M. Dinakaran’s research while affiliated with Vellore Institute of Technology University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (50)


Longitudinal strain waves propagating in an infinitely long cylindrical rod composed of generally incompressible materials and its Jacobi elliptic function solutions
  • Article

April 2021

·

80 Reads

·

24 Citations

Mathematics and Computers in Simulation

·

·

R. Vijay Anand

·

[...]

·

The axisymmetric longitudinal waves propagating in the long infinite cylindrical rod composed of material and structural constants, combinedly called as general incompressible materials, are derived using the perturbation reduction method as the far-field equation in the form of KdV equation in Dai and Huo (2002). In this work, the F expansion method is applied to the far-field equation and the properties of longitudinal strain waves travelling in the cylindrical rod are studied. The behaviour of the strain waves is analysed with the material and structural constants. To support the study, the graphs are drawn in the two and three dimensional surfaces. The obtained longitudinal strain waves are in the form of Jacobi elliptic function and necessary condition for the existence of each wave is provided.


Privacy Preserving and Data Transpiration in Multiple Cloud using Secure and Robust Data Access Management Algorithm

January 2021

·

26 Reads

·

9 Citations

Microprocessors and Microsystems

Nowadays, privacy preserving is playing important role in cloud computing where content based privacy is challengeable task in un-trusted cloud environment. Based on literature studies, the method has key complexities and access polices authentication issues. The system need to concentrate to bring strong encryption function and efficient key distribution polices to meet future challenges. The method need to address the real time application in cloud environments minimal computation cost, inherent defects in key management and flexible access control policy. Current approaches have still believe in user identity, mutual privacy and key agreement session wise among content owner, Trusted client, and cloud service provider. The Proposed work focused on designing a framework named Secure and Robust Data Access Management (SRDAM) Algorithm proposed to maintain enhanced privacy, secure data transportation, and data access managements. Proposed algorithm consolidates validating cloud service providers and after that considers the property necessity of cloud user and cloud service provider (CSP).Proposed SRDAM Algorithm reduces the 1.79 seconds Data uploading time (DUT), Data 1.80 seconds Downloading Time (DDT) and 11.02 seconds Communication Overhead (CO) for document, images and video for conventional methodologies.


An algorithmic approach to rank the disambiguous entities in Twitter streams for effective semantic search operations

December 2020

·

46 Reads

·

3 Citations

Sadhana

The most challenging task in any modern reasoning system is that it has been completely relied on automatic knowledge acquisition from the unstructured text and filtering out the structured information from it has turned out to be the most crucial task of Information Retrieval systems. In this paper, we have proposed a system that can recognize the potential named entities from the Twitter streams and link them to the appropriate real world knowledge entities. Besides, it has performed many semantic functions such as entity disambiguation, contextual similarity, type induction, and semantic labeling, to augment the semantic score of the entity and provide the rich entity feature space to quantitatively enhance entity retrieval accuracy. Nevertheless, we have leveraged a model to alleviate the entity imbalance present over the collected Twitter Streams and effectively utilized the contextual relatedness between the candidate entity sets. Eventually, we have proposed a probabilistic approach to deal with topic modeling and effectively disambiguate the entities by clustering the entities into its appropriate entity domain. The proposed Latent Dirichlet Allocation (LDA) model has been categorically distinguished the topics for clustering between the candidate entities and fix the exact true mentions occurred in the Knowledge Base such as DBpedia. We have also demonstrated the performance and accuracy rate of the proposed system and evaluated the results with the collected Twitter Streams for the month of August, 2016. The empirical results have shown that it has outperformed the existing state-of-the-art systems and proved that the proposed system given here has gradual accuracy rate against the conventional systems.




Secure Big Data Storage Using Training Dataset Filtering-K Nearest Neighbour Classification with Elliptic Curve Cryptography

June 2018

·

23 Reads

·

2 Citations

Journal of Computational and Theoretical Nanoscience

Recently, data storage and processing have demand highly, which has increased in large data era. The major concerns of business users and organisation perspective are the Data confidentiality, availability and integrity while outsourcing the data in cloud. There are still exists some security attacks while storing the data even various techniques are implemented to solve these issues. In this research, we mainly focuses on security threats while storing data, especially confidential data which has classified from the unstructured data by using TDF algorithm (Training Data Set filtering) based on k-nearest neighbor algorithm. Finally, confidential data encrypted with Elliptic Curve Cryptography and securely stored in cloud. We can assure Data Security with the help of using Data Classification with encryption technique. Experiment analysis shows to get efficient results and which ensures the secrecy and privacy to the user data.





Improved scrum method through staging priority and cyclomatic complexity to enhance software process and quality

January 2018

·

35 Reads

·

3 Citations

International Journal of Internet Technology and Secured Transactions

Software development has been inevitable in the modern era. In the olden days, organisations followed intense traditional software process; but currently, the focus has turned greatly towards agile methodologies. In agile methodology, scrum is the mostly followed process. But it comes with a bunch of technical and generic issues. For instance, assigning, prioritising and integrating product backlog items prove to be difficult to deal with in agile methodology. On the other hand, it poses several other generic issues ranging from environment problems due to idle team participants and developer-tester issues. In this paper mainly concentrates on overcoming the technical issues mentioned above with the assistance of a framework which is perfectly refined in addition to the introduction of a new term called RScrum which is the extension of scrum which will greatly help to overcome the glitches.


