Papers by Karthik Subburathinam
Journal of Ambient Intelligence and Humanized Computing, Jul 11, 2022
The Editor-in-Chief and the publisher have retracted this article. This article was submitted to ... more The Editor-in-Chief and the publisher have retracted this article. This article was submitted to be part of a guestedited issue. An investigation concluded that the editorial process of this guest-edited issue was compromised by a third party and that the peer review process has been manipulated. Based on the investigation's findings the Editor-in-Chief therefore no longer has confidence in the results and conclusions of this article. Authors Srihari Kannan and Karthik Subburathinam disagree with this retraction. Author Venkata Koti Reddy Gangireddy has not responded to correspondence regarding this retraction.
Journal of Ambient Intelligence and Humanized Computing
The Editor-in-Chief and the publisher have retracted this article. This article was submitted to ... more The Editor-in-Chief and the publisher have retracted this article. This article was submitted to be part of a guestedited issue. An investigation concluded that the editorial process of this guest-edited issue was compromised by a third party and that the peer review process has been manipulated. Based on the investigation's findings the Editor-in-Chief therefore no longer has confidence in the results and conclusions of this article. Authors Srihari Kannan and Karthik Subburathinam disagree with this retraction. Author Venkata Koti Reddy Gangireddy has not responded to correspondence regarding this retraction.
International Journal of Research -GRANTHAALAYAH, 2016
Agent technology and Data Mining have emerged as two of the prominent areas in information scienc... more Agent technology and Data Mining have emerged as two of the prominent areas in information sciences. An effort has been activated towards the interaction and integration between agent technology and data mining which is referred to as “AGENT MINING”. Data Mining is the process of extracting interesting information or patterns from large volumes of data. Agents comprise a powerful technology for the analysis, design and implementation of autonomous intelligent systems that can handle distributed problem-solving, cooperation, coordination, communication, and organization in a multiplayer environment. This agent uses information technology to find trends and patterns in an abundance of information from many different sources. The user can sort through this information in order to find whatever information they are seeking. Intelligent agents are today accepted as powerful tools for data mining in a distributed environment. The interaction and integration between agent and mining has po...
International Journal of Advanced Research in Computer Science and Electronics Engineering, 2012
The need for buffering is very important for packet switching networks. Buffers in routers absorb... more The need for buffering is very important for packet switching networks. Buffers in routers absorb the transient bursts that occur naturally in such networks. It reduces the frequency of packet loss and even they can avoid under-utilization when TCP connections back off due to packet drops. After several years of research with packet switching networks, it is surprising that we still do not know how to dimension the buffer of a router interface. At the same time the issue of buffer sizing has become important in practice. Recently there have been many interesting debates regarding the sizing of router buffers. From all the previous work we can say that the buffer size on the routers depends on several network parameters such as number of flows, output/input capacity ratios, speed, window size etc i.e. it is difficult to arrive at a simple formula for sizing router buffer. This article describes the impact of these networks parameters on buffer sizing in routers.
International Journal of Communication Systems, 2021
Exploration has been done on Internet of Things (IoT) with accentuation on the security like remo... more Exploration has been done on Internet of Things (IoT) with accentuation on the security like remote system security, correspondence security, sensor information security, respectability of physical signals, and impelling gadgets. The procedure for current security is not reasonable for IoT applications as gadgets that are included at the ground level have some of the restricted assets, low multifaceted nature, and vitality requirements. IoT being a system of systems permits billions of people and machines to connect with each other. IoT offers us a chance to build compelling organizations, applications for assembling, lifesaving arrangements, appropriate development, and the sky is the limit from there. The manuscript proposes a broad review of the IoT innovation and its differed applications in life sparing, brilliant urban communities, rural, mechanical by looking into the ongoing examination work. Existing strategies manage static remote sensor web to reason the interruptions in ...
International Journal of Innovative Research in Computer and Communication Engineering, 2014
Customer segmentation is the process of finding homogenous sub-groups within a heterogeneous aggr... more Customer segmentation is the process of finding homogenous sub-groups within a heterogeneous aggregate market. This approach is used in direct marketing to target and focus on increasingly well-defined and profitable market segments. The process of segmentation begins with observing customer actions and continues with learning about the demographic and psychographic characteristics of these customers. This intelligence can be made available to the customer facing teams which may be a great tool to increase cross selling and up selling capability of a company. Data Mining is the process of discovering knowledge from huge volumes of data. It is widely used in customer segmentation where various classes can be formed based on the customers buying behaviour. This paper deals with two such methods: K-Means and Hierarchical Clustering. K-Means groups the customers into K-clusters. It is an Iterative algorithm which repeatedly calculates the distance and reforms the centroids based on the ...
