-
A Regularization for Time-Fractional Backward Heat Conduction Problem with Inhomogeneous Source Function
Authors:
Vighnesh V. Alavani,
P. Danumjaya,
M. Thamban Nair
Abstract:
Recently, Nair and Danumjaya (2023) introduced a new regularization method for the homogeneous time-fractional backward heat conduction problem (TFBHCP) in a one-dimensional space variable, for determining the initial value function. In this paper, the authors extend the analysis done in the above referred paper to a more general setting of an inhomogeneous time-fractional heat equation involving…
▽ More
Recently, Nair and Danumjaya (2023) introduced a new regularization method for the homogeneous time-fractional backward heat conduction problem (TFBHCP) in a one-dimensional space variable, for determining the initial value function. In this paper, the authors extend the analysis done in the above referred paper to a more general setting of an inhomogeneous time-fractional heat equation involving the higher dimensional state variables and a general elliptic operator. We carry out the analysis for the newly introduced regularization method for the TFBHCP providing optimal order error estimates under a source condition by choosing the regularization parameter appropriately, and also carry out numerical experiments illustrating the theoretical results.
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
Three fold Spin valley intertwined Dirac cone in nonmagnetic Weyl Semimetal Pt$_3$Sn$_2$S$_2$ with the Kagome lattice A theoretical DFT perspective
Authors:
Ravi Trivedi,
Seetha Lakshmy,
Heera T. Nair,
Alok Shukla,
Brahmananda Chakraborty
Abstract:
Recent experimental and theoretical research in Pt$_3$Sn$_2$S$_2$ have opened avenues for restoring Dirac dispersion in layered materials. Inspired by this we conducted first-principles DFT calculations unveiling a novel nonmagnetic metal Pt$_3$Sn$_2$S$_2$ with a robust Dirac dispersion. Under strong SOC and high pressure the Fermi surface topology shifts yielding spin valley intertwined Dirac con…
▽ More
Recent experimental and theoretical research in Pt$_3$Sn$_2$S$_2$ have opened avenues for restoring Dirac dispersion in layered materials. Inspired by this we conducted first-principles DFT calculations unveiling a novel nonmagnetic metal Pt$_3$Sn$_2$S$_2$ with a robust Dirac dispersion. Under strong SOC and high pressure the Fermi surface topology shifts yielding spin valley intertwined Dirac cones and three fold charge density waves due to inversion symmetry breaking. Thermal conductivity and Seebeck coefficient exhibit an inverse relationship with temperature due to increased phonon collisions attributed to anharmonic phonon phonon interactions via Umklapp processes. Ab initio molecular dynamics and phonon dispersion calculations confirm the dynamic and thermal stability of Pt$_3$Sn$_2$S$_2$ illuminating the origin of its Dirac cone and electronic properties.
△ Less
Submitted 20 May, 2024;
originally announced May 2024.
-
A source identification problem in a bi-parabolic equation: convergence rates and some optimal results
Authors:
Subhankar Mondal,
M. Thamban Nair
Abstract:
This paper is concerned with identification of a spatial source function from final time observation in a bi-parabolic equation, where the full source function is assumed to be a product of time dependent and a space dependent function. Due to the ill-posedness of the problem, recently some authors have employed different regularization method and analysed the convergence rates. But, to the best o…
▽ More
This paper is concerned with identification of a spatial source function from final time observation in a bi-parabolic equation, where the full source function is assumed to be a product of time dependent and a space dependent function. Due to the ill-posedness of the problem, recently some authors have employed different regularization method and analysed the convergence rates. But, to the best of our knowledge, the quasi-reversibility method is not explored yet, and thus we study that in this paper. As an important implication, the H{ö}lder rates for the apriori and aposteriori error estimates obtained in this paper improve upon the rates obtained in earlier works. Also, in some cases we show that the rates obtained are of optimal order. Further, this work seems to be the first one that has broaden the applicability of the problem by allowing the time dependent component of the source function to change sign. To the best of our knowledge, the earlier known work assumed the fixed sign of the time dependent component by assuming some bounded below condition.
△ Less
Submitted 2 May, 2023; v1 submitted 17 April, 2023;
originally announced April 2023.
-
A new regularisation for time-fractional backward heat conduction problem
Authors:
M. Thamban Nair,
P. Danumjaya
Abstract:
It is well-known that the backward heat conduction problem of recovering the temperature $u(\cdot, t)$ at a time $t\geq 0$ from the knowledge of the temperature at a later time, namely $g:= u(\cdot, τ)$ for $τ>t$, is ill-posed, in the sense that small error in $g$ can lead to large deviation in $u(\cdot, t)$. However, in the case of a time fractional backward heat conduction problem (TFBHCP), the…
▽ More
It is well-known that the backward heat conduction problem of recovering the temperature $u(\cdot, t)$ at a time $t\geq 0$ from the knowledge of the temperature at a later time, namely $g:= u(\cdot, τ)$ for $τ>t$, is ill-posed, in the sense that small error in $g$ can lead to large deviation in $u(\cdot, t)$. However, in the case of a time fractional backward heat conduction problem (TFBHCP), the above problem is well-posed for $t>0$ and ill-posed for $t=0$. We use this observation to obtain stable approximate solutions for the TFBHCP for $t=0$, and derive error estimates under suitable source conditions. We shall also provide some numerical examples to illustrate the approximation properties of the regularized solutions.
△ Less
Submitted 28 February, 2023;
originally announced March 2023.
-
Conforming and Nonconforming Finite Element Methods for Biharmonic Inverse Source Problem
Authors:
Devika Shylaja,
M. T. Nair
Abstract:
This paper deals with the numerical approximation of the biharmonic inverse source problem in an abstract setting in which the measurement data is finite-dimensional. This unified framework in particular covers the conforming and nonconforming finite element methods (FEMs). The inverse problem is analysed through the forward problem. Error estimate for the forward solution is derived in an abstrac…
▽ More
This paper deals with the numerical approximation of the biharmonic inverse source problem in an abstract setting in which the measurement data is finite-dimensional. This unified framework in particular covers the conforming and nonconforming finite element methods (FEMs). The inverse problem is analysed through the forward problem. Error estimate for the forward solution is derived in an abstract set-up that applies to conforming and Morley nonconforming FEMs. Since the inverse problem is ill-posed, Tikhonov regularisation is considered to obtain a stable approximate solution. Error estimate is established for the regularised solution for different regularisation schemes. Numerical results that confirm the theoretical results are also presented.
△ Less
Submitted 14 June, 2021;
originally announced June 2021.
-
Efficient Reservoir Management through Deep Reinforcement Learning
Authors:
Xinrun Wang,
Tarun Nair,
Haoyang Li,
Yuh Sheng Reuben Wong,
Nachiket Kelkar,
Srinivas Vaidyanathan,
Rajat Nayak,
Bo An,
Jagdish Krishnaswamy,
Milind Tambe
Abstract:
Dams impact downstream river dynamics through flow regulation and disruption of upstream-downstream linkages. However, current dam operation is far from satisfactory due to the inability to respond the complicated and uncertain dynamics of the upstream-downstream system and various usages of the reservoir. Even further, the unsatisfactory dam operation can cause floods in downstream areas. Therefo…
▽ More
Dams impact downstream river dynamics through flow regulation and disruption of upstream-downstream linkages. However, current dam operation is far from satisfactory due to the inability to respond the complicated and uncertain dynamics of the upstream-downstream system and various usages of the reservoir. Even further, the unsatisfactory dam operation can cause floods in downstream areas. Therefore, we leverage reinforcement learning (RL) methods to compute efficient dam operation guidelines in this work. Specifically, we build offline simulators with real data and different mathematical models for the upstream inflow, i.e., generalized least square (GLS) and dynamic linear model (DLM), then use the simulator to train the state-of-the-art RL algorithms, including DDPG, TD3 and SAC. Experiments show that the simulator with DLM can efficiently model the inflow dynamics in the upstream and the dam operation policies trained by RL algorithms significantly outperform the human-generated policy.
△ Less
Submitted 7 December, 2020;
originally announced December 2020.