Citations (34)


... To execute successful decryption, users must choose a single set of attributes from the available options. The issue of the CP-ABE method has been subject to further research, with CP-ASBE (Cipher Text Policy Attribute Set Based Encryption) being recognized as the ideal solution [12][13][14][15]. ...

Reference:

A Hybrid Multi-user Cloud Access Control based Block Chain Framework for Privacy Preserving Distributed Databases
Privacy Preserving and Data Transpiration in Multiple Cloud using Secure and Robust Data Access Management Algorithm
  • Citing Article
  • January 2021

Microprocessors and Microsystems

... The non dissipated double dispersion micro strain wave in the micro structured solid is studied by F expansion method in Gao et al. (2020) where the extensive Jacobi elliptic function based solutions and their special cases are given.The (2 + 1)− dimension Heisenberg ferromagnetic spin chain is solved using modified simple equation method and improved F expansion method where the initial solution is considered in the different form in Bashar and Islam (2020). The Jacobi elliptic solutions of longitudinal strains with incompressible materials by F expansion method are given in Silambarasan et al. (2021). The twin core couplers with polynomial law nonlinearity with perturbation terms is solved using extended F expansion method singular, bright and cubic-quartic solitons in Rabie and Ahmed (2022a) while in Rabie and Ahmed (2022b) triple power law non-linearity in the twin core couplers is considered and solved using extended F expansion method. ...

Longitudinal strain waves propagating in an infinitely long cylindrical rod composed of generally incompressible materials and its Jacobi elliptic function solutions
  • Citing Article
  • April 2021

Mathematics and Computers in Simulation

... Natural language processing (NLP) allows digital gadgets and devices to comprehend the semantics in languages. Usually, the NLP can be broadly characterized into two categories such as data preprocessing and model development [50][51][52][53][54][55][56][57]. There are several text normalization strategies proposed by eminent researchers to solve the impending issues and reduce the error rate considerably [50][51][52][53]. ...

An algorithmic approach to rank the disambiguous entities in Twitter streams for effective semantic search operations
  • Citing Article
  • December 2020

Sadhana

... These algorithms work on complex optimization problems using the fundamental mechanisms of biological evolution processes: selection, crossover, mutation, and reproduction. In this category, sample studies from the literature are presented in [10][11][12][13][14]. Algorithms in the PA category is based on physical phenomena inspired by the laws of physics in nature, such as the force of gravity. ...

Wildebeest herd optimization: A new global optimization algorithm inspired by wildebeest herding behaviour
  • Citing Article
  • November 2019

Journal of Intelligent & Fuzzy Systems

... These strategies find similar comparative success in performance aspects, as noted, with the field appearing to be currently on a plateau. Some studies, in both categories, perform exceedingly better than the average accuracy observed, like Bagchi et al. [6], Mohammed and Sajjanhar [54], Putriany et al. [70], Saliha et al. [77], which achieved accuracy results higher than 98% using EFBM approaches and Fan et al. [19], Wu et al. [95], whose results are over 99% using HFBMs. However, we noted that the number of classes evaluated has a high impact on the classification performance, emphasizing the importance of careful classification design and highquality inputs over a sheer number of examples in classification tasks [57,58]. ...

Accurate Facial Ethnicity Classification Using Artificial Neural Networks Trained with Galactic Swarm Optimization Algorithm: Proceedings of Fifth International Conference INDIA 2018 Volume 1
  • Citing Chapter
  • January 2019

Advances in Intelligent Systems and Computing

... The research was discussed by [14] proposed RScrum (Refined Scrum) process model which solves the technological problems associated with scrum methodology. For example assigning, prioritizing, and integrating product backlog items, prove difficult to manage in agile methodology. ...

Improved scrum method through staging priority and cyclomatic complexity to enhance software process and quality
  • Citing Article
  • January 2018

International Journal of Internet Technology and Secured Transactions

... Evaluate partner preference with a one-time recommendation and case studies to make software using a vaguebased approach [24,25]. The software is recommended by lower consumption to manage the service resources [26]. ...

WhaleRank: an optimisation based ranking approach for software requirements prioritisation
  • Citing Article
  • January 2018

International Journal of Environment and Waste Management

... • [13] put forward the WhaleRank approach that rests on the Whale optimization algorithm. WhaleRank combines four ranking functions based on dictionary words, similarity measure, managers' perceptions, and the newly updated requirements, in order to yield a linear rank. ...

WhaleRank: an optimisation based ranking approach for software requirements prioritisation
  • Citing Article
  • January 2018

International Journal of Environment and Waste Management

... However, adherence to recommended exercise for patients with HF is often hampered by their clinical condition and other structural and sociodemographic barriers [44]. With significant improvements in wireless internet connectivity and smartphone use across the world, mHealth-driven interventions hold immense promise with the ability to deliver the intervention to the participant's home using varied forms of multimedia engagement tools [45,46]. This review found 8 feasibility or pilot studies delivering exercise interventions using mHealth tools and reporting on adherence to varied exercise programs in patients with HF. ...

A Review on Mobile Technologies: 3G, 4G and 5G
  • Citing Conference Paper
  • February 2017