V. Govindasamy

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The Harmony Search (HS) method is an emerging metaheuristic optimization algorithm, which has been employed to cope with numerous challenging tasks during the past decade. In this paper, the essential theory and applications of the HS algorithm are first described and reviewed. Several typical variants of the original HS are next briefly explained. As an(More)
Complex Event Processing (CEP) is the most favorable platform to build and execute multiple numbers of real-time applications. This paper briefly describes about Web Data Extraction method. It has been implemented on multiple online shopping portals to extract the data in a structured way. Complex Event Processing method has been implemented over the(More)
In a real-time application scenario, the proposed Probabilistic Fuzzy Logic (PFL) approach can be implemented in various applications such as health care, stock trading, click stream analysis, retail and supply chain management. This work analyses stock trading due to its high non-linear, uncertain and dynamic data over time. Therefore, this paper presents(More)
— A study of awareness of landslide hazards have been conducted among secondary school teachers. The survey focused on four schools which are located in landslide areas and questionnaire methodologies were adopted to collect data from each school. Guided and close-ended questionnaires were distributed to 60 teachers in four selected schools in Penang(More)
Landslide is a growing global threat and has been destroying lives and property of humankind. In most cases, the damages inflicted could be mitigated if there is a proper knowledge and awareness among the students. Students are playing an important role in maintaining a safe environment and harmony as well as the hope of the nation. Moreover, they(More)
—Distributed Denial of Service threats has become the real threat to the security of the Internet. In the critical application areas, the information transmission must be kept secret and confidentiality should be ensured. Such applications are space research, military applications and online transactions. A web referral mechanism will defend against attacks(More)
  • 1