Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by S. Sakthivel
Total Records ( 2 ) for S. Sakthivel
  T. Satish Kumar , S. Sakthivel and M. Manjunatha Swamy
  For high performance computing using distributed memory architecture, MPI is the de-facto standard. To achieve high system performance the MPI communication routines have to be optimized. This can be done by tuning the runtime parameters. But, to find the optimal values for the important runtime parameter is a challenging task. Several hundred runs are required and the parameter values found are specific to a particular input. In this study, certain standard benchmarks are used to overcome this problem so that the optimal values found for the parameters can be used for other similar applications. Two heuristic algorithms: Genetic algorithm and Simulated Annealing algorithm are used to find the optimal MPI runtime parameter values. It is proved to have significantly reduced the time and effort in predicting the parameters. A comparison is made among two algorithms and also among variations in Genetic algorithm based on performance gain obtained using optimal runtime parameter values with respect to default MPI parameter values.
  S. Kasthuripriya , B. Dhiyanesh and S. Sakthivel
  A DDos Attack is based on cloud security, where each cloud system transfers data to the neighbor cloud system. Access Point (AP) need not be in the reach of all the cloud system in the service area. Cloud system around the AP forward the packets from the distant cloud system to the next node. Cloud service area have the advantages, they can work in a suburbanized fashion, area unit low cost with minimum investment for initial infrastructure, more reliable, scalable and provide increased coverage. The Distributed Denial of Service attacks (DDoS) have become more and more frequent and caused some fatal issues within the recent time. Web user’s expertise Denial of Service (DoS) attacks every day. The completions of the planned method bring no modification on in progress steering software. The Local Flow Trust based Service Monitoring (LFTSM) in addition to trust model require keep post on the offered routing cloud system which is tremendously hard to reach on the service area. On the other hand, our planned method can labor separately as an additional unit on routers for monitor and recording flow in order and communicating with its upstream and downstream data transfer at what occasion the pushback practice is approved out. We are getting to gift Associate with an Analytical approach which can use reactive defense mechanism to mitigate the DDoS attack and any improve topographic point performance in terms of less computation time. Any the simulation result proves it to be a better result familiarized approach.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility