Papers by Shoney Sebastian
Cloud computing is emerging as a new trend to store and analyze data, Hadoop is a very good and e... more Cloud computing is emerging as a new trend to store and analyze data, Hadoop is a very good and efficient framework that can be used to process the data through map reduce programming paradigm. This paper provides the insight for the rise of big data and what role does the hadoop plays to handle this. The structure and architecture view of hadoop with all the components and Yarn architecture is discussed. Scheduling is allot the set of jobs to process in the corresponding slots based on the few job scheduling algorithms, comparative study of all the scheduling algorithms are made which would be helpful while processing the data.
Global Positioning Systems are widely used to accurately locating one's position nowadays. Us... more Global Positioning Systems are widely used to accurately locating one's position nowadays. Using this Global positioning systems the distance between two locations on earth can also be measured. The functions of the GPS are to locate the position of user. My Event project aims to manage the events using GPS throughout the city. The GPS will generate the coordinates of latitude and longitude as well as the bearing angles between two positions. Generally this GPS are design and implement a low cost tracking system suitable to be used forclimbing and hiking, sailing activities. In MY EVENT this GPS is used to find a place or an event, where the event is being conducted with the help of micro view.

This paper intends to perform a detailed comparison of different tools that are used for image st... more This paper intends to perform a detailed comparison of different tools that are used for image steganography. Image steganography, which is the art of hiding secret data within the images, can be performed using different software tools available. These software tools use different steganography algorithms to perform the operation. Steganography hides the fact that the communication is taking place by hiding the secret data within a carrier file whereas cryptography is a technique that encrypts the secret data during communication. Steganography along with cryptography is more secured data hiding technique and is thus used in many software tools. The paper aims at comparing the properties of the stego image of a carrier file produced from different tools. The steganography methods are experimented and their results are analyzed. Different measures of the stego images such as peak signal to noise ratio, mean squared error etc. are compared and are graphically represented. Thus the pa...

A Load Balancing Algorithm for Infrastructure as a Service Platform (IaaS) Using Bees Algorithm and Queuing Theory
International Journal of Applied Research on Information Technology and Computing, 2017
Cloud computing is an emerging computing paradigm in the IT industry and the acceptance of this t... more Cloud computing is an emerging computing paradigm in the IT industry and the acceptance of this technology is rising fast with an unprecedented growth of data centre across the world. Recent studies have shown that ensuring load balancing (LB) in different data centre is critical for achieving optimal resource utilisation, maximise throughput, minimum response time and avoid overloading of resource. The traditional techniques of LB are not suitable for the cloud data centre's because of the virtualisation of the physical systems. In a centralised approach, scalability issues are more especially on machines with small amount of memory. On the other hand, a fully distributed approach tends to yield a poor performance on very large number of systems. In this paper, we propose a hybrid agent-based LB algorithm for cloud computing using Bees algorithm and queuing theory for Infrastructure as a Service platform. The proposed algorithm solves the problem of load unbalance and ensures high resource utilisation with minimum response time.

International Journal of Advanced Computer Science and Applications, 2021
Cloud computing has become an essential source for modern trade or market environments by abled f... more Cloud computing has become an essential source for modern trade or market environments by abled frameworks. The exponential growth of cloud computing services in the last few years has resulted in extensive use, especially in storing and sharing the data on various cloud servers. The current trend in the cloud shows that the cloud owners use relative functions and target areas in such a way that cloud customers access or store their data either in the same servers or related servers. Simultaneously, from the security point of view, the lack of confidence about the customer's data on the cloud server is still questionable. The hour's need is to provide the cloud service in a 'single port way' by forming the joint management policy to increase customer satisfaction and profitability. In addition to this, the authentication steps also need to be improvised. This paper discusses issues on the security authentication and access provisioning of the cloud service consumers in federated clouds using subscribed user identity. This work proposes the user identity verification module (UidVM) in the cloud service consumer's authentication process to serve as a cloud broker to minimize the work overloads on the central cloud federation management system, thus enhancing the cloud security.

