Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where M. A. Maluk Mohamed is active.

Publication


Featured researches published by M. A. Maluk Mohamed.


international conference on information technology: new generations | 2010

A DHT-Based Process Migration Policy for Mobile Clusters

Y. Mohamadi Begum; M. A. Maluk Mohamed

A mobile cluster experiences disruption in execution of long-running applications because of its highly dynamic nature. Process migration is a solution for handling such dynamism to have seamless computing with minimal disruption. The challenge in process migration is that it should take considerably less time. This work is a novel effort at such a goal that employs a heap-based super P2P structure for the cluster. The P2P cluster transfers process state in terms of object migration between the peers through the base station. Also, while migrating processes, care is taken to maintain load balancing. As the mobile cluster has heterogeneous nodes with varying processing capabilities, we devise a mechanism for computing the capabilities of these nodes. Considering the capability and current load of the nodes the destination for process migration is chosen.


data engineering for wireless and mobile access | 2011

An improved kangaroo transaction model using surrogate objects for distributed mobile system

S. Ravimaran; M. A. Maluk Mohamed

The rapid growth in the use of wireless communication and mobile devices has created a potential for variety of mobile transaction support. The variety of mobile transaction models have already been developed for dealing with different challenging requirements in this environment. However, a transaction management in mobile computing environment faces several challenges such as scarce bandwidth, limited energy resources, asymmetry in wired and wireless connectivity, asymmetry in mobile and fixed hosts, and mobility of host and their limitations. Due to these constraints, data loss, frequent disconnection, unpredicted number of wireless and wired access and high transaction aborts have been occurred. In this paper we propose a new transaction scheme called Surrogate Object based mobile transaction model. The main focus is to support data caching at surrogate object for faster data access and database operations among mobile transactions at different mobile hosts in mobile environment. This is done by creating the surrogate object in the static network to act on behalf of each mobile device. One consequence of using the surrogate object model is that mobile devices would be transparent to the instability of wireless communication. The surrogate object can remain active, maintaining information regarding the current state and plays an active role on behalf of the device and reduces the network congestions, overcomes the asymmetry in wired and wireless access and achieve the low abort rate. The performance of the proposed model for mobile transaction is evaluated and compared in the absence of surrogate object. Results showed that a significant reduction in wireless access and abort probability can be obtained with the proposed model when measuring performance metrics.


annual acis international conference on computer and information science | 2009

An Empirical Performance Metrics Measurement and Analysis of Software Platforms for Implementation of Web Services

K. Velmurugan; M. A. Maluk Mohamed

Web services play a vital role in the paradigms of distributed computing and grid computing. Web services can be implemented in different platforms, but the most commonly used platforms are .NET and J2EE as they provide a wide variety of tools for creation and integration of web services to any existing business application. The selection of appropriate platform for implementation is purely based on performance offered by the particular platform. This paper focuses on analyzing the performance of a generic model composed of three tiers for implementing and consuming web services. This generic model is implemented with four different combinations of .NET and J2EE in different tiers. The analysis of performance is carried out with a novel set of four performance metrics proposed and the metrics are based on time spent for actual response and network traffic involved between the different tiers. The performance metrics measurement is observed on the model to study performance of platforms deployed for implementation of web services.


International Journal of Future Computer and Communication | 2012

Data Management in the Mobile Cloud Using Surrogate Object

Ravimaran Shanmugam; M. A. Maluk Mohamed

Cloud computing had resulted in reducing the infrastructure and administrative costs and creating more efficient, flexible and collaborative computing models for business growth. However, managing the data over the cloud which includes mobile devices, namely the mobile cloud, faces several challenges. Building a consistent, secured and efficient transactional data management system for managing large volume of data is one of the major challenges in mobile cloud. In this paper, we propose a Surrogate Object based Cloud Caching (SOCC) mechanism which provides mobile device network to self heal by storing data needed for transactions across multiple surrogate objects over the cloud by analyzing customer requirements and context. The proposed SOCC mechanism ensures low latency, reliability and fault tolerance in transaction management over the mobile cloud. Extensive analysis shows that our proposed mechanism is highly efficient, provides better data management and effectively utilizing the underlying distributed datas over the mobile cloud.


database and expert systems applications | 2007

Advances in Computing Technologies: An Insight

Y. Mohamadi Begum; M. A. Maluk Mohamed

Mobile computing and pervasive computing represent major evolutionary steps in a line of research dating back to the mid-1970s. Ubiquitous computing is another type of computing, next to mainframes and PCs. Although interchangeably used, these technologies have inherent differences in them. This paper attempts to bring out such differences so as to enable better understanding and thereby facing various issues and challenges of the same.


International Journal of Future Computer and Communication | 2013

Distributed Pipes Enforcement in Mobile Grid Environment - A Novel Approach for Task Scheduling

Aghila Rajagopal; M. A. Maluk Mohamed

The Mobile Grid Environment has the dynamic structure in which the position and location of grid changes vigorously. It compounds the pervasive ingression methods of mobile computing and coalition of computational resources from multiple domains to attain a common task. Due to mobility, failure of nodes, disconnection and network partitioning in networks, resource allocation and scheduling is being the demanding problems. We endow with solutions to the above-mentioned problems by implementing pipes in the Mobile grid environment. It is conspicuous that pipes are the collection of segments or processes that are connected in a series which can execute its process concurrently with the other segments or processes in a successive manner. We contrive temporal clusters in our Distributed Pipes Enforcement (DPE) methodology with the determination of demand bound functions and induce master/slave conceits with that in order to augment the efficiency in task completion and abate the resource dissipation. With this, the chances to get erroneous result can be probably avoided. Our approach caters for performance optimization, flexible deployment and consistency. Index Terms—Deadline analysis, demand bound function, master/slave, mobile grid, pipes, scheduling.


mobile data management | 2012

Secured Data Management Paradigm for Mobile Grid Environment Using Surrogate Objects

H. Parveen Begam; M. A. Maluk Mohamed

In mobile grid computing environment mobility, data management and security are some of the major issues. Data management in wireless communication has a double impact on the mobile device which increases the response time for accessing remote data from a mobile host and transmission of data. Security is a very important factor and it is also difficult to achieve owing to the open nature of wireless networks, heterogeneous and distributed environments. The surrogate object model maintains a cache of data stored in the mobile host and reduces wireless data transfers. This model consists of collection of surrogate objects which acts as place holder frame to solve location management problem to handle the mobility of mobile hosts. Mobility and portability pose new challenges to mobile database management and distributed computing like Transaction processing, Caching, Query processing and Replication. The proposed models should support and handle concurrency, recovery, disconnection and mutual consistency of the replicated data objects, as mobile hosts move from one cell to another. Hence adaptive data management technique along with adequate authentication mechanisms must be employed. This paper proposes the secured data management approach for mobile grid environment using surrogate objects. Authentication and secured communication are also discussed. Authentication protocol is built on top of surrogate objects to deals with the security issues in a mobile grid environment. Authentication protocol is built on communication services to provide cryptographically secure mechanisms for verifying the identity of users and resources. The predefined certificate standard X.509 is used for authentication. The secured communication between two mobile hosts is made possible through SSL/TLS. Data sanitation process, which means copying the data from MSS to SO is adopted to protect our information.


International Journal of Future Computer and Communication | 2012

Sensor Grid Based Vision Status Monitoring in Eye Care System

M. Anitha; S. Ravimaran; M. A. Maluk Mohamed; M. Anbazhagan

Wireless sensor networks play an important role in various applications including health care monitoring of patients. In health care monitoring various health conditions of patients are monitored by using bio medical sensor including the field of Ophthalmology for monitoring oculomotor behavior, cognitive visual function and vision deficiencies in diverse environments for various post surgical treatment. The Bio sensors deployed in this environment are resource constraint in nature with limited processing and communication power. The work have proposed Sensor Grid architecture called sensor grid based vision status monitoring in eye care system for monitoring the vision status of different groups of eye patients to provide a platform for ophthalmologists to share computational resources to facilitate quantifiable eye-movement analysis, diagnose and treat abnormalities or ocular disease in clinical situations to reduce the dormant propagation of eye diseases. The paper proposes a novel unique simulated model integrating ophthalmological sensors (bio sensors) with the grid to process and store the collected ophthalmology data to achieve better vision prediction rate in ophthalmological field with low latency, increased throughput and proper load balancing across the sensor grid.


International Journal of Future Computer and Communication | 2012

Intrusion Prevention System in VPN with Entities Based Access Rule and Vibrant Key Authentication.

Kanimozhi G; S. Ravimaran; M. A. Maluk Mohamed

VPN technology continues to struggle with intruders attacks that cripple their network performance and connectivity. This compels security threats on the remote network because its firewall does not know what transfer is flowing within VPN tunnel. This paper proposes a new framework called V-Safe which provides vibrant key authentication and entities based access rule to prevent intruders. The traditional access rule models are group based and it is not an effective mechanism since it uses common identity for access control. The entities based access rule provides access permission based on various entities like requestors, resources, actions and environment that will prevent against intruders and performs deep scans to detect and block most suspicious threats and attacks. The V-Safe framework is evaluated through simulation and it shows the proposed system is more secure and efficient than the existing intrusion prevention system.


International Journal of Future Computer and Communication | 2012

Reliable and Fault Tolerant Mobile Transaction Paradigmusing Surrogate Object

S. Ravimaran; Kanimozhi G; M. A. Maluk Mohamed

67 Abstract—Today vast practical expansion in mobile technology have possibly allowed service consumer and service providers to replace the traditional transaction process into Mobile transaction process. Due to the various challenges in the both traditional and distributed transaction systems, the advanced Mobile Transaction process yields several benefits and flexibility to both consumer and provider. However, more critical issues have not yet fully deal with in mobile transaction system, mainly because of security concern. This paper propose a reliable and fault tolerant Mobile Transaction paradigm using surrogate object which provides a text based as well as biometric authentication which has finger print and face recognition for strong authentication and utilizes cryptographic method for securing the Mobile transaction process. And moreover, efficient fault tolerance mechanism which helps in case of the mobile device gets switch off or any network connectivity issues occurs, to provide an optimal mobile transaction process to an authorized user with increased reliability, that can be done by using this surrogate object model. This new approach is evaluated through simulation and it shows the proposed system is more reliable and secured than the existing Mobile transaction process.

Collaboration


Dive into the M. A. Maluk Mohamed's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge