Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
 
Articles by K.S. Easwarakumar
Total Records ( 3 ) for K.S. Easwarakumar
  M. Sugumaran , K.S. Easwarakumar and P. Narayanasamy
  Meeting scheduling is generally considered as one of the most common activities that takes place in organizations. The basic problem in meeting scheduling is to find a common free time for all participants of a particular meeting. It is an important activity in many organizations as most of the office workers spend much of their times in meeting scheduling. It is a time-consuming, iterative and tedious task. There exists several solutions in the literature for centralized calendar management and meeting scheduling, but they are of limited success. In this paper, we propose a new approach based on A-algorithm using heuristic function for meeting scheduling, which is performs effectively even in the case of larger problem instances than the existing algorithm.
  A. Anasuya Threse Innocent , V. Kavitha and K.S. Easwarakumar
  The increasing network transaction of sensitive information needs an efficient and secured way of information transmission. In today’s era of Information Technology, there is a strong need for transmitting heavy volumes of information within the available bandwidth. This can be achieved by means of compression techniques thereby the efficiency of data transmission is increased. Data security has to be incorporated for secure transaction of sensitive data. Cryptographic technique ensures privacy by keeping the information hidden from anyone to whom it is not intended. The present scenario does encryption and compression as individual process to achieve secure and effective transmission. Pre-analysis proves that performing compression and then encryption is the best. To overcome the individual compression and encryption process and to minimize the time of execution, this trigonometry approach does simultaneous compression and encryption.
  A. Merry Ida , V. Kavitha and K.S. Easwarakumar
  In e-commerce applications Authentication is provided with the combination of user id and password that results in fraud and misuse. Automated biometrics technology in general and fingerprints in particular, provide an accurate and reliable authentication method. However, fingerprint based authentication requires accessing fingerprint images scanned remotely at the user`s workstation, a potentially weak point in the security system. Even though the communication channel is encrypted, stored or synthetic fingerprint images might be fraudulently transmitted. To enhance security, embedding additional information directly in compressed fingerprint images can use data hiding technique. Integrity is incorporated while transmitting fingerprint for authentication. Data Integrity is achieved by hashing the features of fingerprint to that of Unique Person Identification (UPID).
 
 
 
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility