Skip to main content

Showing 1–26 of 26 results for author: Meghanathan, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.03525  [pdf

    cs.SI

    Exploratory Factory Analysis of the Centrality Metrics for Complex Real-World Networks

    Authors: Natarajan Meghanathan

    Abstract: Exploratory factor analysis (EFA) is useful to identify the number and mapping of the hidden factors that could dominantly represent the features in the dataset. Principal component analysis (PCA) is the first step as part of the two-step procedure to conduct EFA, with the number of dominant principal components being the number of hidden factors and the entries for the features in the correspondi… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: 8 pages, 4 figures

    MSC Class: I.2.6

  2. arXiv:2310.09504  [pdf

    cs.SI

    Node Dissimilarity Index for Complex Network Analysis

    Authors: Natarajan Meghanathan

    Abstract: We propose a principal component analysis (PCA)-based approach to quantify (the node dissimilarity index, NDI) the extent of dissimilarity among nodes in a network with respect to values incurred for a suite of node-level metrics (like centrality metrics). We subject the dataset (n nodes and their values incurred for four commonly studied centrality metrics: degree, eigenvector, betweenness and cl… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

    Comments: 7 pages, 4 figures

    MSC Class: I.2.6

  3. arXiv:2310.06358  [pdf

    cs.SI cs.LG

    Core-Intermediate-Peripheral Index: Factor Analysis of Neighborhood and Shortest Paths-based Centrality Metrics

    Authors: Natarajan Meghanathan

    Abstract: We perform factor analysis on the raw data of the four major neighborhood and shortest paths-based centrality metrics (Degree, Eigenvector, Betweeenness and Closeness) and propose a novel quantitative measure called the Core-Intermediate-Peripheral (CIP) Index to capture the extent with which a node could play the role of a core node (nodes at the center of a network with larger values for any cen… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

    Comments: 10 pages, 5 figures

    MSC Class: I.2.6; J.2

  4. arXiv:2309.16197  [pdf

    cs.SI physics.soc-ph

    Neighborhood-based Bridge Node Centrality Tuple for Preferential Vaccination of Nodes

    Authors: Natarajan Meghanathan

    Abstract: We investigate the use of a recently proposed centrality tuple called the Neighborhood-based Bridge Node Centrality (NBNC) tuple to choose nodes for preferential vaccination so that such vaccinated nodes could provide herd immunity and reduce the spreading rate of infections in a complex real-world network. The NBNC tuple ranks nodes on the basis of the extent they play the role of bridge nodes in… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: 11 pages, 6 figures

    MSC Class: J.3; J.4

  5. arXiv:1511.06620  [pdf

    cs.SI cs.DM cs.DS

    Use of Eigenvector Centrality to Detect Graph Isomorphism

    Authors: Natarajan Meghanathan

    Abstract: Graph Isomorphism is one of the classical problems of graph theory for which no deterministic polynomial-time algorithm is currently known, but has been neither proven to be NP-complete. Several heuristic algorithms have been proposed to determine whether or not two graphs are isomorphic (i.e., structurally the same). In this research, we propose to use the sequence (either the non-decreasing or n… ▽ More

    Submitted 20 November, 2015; originally announced November 2015.

    Comments: 9 pages, 4 figures; Proceedings of the Fourth International Conference on Advanced Information Technologies and Applications (ICAITA), pp. 1-9, Dubai, UAE, November 6-7, 2015

  6. arXiv:1511.06613  [pdf

    cs.SI physics.soc-ph

    Probabilistic Diffusion in Random Network Graphs

    Authors: Natarajan Meghanathan

    Abstract: In this paper, we consider a random network such that there could be a link between any two nodes in the network with a certain probability (plink). Diffusion is the phenomenon of spreading information throughout the network, starting from one or more initial set of nodes (called the early adopters). Information spreads along the links with a certain probability (pdiff). Diffusion happens in round… ▽ More

    Submitted 20 November, 2015; originally announced November 2015.

    Comments: 7 papers; 5 figures

    Journal ref: International Journal in Foundations of Computer Science and Technology (IJFCST), vol. 5, no. 5, pp. 1-7, September 2015

  7. arXiv:1508.01668  [pdf

    cs.SI physics.soc-ph

    Distribution of maximal clique size of the vertices for theoretical small-world networks and real-world networks

    Authors: Natarajan Meghanathan

    Abstract: Our primary objective in this paper is to study the distribution of the maximal clique size of the vertices in complex networks. We define the maximal clique size for a vertex as the maximum size of the clique that the vertex is part of and such a clique need not be the maximum size clique for the entire network. We determine the maximal clique size of the vertices using a modified version of a br… ▽ More

    Submitted 7 August, 2015; originally announced August 2015.