International Journal of Advanced Research in Computer Science, 2017
Hadoop is a structure for BigData handling in distributed applications. Hadoop bunch is worked fo... more Hadoop is a structure for BigData handling in distributed applications. Hadoop bunch is worked for running information intensive distributed applications. Hadoop distributed file system is the essential stockpiling territory for BigData. MapReduce is a model to total undertakings of a job. Task assignment is conceivable by schedulers. Schedulers ensure the reasonable assignment of assets among clients. At the point when a client presents a job, it will move to a job queue. From the job queue, job will be divided into tasks and distributed to various nodes. By the correct assignment of tasks, job finish time will decrease. This can guarantee better execution of the job. This paper gives the comparison of different Hadoop Job Schedulers. Keywords: Hadoop, HDFS, MapReduce, Scheduling, FIFO Scheduling, Fair Scheduling, Capacity Scheduling

The rapid evolution of location-based services has made tremendous changes in the society. In thi... more The rapid evolution of location-based services has made tremendous changes in the society. In this paper, Trilateration method is implemented in fingerprinting methodology to obtain very precise and low error position details of the client portable device. Trilateration is a method in which the portable device is determined by the received signal strength intersecting at one position from the three reference points. Fingerprinting method involves several steps like training stage and positioning stage in which the training stage consists of the creation of the database of the signal strengths along with its associated location measurements. In the positioning step where effective and efficient received signal strength collected from the portable device is matched with the data saved into the database to get the position information of the client. The position of the user is estimated by collecting the received signal strengths from three reference points by using the concepts of tri...

Due to the wide acceptability of the industry for cloud computing, variety of applications are de... more Due to the wide acceptability of the industry for cloud computing, variety of applications are designed targeting to cloud platform which makes efficient load balancing a major bottleneck for the above. To improve the efficiency of the cloud platform, a judicial distribution of workload among the available resources needs to be ensured. To share the workload in an effective way, a proper load balancing strategy is important. This strategy comprises of information policy, triggering policy, resource type policy and selection policy. Since cloud applications are running in a distributed scenario, through this paper, researcher suggests a selection policy for load balancer in a distributed environment. © 2015 Elixir All rights reserved. An Effective Selection Policy in Load Balancer to Enhance the Cloud Performance Shoney Sebastian 1 and Ganeshan N 2 1 Department of Computer Science, Christ University, Bangalore. 2 Director (MCA), RICM, Bangalore.
1Department of Computer Science, Christ University, Bangalore 2 Department of Computer Science, C... more 1Department of Computer Science, Christ University, Bangalore 2 Department of Computer Science, Christ University, Bangalore ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract This paper talks about block chain technology and its working principle. The paper is drafted to create an understanding of the blockchain technology and how it is different from the currently used centralized transactions systems. The paper also describes the advantages of block chain and various evaluation techniques.

International Journal of Electrical and Computer Engineering (IJECE), 2019
The verification of vehicle documents is an important role of transport department which is risin... more The verification of vehicle documents is an important role of transport department which is rising day by day due to the mass registration of the vehicles. An automated vehicle verification system can improve the efficiency of this process. In this paper, we propose an IOT based vehicle verification system using RFID technology. As a result, the vehicle checking which is done now manually can be replaced by automation. There is a loss of a significant amount of time when the normal vehicle checking is done manually. The proposed system will make this process automated. The present verification process is using inductive loops that are placed in a roadbed for detecting vehicles as they pass through the loop of the magnetic field. Similarly, the sensing devices spread along the road can detect passing vehicles through the Bluetooth mechanism. The fixed audio detection devices that can be used to identify the type of vehicles on the road. Other measurements are fixed cameras installed...
International Journal of Electrical and Computer Engineering (IJECE), 2019
Localisation technologies have always remained in the limelight of positioning-science as researc... more Localisation technologies have always remained in the limelight of positioning-science as researchers have ever shown keen interest to know the exact positions of things. Ultrasonic sensors are mainly used for localisation of mobile robots since they provide high accuracy. This paper presents Taylor Series Method in Time Difference of Arrival approach using ultrasonic sensors.Signals are send from the sensors periodically.The time difference of arrival of signals from the ultrasonic sensors is used by the receiver unit to estimate the location of the mobile unit. The equations formed by using Time Difference of Approach are solved using Taylor Series Method. Taylor Series Method provides a more accurate result since they give less error compared to other methods and they ignore the measurement errors.

International Journal of Electrical and Computer Engineering (IJECE), 2019
With an increase in population, there is an increase in the number of accidents that happen every... more With an increase in population, there is an increase in the number of accidents that happen every minute. These road accidents are unpredictable. There are situations where most of the accidents could not be reported properly to nearby ambulances on time. In most of the cases, there is the unavailability of emergency services which lack in providing the first aid and timely service which can lead to loss of life by some minutes. Hence, there is a need to develop a system that caters to all these problems and can effectively function to overcome the delay time caused by the medical vehicles. The purpose of this paper is to introduce a framework using IoT, which helps in detecting car accidents and notifying them immediately. This can be achieved by integrating smart sensors with a microcontroller within the car that can trigger at the time of an accident. The other modules like GPS and GSM are integrated with the system to obtain the location coordinates of the accidents and sending ...

International Journal of Informatics and Communication Technology (IJ-ICT), 2019
Data mining can be defined as a process of extracting unknown, verifiable and possibly helpful da... more Data mining can be defined as a process of extracting unknown, verifiable and possibly helpful data from information. Among the various ailments, heart ailment is one of the primary reason behind death of individuals around the globe, hence in order to curb this, a detailed analysis is done using Data Mining. Many a times we limit ourselves with minimal attributes that are required to predict a patient with heart disease. By doing so we are missing on a lot of important attributes that are main causes for heart diseases. Hence, this research aims at considering almost all the important features affecting heart disease and performs the analysis step by step with minimal to maximum set of attributes using Data Mining techniques to predict heart ailments. The various classification methods used are NaĂŻve Bayes classifier, Random Forest and Random Tree which are applied on three datasets with different number of attributes but with a common class label. From the analysis performed, it shows that there is a gradual increase in prediction accuracies with the increase in the attributes irrespective of the classifiers used and NaĂŻve Bayes and Random Forest algorithms comparatively outperforms with these sets of data.
Indoor Location Tracking using Time of Arrival Estimation Method
International Journal of Sensors, Wireless Communications and Control, 2019
Location-based services enable collection of location-oriented information which finds use in var... more Location-based services enable collection of location-oriented information which finds use in various fields. The most common application is to navigate through places, finding or tracking your personal belongings, targeted advertisements by knowing the nearby popular places and various other services like augmented reality gaming among others. Through this paper, we demonstrate a method to track the location of a mobile sensor node using Trilateration algorithm with the help of Time of Arrival (ToA) property of signals. The accuracy and performance of the simulated wireless sensor network are compared and analyzed.
International Journal of Electrical and Computer Engineering (IJECE), 2018
In the present age, cellular phones are the largest selling products in the world. Big Data Analy... more In the present age, cellular phones are the largest selling products in the world. Big Data Analytics is a method used for examining large and varied data, which we know as big data. Big data analytics is very useful for understanding the world of cellphone business. It is important to understand the requirements, demands, and opinions of the customer. Opinion Mining is getting more important than ever before, for performing analysis and forecasting customer behavior and preferences. This study proposes a framework about the key features of cellphones based on which, customers buy them and rate them accordingly. This research work also provides balanced and well researched reasons as to why few companies enjoy dominance in the market, while others do not make as much of an impact.

Oriental journal of computer science and technology, 2017
It is essential to maintain a ratio between privacy protection and knowledge discovery. Internet ... more It is essential to maintain a ratio between privacy protection and knowledge discovery. Internet users depend daily on SSL/HTPS for secure communication on internet. Over the years, many attacks on the certificate trust model it uses have been evolved. Mutual SSL authentication shared verification alludes to two parties validating each other through checking the digital certificate so that both sides are guaranteed of the other’s identity. In technical terms, it alludes to a client (web program or client application) authenticate themselves to the server (server application) and that server likewise confirming itself to the client through checking the general public key certificate issued by trusted Certificate Authorities (CA). Since confirmation depends on computerized Certificate, certification authorities, for example, Verisign or Microsoft Declaration Server are a critical part of mutual authentication process. From an abnormal state perspective, the way toward authenticating a...

