermark can be completely removed from the watermarked image. If the image is tampered, then the tampering positions can also be localized. Two layers of watermarki… ▽ More

    Submitted 3 December, 2009; originally announced December 2009.

    Comments: 8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 067-074, November 2009, USA

  10. arXiv:0911.2865   

    cs.NE cs.AI

    Neural Networks for Dynamic Shortest Path Routing Problems - A Survey

    Authors: R. Nallusamy, K. Duraiswamy

    Abstract: This paper reviews the overview of the dynamic shortest path routing problem and the various neural networks to solve it. Different shortest path optimization problems can be solved by using various neural networks algorithms. The routing in packet switched multi-hop networks can be described as a classical combinatorial optimization problem i.e. a shortest path routing problem in graphs. The su… ▽ More

    Submitted 30 May, 2010; v1 submitted 15 November, 2009; originally announced November 2009.

    Comments: This article has been withdrawn by the authors. Misplaced equation 1

    Journal ref: CiiT International Journal of Artificial Intelligent Systems and Machine Learning, Vol. 1, No. 2, pp. 31-34, May 2009

  11. arXiv:0908.0984  [pdf

    cs.DB cs.LG

    An Application of Bayesian classification to Interval Encoded Temporal mining with prioritized items

    Authors: C. Balasubramanian, K. Duraiswamy

    Abstract: In real life, media information has time attributes either implicitly or explicitly known as temporal data. This paper investigates the usefulness of applying Bayesian classification to an interval encoded temporal database with prioritized items. The proposed method performs temporal mining by encoding the database with weighted items which prioritizes the items according to their importance fr… ▽ More

    Submitted 7 August, 2009; originally announced August 2009.

    Comments: 7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No. 1, July 2009, USA