oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 105 )

2019 ( 650 )

2018 ( 751 )

2017 ( 773 )

Custom range...

Search Results: 1 - 10 of 423239 matches for " K.S.RAVICHANDRAN "
All listed articles are free for downloading (OA Articles)
Page 1 /423239
Display every page Item
RELIABILITY ANALYSIS OF RING, AGENT AND CLUSTER BASED DISTRIBUTED SYSTEMS
R.SEETHALAKSHMI,K.S.RAVICHANDRAN
Journal of Theoretical and Applied Information Technology , 2011,
Abstract: The introduction of pervasive devices and mobile devices has led to immense growth of real time distributed processing. In such context reliability of the computing environment is very important. Reliability is the probability that the devices, links, processes, programs and files work efficiently for the specified period of time and in the specified condition. Distributed systems are available as conventional ring networks, clusters and agent based systems. Reliability of such systems is focused. These networks are heterogeneous and scalable in nature. There are several factors, which are to be considered for reliability estimation. These include the application related factors like algorithms, data-set sizes, memory usage pattern, input-output, communication patterns, task granularity and load-balancing. It also includes the hardware related factors like processor architecture, memory hierarchy, input-output configuration and network. The software related factors concerning reliability are operating systems, compiler, communication protocols, libraries and preprocessor performance. In estimating the reliability of a system, the performance estimation is an important aspect. Reliability analysis is approached using probability.
ESTIMATION OF RETURN ON INVESTMENT IN SHARE MARKET THROUGH ANN
K.S.Ravichandran,P.Thirunavukarasu,R. Nallaswamy,R.Babu
Journal of Theoretical and Applied Information Technology , 2007,
Abstract: The stock market is one of the most popular investing places because of its expected high profit. Traditionally, technical analysis approach, that predicts stock prices based on historical prices and volume, basic concepts of trends, price patterns and oscillators, is commonly used by stock investors to aid investment decisions. Advanced intelligent techniques, ranging from pure mathematical models and expert systems to fuzzy logic networks, have also been used by many financial trading systems for investing and predicting stock prices. In recent years, most of the researchers have been concentrating their research work on the future prediction of share market prices by using Neural Networks. But, in this paper we newly propose a methodology inwhich the neural network is applied to the investor’s financial decision making to invest all type of shares irrespective of the high / low index value of the scripts, in a continuous time frame work and further it is further extended to obtain the expected return on investment through the Neural Networks and finally it is compared with the actual value. The proposed network has been tested with stock data obtained from the Indian Share Market BSE Index. Finally, the design, implementation and performance of the proposed neural network are described.
A Review on Semantic-Based Web Mining and its Applications
Sivakumar J,Ravichandran K.S
International Journal of Engineering and Technology , 2013,
Abstract: In this paper we survey the Semantic-based Web mining is a combination of two fast developing domains Semantic Web and Web mining. These two fields address the current challenges of the WorldWide Web (WWW). The idea is to improve the results of Web Mining by making use of the new semantic structure of the Web and to make use of Web Mining for creating the Semantic Web. The Semantic Web can make mining of the Web much easier because of the availability of background knowledge and Web Mining can also construct new semantic structures in the Web. This survey analyses the approach of both areas. This paper first introduces the knowledge of Semantic Web and Web mining techniques, and then discusses the semantic-based Web mining and its applications and finally discuss the survey on sematicbased web mining tools.
ANFIS Approach for Optimal Selection of Reusable Components
K.S. Ravichandran,P. Suresh,K.R. Sekr
Research Journal of Applied Sciences, Engineering and Technology , 2012,
Abstract: In a growing world, the development of modern software system requires large-scale manpower, high development cost, larger completion time and high risk of maintaining the software quality. Component- Based Software Development (CBSD) approach is based on the concept of developing modern software systems by selecting the appropriate reusable components or COTS (Commercial Off-The-Shelf) components and then assembling them with well-defined software architecture. The proper selection of COTS components will really reduce the manpower, development cost, product completion time, risk, maintenance cost and also it addresses the high quality software product. In this paper, we develop an automated process of component selection by using Adaptive Neuro-Fuzzy Inference Systems (ANFIS) based technique by using 14 reusable components’ parameters as a first time in this field. Again, for increasing the accuracy of a model, Fuzzy- Weighted-Relational-Coefficient (FWRC) matrix is derived between the components and CBS development with the help of 14 component parameters, namely, Reliability, Stability, Portability, Consistency, Completeness, Interface & Structural Complexity, Understandability of Software Documents, Security, Usability, Accuracy, Compatibility, Performance, Serviceability and Customizable. In the recent literature studies reveals that almost all the researchers have been designed a general fuzzy-design rule for a component selection problem of all kinds of software architecture; but it leads to a poor selection of components and this paper suggests adoption of a specific fuzzy-design rule for every software architecture application for the selection of reusable components. Finally, it is concluded that the selection of reusable components through ANFIS performs better than the other models discussed so far.
Web Prior Architecture to Avoid Threats and Enhance Intrusion Response System
K.S. Ravichandran,R. Baby Akila,T. Durga Laxmi
Research Journal of Applied Sciences, Engineering and Technology , 2012,
Abstract: Web is hierarchically composed of entities such as domains, Web sites and documents distributed over Web sites and linked together by hyperlinks. The response component of the intrusion detection system issues the response to the jarring requests. In this paper, the intension is to allow the legitimate user to access the target website and perform the selective operations on the database to avoid threats and protect the database from unauthorized users. The designed Web Prior Architecture (WPA) permits the legal client to obtain the privilege license by clicking on an authority link provided by the referrer. Using this license, the client can get the liberty to perform the operations on the target website. In that website, database can be accessed by the client with the selective permissions. These can be performed by the two methods, namely strategy toning and strategy management. By this way, the database is accessed in a highly securable manner. The massive scale of this study specifies the method to avoid the threats from the unauthorized users and augment the intrusion response system. This will protect the target website and its database from the unconstitutional users. Our pragmatic study demonstrates that Web Prior Architecture enables the legitimate user to connect to the target website and perform selective database operations.
Adaptive Neuro Fuzzy Inference System Based DTC Control for Matrix Converter
Venugopal Chitra,K.S. Ravichandran,R. Varadarajan
Research Journal of Applied Sciences, Engineering and Technology , 2012,
Abstract: In this study an Adaptive Neuro Fuzzy Inference System is introduced to select the switching states of Matrix Converters. Matrix converters have received more attention in research and industrial application due its advantages like four quadrant operation, sinusoidal input and output waveforms, controllable displacement factor, less number of switches etc., Matrix Converters are efficient in speed control of Induction motors than the conventional converters. There are two different control techniques namely field oriented control and Direct Torque Control systems available for closed loop operation of induction motors. The Direct Torque Control technique provides control of torque and flux directly. The major drawback of Direct Torque Control technique is the presence of ripples in torque and flux curves. This due to the presence of two level and three level hysteresis controllers in torque and flux control stages respectively. Also the conventional space vector and look up table method of switching state selection reduces the accuracy of switch state selection in the appropriate time width. This reduces the speed control performance of the motor. Also in this paper the hysteresis controllers are replaced by fuzzy controllers. the complete ANFIS based DTC for Matrix Converter is simulated in MATLAB/SIMULINK and the results shows that the use of Adaptive neuro fuzzy inference in Matrix Converter system increases the speed control performance of Induction Motor.
A Novel Approach for Optimal Capacitor Placement Model in Power Distribution Systems
K.S. Ravichandran,Salem Saleh Saeed Alsheyuhi,Venugopal Chitra
Research Journal of Applied Sciences, Engineering and Technology , 2012,
Abstract: This study deals with the design of distributed power systems and optimal capacitor placement based on the ANFIS (Adaptive Network Fuzzy Inference Systems) using Mamdani-type fuzzy inference model. Traditionally, this problem of optimal capacitor placement has been solved through various optimization techniques, but it is less accuracy of finding placement and more time consuming. This can be avoided by defining the system stochastically. In this study, we introduce ANFIS architecture for the first time in this field to obtain an optimal capacitor placement in power distributed systems. The results are compared with a standard 34-bus test system with other models, with respect to the placements, savings and the computational time.
Study of User Behavior Pattern in Mobile Environment
T. Durga Laxmi,R. Baby Akila,K.S. Ravichandran,B. Santhi
Research Journal of Applied Sciences, Engineering and Technology , 2012,
Abstract: Mobile communication is rapidly emergent articulation of the communication surroundings. Users move to the various location and access various services to accomplish their requirements in mobile environment. These location navigation and service invocation are characterized as a Mobile User Behavior Pattern (MUBP).User behavior pattern analyses mobile user’s destination point and their service utilization. Region pattern inquires the details of users target location. Access pattern specifies the services utilized by mobile users. User behavior pattern provides better quality and good services to the mobile users in time. User behavior patterns are not only helpful for user, but also for service providers. Analysis of user behavior pattern gives benefit to the users by invoking the services without traffic congestion problem and to the service providers by contributing the immediate response to mobile users. This study analyzes the behavior of user pattern in detail related to existing work of 24 authors from the past few years.
A Novel Cryptographic Key Generation Method Using Image Features
B. Santhi,K.S. Ravichandran,A.P. Arun,L. Chakkarapani
Research Journal of Information Technology , 2012,
Abstract: Several methods in steganography and cryptography have been proposed for secured communication. But many compromises are there in them. Steganography which deals with security using multimedia has a very big disadvantage of increase in the information size. Cryptography which deals with encryption using the keys generated by various algorithms has the disadvantage of difficulty in remembering the key which can be easily cracked. The main objective of this study is to increase the security in communication by encrypting the information with the key generated by using an image. This study proposes a novel algorithm for key generation using image features. It is a reliable and flexible method of key generation for information security. In this method the user need not remember the keys during encryption and decryption. This study uses the Gray Level Co-occurrence matrix of an image to extract the Gray Level Co-occurrence properties of the image. A 56-bit sub-key is generated from the extracted Gray Level Co-occurrence properties. Then the key for encryption and decryption is generated using the sub-key generated from the image. This proposed method is easy to implement. The key strength is much better than others.
A Study of the Language Learner Strategies Adopted by Nigerian Students
K.S. Ariyo
Pakistan Journal of Social Sciences , 2012, DOI: 10.3923/pjssci.2010.433.436
Abstract: Nigerian students learn and eventually use English as a Second Language (ESL) having acquired at least one of the numerous Nigerian languages as mother tongue (L1). Consequently, learning English in such an ESL environment must take into cognizance some useful strategies that are capable of assisting the English language learner in the Nigerian setting. However, teachers as well as students usually fail to benefit from the numerous opportunities offered by language learner strategies in the course of either language teaching or learning. The written and spoken expressions of Nigerian students in English are generally poor. They obviously need to function adequately well in English since it is the medium of instruction in Nigerian schools. It is on this note that this study aims to attempt a detailed study of the language learner strategies usually adopted in Nigerian schools. It is the position of this study that Nigerian students must be well exposed to all the language learning strategies. They must also be aware that no singular strategy can adequately meet their functional needs.
Page 1 /423239
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.