    Comments: 20 pages, 13 figures, 3 tables

    Journal ref: International Journal of Computer Networks and Communications, vol. 7, no. 4, pp. 21-41, July 2015

  8. arXiv:1504.02504  [pdf

    cs.SI physics.soc-ph

    Using Spectral Radius Ratio for Node Degree to Analyze the Evolution of Scale Free Networks and Small World Networks

    Authors: Natarajan Meghanathan

    Abstract: In this paper, we show the evaluation of the spectral radius for node degree as the basis to analyze the variation in the node degrees during the evolution of scale-free networks and small-world networks. Spectral radius is the principal eigenvalue of the adjacency matrix of a network graph and spectral radius ratio for node degree is the ratio of the spectral radius and the average node degree. W… ▽ More

    Submitted 9 April, 2015; originally announced April 2015.

    Comments: 8 pages, 8 figures, Second International Conference on Computer Science and Information Technology, (COSIT-2015), Geneva, Switzerland, March 21-22, 2015

  9. arXiv:1412.8104  [pdf

    cs.NI

    Performance Comparison of Minimum Hop vs. Minimum Edge Based Multicast Routing under Different Mobility Models for Mobile Ad hoc Networks

    Authors: Natarajan Meghanathan

    Abstract: The high-level contribution of this paper is to establish benchmarks for the minimum hop count per source-receiver path and the minimum number of edges per tree for multicast routing in mobile ad hoc networks (MANETs) under different mobility models. In this pursuit, we explore the tradeoffs between these two routing strategies with respect to hop count, number of edges and lifetime per multicast… ▽ More

    Submitted 7 December, 2014; originally announced December 2014.

    Comments: 14 pages, 17 figures

    Journal ref: International Journal of Wireless and Mobile Networks, 3(3):1-14, June 2011

  10. arXiv:1412.8103  [pdf

    cs.NI

    A Simulation Based Performance Comparison Study of Stability-Based Routing, Power-Aware Routing and Load-Balancing On-Demand Routing Protocols for Mobile Ad hoc Networks

    Authors: Natarajan Meghanathan, Leslie C. Milton

    Abstract: The high-level contribution of this paper is a simulation-based detailed performance comparison of three different classes of on-demand routing protocols for mobile ad hoc networks: stability-based routing, power-aware routing and load-balanced routing. We choose the Flow-Oriented Routing protocol (FORP), Min-Max Battery Cost Routing (MMBCR) and the traffic interference based Load Balancing Routin… ▽ More

    Submitted 5 December, 2014; originally announced December 2014.

    Comments: 8 pages, 12 figures. arXiv admin note: substantial text overlap with arXiv:1007.0409

  11. arXiv:1412.6155   

    cs.SI physics.soc-ph

    Use of Eigenvalue and Eigenvectors to Analyze Bipartivity of Network Graphs

    Authors: Natarajan Meghanathan

    Abstract: This paper presents the applications of Eigenvalues and Eigenvectors (as part of spectral decomposition) to analyze the bipartivity index of graphs as well as to predict the set of vertices that will constitute the two partitions of graphs that are truly bipartite and those that are close to being bipartite. Though the largest eigenvalue and the corresponding eigenvector (called the principal eige… ▽ More

    Submitted 19 January, 2016; v1 submitted 16 December, 2014; originally announced December 2014.

    Comments: A paper with a similar idea has been published earlier. I was not aware of this before. Now that, I have come to know about this, I am withdrawing my paper from arXiv

  12. arXiv:1412.6017  [pdf

    cs.CR cs.NI

    A Tutorial on Network Security: Attacks and Controls

    Authors: Natarajan Meghanathan

    Abstract: With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of… ▽ More

    Submitted 7 December, 2014; originally announced December 2014.

    Comments: 21 pages, 19 figures

  13. arXiv:1412.2338  [pdf

    cs.NI

    An Algorithm to Determine Energy-aware Maximal Leaf Nodes Data Gathering Tree for Wireless Sensor Networks

    Authors: Natarajan Meghanathan

    Abstract: We propose an Energy-aware Maximal Leaf Nodes Data Gathering (EMLN-DG) algorithm for periodic data collection and transmission in wireless sensor networks. For each round of data gathering, an EMLN-DG tree spanning the entire sensor network is formed based on the residual energy level available at the nodes and the number of uncovered neighbors of a node during tree formation. Only nodes that have… ▽ More

    Submitted 7 December, 2014; originally announced December 2014.

    Comments: 14 pages, 5 figures, Journal of Theoretical and Applied Information Technology, Vol. 15, No. 1, May 2010

  14. arXiv:1412.2168  [pdf

    cs.NI

    An Energy Efficient Risk Notification Message Dissemination Protocol for Vehicular Ad hoc Networks

    Authors: Natarajan Meghanathan, Gordon Skelton

    Abstract: We propose the design and development of an energy-efficient Risk Notification Message Dissemination Protocol (RNMDP) for vehicular ad hoc networks (VANETs). RNMDP propagates Risk Notification Messages (RNMs) from their location of origin (called the Risk Zone) to vehicles approaching the Risk Zone. RNMDP assumes each node is aware of its current location in the network. The protocol works as foll… ▽ More

    Submitted 5 December, 2014; originally announced December 2014.

    Comments: 15 pages, 15 figures

    Journal ref: IAENG International Journal of Computer Science, vol. 37, no. 1, pp. 1 - 10, March 2010

  15. arXiv:1412.2158  [pdf

    cs.NI

    A Two-layer Architecture of Mobile Sinks and Static Sensors

    Authors: Natarajan Meghanathan, Gordon Skelton

    Abstract: We propose a two-layer mobile sink and static sensor network (MSSSN) architecture for large scale wireless sensor networks. The top layer is a mobile ad hoc network of resource-rich sink nodes while the bottom layer is a network of static resource-constrained sensor nodes. The MSSSN architecture can be implemented at a lower cost with the currently available IEEE 802.11 devices that only use a sin… ▽ More

    Submitted 5 December, 2014; originally announced December 2014.

    Comments: 11 pages, 1 figure

    Journal ref: Proceedings of the 15th International Conference on Advanced Computing and Communication, pp. 249-254, Guwahathi, India, December 2007

  16. Node Failure Time and Coverage Loss Time Analysis for Maximum Stability Vs Minimum Distance Spanning Tree based Data Gathering in Mobile Sensor Networks

    Authors: Natarajan Meghanathan, Philip Mumford

    Abstract: A mobile sensor network is a wireless network of sensor nodes that move arbitrarily. In this paper, we explore the use of a maximum stability spanning tree-based data gathering (Max.Stability-DG) algorithm and a minimum-distance spanning tree-based data gathering (MST-DG) algorithm for mobile sensor networks. We analyze the impact of these two algorithms on the node failure times and the resulting… ▽ More

    Submitted 1 December, 2014; originally announced December 2014.

    Comments: 16 pages, 11 figures

    Journal ref: IJCNC, 5(4): 15-30, 2013

  17. arXiv:1411.6188  [pdf

    cs.NI cs.CR

    A Pair-wise Key Distribution Mechanism and Distributed Trust Evaluation Model for Secure Data Aggregation in Mobile Sensor Networks

    Authors: Natarajan Meghanathan

    Abstract: We propose a secure data aggregation (SDA) framework for mobile sensor networks whose topology changes dynamically with time. The SDA framework (designed to be resilient to both insider and outsider attacks) comprises of a pair-wise key establishment mechanism run along the edges of a data gathering tree and a distributed trust evaluation model that is tightly integrated with the data aggregation… ▽ More

    Submitted 22 November, 2014; originally announced November 2014.

    Comments: 20 pages

  18. Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study

    Authors: Natarajan Meghanathan

    Abstract: This paper presents the source code analysis of a file reader server socket program (connection-oriented sockets) developed in Java, to illustrate the identification, impact analysis and solutions to remove five important software security vulnerabilities, which if left unattended could severely impact the server running the software and also the network hosting the server. The five vulnerabilitie… ▽ More

    Submitted 6 February, 2013; originally announced February 2013.

    Comments: 16 pages, 16 figures

    ACM Class: C.2.0

    Journal ref: International Journal of Network Security and its Applications (IJNSA), vol. 5, no. 1, pp. 1-16, 2013

  19. Integration of an RFID Reader to a Wireless Sensor Network and using it to Identify an Individual Carrying RFID Tags

    Authors: Bolivar Torres, Qing Pang, Gordon Skelton, Scott Bridges, Natarajan Meghanathan

    Abstract: The objective of this research is to integrate an RFID (Radio Frequency Identification) reader into a Wireless Sensor Network (WSN) to authorize or keep track of people carrying RFID tags. The objective was accomplished by integrating hardware and software. The hardware consisted of two WSN nodes - the RFID node connected to one of the WSN nodes, and a computer connected to the other WSN node. For… ▽ More

    Submitted 30 April, 2011; originally announced May 2011.