International Journal of Communication Systems, 2020
SummaryWith the advancement of Internet of Things (IoT), the devices are allowed to interact with... more SummaryWith the advancement of Internet of Things (IoT), the devices are allowed to interact with other networks like mobile ad hoc network (MANET). The MANET‐IoT systems often undergo energy balancing problem between the sensor nodes, whereas the MANETs operate on mobile sensor nodes. Hence, proper utilization of battery power is required to maintain the network connectivity during a multi‐hop transmission. In this paper, we propose a DeepSense IoT‐MANET framework that effectively routes the packets from the IoT nodes via mobile sensor nodes in MANETs. The routings between the MANETs are organized by DeepSense interconnected with deep neural network (DNN) learning methods. The performance of the DeepSense DNN method is evaluated against various network metrics to evaluate the efficacy of the model.
Journal of Ambient Intelligence and Humanized Computing, 2020
In the recent years, increase in the mobile devices and cloud processing the data stored in the c... more In the recent years, increase in the mobile devices and cloud processing the data stored in the cloud in the form of pictures, messages and texts. Cloud service providers cannot trust entirely to authorize the services used by the clients. For enhancing the security in the cloud, new cyber security model is introduced with optimal key selection. In this k-medoid clustering algorithm is used to cluster the information which is secret. It is based on the data distance measure. The data is encrypted and stored in the cloud using blowfish encryption. To improve the accuracy improved dragonfly algorithm is used.
TheScientificWorldJournal, 2015
Competent data mining methods are vital to discover knowledge from databases which are built as a... more Competent data mining methods are vital to discover knowledge from databases which are built as a result of enormous growth of data. Various techniques of data mining are applied to obtain knowledge from these databases. Data clustering is one such descriptive data mining technique which guides in partitioning data objects into disjoint segments. K-means algorithm is a versatile algorithm among the various approaches used in data clustering. The algorithm and its diverse adaptation methods suffer certain problems in their performance. To overcome these issues a superlative algorithm has been proposed in this paper to perform data clustering. The specific feature of the proposed algorithm is discretizing the dataset, thereby improving the accuracy of clustering, and also adopting the binary search initialization method to generate cluster centroids. The generated centroids are fed as input to K-means approach which iteratively segments the data objects into respective clusters. The c...
Communications in Computer and Information Science, 2010
... Professor Dr.VPArunachalam received the BE and ME degrees from Madras University, Madras, Ind... more ... Professor Dr.VPArunachalam received the BE and ME degrees from Madras University, Madras, India in 1971 and 1972, respectively, and PhD degree from the Bharathiar University, Coimbatore, India, in 1988. ... Professor Arunachalam is a member of the IE and ISTE. ...
International Journal of Computer Applications, 2010
DoS / DDoS(Distributed Denial of Service) attacks deny regular, internet services accessed by leg... more DoS / DDoS(Distributed Denial of Service) attacks deny regular, internet services accessed by legitimate users, either by blocking the services completely, or by disturbing it completely, so as to cause customer baulking. Several traceback schemes are available to mitigate these attacks. The simulation approach also can be used to test the performing effects of different marking schemes in largescale DDoS attacks. Based on the simulation and evaluation results, more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed. DGT8, directional geographical trackback scheme, with 8 directions is one of them. Having a limited set of 8 directions, DGT8 may not work for routers with more than 8 interfaces. In this paper, we propose M-DGT i.e DGT 16, a 16 directional geographical traceback scheme having all the advantages of DGT. The 16 directions, though not having exactly equal interface, have nearly equal measures, and are identified using a novel scheme of Segment Direction Ratios (SDR). The SDR concept and the associated marking scheme allow the victim to defend against DDoS attacks independent of its ISP and also the generalization to DGT2n, having 2n directions (n>4).
Research Journal of Applied Sciences, 2010
Journal of Engineering and Applied Sciences, 2010
International Journal of Systems Signal Control and Engineering Application, 2010
2008 International Conference on Computing, Communication and Networking, 2008
Page 1. Analyzing Interaction between Denial of Service (DoS) attacks and threats S.Karthik 1 RMB... more Page 1. Analyzing Interaction between Denial of Service (DoS) attacks and threats S.Karthik 1 RMBhavadharini 2 Dr. YPArunachalam 3 ... The authors would like to thank Dr.VPArunachalam, Principal for his valuable input and fruitful discussions. REFERENCES ...
Research Journal of Applied Sciences, 2010
Journal of Mobile Communication, 2011
International Journal of Soft Computing, 2010
Journal of Mobile Communication, 2010
International Journal of Soft Computing, 2010
Uploads
Papers by Karthik Subburathinam