Saturday, September 7, 2019

Published Papers




List of papers Published in Journals



Ø R. Prabahari, M. Ramalingam, ”An Eminent Way Of An Improving A Denclue Algorithm Approach For Outlier Mining In Large Database”, International Journal of Computer Sciences and Engineering ,Vol.6(10), Oct 2018, ISSN: 2347-2693.

Ø M. Ramalingam, P. Prabhusundhar, R.Prabhahari, V.Azhaharasan, K. Yuvaraj, “Classifications of Biometric Security Authentication and Cluster Based Intrusion Detection, Prevention Technique in Mobile Ad-hoc Network”, ISSN 2319 – 1953International Journal of Scientific Research in Computer Science Applications and Management Studies,Volume 7, Issue 4 (July 2018).

Ø R. NagarajM. RamalingamK. Sathishkumar, “Contextual Clustering Algorithm and Sentence Clustering Based Fuzzy Relational Hierarchical Clustering for Document Clustering”, ISSN 2319 – 1953 International Journal of Scientific Research in Computer Science Applications and Management Studies IJSRCSAMS Volume 7, Issue 3 (May 2018).

Ø M. RamalingamK. Sathishkumar, K. Yuvaraj, V. Azhaharasan, R. Prabahari, “Classifications of Mobile Ad Hoc Network Security Attacks and Detection Mechanism against the Attacks in MANET”, ISSN 2319 – 1953 International Journal of Scientific Research in Computer Science Applications and Management Studies, Volume 7, Issue 3 (May 2018).

Ø P. Prabhusundhar, B. Srinivasan, M. Ramalingam, “Detection Mechanism against the Attacks in MANET and Biometric Classification”, International Journal of Computer Sciences and Engineering Vol.6(5), May 2018, E-ISSN: 2347-2693

Ø P. Prabhusundhar, B. Srinivasan, M. Ramalingam, “Stretch and Shrink Method for Security in MANET Using Biometric and Intrusion Detection System”, 2018 IJSRSET, Volume 4, Issue 4, Print ISSN: 2395-1990, Online ISSN: 2394-4099 Themed Section: Engineering and Technology 

Ø K. Sathishkumar, Dr.V. Thiagarasu, Dr.E. Balamurugan, Dr.M. Ramalingam, “Gene Selection for Cancer Classification on Microarray Gene Expression Data”, Jour of Adv Research in Dynamical & Control Systems, Vol. 10, 05-Special Issue, 2018, Elsevier, Scopus SJR.

Ø Dr. Ramalingam M., Dr. Prabhusundhar P, Dr. Thiagarasu V, Biometric Based Intrusion Detection System using Dempster-Shafer Theory for Mobile Ad hoc Network Security”, International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7, P.No: 384 – 391, June-2017.

Ø M. Ramalingam, Dr. V Thiagarasu, Routing and Broadcasting in MANET: A comprehensive Analysis based on, Routing technique, Clustering and Architectural Model”, International Journal of Engineering Sciences & Research Technology, ISSN: 2277-9655, IJESRT 3 (11), November 2014.
Ø Ramalingam M and Dr. Thiagarasu V., [2014], “Cluster Based Stretch and Shrink Method for Manet Using Load Balancing, Nearest Neighbor and Rule Mining”, International Journal of Engineering Sciences & Research Technology, 3(10.): October, 2014, ISSN: 2277-9655.
Ø Ramalingam M and Dr. Thiagarasu V., [2014], Identified the Cluster Based Stretch and Shrink Method Based on Load Balancing Algorithm for Ad Hoc Network Topology Stability”, International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169Volume: 2 Issue: 9 p.no: 2631 – 2635

Ø S. Janarthanam, M.Ramalingam, P. NarendranTexture analysis on low resolution images using unsupervised segmentation algorithm with multichannel Local Frequency analysis  IEEE Xplore:24 March 2011, Date Added to IEEE Xplore24 March 2011, Electronic ISBN: 978-81-8371-369-6Print on Demand(PoD) ISBN: 978-1-4577-0376-8, INSPEC Accession Number: 11887432, Publisher: IEEE.

Ø K Sathishkumar, Dr.V Thiagarasu, M. Ramalingam, Survey On Biclustering And Its Applications”, International Journal of Computer Science and Business Informatics 12 (1), ISSN-1694-2108, 2014

Ø K. Sathishkumar, Dr.V.Thiagarasu, M.RamalingamBiclustering of Gene Expression Using Glowworm Swarm Optimization and Neuro-Fuzzy Discriminant Analysis”, International Journal of Advanced Research in Computer Science and Software Engineering ,2014 

Ø K Sathishkumar,M Ramalingam, Survey on Clustering Techniques for Gene Expression Data,  GASCIAN 1 (1), 31-35, 2014

Ø K Sathishkumar, M Ramalingam, Sentence Level Clustering Approaches and its Issues in Various Applications”,International Journal of Applied Research and Studies (iJARS) 2 (9), 1-6, 2013

Ø K Sathishkumar, M Ramalingam, A Thorough Investigation on the Sentence Level Clustering Approaches and its Issues in Various Applications”, International Journal of Applied Research and Studies (iJARS) 2 (7), 1-5 2013

Ø K Sathishkumar, M Ramalingam, Efficient Clustering for Gene Expression Data”, International journal of Advanced and Innovative Research (IJAIR) 2 (5), 1-6 2013

Ø K. Sathishkumar, Dr.V.Thiagarasu ,M.Ramalingam, A Study on Various Clustering Techniques for DNA Micro Arrays Based Gene Expression Data”, International Journal of Applied Research and Studies (iJARS) 2 (5), 1-5 2013

Ø K. Sathishkumar, Dr.V.Thiagarasu ,M.Ramalingam, Identification of Biclustering Algorithms for Gene Extraction”, JESRT, 3008-3014 ,2013

Ø K. Sathishkumar, Dr.V.Thiagarasu ,M.Ramalingam, “An Efficient Artificial Bee Colony And Fuzzy C Means Based Clustering Gene Expression Data”, IJIRCCE 1, 1125-1131  2013.

Ø Ramalingam. M, Dr.Thiagarasu.V, Narendran.P, “Periodical and On-Demand Topology Dissemination in routing protocols: A comprehensive Analysis based on Delay, Delivery Ratio and Throughput”, International Journal of Advanced and Innovative Research (2278-7844) / # 123 / Volume 2 Issue 9, 2013

Wednesday, August 21, 2019

Operating System


Know more about Operating System...Click



What is Operating System?


The OS consists of many components and features. Which features are defined as part of the OS vary with each OS.

However, the three most easily defined components are:

KernelThis provides basic-level control over all of the computer hardware devices.

Main roles include reading data from memory and writing data to memory, processing execution orders, determining how data is received and sent by devices such as the monitor, keyboard and mouse, and determining how to interpret data received from networks.

User Interface: This component allows interaction with the user, which may occur through graphical icons and a desktop or through a command line. The user interface for mobile computers generally features a touch screen
{ GUI..Click & drag--- event-driven-----COM}
Application Programming Interfaces: This component allows application developers to write modular code.


However, the three most easily defined components are:

What is the difference between the UI and API?
An application program interface (API) is a set of routines, protocols, and tools for building software applications.

Basically, an API specifies how software components should interact. Additionally, APIs are used when programming graphical user interface (GUI) components.
UI- user communication


Basics of O.S

An operating system is a control program. A control program manages the execution of user programs to prevent errors and improper use of the computer. It is especially concerned with the operation and control of I/O devices.

An operating system as a resource allocator. A computer system has many resources that may be required to solve a problem:

Mobile operating systems often include not only a core kernel but also middleware : a set of software frameworks that provide additional services to application developers.


Middleware 
A typical operating system provides an application programming interface (API) for programs to utilize underlying hardware features. Middleware, however, provides an API for utilizing underlying operating system features.

Middleware is a software layer placed between applications and operating systems.


Bootstrap (Basic of O.S)

When it is powered up or rebooted—it needs to have an initial program to run. This initial program, or bootstrap program, tends to be simple. Typically, it is stored within the computer hardware in read-only memory (ROM)

The bootstrap program must know how to load the operating system and how to start executing that system. To accomplish this goal, the bootstrap program must locate the operating-system kernel and load it into memory.

Once the kernel is loaded and executing, it can start providing services to the system and its users.

Interrupt (Basic of O.S)

The occurrence of an event is usually signaled by an interrupt from either the hardware or the software. Hardware may trigger an interrupt at any time by sending a signal to the CPU, usually by way of the system bus. 
Software may trigger an interrupt by executing a special operation called a system call (also called a monitor call).

Generally, the table of pointers is stored in low memory (the first hundred or so locations).
These locations hold the addresses of the interrupt service routines for the various devices.
'C' -ISR (Interrupt Service Routine or interrupt handler.)


This array, or interrupt vector, of addresses is then indexed by a unique device number, given with the interrupt request, to provide the address of the interrupt service routine for the interrupting device.


system call (also called a monitor call).


A system call is a way for programs to interact with the operating system. A computer program makes a system call when it makes a request to the operating system’s kernel.

System call provides the services of the operating system to the user programs via Application Program Interface(API).

Services Provided by System Calls :
Process creation and management
Main memory management
File Access, Directory and File system management
Device handling(I/O)
Protection
Networking, etc.

system call (also called a monitor call).
Types of System Calls : There are 5 different categories of system calls –

Process control: end, abort, create, terminate, allocate and free memory.
File management: create, open, close, delete, read file etc.
Device management
Information maintenance
Communication

A typical operating system provides an application programming interface (API) for programs to utilize underlying hardware features. Middleware, however, provides an API for utilizing underlying operating system features.

Interrupt in C
VC++................... MFC












Java Programs

Simple Java Programs  

public class prg2 {

    public static void main(String[] args) {

        
        System.out.println("You entered:");
    }
}


public class prg1{

    public static void main(String[] args) {
        String str = "Welcome to Beginnersbook";
        String reversed = reverseString(str);
        System.out.println("The reversed string is: " + reversed);
    }

    public static String reverseString(String str)
    {
        if (str.isEmpty())
            return str;
        //Calling Function Recursively
        return reverseString(str.substring(1)) + str.charAt(0);
    }
}

public class prg3{

    public static void main(String[] args) {

        double number = 12.3;

        // true if number is less than 0
        if (number < 0.0)
            System.out.println(number + " is a negative number.");

        // true if number is greater than 0
        else if ( number > 0.0)
            System.out.println(number + " is a positive number.");

        // if both test expression is evaluated to false
        else
            System.out.println(number + " is 0.");
    }
}

public class prg5{

    public static void main(String[] args) {

        float first = 1.20f, second = 2.45f;

        System.out.println("--Before swap--");
        System.out.println("First number = " + first);
        System.out.println("Second number = " + second);

        // Value of first is assigned to temporary
        float temporary = first;

        // Value of second is assigned to first
        first = second;

        // Value of temporary (which contains the initial value of first) is assigned to second
        second = temporary;

        System.out.println("--After swap--");
        System.out.println("First number = " + first);
        System.out.println("Second number = " + second);
    }
}

public class prg6{
      public static void main(String args[]) {
         int a=5;
   while(a<10)   //while condition
         {
         System.out.println("value of a" +a);
         a++;
   System.out.println("aa");
         }
    }
}

public class prg7{
   public static String myClassVar="class or static variable";
   public static void main(String args[]){
      prg7 obj = new prg7();
      prg7 obj2 = new prg7();
      prg7 obj3 = new prg7();
      
      //All three will display "class or static variable"
      System.out.println(obj.myClassVar);
      System.out.println(obj2.myClassVar);
      System.out.println(obj3.myClassVar);