International Journal of Advanced Research, 2017
Securing portable devices with the help of existing technology of Bit-Locker drive encryption, wi... more Securing portable devices with the help of existing technology of Bit-Locker drive encryption, with more security of reset operations, if you lost your portable devices like memory cards, pen drive etc. The main objective is to make Data more secured and unauthorized access is denied when they try to access the personal information that are present in SD card after the User lost his/her Mobile/SD card. Methods: a performance difference between Bit-Locker enabled device and Bit-Locker not enabled device with varying of read/write operation is more in non-enabled Bit-Locker device, so we will suggest to encrypt SD card using Existing Method Bit-Locker and also we suggest an Idea that User can Encrypt once in Windows Platform and Decrypt in Other Platform (Ex: Ubuntu) better way of protecting the SD card. Findings: The issues of Bit-Locker device that is we enabled Bit-Locker drive encryption, even the drive is locked but the user can be able to format the entire drive without any interruption.so we have given better solution for these type of problem and also if you lost your portable device without encrypting the unknown user can easily misuse the data present in portable device, so we provided a solution if any unknown user wants to access your data it will ask for password, if unknown user enters 5 times wrong password the portable device will be locked and all the data is format the unknown user cannot perform any read/write operation on portable device. And also if we enabled bitlocker drive encrypted it will have decrypted in windows operating system so we introduced a concept of encrypt once and decrypt in any operating system [EODAOS]. Improvements: The privacy data is more secured compared to Bit-Locker technology, with reset operation if unknown user enters five times wrong password the portable device will be format and lock the portable device with read/write operations. Performance is more improved.

Oriental journal of computer science and technology, 2017
Traditional way of storing such a huge amount of data is not convenient because processing those ... more Traditional way of storing such a huge amount of data is not convenient because processing those data in the later stages is very tedious job. So nowadays, Hadoop is used to store and process large amount of data. When we look at the statistics of data generated in the recent years it is very high in the last 2 years. Hadoop is a good framework to store and process data efficiently. It works like parallel processing and there is no failure or data loss as such due to fault tolerance. Job scheduling is an important process in Hadoop Map Reduce. Hadoop comes with three types of schedulers namely FIFO (First in first out), Fair and Capacity Scheduler. The schedulers are now a pluggable component in the Hadoop Map Reduce framework. This paper talks about the native job scheduling algorithms in Hadoop. Fair scheduling algorithm is analysed with its algorithm considering its response time, throughput and performance. Advantages and drawbacks of fair scheduling algorithm is discussed. Impr...
The objective of this paper is to highlight the implementation of dynamic memory allocation using... more The objective of this paper is to highlight the implementation of dynamic memory allocation using arrays and how it is better than other methods. It is often observed that parking vehicles manually takes longer time wherein user searches the parking area and parks the vehicle which is a tedious task, to save the time spent for searching the slot a registration based application circle parking system is designed which provides platform to users to book parking spaces online in advance for a given location and then park the vehicle with a minimal fees. This application allocates slots dynamically using array and stores the booking details. This paper discusses the benefits of the dynamic allocation in circle parking system.

Cloud computing is emerging as a new paradigm for manipulating, configuring, and accessing large ... more Cloud computing is emerging as a new paradigm for manipulating, configuring, and accessing large scale distributed computing applications over the network. Load balancing is one of the main Challenges in cloud computing which is required to distribute the workload evenly across all the nodes. Load is a measure of the amount of work that a computation system performs which can be classified as CPU load, network load, memory capacity and storage capacity. It helps to achieve a high user satisfaction and resource utilization ratio by ensuring an efficient and fair allocation of every computing resource. Proper load balancing aids in implementing fail-over, enabling scalability, over-provisioning, minimizing resource consumption and avoiding bottlenecks etc. This paper describes a survey on load balancing algorithms in cloud computing environment along with their corresponding advantages, disadvantages and performance metrics are discussed in detail.
Uploads
Papers by Shoney Sebastian