-
AI Tax: The Hidden Cost of AI Data Center Applications
Authors:
Daniel Richins,
Dharmisha Doshi,
Matthew Blackmore,
Aswathy Thulaseedharan Nair,
Neha Pathapati,
Ankit Patel,
Brainard Daguman,
Daniel Dobrijalowski,
Ramesh Illikkal,
Kevin Long,
David Zimmerman,
Vijay Janapa Reddi
Abstract:
Artificial intelligence and machine learning are experiencing widespread adoption in industry and academia. This has been driven by rapid advances in the applications and accuracy of AI through increasingly complex algorithms and models; this, in turn, has spurred research into specialized hardware AI accelerators. Given the rapid pace of advances, it is easy to forget that they are often develope…
▽ More
Artificial intelligence and machine learning are experiencing widespread adoption in industry and academia. This has been driven by rapid advances in the applications and accuracy of AI through increasingly complex algorithms and models; this, in turn, has spurred research into specialized hardware AI accelerators. Given the rapid pace of advances, it is easy to forget that they are often developed and evaluated in a vacuum without considering the full application environment. This paper emphasizes the need for a holistic, end-to-end analysis of AI workloads and reveals the "AI tax." We deploy and characterize Face Recognition in an edge data center. The application is an AI-centric edge video analytics application built using popular open source infrastructure and ML tools. Despite using state-of-the-art AI and ML algorithms, the application relies heavily on pre-and post-processing code. As AI-centric applications benefit from the acceleration promised by accelerators, we find they impose stresses on the hardware and software infrastructure: storage and network bandwidth become major bottlenecks with increasing AI acceleration. By specializing for AI applications, we show that a purpose-built edge data center can be designed for the stresses of accelerated AI at 15% lower TCO than one derived from homogeneous servers and infrastructure.
△ Less
Submitted 20 July, 2020;
originally announced July 2020.
-
Identification of matrix diffusion coefficients in a parabolic PDE
Authors:
Subhankar Mondal,
M. Thamban Nair
Abstract:
We consider an inverse problem of identifying the diffusion coefficient in matrix form in a parabolic PDE. In 2006, Cao and Pereverzev, used a \textit{natural linearisation} method for identifying a scalar valued diffusion coefficient in a parabolic PDE. In this paper, we make use of that idea for identifying a matrix valued coefficient, namely, using the notion of a weak solution for a parabolic…
▽ More
We consider an inverse problem of identifying the diffusion coefficient in matrix form in a parabolic PDE. In 2006, Cao and Pereverzev, used a \textit{natural linearisation} method for identifying a scalar valued diffusion coefficient in a parabolic PDE. In this paper, we make use of that idea for identifying a matrix valued coefficient, namely, using the notion of a weak solution for a parabolic PDE, we transform our non-linear inverse problem into a problem of solving an ill-posed operator equation where the operator depending on the data is linear. For the purpose of obtaining stable approximate solutions, Tikhonov regularization is employed, and error estimates under noisy data are derived. We have also showed the uniqueness of the solution of the inverse problem under some assumptions on the data and obtained explicit representation of adjoint of the linear operator involved. For the obtaining error estimates in the finite dimensional setting, Galerkin method is used, by defining orthogonal projections on the space of matrices with entries from $L^2(Ø)$, by making use of standard orthogonal projections on $L^2(Ø)$. For choosing the regularizing parameter, we used the adaptive technique, so that we have an order optimal rate of convergence. Finally, for the relaxed noisy data, we described a procedure for obtaining a smoothed version so as to obtain the error estimates.
△ Less
Submitted 23 June, 2020;
originally announced June 2020.
-
A new regularization method for a parameter identification problem in a non-linear partial differential equation
Authors:
M Thamban Nair,
Samprita Das Roy
Abstract:
We consider a parameter identification problem related to a quasi-linear elliptic Neumann boundary value problem involving a parameter function $a(\cdot)$ and the solution $u(\cdot)$, where the problem is to identify $a(\cdot)$ on an interval $I:= g(Γ)$ from the knowledge of the solution $u(\cdot)$ as $g$ on $Γ$, where $Γ$ is a given curve on the boundary of the domain $Ω\subseteq \mathbb{R}^3$ of…
▽ More
We consider a parameter identification problem related to a quasi-linear elliptic Neumann boundary value problem involving a parameter function $a(\cdot)$ and the solution $u(\cdot)$, where the problem is to identify $a(\cdot)$ on an interval $I:= g(Γ)$ from the knowledge of the solution $u(\cdot)$ as $g$ on $Γ$, where $Γ$ is a given curve on the boundary of the domain $Ω\subseteq \mathbb{R}^3$ of the problem and $g$ is a continuous function. For obtaining stable approximate solutions, we consider new regularization method which gives error estimates similar to, and in certain cases better than, the classical Tikhonov regularization considered in the literature in recent past.
△ Less
Submitted 23 April, 2020; v1 submitted 23 February, 2020;
originally announced February 2020.
-
Regularization of linear ill-posed problems involving multiplication operators
Authors:
Peter Mathé,
M. Thamban Nair,
Bernd Hofmann
Abstract:
We study regularization of ill-posed equations involving multiplication operators when the multiplier function is positive almost everywhere and zero is an accumulation point of the range of this function. Such equations naturally arise from equations based on non-compact self-adjoint operators in Hilbert space, after applying unitary transformations arising out of the spectral theorem. For classi…
▽ More
We study regularization of ill-posed equations involving multiplication operators when the multiplier function is positive almost everywhere and zero is an accumulation point of the range of this function. Such equations naturally arise from equations based on non-compact self-adjoint operators in Hilbert space, after applying unitary transformations arising out of the spectral theorem. For classical regularization theory, when noisy observations are given and the noise is deterministic and bounded, then non-compactness of the ill-posed equations is a minor issue. However, for statistical ill-posed equations with non-compact operators less is known if the data are blurred by white noise. We develop a regularization theory with emphasis on this case. In this context, we highlight several aspects, in particular we discuss the intrinsic degree of ill-posedness in terms of rearrangements of the multiplier function. Moreover, we address the required modifications of classical regularization schemes in order to be used for non-compact statistical problems, and we also introduce the concept of the effective ill-posedness of the operator equation under white noise. This study is concluded with prototypical examples for such equations, as these are deconvolution equations and certain final value problems in evolution equations.
△ Less
Submitted 16 August, 2019;
originally announced August 2019.
-
On truncated spectral regularization for an ill-posed evolution equation
Authors:
M. Thamban Nair
Abstract:
In this note we consider the {\it spectral truncation} as the regularization for an ill-posed non-homogeneous parabolic final value problem, and obtain error estimates under a genral source condition when the data, which consist of the non-homogeneous term as well as the final value, are noisy. The resulting error estimate is compared with the corresponding estimate under the Lavrentieve method, a…
▽ More
In this note we consider the {\it spectral truncation} as the regularization for an ill-posed non-homogeneous parabolic final value problem, and obtain error estimates under a genral source condition when the data, which consist of the non-homogeneous term as well as the final value, are noisy. The resulting error estimate is compared with the corresponding estimate under the Lavrentieve method, and showed that the truncation method has no index of saturation.
△ Less
Submitted 22 July, 2019;
originally announced July 2019.
-
Apache Hive: From MapReduce to Enterprise-grade Big Data Warehousing
Authors:
Jesús Camacho-Rodríguez,
Ashutosh Chauhan,
Alan Gates,
Eugene Koifman,
Owen O'Malley,
Vineet Garg,
Zoltan Haindrich,
Sergey Shelukhin,
Prasanth Jayachandran,
Siddharth Seth,
Deepak Jaiswal,
Slim Bouguerra,
Nishant Bangarwa,
Sankar Hariappan,
Anishek Agarwal,
Jason Dere,
Daniel Dai,
Thejas Nair,
Nita Dembla,
Gopal Vijayaraghavan,
Günther Hagleitner
Abstract:
Apache Hive is an open-source relational database system for analytic big-data workloads. In this paper we describe the key innovations on the journey from batch tool to fully fledged enterprise data warehousing system. We present a hybrid architecture that combines traditional MPP techniques with more recent big data and cloud concepts to achieve the scale and performance required by today's anal…
▽ More
Apache Hive is an open-source relational database system for analytic big-data workloads. In this paper we describe the key innovations on the journey from batch tool to fully fledged enterprise data warehousing system. We present a hybrid architecture that combines traditional MPP techniques with more recent big data and cloud concepts to achieve the scale and performance required by today's analytic applications. We explore the system by detailing enhancements along four main axis: Transactions, optimizer, runtime, and federation. We then provide experimental results to demonstrate the performance of the system for typical workloads and conclude with a look at the community roadmap.