      //changing the value of static variable using obj2
      obj2.myClassVar = "Changed Text";

      //All three will display "Changed Text"
      System.out.println(obj.myClassVar);
      System.out.println(obj2.myClassVar);
      System.out.println(obj3.myClassVar);
   }
}

public class prg8{
      public static void main(String args[]) {
         int a=5;
   while(a<10)   //while condition
         {
         System.out.println("value of a" +a);
         a++;
   System.out.println("");
         }
    }
}

public class prg9{
    public static void main(String[] args) {
     int a=10;
     int b=5;
  
if(a>b)
      {  // if condition
     System.out.println(" A is greater than B");
      }
else
      {     // else condition
      System.out.println(" B is greater");
      }
}
}

public class prg10{ 
    public static void main(String[] args) {
     int week=2;
     String weeknumber;

switch(week){    // switch case
case 1:
          weeknumber="Monday";
       break;
     
case 2:
          weeknumber="tuesday";
       break;

case 3:
          weeknumber="wednesday";
       break;

default:        // default case
          weeknumber="invalid week";
       break;
     }
  System.out.println(weeknumber);
     } 
}


public class prg11{
      public static void main(String args[]){
          int count=1;
do {                        // do statement
     System.out.println("count is:"+count);
     count++;
   }
 while (count<10);
       }
  }

public class prg12{
      public static void main(String args[]) {
          for(int i=0; i<=10; i++)  // for condition  
          {
          System.out.println(i);
          }
     }
}


import java.util.Scanner;
class prg13{
    public static void main(String[] args) {
    
     Scanner input = new Scanner(System.in);
    
     System.out.print("Enter an integer: ");
     int number = input.nextInt();
     System.out.println("You entered " + number);
    }
}



Monday, June 10, 2019

Basics of O.S

Basics of O.S


An operating system is a control program. A control program manages the execution of user programs to prevent errors and improper use of the computer. It is especially concerned with the operation and control of I/O devices.

An operating system as a resource allocator. A computer system has many resources that may be required to solve a problem:

Mobile operating systems often include not only a core kernel but also middleware : a set of software frameworks that provide additional services to application developers. 


Middleware 
A typical operating system provides an application programming interface (API) for programs to utilize underlying hardware features. Middleware, however, provides an API for utilizing underlying operating system features.

Middleware is a software layer placed between applications and operating systems.


Bootstrap (Basic of O.S)

When it is powered up or rebooted—it needs to have an initial program to run. This initial program, or bootstrap program, tends to be simple. Typically, it is stored within the computer hardware in read-only memory (ROM)

The bootstrap program must know how to load the operating system and how to start executing that system. To accomplish this goal, the bootstrap program must locate the operating-system kernel and load it into memory.

Once the kernel is loaded and executing, it can start providing services to the system and its users.

Ad hoc networking technology



Know more about Operating System....Click!



Ad hoc networking technology


With the increased number of lightweight devices as well as evolution in wireless communication, the ad hoc networking technology is gaining effort with the increasing number of widespread applications. Ad hoc networking can be used anytime, anywhere with limited or no communication infrastructure. The ad hoc network architecture can be used in real time business applications, corporate companies to increase the productivity and profit. The wireless communications technology is holding much importance in the recent era. The complicated wired network is not possible to fulfil the requirement of the network users and also the traditional network systems are very expensive and more complicated. In this new phase of technologies and standards, the new wireless communication devices are available such as Bluetooth, Infrared Data Association (IrDA) and HomeRF. This is particularly true within the past decade which has seen wireless networks being adapted to enable mobility. There are currently two variations of mobile wireless networks. The first is known as infrastructure networks, i.e., those networks with fixed and wired gateways. The bridges for these networks are known as base stations. A mobile unit within these networks connects to and communicates with, the nearest base station that is within its communication radius. The second type of mobile wireless network is the infrastructure less mobile network, commonly known as a mobile ad hoc network (MANET).