Dr. Harini N. currently serves as Assistant Professor at Department of Computer Science and Engineering, School of Engineering, Coimbatore Campus. Her areas of research include Security.






Publication Type: Journal Article
Year of Conference Publication Type Title
2015 Journal Article H. A. Raman, MuraliKrishnan, E., Abishek, M., SaiSandhesh, R., Vijaykanth, K., and N. Harini, “Analysis of twitter feeds using natural language processing and machine learning”, International Journal of Applied Engineering Research, vol. 10, pp. 18911-18916, 2015.[Abstract]

Cyber bullying is a rapidly burgeoning phenomenon in to-days world dominated by the Internet. From every major incident happening around the world to meager day-to-day activities of an individual is posted on social media. Ergo, Internet has now become an essentiality that is indispensable. Though this seems intriguing, however, it has led to the advent of cyber bullying. Social networking sites provide an easy platform for the cyber bullies to identify and victimize other users. Cyber bullies may make use of victims personal data(e.g. real name, home address) to impersonate them, or by creating fake accounts in social networking sites that defames, discredits or ridicules them. Due to the anonymity of the Cyber bullies it becomes increasingly difficult for the o ender to be caught and punished for their behavior. This paper proposes a system which identifies posts which are aimed at hurting the sentiments of other users and makes the user to rethink and hence refrain from posting the same. This paper also provides an effective algorithm that identifies and reduces the spam content in the users post/tweet. © Research India Publications.

More »»
2013 Journal Article N. Harini and Padmanabhan, T. R., “2CAuth: A new two factor authentication scheme using QR-code”, International Journal of Engineering and Technology, vol. 5, pp. 1087-1094, 2013.[Abstract]

Password based schemes has been the standard means of authentication over decades. Enhancements use entities like ownership (something one possess), knowledge (something one knows), and inherence (something one is) as first factor and mobile phones as token less second factor, in combinations, to offer different levels of security assurances, trading off usability. In this paper we present '2CAuth' a new two factor authentication scheme that enhances secure usage of application information and preserves usability, without sacrificing user's privacy. A significant feature of the scheme is that it DOES NOT call for any synchronization between Mobile Network Operator (MNO) and users. The analysis of the scheme clearly brings out its effectiveness in terms of its usability even at times of peak loads on mobile networks. The scheme has the dual advantage of carrying out the verification of transactions which involve the physical presence of the user as well as those to be done in his absence.

More »»
2013 Journal Article N. Harini and Padmanabhan, T. R., “Admission Control and Request Scheduling for Secured-concurrent-available Architecture”, International Journal of Computer Applications, vol. 63, pp. 24-30, 2013.[Abstract]

The Internet society is continuously growing and the need of performance studies in this field is essential in order to obtain better throughput for the Web users. Moreover, Internet applications and clients have varied service expectations and demand provisioning of different levels of QoS to multiple traffic classes on the Internet. Meeting client QoS expectations prove to be a difficult task for E-Commerce service providers, especially when web servers experience overload conditions that cause increased response time, request rejections, user frustration, lowered usage of the service and reduced revenues. A recently proposed MLF (Multi Layered Filtering) framework manages potential workload; it also guaranties data freshness for all transactions that complete within their deadlines without service differentiation using request filtering and admission control schemes. In this paper, an improved request classifier and class-based admission control scheme called Multi-phase Admission Control (MPAC) that can be integrated with the MLF framework to prioritize user requests into several service classes according to their importance, and offer differentiated quality of service in terms of minimizing the frustration of premium users is presented and evaluated. The performance evaluations carried out confirm that the scheme can significantly boost the reward for having serviced a request while providing better QoS to clients. More »»
Publication Type: Conference Proceedings
Year of Conference Publication Type Title
2014 Conference Proceedings Senthil Kumar Mathi, Aishwarya, M., K. Vaishnavi, S., Sukanya, R., Aiswariya, C., and N. Harini, “An Improved Authentication Scheme Using Colour QR Codes”, International conference on Adaptive Technologies for Sustainable Growth (ICATS-2014), . pp. 65-72, 2014.
2012 Conference Proceedings N. Harini and Padmanabhan, T. R., “A secured-concurrent-available architecture for improving performance of web servers”, Communications in Computer and Information Science, vol. 292 CCIS. Bangalore, pp. 621-631, 2012.[Abstract]

As Internet services become more popular and pervasive, a serious problem that arises is managing the performance of services under intense overload. Models and mechanisms proposed by researchers till date either stop answering requests or give answers based on incomplete/stale data, specifically when Web servers become saturated. The paper provides two contributions to the study of improving the performance of Web servers in terms of support for massive concurrency. Firstly it outlines the factors necessary to build scalable Web servers and the research contributions made to these. Secondly it illustrates how these factors can be combined and applied to obtain architecture for highly concurrent Internet services. The proposed scheme addresses the issues of overload and staleness effectively and ensures that more number of legitimate requests is answered with complete data. It is shown to improve Web QoS for commercial Web servers through control mechanisms that offer adaptive load shedding,improved availability, and secure transactions using a multi layered filtering scheme. Our experimental results show that the proposed architectural framework provides a simpler programming model that achieves superior performance. © 2012 Springer-Verlag.

More »»
Faculty Details



Faculty Research Interest:

Faculty Email: