Poulose Jacob,K; Bindiya, Varghese M; Unnikrishnan, A(Asian Journal of Computer Science & Information Technology, January 1, 2013)
[+]
[-]
Abstract:
An Overview of known spatial clustering algorithms The space of interest can be the two-dimensional abstraction of the surface of the earth or a man-made space like the layout of a VLSI design, a volume containing a model of the human brain, or another 3d-space representing the arrangement of chains of protein molecules. The data consists of geometric information and can be either discrete or continuous. The explicit location and extension of spatial objects define implicit relations of spatial neighborhood (such as topological, distance and direction relations) which are used by spatial data mining algorithms. Therefore, spatial data mining algorithms are required for spatial characterization and spatial trend analysis. Spatial data mining or knowledge discovery in spatial databases differs from regular data mining in analogous with the differences between non-spatial data and spatial data. The attributes of a spatial object stored in a database may be affected by the attributes of the spatial neighbors of that object. In addition, spatial location, and implicit information about the location of an object, may be exactly the information that can be extracted through spatial data mining
Description:
Asian Journal of Computer Science And Information Technology 3: 1 (2013) 1 - 8.
Poulose Jacob,K; Vimina, E R(International Journal of Computer Science Issues (IJCSI), January 1, 2013)
[+]
[-]
Abstract:
This paper proposes a content based image retrieval (CBIR) system using the local colour and texture features of selected image sub-blocks and global colour and shape features of the image. The image sub-blocks are roughly identified by segmenting the image into partitions of different configuration, finding the edge density in each partition using edge thresholding, morphological dilation. The colour and texture features of the identified regions are computed from the histograms of the quantized HSV colour space and Gray Level Co- occurrence Matrix (GLCM) respectively. A combined colour and texture feature vector is computed for each region. The shape features are computed from the Edge Histogram Descriptor (EHD). A modified Integrated Region Matching (IRM) algorithm is used for finding the minimum distance between the sub-blocks of the query and target image. Experimental results show that the proposed method provides better retrieving result than retrieval using some of the existing methods
Description:
International Journal of Computer Science Issues (IJCSI)
Sheena, Mathew; Poulose Jacob,K(International Journal of Computer and Information Engineering, 2008)
[+]
[-]
Abstract:
Extensive use of the Internet coupled with the
marvelous growth in e-commerce and m-commerce has created a
huge demand for information security. The Secure Socket Layer
(SSL) protocol is the most widely used security protocol in the
Internet which meets this demand. It provides protection against
eaves droppings, tampering and forgery. The cryptographic
algorithms RC4 and HMAC have been in use for achieving security
services like confidentiality and authentication in the SSL. But recent
attacks against RC4 and HMAC have raised questions in the
confidence on these algorithms. Hence two novel cryptographic
algorithms MAJE4 and MACJER-320 have been proposed as
substitutes for them. The focus of this work is to demonstrate the
performance of these new algorithms and suggest them as dependable
alternatives to satisfy the need of security services in SSL. The
performance evaluation has been done by using practical
implementation method.
Poulose Jacob,K; Sheena, Mathew(International Journal of Computer, Information & Systems Science & Engineering, September 1, 2008)
[+]
[-]
Abstract:
Extensive use of the Internet coupled with the
marvelous growth in e-commerce and m-commerce has created a
huge demand for information security. The Secure Socket Layer
(SSL) protocol is the most widely used security protocol in the
Internet which meets this demand. It provides protection against
eaves droppings, tampering and forgery. The cryptographic
algorithms RC4 and HMAC have been in use for achieving security
services like confidentiality and authentication in the SSL. But recent
attacks against RC4 and HMAC have raised questions in the
confidence on these algorithms. Hence two novel cryptographic
algorithms MAJE4 and MACJER-320 have been proposed as
substitutes for them. The focus of this work is to demonstrate the
performance of these new algorithms and suggest them as dependable
alternatives to satisfy the need of security services in SSL. The
performance evaluation has been done by using practical
implementation method.
Description:
World Academy of Science, Engineering and Technology
Vol:2 2008-03-28
Poulose Jacob,K; Preetha Theresa, Joy(IEEE, February 16, 2014)
[+]
[-]
Abstract:
Cache look up is an integral part of cooperative
caching in ad hoc networks. In this paper, we discuss a
cooperative caching architecture with a distributed cache look up
protocol which relies on a virtual backbone for locating and
accessing data within a cooperate cache. Our proposal consists of
two phases: (i) formation of a virtual backbone and (ii) the cache
look up phase. The nodes in a Connected Dominating Set (CDS)
form the virtual backbone. The cache look up protocol makes use
of the nodes in the virtual backbone for effective data
dissemination and discovery. The idea in this scheme is to reduce
the number of nodes involved in cache look up process, by
constructing a CDS that contains a small number of nodes, still
having full coverage of the network. We evaluated the effect of
various parameter settings on the performance metrics such as
message overhead, cache hit ratio and average query delay.
Compared to the previous schemes the proposed scheme not only
reduces message overhead, but also improves the cache hit ratio
and reduces the average delay
Description:
Advanced Communication Technology (ICACT), 2014 16th International Conference on
Poulose Jacob,K; Santhosh, Simon(International Journal of Modern Engineering Research, 2012)
[+]
[-]
Abstract:
The evolution of wireless sensor network technology has enabled us to develop advanced systems for real time monitoring. In the present scenario wireless sensor networks are increasingly being used for precision agriculture. The advantages of using wireless sensor networks in agriculture are distributed data collection and monitoring, monitor and control of climate, irrigation and nutrient supply. Hence decreasing the cost of production and increasing the efficiency of production.This paper describes the application of wireless sensor network for crop monitoring in the paddy fields of kuttand, a region of Kerala, the southern state of India.
Description:
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.4, July-Aug 2012 pp-2017-2020