    Journal ref: International Journal of Ad hoc, Sensor and Ubiquitous Computing, vol. 1, no. 4, pp. 1-15, December 2010

  20. Virtual Machines and Networks - Installation, Performance Study, Advantages and Virtualization Options

    Authors: Ishtiaq Ali, Natarajan Meghanathan

    Abstract: The interest in virtualization has been growing rapidly in the IT industry because of inherent benefits like better resource utilization and ease of system manageability. The experimentation and use of virtualization as well as the simultaneous deployment of virtual software are increasingly getting popular and in use by educational institutions for research and teaching. This paper stresses on th… ▽ More

    Submitted 30 April, 2011; originally announced May 2011.

    Journal ref: International Journal of Network Security and its Applications, vol. 3, no. 1, pp. 1-15, January 2011

  21. Impact of the Optimum Routing and Least Overhead Routing Approaches on Minimum Hop Routes and Connected Dominating Sets in Mobile Ad Hoc Networks I

    Authors: Natarajan Meghanathan

    Abstract: Communication protocols for mobile ad hoc networks (MANETs) follow either an Optimum Routing Approach (ORA) or the Least Overhead Routing Approach (LORA): With ORA, protocols tend to determine and use the optimal communication structure at every time instant; whereas with LORA, a protocol tends to use a chosen communication structure as long as it exists. In this paper, we study the impact of the… ▽ More

    Submitted 30 April, 2011; originally announced May 2011.

    Comments: 17 pages, 19 figures, 6 tables

    Journal ref: International Journal of Wireless and Mobile Networks, vol. 3, no. 2, pp. 196-212, April 2011

  22. Performance Comparison of Link, Node and Zone Disjoint Multi-path Routing Strategies and Minimum Hop Single Path Routing for Mobile Ad Hoc Networks

    Authors: Natarajan Meghanathan

    Abstract: The high-level contribution of this paper is a simulation-based analysis to evaluate the tradeoffs between lifetime and hop count of link-disjoint, node-disjoint and zone-disjoint multi-path routes vis-à-vis single-path minimum hop routes for mobile ad hoc networks. The link-disjoint, node-disjoint and zone-disjoint algorithms proposed in this paper can be used to arrive at benchmarks for the time… ▽ More

    Submitted 23 November, 2010; originally announced November 2010.

    Comments: 17 pages

  23. arXiv:1007.0409  [pdf

    cs.NI

    A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks

    Authors: Natarajan Meghanathan, Leslie Milton

    Abstract: The high-level contribution of this paper is a simulation-based detailed performance comparison of three different classes of routing protocols for mobile ad hoc networks: stability-based routing, power-aware routing and load-balanced routing. We choose the Flow-Oriented Routing protocol (FORP), the traffic interference based Load Balancing Routing (LBR) protocol and Min-Max Battery Cost Routing (… ▽ More

    Submitted 1 July, 2010; originally announced July 2010.

    Comments: http://ijict.org/index.php/ijoat/article/view/performance-comparison-manet-routing-protocols

    Journal ref: International Journal of Advancements in Technology, Vol 1, No 1 (2010)

  24. A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks

    Authors: Busola S. Olagbegi, Natarajan Meghanathan

    Abstract: This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks. The objective of a multicast routing protocol for MANETs is to support the propagation of d… ▽ More

    Submitted 17 June, 2010; originally announced June 2010.

    Comments: 15 pages

    Journal ref: International journal on applications of graph theory in wireless ad hoc networks and sensor networks 2.2 (2010) 1-15

  25. An Algorithm to Self-Extract Secondary Keywords and Their Combinations Based on Abstracts Collected using Primary Keywords from Online Digital Libraries

    Authors: Natarajan Meghanathan, Nataliya Kostyuk, Raphael Isokpehi, Hari Cohly

    Abstract: The high-level contribution of this paper is the development and implementation of an algorithm to selfextract secondary keywords and their combinations (combo words) based on abstracts collected using standard primary keywords for research areas from reputed online digital libraries like IEEE Explore, PubMed Central and etc. Given a collection of N abstracts, we arbitrarily select M abstracts (M<… ▽ More

    Submitted 7 June, 2010; originally announced June 2010.

    Comments: 9 Pages

    Journal ref: International Journal of Computer Science and Information Technology 2.3 (2010) 93-101

  26. arXiv:1004.0570  [pdf

    cs.NI

    Tools and techniques for Network Forensics

    Authors: Natarajan Meghanathan, Sumanth Reddy Allam, Loretta A. Moore

    Abstract: Network forensics deals with the capture, recording and analysis of network events in order to discover evidential information about the source of security attacks in a court of law. This paper discusses the different tools and techniques available to conduct network forensics. Some of the tools discussed include: eMailTrackerPro to identify the physical location of an email sender; Web Historian… ▽ More

    Submitted 5 April, 2010; originally announced April 2010.

    Comments: 12Pages

    Journal ref: International Journal of Network Security & Its Applications 1.1 (2009) 14-25