K . Karthick

  • Citations Per Year
Learn More
Support vector machines (SVM) methods have become increasingly popular tools for data mining tasks viz., classification, regression and novelty detection. The present paper deals with classification of Indian industries using SVM. Industries stable for one month period in NIFTY was selected, of which 50 companies in NIFTY, 32 were found to be stable. Twenty(More)
Trust management is an important issue in a grid environment where consumers and service providers are distributed geographically across autonomous administrative domains. In this paper, we propose reputation-based trust management architecture through the use of intermediaries, brokers. This architecture insists on multiple brokers in each domain. The(More)
In most of the trust-based systems, intermediaries, known as brokers, are responsible for the selection of Service Providers (SPs) for consumer requests. In such models, the intermediaries gain monetary benefit for each of the transactions made through them. This may lead to favoritism & bias in the selection of suitable SPs. This challenge may be(More)
In this article, we will report some recent progress on wireless power transfer (WPT) based on resonant coupling. Two major technologies will be discussed: the use of metamaterials, and array of coupled resonators. With a slab of metamaterial, the near-field coupling between two resonant coils can be enhanced; the power transfer efficiency between coils is(More)
Currently more than 1 billion adults are overweight -and at least 300 million of them are clinically obese. Article from World Health Organisation mentioned that obese is the major cause for Diabetics, cardio vascular problem and cancer. Change in food habits and lack of physical activities are the main reason for obese. Daily food choices affect our short(More)
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new emerging technology, users’ fears of losing control(More)
  • 1