oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 6 )

2019 ( 223 )

2018 ( 275 )

2017 ( 292 )

Custom range...

Search Results: 1 - 10 of 223985 matches for " R. Manjula "
All listed articles are free for downloading (OA Articles)
Page 1 /223985
Display every page Item
An Approach for Content Retrieval from Web Pages Using Clustering Techniques  [PDF]
R. Manjula, A. Chilambuchelvan
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.79230
Abstract: Mining the content from an information database provides challenging solutions to the industry experts and researchers, due to the overcrowded information in huge data. In web searching, the information retrieved is not an appropriate, because it gives ambiguous information for the user query, and the user cannot get relevant information within the stipulated time. To overcome these issues, we propose a new methodology for information retrieval EPCRR by providing the top most exact information to the user, by using the collaborative clustered automated filter which makes use of the collaborative data set and filter works on the prediction by providing the highest ranking for the exact data retrieved. The retrieval works on the basis of recommendation of data which consists of relevant data set with highest priority from the cluster of data which is on high usage. In this work, we make use of the automated wrapper which works similar to the meta crawler functionality and it obtains the content in the semantic usage data format. Obtained information from the user to the agent will be ranked based on the Enabled Pile clustered data with respect to the metadata information from the agent and end-user. The information is given to the end-user with the top most ranking data within the stipulated time and the remaining top information will be moved to the data repository for future use. The data collected will remain stable based on the user preference and works on the intelligence system approach in which the user can choose any information under any instances and can be provided with suitable high range of exact content. In this approach, we find that the proposed algorithm has produced better results than existing work and it costs less online computation time.
Mobile Agent Framework for Network Intrusion Detection System with Classification Algorithm
R. Sasikumar,D. Manjula
Asian Journal of Information Technology , 2012, DOI: 10.3923/ajit.2012.237.243
Abstract: Wireless computingis the delivery of computingas aservicerather than aproduct, whereby shared resources, software and information are provided to users over anetwork. Wireless computing entrusts services with a user's data, software and computation on a published Application Programming Interface (API) over a network. Wireless computing is defined in simplest terms as follows: A set of pooled computing resources, delivered over the web, powered by software. It is a form of computing that involves the interaction of several virtualized resources, meaning that many servers are connecting and sharing information that can expand and contract across servers depending on the amount of servers needed to manage the amount of traffic on various sites. Wireless allows the end users to use the application without installation and access their personal files at any computer with internet access. Apart from the advantages of wireless environment, security is the major issue. Due to the distributed nature, wireless environment is an easy target for intruders looking for the possible attacks to exploit. There are many advantages in wireless computing such as increased storage, highly automated, flexibility, mobility, etc. apart from these advantages the major issue in wireless environment is security. Due to the distributed nature of the wireless environment many users can access the wireless to utilize the service. So, there is a chance for an intruder or attacker to exploit an attack in the wireless environment. In order to address this issue in the wireless environment an Intrusion Detection System (IDS) is proposed based on the features of the mobile agent. The mobile agents are used to collect and analyze the data collected from wireless environment to identify attacks exploited by the intruders. The main objective of the proposed system is to detect the known and new attacks exploited by the intruders in the wireless environment.
Securing Watermarked-Relational Data by Using Encryption and Decryption
Nagarjuna Settipalli,R Manjula
ARPN Journal of Systems and Software , 2011,
Abstract: Ownership rights on outsourced relational database are very crucial issue in today’s internet environment and in many content distribution applications, because the rapid growth of the internet and related technologies offered an unprecedented ability to access and redistribute digital content. In earlier existing systems the relational data will be watermarked and directly send to the client system, in these systems while sending relational data from server to client attacker easily copy the data and create same copy of relational data. Here there is no security to watermarked relational data. In our proposed system before sending the watermarked relational data to client side we encrypt the relational data and send it to the client side, at client side decryption will be done to get the original watermarked data. Because of using this encryption technique even an attacker copy the data he/she may not read the watermarked relational data.
DETECTION OF MALICIOUS URL REDIRECTION AND DISTRIBUTION
T. Manjula Devi,R. Krishnaveni?
International Journal of Computer Science and Mobile Computing , 2013,
Abstract: Web-based malicious software (malware) has been increasing over the Internet .It poses threats tocomputer users through web sites. Computers are infected with Web-based malware by drive-by-downloadattacks. Drive-by-download attacks force users to download and install the Web-based malware without beingaware of it .these attacks evade detection by using automatic redirections to various websites. It is difficult todetect these attacks because each redirection uses the obfuscation technique. This paper analyzes the HTTPcommunication data of drive-by-download attacks. The results show significant features of the maliciousredirections that are used effectively when we detect malware.
A novel hash based least significant bit (2-3-3) image steganography in spatial domain
G. R. Manjula,Ajit Danti
Computer Science , 2015, DOI: 10.5121/ijsptm.2015.4102
Abstract: This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show an improvement in the Mean squared error (MSE) and Peak Signal to Noise Ratio (PSNR) values of the proposed technique over the base technique of hash based 3-3-2 LSB insertion.
Megalithism and Tribal Ritualism: A Passage through the Kurumbas of Attappadi  [PDF]
Manjula Poyil
Advances in Historical Studies (AHS) , 2013, DOI: 10.4236/ahs.2013.22009
Abstract: The study of mortuary practices of Megalithic communities and its use as the basis for reconstructing the past society is unique in archaeology as it represents the direct and purposeful culmination of conscious behavior of the followers of this cultural trait. There are voluminous studies on the Megalithic builders of South India, including Kerala, written by prominent archaeologists and anthropologists from the early decades of the nineteenth century. Most of them ignored the continuity of Megalithic tradition, except a scant reference to the erection of funeral edifices among tribes like the Kurumbas and Mudugas of Attappadi and Mala-arayans of the Thiruvananthapuram district of Kerala. A study of the living Megalithic practices provides clues to ethnographic parallels, existing belief systems and habitation sites of the present communities. The present study discusses the cultural aspects of the rituals related to living Megalithic tradition among the Attappadi tribes, of the Palakkad district of Kerala. The study of the mortuary practices of the Kurumbas raises two important questions-firstly, how far this tribe can be seen as the actual successor of Megalithic builders of Kerala and, secondly, how does the social differentiation within the Kurumba community got reflected in its mortuary practices, just like the Megalithic builders of the past.
Maturity Model of Software Product with Educational Maturity Model
R.Manjula,J.Vaideeswaran
ARPN Journal of Systems and Software , 2011,
Abstract: Software product line engineering is an inter-disciplinary concept. It spans the dimensions of business, architecture, process,and the organization. Similarly, Education System engineering is also an inter-disciplinary concept, which spans the dimensions of academic, infrastructure, facilities, administration etc. Some of the potential benefits of this approach includecontinuous improvements in System quality and adhering to global standards. The increasing competency in IT and Educational Sectors necessitates a process maturity evaluation methodology. Accordingly, this paper presents an organizational maturity model for Education system for evaluating the maturity of multi- dimension factors and attributes of an Education System. Assessment questionnaires and a rating methodology comprise the framework of this Educational maturity model. The objective and design of the questionnaires are to collect information about the Education system engineering process from the multi perspectives of academic, infrastructure, administration, facilities etc. Furthermore, we conducted one case study and reported the assessment results using the organizational maturity model presented in this paper.
Software Architecture Recovery through Graph Mining Technique and Reduction of Complexity Involved in A* Algorithm through Stable Marriage Problem
Pavankumar kolla,kolla HariPriyanka,R Manjula
ARPN Journal of Systems and Software , 2011,
Abstract: This paper represents a technique for recovering the Software Architecture based on Graph Pattern Matching by the help of mining Techniques. Generally Software Architecture is represented in terms of graphs with set of vertices and edges. Finding the frequent data sets is the major step in the software architecture recovery. Many algorithms are proposed for this, for example Apriori based. In this paper to find the frequent data sets and a maximum association between the graphs we used an efficient algorithm called TMGM (tree based Maximal Graph Mining Technique). The results have shown that our proposed Graph mining technique is more efficient in recovering the Software Architecture. For pattern matching problem, Software Architecture Recovery uses A* Algorithm which runs in exponential time. In this paper we proposed an algorithm which runs in linear time through stable marriage problem.
HAULING TEMPLATES FROM WEB PAGES USING CLUSTERING TECHNIQUES
R.Manjula,A.Chilambuchelvan
International Journal of Engineering Sciences and Emerging Technologies , 2013,
Abstract: In today’s world, World Wide Web is the most popular information providers. A website is a collection of web pages and Web pages usually include information for the users. The web sites are designed with common templates and content. The template is used to access the content easily by consistent structures even the templates are not explicitly announced. The current Template extraction techniques are degrading the performance of web applications such as search engine due to irrelevant terms in templates.In this work, we present new method for extracting templates from a large number of web documents which are generated from heterogeneous templates. This paper cluster the web documents based on the similarity of underlying template structures in the documents so that the template for each cluster is extracted simultaneously.
A Bootstrap Approach of Benchmarking Organizational Maturity Model of Software Product With Educational Maturity Model
R.Manjula,J.Vaideeswaran
International Journal of Modern Education and Computer Science , 2012,
Abstract: This Software product line engineering is an inter-disciplinary concept. It spans the dimensions of business, architecture, process, and the organization. Similarly, Education System engineering is also an inter-disciplinary concept, which spans the dimensions of academic, infrastructure, facilities, administration etc. Some of the potential benefits of this approach include continuous improvements in System quality and adhering to global standards. The increasing competency in IT and Educational Sectors necessitates a process maturity evaluation methodology. Accordingly, this paper presents an organizational maturity model for Education system for evaluating the maturity of multi- dimension factors and attributes of an Education System. Assessment questionnaires and a rating methodology comprise the framework of this Educational maturity model. The objective and design of the questionnaires are to collect information about the Education system engineering process from the multi perspectives of academic, infrastructure, administration, facilities etc. Furthermore, we conducted one case study and reported the assessment results using the organizational maturity model presented in this paper.
Page 1 /223985
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.