△ Less
Submitted 26 March, 2019;
originally announced March 2019.
-
How practical is it? Machine Learning for Identifying Conceptual Interoperability Constraints in API Documents
Authors:
Hadil Abukwaik,
Mohammed Abufouda,
Thejashree Nair,
Dieter Rombach
Abstract:
Building meaningful interoperation with external software units requires performing the conceptual interoperability analysis that starts with identifying the conceptual interoperability constraints of each software unit, then it compares the systems' constraints to detect their conceptual mismatch. We call the conceptual interoperability constraints (the COINs) that can be of different types inclu…
▽ More
Building meaningful interoperation with external software units requires performing the conceptual interoperability analysis that starts with identifying the conceptual interoperability constraints of each software unit, then it compares the systems' constraints to detect their conceptual mismatch. We call the conceptual interoperability constraints (the COINs) that can be of different types including structure, dynamic, and quality. Missing such constraints may lead to unexpected mismatches, expensive resolution, and running-late projects. However, it is a challenging task for software architects and analysts to manually analyze the unstructured text in API documents to identify the COINs. Not only it is a tedious and time-consuming task, but also it needs knowledge about the constraint types. In this article, we present and evaluate our idea of utilizing machine learning techniques in automating the COIN identification, which is the first step of conceptual interoperability analysis, from human text in API documents. Our empirical research started with a multiple-case study to build the ground truth dataset, on which we contributed our machine learning COIN-Classification Model. We show the model's robustness through experiments using different machine learning text-classification algorithms. The experiments' results revealed that our model can achieve up to 87% accuracy in automatically identifying the COINs in text. Thus, we implemented a tool that embeds our model to demonstrate its practical value in industrial context. Then, we evaluated the practitioners' acceptance for the tool and found that they significantly agreed on its usefulness and ease of use.
△ Less
Submitted 5 December, 2018;
originally announced December 2018.
-
Exploring Uncertainty Measures in Deep Networks for Multiple Sclerosis Lesion Detection and Segmentation
Authors:
Tanya Nair,
Doina Precup,
Douglas L. Arnold,
Tal Arbel
Abstract:
Deep learning (DL) networks have recently been shown to outperform other segmentation methods on various public, medical-image challenge datasets [3,11,16], especially for large pathologies. However, in the context of diseases such as Multiple Sclerosis (MS), monitoring all the focal lesions visible on MRI sequences, even very small ones, is essential for disease staging, prognosis, and evaluating…
▽ More
Deep learning (DL) networks have recently been shown to outperform other segmentation methods on various public, medical-image challenge datasets [3,11,16], especially for large pathologies. However, in the context of diseases such as Multiple Sclerosis (MS), monitoring all the focal lesions visible on MRI sequences, even very small ones, is essential for disease staging, prognosis, and evaluating treatment efficacy. Moreover, producing deterministic outputs hinders DL adoption into clinical routines. Uncertainty estimates for the predictions would permit subsequent revision by clinicians. We present the first exploration of multiple uncertainty estimates based on Monte Carlo (MC) dropout [4] in the context of deep networks for lesion detection and segmentation in medical images. Specifically, we develop a 3D MS lesion segmentation CNN, augmented to provide four different voxel-based uncertainty measures based on MC dropout. We train the network on a proprietary, large-scale, multi-site, multi-scanner, clinical MS dataset, and compute lesion-wise uncertainties by accumulating evidence from voxel-wise uncertainties within detected lesions. We analyze the performance of voxel-based segmentation and lesion-level detection by choosing operating points based on the uncertainty. Empirical evidence suggests that uncertainty measures consistently allow us to choose superior operating points compared only using the network's sigmoid output as a probability.
△ Less
Submitted 16 October, 2018; v1 submitted 3 August, 2018;
originally announced August 2018.
-
Adversarially Learned Mixture Model
Authors:
Andrew Jesson,
Cécile Low-Kam,
Tanya Nair,
Florian Soudan,
Florent Chandelier,
Nicolas Chapados
Abstract:
The Adversarially Learned Mixture Model (AMM) is a generative model for unsupervised or semi-supervised data clustering. The AMM is the first adversarially optimized method to model the conditional dependence between inferred continuous and categorical latent variables. Experiments on the MNIST and SVHN datasets show that the AMM allows for semantic separation of complex data when little or no lab…
▽ More
The Adversarially Learned Mixture Model (AMM) is a generative model for unsupervised or semi-supervised data clustering. The AMM is the first adversarially optimized method to model the conditional dependence between inferred continuous and categorical latent variables. Experiments on the MNIST and SVHN datasets show that the AMM allows for semantic separation of complex data when little or no labeled data is available. The AMM achieves a state-of-the-art unsupervised clustering error rate of 2.86% on the MNIST dataset. A semi-supervised extension of the AMM yields competitive results on the SVHN dataset.
△ Less
Submitted 23 April, 2022; v1 submitted 14 July, 2018;
originally announced July 2018.
-
A Discrete Regularization Method for Ill-Posed Operaror Equations
Authors:
M Thamban Nair
Abstract:
Discrete regularization methods are often applied for obtaining stable approximate solutions for ill-posed operator equations $Tx=y$, where $T: X\to Y$ is a bounded operator between Hilbert spaces with non-closed range $R(T)$ and $y\in R(T)$. Most of the existing such methods involve finite rank bounded projection operators on either the domain space $X$ or on codomain space $Y$ or on both. In thi…
▽ More
Discrete regularization methods are often applied for obtaining stable approximate solutions for ill-posed operator equations $Tx=y$, where $T: X\to Y$ is a bounded operator between Hilbert spaces with non-closed range $R(T)$ and $y\in R(T)$. Most of the existing such methods involve finite rank bounded projection operators on either the domain space $X$ or on codomain space $Y$ or on both. In this paper, we propose a discrete regularization based on finite rank projection-like operators on some subspace of the codomain space such that their ranges need not be subspaces of the codomain space. This method not only incudes some of the exisiting projection based methods but also a quadrature based collocation method considered by the author in \cite{mtn-acm} for integral equations of the firt kind.
△ Less
Submitted 29 June, 2016;
originally announced June 2016.
-
Priority based bandwidth allocation in wireless sensor networks
Authors:
Mary Cherian,
T. R. Gopalakrishnan Nair
Abstract:
Most of the sensor network applications need real time communication and the need for deadline aware real time communication is becoming eminent in these applications. These applications have different dead line requirements also. The real time applications of wireless sensor networks are bandwidth sensitive and need higher share of bandwidth for higher priority data to meet the dead line requirem…
▽ More
Most of the sensor network applications need real time communication and the need for deadline aware real time communication is becoming eminent in these applications. These applications have different dead line requirements also. The real time applications of wireless sensor networks are bandwidth sensitive and need higher share of bandwidth for higher priority data to meet the dead line requirements. In this paper we focus on the MAC layer modifications to meet the real time requirements of different priority data. Bandwidth partitioning among different priority transmissions is implemented through MAC layer modifications. The MAC layer implements a queuing model that supports lower transfer rate for lower priority packets and higher transfer rate for real time packets with higher priority, minimizing the end to end delay. The performance of the algorithm is evaluated with varying node distribution.
△ Less
Submitted 9 December, 2014;
originally announced December 2014.
-
A QoS based Routing Approach using Genetic Algorithms for Bandwidth Maximization in Network
Authors:
T R Gopalakrishnan Nair,
Kavitha Sooda,
R Selvarani
Abstract:
This paper addresses the path selection problem from a known source to the destination in dense networks. The proposed solution for route discovery uses the genetic algorithm approach for a QoS based network. The multi point crossover and mutation helps in determining the optimal path and alternate path when required. The input to the genetic algorithm is a learnt module which is a part of the cog…
▽ More
This paper addresses the path selection problem from a known source to the destination in dense networks. The proposed solution for route discovery uses the genetic algorithm approach for a QoS based network. The multi point crossover and mutation helps in determining the optimal path and alternate path when required. The input to the genetic algorithm is a learnt module which is a part of the cognitive router that takes care of four QoS parameters. Here the set of nodes selected for routing is determined by delay, jitter and loss. On this graded surface of nodes selected, the bandwidth parameter is considered for path selection. The aim of the approach is to occupy the maximized bandwidth along the forward channels and minimize the route length. The population size is considered as fixed nodes participating in the network scenario, which will be limited to a known size of topology. The simulated results show that by using genetic algorithm (GA) approach the probability of convergence to shortest path is higher.
△ Less
Submitted 8 August, 2014;
originally announced August 2014.
-
An intelligent routing approach using genetic algorithms for quality graded network
Authors:
T. R. Gopalakrishnan Nair,
Kavitha Sooda
Abstract:
Intelligent routing in networks has opened up many challenges in modelling and methods, over the past decade. Many techniques do exist for routing on such an environment where path determination was carried out by advertisement, position and near-optimum node selection schemes. In this paper, an efficient routing scheme has been proposed using genetic algorithm for a grade-based two-level node sel…
▽ More
Intelligent routing in networks has opened up many challenges in modelling and methods, over the past decade. Many techniques do exist for routing on such an environment where path determination was carried out by advertisement, position and near-optimum node selection schemes. In this paper, an efficient routing scheme has been proposed using genetic algorithm for a grade-based two-level node selection method. This method assumes that nodes have the knowledge of its environment and is capable of taking decision for route discovery. The data learnt from the topology which is under consideration for routing, is saved in its local memory. In this two-level node selection scheme, the route discovery operation takes place in multiple levels. At the first level, the grade based selection is applied for considering the most optimal nodes which would be fit for sending data. At the second level, the optimal path is discovered using Genetic Algorithm. The simulation result shows that faster convergence of path took place in the case of the proposed method with good fitness value, as compared to non-graded network.
△ Less
Submitted 6 August, 2014;
originally announced August 2014.
-
Competitive performance analysis of two evolutionary algorithms for routing optimization in graded network
Authors:
Kavitha Sooda,
T. R. Gopalakrishnan Nair
Abstract:
In this paper we compare the two intelligent route generation system and its performance capability in graded networks using Artificial Bee Colony (ABC) algorithm and Genetic Algorithm (GA). Both ABC and GA have found its importance in optimization technique for determining optimal path while routing operations in the network. The paper shows how ABC approach has been utilized for determining the…
▽ More
In this paper we compare the two intelligent route generation system and its performance capability in graded networks using Artificial Bee Colony (ABC) algorithm and Genetic Algorithm (GA). Both ABC and GA have found its importance in optimization technique for determining optimal path while routing operations in the network. The paper shows how ABC approach has been utilized for determining the optimal path based on bandwidth availability of the links and determines better quality paths over GA. Here the nodes participating in the routing are evaluated for their QoS metric. The nodes which satisfy the minimum threshold value of the metric are chosen and enabled to participate in routing. A quadrant is synthesized on the source as the centre and depending on which quadrant the destination node belongs to, a search for optimal path is performed. The simulation results show that ABC speeds up local minimum search convergence by around 60% as compared to GA with respect to traffic intensity, and opens the possibility for cognitive routing in future intelligent networks.
△ Less
Submitted 5 August, 2014;
originally announced August 2014.
-
Optimal path selection in Graded network using Artificial Bee Colony algorithm with Agent enabled Information
Authors:
Kavitha Sooda,
T. R. Gopalakrishnan Nair
Abstract:
In this paper we propose a network aware approach for routing in graded network using Artificial Bee Colony (ABC) algorithm. ABC has been used as a good search process for optimality exploitation and exploration. The paper shows how ABC approach has been utilized for determining the optimal path based on bandwidth availability of the link and how it outperformed non graded network while deriving t…
▽ More
In this paper we propose a network aware approach for routing in graded network using Artificial Bee Colony (ABC) algorithm. ABC has been used as a good search process for optimality exploitation and exploration. The paper shows how ABC approach has been utilized for determining the optimal path based on bandwidth availability of the link and how it outperformed non graded network while deriving the optimal path. The selection of the nodes is based on the direction of the destination node also. This would help in narrowing down the number of nodes participating in routing. Here an agent system governs the collection of QoS parameters of the nodes. Also a quadrant is synthesized with centre as the source node. Based on the information of which quadrant the destination belongs, a search is performed. Among the many searches observed by the onlooker bees the best path is selected based on which onlooker bee comes back to source with information of the optimal path. The simulation result shows that the path convergence in graded network with ABC was 30% faster than non-graded ABC.
△ Less
Submitted 5 August, 2014;
originally announced August 2014.
-
Correlating and Cross-linking Knowledge Threads in Informledge System for Creating New Knowledge
Authors:
T. R. Gopalakrishnan Nair,
Meenakshi Malhotra
Abstract:
There has been a considerable advance in computing, to mimic the way in which the brain tries to comprehend and structure the information to retrieve meaningful knowledge. It is identified that neuronal entities hold whole of the knowledge that the species makes use of. We intended to develop a modified knowledge based system, termed as Informledge System (ILS) with autonomous nodes and intelligen…
▽ More
There has been a considerable advance in computing, to mimic the way in which the brain tries to comprehend and structure the information to retrieve meaningful knowledge. It is identified that neuronal entities hold whole of the knowledge that the species makes use of. We intended to develop a modified knowledge based system, termed as Informledge System (ILS) with autonomous nodes and intelligent links that integrate and structure the pieces of knowledge. We conceive that every piece of knowledge is a cluster of cross-linked and correlated structure. In this paper, we put forward the theory of the nodes depicting concepts, referred as Entity Concept State which in turn is dealt with Concept State Diagrams (CSD). This theory is based on an abstract framework provided by the concepts. The framework represents the ILS as the weighted graph where the weights attached with the linked nodes help in knowledge retrieval by providing the direction of connectivity of autonomous nodes present in knowledge thread traversal. Here for the first time in the process of develo** Informledge, we apply tenor computation for creating intelligent combinatorial knowledge with cross mutation to create fresh knowledge which looks to be the fundamentals of a typical thought process.
△ Less
Submitted 4 August, 2014;
originally announced August 2014.
-
Adaptive Wavelet Based Identification and Extraction of PQRST Combination in Randomly Stretching ECG Sequence
Authors:
T. R. Gopalakrishnan Nair,
A. P. Geetha,
M. Asharani
Abstract:
Cardiovascular system study using ECG signals have evolved tremendously in the domain of electronics and signal processing. However, there are certain floating challenges unresolved in the analysis and detection of abnormal performances of cardiovascular system. As the medical field is moving towards more automated and intelligent systems, wrong detection or wrong interpretations of ECG waveform o…
▽ More
Cardiovascular system study using ECG signals have evolved tremendously in the domain of electronics and signal processing. However, there are certain floating challenges unresolved in the analysis and detection of abnormal performances of cardiovascular system. As the medical field is moving towards more automated and intelligent systems, wrong detection or wrong interpretations of ECG waveform of abnormal conditions can be quite fatal. Since the PQRST signals vary their positions randomly, the process of locating, identifying and classifying each feature can be cumbersome and it is prone to errors. Here we present an automated scheme using adaptive wavelet to detect prominent R-peak with extreme accuracy and algorithmically tag and mark the coexisting peaks P, Q, S, and T with almost same accuracy. The adaptive wavelet approach used in this scheme is capable of detecting R-peak in ECG with 99.99% accuracy along with the rest of the waveforms.
△ Less
Submitted 2 August, 2014;
originally announced August 2014.
-
Methodology For Detection of QRS Pattern Using Secondary Wavelets
Authors:
T. R. Gopalakrishnan Nair,
A. P. Geetha,
Asharani
Abstract:
Applications of wavelet transform to the field of health care signals have paved the way for implementing revolutionary approaches in detecting the presence of certain abnormalities in human health patterns. There were extensive studies carried out using primary wavelets in various signals like Electrocardiogram (ECG), sonogram etc. with a certain amount of success. On the other hand analysis usin…
▽ More
Applications of wavelet transform to the field of health care signals have paved the way for implementing revolutionary approaches in detecting the presence of certain abnormalities in human health patterns. There were extensive studies carried out using primary wavelets in various signals like Electrocardiogram (ECG), sonogram etc. with a certain amount of success. On the other hand analysis using secondary wavelets which inherits the characteristics of a set of variations available in signals like ECG can be a promise to detect diseases with ease. Here a method to create a generalized adapted wavelet is presented which contains the information of QRS pattern collected from an anomaly sample space. The method has been tested and found to be successful in locating the position of R peak in noise embedded ECG signal.
△ Less
Submitted 2 August, 2014;
originally announced August 2014.
-
SLI, a New Metric to determine Success of a Software Project
Authors:
Shashi Kumar N. R.,
T. R. Gopalakrishnan Nair,
Suma V
Abstract:
Project Management process plays a critical role in managing factors such as cost, time, technology and personnel towards achieving the success of a project and henceforth the sustainability of the company in the industrial market. This paper emphasizes empirical study of several projects developed over a period of time in a product and service based CMMI Level 5 Software Company. The investigatio…
▽ More
Project Management process plays a critical role in managing factors such as cost, time, technology and personnel towards achieving the success of a project and henceforth the sustainability of the company in the industrial market. This paper emphasizes empirical study of several projects developed over a period of time in a product and service based CMMI Level 5 Software Company. The investigation shows impact analysis of resources such as cost, time, and number of developers towards the successful completion of the project as allocated by the project manager during the developmental process. The analysis has further led to the introduction of a new qualitative metric, Success Level Index Metric (SLI) whose index value varies from 0 to 1. SLI acts as a maturity indicator that indicates the degree of maturity of the company in terms of success of their projects based on which the company can choose their desired level of success for their projects.
△ Less
Submitted 31 July, 2014;
originally announced July 2014.
-
Accurate merging of images for predictive analysis using combined image
Authors:
T. R. Gopalakrishnan Nair,
Richa Sharma
Abstract:
Several Scientific and engineering applications require merging of sampled images for complex perception development. In most cases, for such requirements, images are merged at intensity level. Even though it gives fairly good perception of combined scenario of objects and scenes, it is found that they are not sufficient enough to analyze certain engineering cases. The main problem is incoherent m…
▽ More
Several Scientific and engineering applications require merging of sampled images for complex perception development. In most cases, for such requirements, images are merged at intensity level. Even though it gives fairly good perception of combined scenario of objects and scenes, it is found that they are not sufficient enough to analyze certain engineering cases. The main problem is incoherent modulation of intensity arising out of phase properties being lost. In order to compensate these losses, combined phase and amplitude merge is demanded. We present here a method which could be used in precision engineering and biological applications where more precise prediction is required of a combined phenomenon. When pixels are added, its original property is lost but accurate merging of intended pixels can be achieved in high quality using frequency domain properties of an image. This paper introduces a technique to merge various images which can be used as a simple but effective technique for overlapped view of a set of images and producing reduced dataset for review purposes.
△ Less
Submitted 30 July, 2014;
originally announced July 2014.
-
Merging and Shifting of Images with Prominence Coefficient for Predictive Analysis using Combined Image
Authors:
T. R. Gopalakrishnan Nair,
Richa Sharma
Abstract:
Shifting of objects in an image and merging many images after appropriate shifting is being used in several engineering and scientific applications which require complex perception development. A method has been presented here which could be used in precision engineering and biological applications where more precise prediction is required of a combined phenomenon with varying prominence of each p…
▽ More
Shifting of objects in an image and merging many images after appropriate shifting is being used in several engineering and scientific applications which require complex perception development. A method has been presented here which could be used in precision engineering and biological applications where more precise prediction is required of a combined phenomenon with varying prominence of each phenomenon. Accurate merging of intended pixels can be achieved in high quality using frequency domain techniques even though initial properties of the original pixels are lost in this process. This paper introduces a technique to shift and merge various images with varying prominence of each image. A coefficient named prominence coefficient has been introduced which is capable of making some of the images transparent and highlighting the rest as per requirement of merging process which can be used as a simple but effective technique for overlapped view of a set of images.
△ Less
Submitted 30 July, 2014;
originally announced July 2014.
-
Model based design of super schedulers managing catastrophic scenario in hard real time systems
Authors:
A. Christy Persya,
T. R. Gopalakrishnan Nair
Abstract:
The conventional design of real-time approaches depends heavily on the normal performance of systems and it often becomes incapacitated in dealing with catastrophic scenarios effectively. There are several investigations carried out to effectively tackle large scale catastrophe of a plant and how real-time systems must reorganize itself to respond optimally to changing scenarios to reduce catastro…
▽ More
The conventional design of real-time approaches depends heavily on the normal performance of systems and it often becomes incapacitated in dealing with catastrophic scenarios effectively. There are several investigations carried out to effectively tackle large scale catastrophe of a plant and how real-time systems must reorganize itself to respond optimally to changing scenarios to reduce catastrophe and aid human intervention. The study presented here is in this direction and the model accommodates catastrophe generated tasks while it tries to minimize the total number of deadline miss, by dynamically scheduling the unusual pattern of tasks. The problem is NP hard. We prove the methods for an optimal scheduling algorithm. We also derive a model to maintain the stability of the processes. Moreover, we study the problem of minimizing the number of processors required for scheduling with a set of periodic and sporadic hard real time tasks with primary/backup mechanism to achieve fault tolerance. EDF scheduling algorithms are used on each processor to manage scenario changes. Finally we present a simulation of super scheduler with small, medium and large real time tasks pattern for catastrophe management.
△ Less
Submitted 21 July, 2014;
originally announced July 2014.
-
A Comparative Analysis for Determining the Optimal Path using PSO and GA
Authors:
Kavitha Sooda,
T. R. Gopalakrishnan Nair
Abstract:
Significant research has been carried out recently to find the optimal path in network routing. Among them, the evolutionary algorithm approach is an area where work is carried out extensively. We in this paper have used particle swarm optimization (PSO) and genetic algorithm (GA) for finding the optimal path and the concept of region based network is introduced along with the use of indirect enco…
▽ More
Significant research has been carried out recently to find the optimal path in network routing. Among them, the evolutionary algorithm approach is an area where work is carried out extensively. We in this paper have used particle swarm optimization (PSO) and genetic algorithm (GA) for finding the optimal path and the concept of region based network is introduced along with the use of indirect encoding. We demonstrate the advantage of fitness value and hop count in both PSO and GA. A comparative study of PSO and genetic algorithm (GA) is carried out, and it was found that PSO converged to arrive at the optimal path much faster than GA.
△ Less
Submitted 20 July, 2014;
originally announced July 2014.
-
A Parametric Analysis of Project Management Performance to Enhance Software Development Process
Authors:
Shashikumar N. R.,
T. R. Gopalakrishnan Nair,
Suma V
Abstract:
Project Management process plays a significant role in effective development of software projects. Key challenges in the project management process are the estimation of time, cost, defect count, and subsequently selection of apt developers. Therefore precise estimation of above stated factors decides the success level of a project. This paper provides an empirical study of several projects develo…
▽ More
Project Management process plays a significant role in effective development of software projects. Key challenges in the project management process are the estimation of time, cost, defect count, and subsequently selection of apt developers. Therefore precise estimation of above stated factors decides the success level of a project. This paper provides an empirical study of several projects developed in a service oriented software company in order to comprehend the project management process. The analysis throws light on the existence of variation in the aforementioned factors between estimation and observed results. It further captures the need for betterment of project management process in estimation and allocation of resources in the realization of high quality software product. The paper therefore aims to bring in an improved awareness in software engineering personnel concerning the magnitude and significance of better estimation and accurate allocation of resources for develo** successful project.
△ Less
Submitted 20 July, 2014;
originally announced July 2014.
-
An Optimum Scheduling Approach for Creating Optimal Priority of Jobs with Business Values in Cloud Computing
Authors:
Vivek Sharma,
T. R. Gopalakrishnan Nair
Abstract:
Realizing an optimal task scheduling by taking into account the business importance of jobs has become a matter of interest in pay and use model of Cloud computing. Introduction of an appropriate model for an efficient task scheduling technique could derive benefit to the service providers as well as clients. In this paper, we have addressed two major challenges which has implications on the perfo…
▽ More
Realizing an optimal task scheduling by taking into account the business importance of jobs has become a matter of interest in pay and use model of Cloud computing. Introduction of an appropriate model for an efficient task scheduling technique could derive benefit to the service providers as well as clients. In this paper, we have addressed two major challenges which has implications on the performance of the Cloud system. One of the major issues is handling technical aspects of distributing the tasks for targeted gains and the second issue is related to the handling of the business priority for concurrently resolving business complexity related to cloud consumers. A coordinated scheduling can be achieved by considering the weightage of both aspects viz. technical requirements and business requirements appropriately. It can be done in such a way that it meets the QoS requirements of technical domain as well as business domain. Along with the technical priority a business Bp is required in creating a resultant priority which could be given to stages of further processing, like task allocation and arbitration schemes. Here we consider a technical priority Tp that is governed by a semi-adaptive scheduling algorithm whereas the resultant priority is derived in which a Business Priority Bp layer encapsulates the Technical Priority Tp to achieve the overall priority of the incoming tasks. It results in a Hybrid priority creation, which is a combination of both technical priority Tp and business priority Bp. By taking into account the business priority of the jobs it is possible to achieve a higher service level satisfaction for the tasks which are submitted with their native technical priority. With this approach the waiting time of the tasks tends to get reduced and it gives a better service level satisfaction.
△ Less
Submitted 20 July, 2014;
originally announced July 2014.
-
Impact Analysis of Allocation of Resources by Project Manager on Success of Software Projects
Authors:
T. R. Gopalakrishnan Nair,
Suma V,
Shashi Kumar N. R
Abstract:
Generation Production of successful software project is one of the prime considerations of software industry. Engineering high quality software products is further influenced by several factors such as budget, schedule, resource constraints etc. A project manager is responsible for estimation and allocation of these resources in a project. Hence, role of project manager has a vital influence on su…
▽ More
Generation Production of successful software project is one of the prime considerations of software industry. Engineering high quality software products is further influenced by several factors such as budget, schedule, resource constraints etc. A project manager is responsible for estimation and allocation of these resources in a project. Hence, role of project manager has a vital influence on success of the project. This research comprises of an empirical study of several projects developed in a product and service based CMMI Level 5 Software Company. The investigation result shows a significant impact of aforementioned factors on the success of software and on the company. The analysis further indicates the vital role of project managers in optimizing the resource allocation towards development of software. This paper brings in impact analysis of efficiency of project manager in effectively allocating resources such as time, cost, number of developers etc. An awareness of efficiency level of project manager in optimal allocation of resources enables one to realize the desired level of quality.
△ Less
Submitted 20 July, 2014;
originally announced July 2014.
-
Comparative performance analysis of AntHocNet and DSR in optimal path route determination
Authors:
T. R. Gopalakrishnan Nair,
Kavitha Sooda,
Kavya B. S,
Sushma M
Abstract:
One of the key challenges in current Internet routing is the application of improved bio-inspired algorithms in deriving the path towards the destination. Current routing trends determine the optimal path based on throughput, delay or combination of these two metric. Here in this paper, we compare the performance of the two algorithms, AntHocNet (AHN) and Dynamic Source Routing (DSR) for determini…
▽ More
One of the key challenges in current Internet routing is the application of improved bio-inspired algorithms in deriving the path towards the destination. Current routing trends determine the optimal path based on throughput, delay or combination of these two metric. Here in this paper, we compare the performance of the two algorithms, AntHocNet (AHN) and Dynamic Source Routing (DSR) for determining the routing path. We introduce the goodput factor as one of the metric for determining the path. Goodput is the number of useful information bits, delivered by the network to a certain destination per unit time .The results show that AHN outperformed DSR in terms of end-to-end delay and overhead. Also the simulation results showed that overhead of AHN was 20.67% lesser than DSR.
△ Less
Submitted 15 July, 2014;
originally announced July 2014.
-
GPU Acclerated Automated Feature Extraction from Satellite Images
Authors:
K. Phani Tejaswi,
D. Shanmukha Rao,
Thara Nair,
A. V. V. Prasad
Abstract:
The availability of large volumes of remote sensing data insists on higher degree of automation in feature extraction, making it a need of the hour.The huge quantum of data that needs to be processed entails accelerated processing to be enabled.GPUs, which were originally designed to provide efficient visualization, are being massively employed for computation intensive parallel processing environ…
▽ More
The availability of large volumes of remote sensing data insists on higher degree of automation in feature extraction, making it a need of the hour.The huge quantum of data that needs to be processed entails accelerated processing to be enabled.GPUs, which were originally designed to provide efficient visualization, are being massively employed for computation intensive parallel processing environments. Image processing in general and hence automated feature extraction, is highly computation intensive, where performance improvements have a direct impact on societal needs. In this context, an algorithm has been formulated for automated feature extraction from a panchromatic or multispectral image based on image processing techniques. Two Laplacian of Guassian (LoG) masks were applied on the image individually followed by detection of zero crossing points and extracting the pixels based on their standard deviation with the surrounding pixels. The two extracted images with different LoG masks were combined together which resulted in an image with the extracted features and edges. Finally the user is at liberty to apply the image smoothing step depending on the noise content in the extracted image. The image is passed through a hybrid median filter to remove the salt and pepper noise from the image. This paper discusses the aforesaid algorithm for automated feature extraction, necessity of deployment of GPUs for the same; system-level challenges and quantifies the benefits of integrating GPUs in such environment. The results demonstrate that substantial enhancement in performance margin can be achieved with the best utilization of GPU resources and an efficient parallelization strategy. Performance results in comparison with the conventional computing scenario have provided a speedup of 20x, on realization of this parallelizing strategy.
△ Less
Submitted 15 April, 2013;
originally announced April 2013.
-
Four-Step Approach Model of Inspection (FAMI) for Effective Defect Management in Software Development
Authors:
Suma V.,
T. R. Gopalakrishnan Nair
Abstract:
IT industry should inculcate effective defect management on a continual basis to deploy nearly a zerodefect product to their customers. Inspection is one of the most imperative and effective strategies of defect management. Nevertheless, existing defect management strategies in leading software industries are successful to deliver a maximum of 96% defect-free product. An empirical study of various…
▽ More
IT industry should inculcate effective defect management on a continual basis to deploy nearly a zerodefect product to their customers. Inspection is one of the most imperative and effective strategies of defect management. Nevertheless, existing defect management strategies in leading software industries are successful to deliver a maximum of 96% defect-free product. An empirical study of various projects across several service-based and product-based industries proves the above affirmations. This paper provides an enhanced approach of inspection through a Four-Step Approach Model of Inspection (FAMI). FAMI consists of i) integration of Inspection Life Cycle in V-model of software development, ii) implementation of process metric Depth of Inspection (DI), iii) implementation of people metric Inspection Performance Metric (IPM), iv) application of Bayesian probability approach for selection of appropriate values of inspection affecting parameters to achieve the desirable DI. The managers of software houses can make use of P2 metric as a benchmarking tool for the projects in order to improve the in-house defect management process. Implementation of FAMI in software industries reflects a continual process improvement and leads to the development of nearly a zero-defect product through effective defect management.
△ Less
Submitted 28 September, 2012;
originally announced September 2012.
-
Defect Management Strategies in Software Development
Authors:
V. Suma,
T. R. Gopalakrishnan Nair
Abstract:
Software is a unique entity that has laid a strong impact on all other fields either related or not related to software. These include medical, scientific, business, educational, defence, transport, telecommunication to name a few. State-of-the-art professional domain activities demands the development of high quality software. High quality software attributes to a defect-free product, which is co…
▽ More
Software is a unique entity that has laid a strong impact on all other fields either related or not related to software. These include medical, scientific, business, educational, defence, transport, telecommunication to name a few. State-of-the-art professional domain activities demands the development of high quality software. High quality software attributes to a defect-free product, which is competent of producing predictable results and remains deliverable within time and cost constraints. It should be manageable with minimum interferences. It should also be maintainable, dependable, understandable and efficient. Thus, a systematic approach towards high quality software development is required due to increased competitiveness in today's business world, technological advances, hardware complexity and frequently changing business requirements.
△ Less
Submitted 25 September, 2012;
originally announced September 2012.
-
Influenza Virus Vaccine Efficacy Based On Conserved Sequence Alignment
Authors:
Baby Jerald,
T. R. Gopalakrishnan Nair
Abstract:
The rapid outbreak of bird flu challenges the outcome of effective vaccine for the upcoming years. The recent research established different norms to eliminate flu pandemics. This can be made possible with skilled experimental analyses and by tracking the recent virulent strain and can be broadly applicable with effective testing of vaccine efficacy. Every year World Health Organization (WHO) reve…
▽ More
The rapid outbreak of bird flu challenges the outcome of effective vaccine for the upcoming years. The recent research established different norms to eliminate flu pandemics. This can be made possible with skilled experimental analyses and by tracking the recent virulent strain and can be broadly applicable with effective testing of vaccine efficacy. Every year World Health Organization (WHO) reveals the administration of drug and vaccine to counter arrest the spread of flu among the population. As there are recurrent failures in priming the population, the complete eradication of the flu pandemic is still appears to be an unresolved problem. To overcome the current scenario, high level efforts with theoretical and practical research is required and it can enhance the scope in this field. The recent advancements also allow the researchers to endeavor effective vaccine to meet the emerging flu types. Only the standardized vaccination among the population at the time of flu pandemics will revolutionalize the current propositions against influenza virus. This paper shows the deficiencies of vaccine fitness research as there are reported failures and less efficacy of vaccine even after priming the population from referred evidences and studies. It also shows simple experimental approach in detecting the effective vaccine among the vaccines announced by WHO.
△ Less
Submitted 2 June, 2012;
originally announced June 2012.
-
Transformation of Traditional Marketing Communications in to Paradigms of Social Media Networking
Authors:
T. R. Gopalakrishnan Nair,
Kumarashvari Subramaniam
Abstract:
Effective Communication for marketing is a vital field in business organizations, which is used to convey the details about their products and services to the market segments and subsequently to build long lasting customer relationships. This paper focuses on an emerging component of the integrated marketing communication, ie. social media networking, as it is increasingly becoming the trend. In 2…
▽ More
Effective Communication for marketing is a vital field in business organizations, which is used to convey the details about their products and services to the market segments and subsequently to build long lasting customer relationships. This paper focuses on an emerging component of the integrated marketing communication, ie. social media networking, as it is increasingly becoming the trend. In 21st century, the marketing communication platforms show a tendency to shift towards innovative technology bound people networking which is becoming an acceptable domain of interaction. Though the traditional channels like TV, print media etc. are still active and prominent in marketing communication, the presences of the Internet and more specifically the Social Media Networking, has started influencing the way individuals and business enterprises communicate. It has become evident that more individuals and business enterprises are engaging the social media networking sites either to accelerate the sales of their products and services or to provide post-purchase feedbacks. This shift in scenario has motivated this research which took six months (June 2011 - December 2011), using empirical analysis which is carried out based on several primary and secondary evidences. The research paper also analyzes the factors that govern the social media networking sites to influence consumers and subsequently enable their purchase decisions. The secondary data presented for this research were those pertaining to the period between the year 2005 and year 2011. The study revealed promising facts like the transition to marketing through SMN gives visible advantages like bidirectional communication, interactive product presentation, and a firm influence on customer who has a rudimentary interest...
△ Less
Submitted 3 June, 2012;
originally announced June 2012.
-
Multipath Routing With Novel Packet Scheduling Approach In Wireless Sensor Networks
Authors:
Mary Cherian,
T. R. Gopalakrishnan Nair
Abstract:
Wireless sensor networks sense and monitor real-time events. They supervise a geographic area where a phenomenon is to be monitored. The data in sensor networks have different levels of priority and hence their criticality differs. In order to keep up the real time commitment, the applications need higher transmission rates and reliability in information delivery. In this work we propose a multipa…
▽ More
Wireless sensor networks sense and monitor real-time events. They supervise a geographic area where a phenomenon is to be monitored. The data in sensor networks have different levels of priority and hence their criticality differs. In order to keep up the real time commitment, the applications need higher transmission rates and reliability in information delivery. In this work we propose a multipath routing algorithm which enables the reliable delivery of data. By controlling the scheduling rate, it is possible to prevent congestion and packet loss in the network. The algorithm provides an efficient way to prevent the packet loss at each node. This results in congestion management in the sensor networks. This protocol prevents packet clustering and provides smoothness to the traffic. Through monitoring and controlling the scheduling rate the flow control and congestion control are managed.
△ Less
Submitted 3 June, 2012;
originally announced June 2012.
-
Pre-allocation Strategies of Computational Resources in Cloud Computing using Adaptive Resonance Theory-2
Authors:
T. R. Gopalakrishnan Nair,
P Jayarekha
Abstract:
One of the major challenges of cloud computing is the management of request-response coupling and optimal allocation strategies of computational resources for the various types of service requests. In the normal situations the intelligence required to classify the nature and order of the request using standard methods is insufficient because the arrival of request is at a random fashion and it is…
▽ More
One of the major challenges of cloud computing is the management of request-response coupling and optimal allocation strategies of computational resources for the various types of service requests. In the normal situations the intelligence required to classify the nature and order of the request using standard methods is insufficient because the arrival of request is at a random fashion and it is meant for multiple resources with different priority order and variety. Hence, it becomes absolutely essential that we identify the trends of different request streams in every category by auto classifications and organize preallocation strategies in a predictive way. It calls for designs of intelligent modes of interaction between the client request and cloud computing resource manager. This paper discusses about the corresponding scheme using Adaptive Resonance Theory-2.
△ Less
Submitted 3 June, 2012;
originally announced June 2012.
-
Defect Management Using Depth of Inspection and the Inspection Performance Metric
Authors:
T. R. Gopalakrishnan Nair,
V Suma
Abstract:
Advancement in fundamental engineering aspects of software development enables IT enterprises to develop a more cost effective and better quality product through aptly organized defect management strategies. Inspection continues to be the most effective and efficient technique of defect management. To have an appropriate measurement of the inspection process, the process metric, Depth of Inspectio…
▽ More
Advancement in fundamental engineering aspects of software development enables IT enterprises to develop a more cost effective and better quality product through aptly organized defect management strategies. Inspection continues to be the most effective and efficient technique of defect management. To have an appropriate measurement of the inspection process, the process metric, Depth of Inspection (DI) and the people metric, Inspection Performance Metric (IPM) are introduced. The introduction of these pair of metrics can yield valuable information from a company in relation to the inspection process.
△ Less
Submitted 2 June, 2012;
originally announced June 2012.
-
A QoS-Aware Routing Protocol for Real-time Applications in Wireless Sensor Networks
Authors:
Mary Cherian,
T. R Gopalakrishnan Nair
Abstract:
The paper presents a quality of service aware routing protocol which provides low latency for high priority packets. Packets are differentiated based on their priority by applying queuing theory. Low priority packets are transferred through less energy paths. The sensor nodes interact with the pivot nodes which in turn communicate with the sink node. This protocol can be applied in monitoring cont…
▽ More
The paper presents a quality of service aware routing protocol which provides low latency for high priority packets. Packets are differentiated based on their priority by applying queuing theory. Low priority packets are transferred through less energy paths. The sensor nodes interact with the pivot nodes which in turn communicate with the sink node. This protocol can be applied in monitoring context aware physical environments for critical applications.
△ Less
Submitted 16 May, 2012;
originally announced May 2012.
-
Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis
Authors:
T. R. Gopalakrishnan Nair,
Suma V,
Manas S
Abstract:
Retention of secrecy is one of the significant features during communication activity. Steganography is one of the popular methods to achieve secret communication between sender and receiver by hiding message in any form of cover media such as an audio, video, text, images etc. Least significant bit encoding is the simplest encoding method used by many steganography programs to hide secret message…
▽ More
Retention of secrecy is one of the significant features during communication activity. Steganography is one of the popular methods to achieve secret communication between sender and receiver by hiding message in any form of cover media such as an audio, video, text, images etc. Least significant bit encoding is the simplest encoding method used by many steganography programs to hide secret message in 24bit, 8bit colour images and grayscale images. Steganalysis is a method of detecting secret message hidden in a cover media using steganography. RS steganalysis is one of the most reliable steganalysis which performs statistical analysis of the pixels to successfully detect the hidden message in an image. However, existing steganography method protects the information against RS steganalysis in grey scale images. This paper presents a steganography method using genetic algorithm to protect against the RS attack in colour images. Stego image is divided into number of blocks. Subsequently, with the implementation of natural evolution on the stego image using genetic algorithm enables to achieve optimized security and image quality.
△ Less
Submitted 12 April, 2012;
originally announced April 2012.
-
Cloud Computing For Microfinances
Authors:
Suma. V,
Bhagavant Deshpande,
Vaidehi. M,
T. R. Gopalakrishnan Nair
Abstract:
Evolution of Science and Engineering has led to the growth of several commercial applications. The wide spread implementation of commercial based applications has in turn directed the emergence of advanced technologies such as cloud computing. India has well proven itself as a potential hub for advanced technologies including cloud based industrial market. Microfinance system has emerged out as a…
▽ More
Evolution of Science and Engineering has led to the growth of several commercial applications. The wide spread implementation of commercial based applications has in turn directed the emergence of advanced technologies such as cloud computing. India has well proven itself as a potential hub for advanced technologies including cloud based industrial market. Microfinance system has emerged out as a panacea to Indian economy since the population encompasses of people who come under poverty and below poverty index. However, one of the key challenges in successful operation of microfinance system in India has given rise to integration of financial services using sophisticated cloud computing model. This paper, therefore propose a fundamental cloud-based microfinance model in order to reduce high transaction risks involved during microfinance operations in an inexpensive and efficient manner.
△ Less
Submitted 12 April, 2012;
originally announced April 2012.
-
Evaluation of the Structural disorder of the protein FMR1 with Carbon Composition
Authors:
Baby Jerald A.,
T. R. Gopalakrishnan Nair,
Ekambaram Rajasekaran
Abstract:
Ever since the disorder of proteins is the main cause for many diseases. As compared with other disorders, the major reason that causes disease is of structural inability of many proteins. The potentially imminent availability of recent datasets helps one to discover the protein disorders, however in majority of cases, the stability of proteins depend on the carbon content. Addressing this distinc…
▽ More
Ever since the disorder of proteins is the main cause for many diseases. As compared with other disorders, the major reason that causes disease is of structural inability of many proteins. The potentially imminent availability of recent datasets helps one to discover the protein disorders, however in majority of cases, the stability of proteins depend on the carbon content. Addressing this distinct feature, it is possible to hit upon the carbon distribution along the sequence and can easily recognize the stable nature of protein. There are certain reported mental disorders which fall in to this category. Regardless, such kind of disorder prone protein FMR1p (Fragile X mental retardation 1 protein) is identified as the main cause for the disease Fragile X syndrome. This paper deals with the identification of defects in the FMR1 protein sequence considering the carbon contents along the sequence. This attempt is to evaluate the stability of proteins, accordingly the protein disorders in order to improvise the certain Biological functions of proteins to prevent disease. The transition of the disorder to order protein involves careful considerations and can be achieved by detecting the unstable region that lacks hydrophobicity. This work focuses the low carbon content in the FMR1 protein so as to attain the stable status in future to reduce the morbidity rate caused by Fragile X syndrome for the society.
△ Less
Submitted 30 March, 2012;
originally announced March 2012.
-
Critical Task Re-assignment under Hybrid Scheduling Approach in Multiprocessor Real-Time Systems
Authors:
Gopalakrishnan T. R. Nair,
Christy A. Persya
Abstract:
Embedded hard real time systems require substantial amount of emergency processing power for the management of large scale systems like a nuclear power plant under the threat of an earth quake or a future transport systems under a peril. In order to meet a fully coordinated supervisory control of multiple domains of a large scale system, it requires the scenario of engaging multiprocessor real tim…
▽ More
Embedded hard real time systems require substantial amount of emergency processing power for the management of large scale systems like a nuclear power plant under the threat of an earth quake or a future transport systems under a peril. In order to meet a fully coordinated supervisory control of multiple domains of a large scale system, it requires the scenario of engaging multiprocessor real time design. There are various types of scheduling schemes existing for meeting the critical task assignment in multiple processor environments and it requires the tracking of faulty conditions of the subsystem to avoid system underperformance from failure patterns. Hybrid scheduling usually engages a combined scheduling philosophy comprising of a static scheduling of a set of tasks and a highly pre-emptive scheduling for another set of tasks in different situations of process control. There are instances where highly critical tasks need to be introduced at a least expected catastrophe and it cannot be ensured to meet all deadline in selected processors because of the arrival pattern of such tasks and they bear low tolerance of time to meet the required target. In such circumstances an effective switching of processors for this set of task is feasible and we describe a method to achieve this effectively.
△ Less
Submitted 30 March, 2012;
originally announced March 2012.
-
Creating Intelligent Linking for Information Threading in Knowledge Networks
Authors:
Dr T. R. Gopalakrishnan Nair,
Meenakshi Malhotra
Abstract:
Informledge System (ILS) is a knowledge network with autonomous nodes and intelligent links that integrate and structure the pieces of knowledge. In this paper, we aim to put forward the link dynamics involved in intelligent processing of information in ILS. There has been advancement in knowledge management field which involve managing information in databases from a single domain. ILS works with…
▽ More
Informledge System (ILS) is a knowledge network with autonomous nodes and intelligent links that integrate and structure the pieces of knowledge. In this paper, we aim to put forward the link dynamics involved in intelligent processing of information in ILS. There has been advancement in knowledge management field which involve managing information in databases from a single domain. ILS works with information from multiple domains stored in distributed way in the autonomous nodes termed as Knowledge Network Node (KNN). Along with the concept under consideration, KNNs store the processed information linking concepts and processors leading to the appropriate processing of information.
△ Less
Submitted 30 March, 2012;
originally announced March 2012.
-
Application of Genetic Algorithm on Quality Graded Networks for Intelligent Routing
Authors:
T. R. Gopalakrishnan Nair,
Kavitha Sooda
Abstract:
In the past decade, significant research has been carried out for realizing intelligent network routing using advertisement, position and near-optimum node selection schemes. In this paper, a grade-based two-level node selection method along with genetic algorithm (GA) is proposed for realizing an efficient routing scheme. This method assumes that the nodes are intelligent and that there exists a…
▽ More
In the past decade, significant research has been carried out for realizing intelligent network routing using advertisement, position and near-optimum node selection schemes. In this paper, a grade-based two-level node selection method along with genetic algorithm (GA) is proposed for realizing an efficient routing scheme. This method assumes that the nodes are intelligent and that there exists a knowledge base about the environment in their local memory. There are two levels for approaching the effective route selection process through grading. At the first level, grade-based selection is applied and at the second level, the optimum path is explored using GA. The simulation has been carried out on different topological structures, and a significant reduction in time is achieved for determining the optimal path through this method compared to the non-graded networks.
△ Less
Submitted 30 March, 2012;
originally announced March 2012.
-
Analysis of Test Efficiency during Software Development Process
Authors:
T. R. Gopalakrishnan Nair,
V. Suma,
Pranesh Kumar Tiwari
Abstract:
One of the prerequisites of any organization is an unvarying sustainability in the dynamic and competitive industrial environment. Development of high quality software is therefore an inevitable constraint of any software industry. Defect management being one of the highly influencing factors for the production of high quality software, it is obligatory for the software organizations to orient the…
▽ More
One of the prerequisites of any organization is an unvarying sustainability in the dynamic and competitive industrial environment. Development of high quality software is therefore an inevitable constraint of any software industry. Defect management being one of the highly influencing factors for the production of high quality software, it is obligatory for the software organizations to orient them towards effective defect management. Since, the time of software evolution, testing is deemed a promising technique of defect management in all IT industries. This paper provides an empirical investigation of several projects through a case study comprising of four software companies having various production capabilities. The aim of this investigation is to analyze the efficiency of test team during software development process. The study indicates very low-test efficiency at requirements analysis phase and even lesser test efficiency at design phase of software development. Subsequently, the study calls for a strong need to improve testing approaches using techniques such as dynamic testing of design solutions in lieu of static testing of design document. Dynamic testing techniques enhance the ability of detection and elimination of design flaws right at the inception phase and thereby reduce the cost and time of rework. It further improves productivity, quality and sustainability of software industry.
△ Less
Submitted 29 March, 2012;
originally announced March 2012.
-
An Analytical Approach for Project Managers in Effective Defect Management in Software Process
Authors:
T. R. Gopalakrishnan Nair,
V. Suma,
N. R. Shashi Kumar
Abstract:
Defect estimation and prediction are some of the main modulating factors for the success of software projects in any software industry. Maturity and competency of a project manager in efficient prediction and estimation of resource capabilities are one of the strategic driving forces towards the generation of high quality software. Currently, there are no estimation techniques developed through em…
▽ More
Defect estimation and prediction are some of the main modulating factors for the success of software projects in any software industry. Maturity and competency of a project manager in efficient prediction and estimation of resource capabilities are one of the strategic driving forces towards the generation of high quality software. Currently, there are no estimation techniques developed through empirical analysis to evaluate the decision capability of a project manager towards resource allocation for effective defect management. This paper brings out an empirical study carried out in a product based software organization. Our deep investigation on several projects throws light on the impact of decision capability of project manager towards accomplishment of an aforementioned objective. The paper enables project managers to gain further awareness towards the significance of predictive positioning in resource allocation in order to develop high quality defect-free software products. It also enhances the maturity level of the company and its persistence in the competitive atmosphere.
△ Less
Submitted 29 March, 2012;
originally announced March 2012.