Skip to main content

Showing 1–50 of 101 results for author: Nair, T

.
  1. arXiv:2405.18074  [pdf, ps, other

    math.AP math.NA

    A Regularization for Time-Fractional Backward Heat Conduction Problem with Inhomogeneous Source Function

    Authors: Vighnesh V. Alavani, P. Danumjaya, M. Thamban Nair

    Abstract: Recently, Nair and Danumjaya (2023) introduced a new regularization method for the homogeneous time-fractional backward heat conduction problem (TFBHCP) in a one-dimensional space variable, for determining the initial value function. In this paper, the authors extend the analysis done in the above referred paper to a more general setting of an inhomogeneous time-fractional heat equation involving… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

    Comments: 24 pages, 4 figures

    MSC Class: 35K57; 35R25; 35R30; 65J20

  2. arXiv:2405.12254  [pdf

    cond-mat.str-el

    Three fold Spin valley intertwined Dirac cone in nonmagnetic Weyl Semimetal Pt$_3$Sn$_2$S$_2$ with the Kagome lattice A theoretical DFT perspective

    Authors: Ravi Trivedi, Seetha Lakshmy, Heera T. Nair, Alok Shukla, Brahmananda Chakraborty

    Abstract: Recent experimental and theoretical research in Pt$_3$Sn$_2$S$_2$ have opened avenues for restoring Dirac dispersion in layered materials. Inspired by this we conducted first-principles DFT calculations unveiling a novel nonmagnetic metal Pt$_3$Sn$_2$S$_2$ with a robust Dirac dispersion. Under strong SOC and high pressure the Fermi surface topology shifts yielding spin valley intertwined Dirac con… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

    Comments: 17 pages, 6 figures, 2 tables [Main Manuscript], and 5 pages, 2 figures [Supplementary material]

  3. arXiv:2304.08035  [pdf, ps, other

    math.AP

    A source identification problem in a bi-parabolic equation: convergence rates and some optimal results

    Authors: Subhankar Mondal, M. Thamban Nair

    Abstract: This paper is concerned with identification of a spatial source function from final time observation in a bi-parabolic equation, where the full source function is assumed to be a product of time dependent and a space dependent function. Due to the ill-posedness of the problem, recently some authors have employed different regularization method and analysed the convergence rates. But, to the best o… ▽ More

    Submitted 2 May, 2023; v1 submitted 17 April, 2023; originally announced April 2023.

    Comments: Comments are welcome. Typos and some mistakes with sign in the PDE are rectified. Section 4 and 5 are majorly revised

    MSC Class: 35R25; 47A52; 65M30; 41A25

  4. arXiv:2303.15455  [pdf, ps, other

    math.NA

    A new regularisation for time-fractional backward heat conduction problem

    Authors: M. Thamban Nair, P. Danumjaya

    Abstract: It is well-known that the backward heat conduction problem of recovering the temperature $u(\cdot, t)$ at a time $t\geq 0$ from the knowledge of the temperature at a later time, namely $g:= u(\cdot, τ)$ for $τ>t$, is ill-posed, in the sense that small error in $g$ can lead to large deviation in $u(\cdot, t)$. However, in the case of a time fractional backward heat conduction problem (TFBHCP), the… ▽ More

    Submitted 28 February, 2023; originally announced March 2023.

    MSC Class: 35R30; ; 35K05; 26A33; 33E12

  5. arXiv:2106.07357  [pdf, ps, other

    math.NA math.FA

    Conforming and Nonconforming Finite Element Methods for Biharmonic Inverse Source Problem

    Authors: Devika Shylaja, M. T. Nair

    Abstract: This paper deals with the numerical approximation of the biharmonic inverse source problem in an abstract setting in which the measurement data is finite-dimensional. This unified framework in particular covers the conforming and nonconforming finite element methods (FEMs). The inverse problem is analysed through the forward problem. Error estimate for the forward solution is derived in an abstrac… ▽ More

    Submitted 14 June, 2021; originally announced June 2021.

    Comments: 26 pages, 6 figures, 5 tables

    MSC Class: 47A52; 65N12; 65N30

  6. arXiv:2012.03822  [pdf, other

    cs.LG

    Efficient Reservoir Management through Deep Reinforcement Learning

    Authors: Xinrun Wang, Tarun Nair, Haoyang Li, Yuh Sheng Reuben Wong, Nachiket Kelkar, Srinivas Vaidyanathan, Rajat Nayak, Bo An, Jagdish Krishnaswamy, Milind Tambe

    Abstract: Dams impact downstream river dynamics through flow regulation and disruption of upstream-downstream linkages. However, current dam operation is far from satisfactory due to the inability to respond the complicated and uncertain dynamics of the upstream-downstream system and various usages of the reservoir. Even further, the unsatisfactory dam operation can cause floods in downstream areas. Therefo… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

    Comments: 5 pages, 4 figures, Workshop paper

  7. arXiv:2007.10571  [pdf, other

    cs.DC cs.PF

    AI Tax: The Hidden Cost of AI Data Center Applications

    Authors: Daniel Richins, Dharmisha Doshi, Matthew Blackmore, Aswathy Thulaseedharan Nair, Neha Pathapati, Ankit Patel, Brainard Daguman, Daniel Dobrijalowski, Ramesh Illikkal, Kevin Long, David Zimmerman, Vijay Janapa Reddi

    Abstract: Artificial intelligence and machine learning are experiencing widespread adoption in industry and academia. This has been driven by rapid advances in the applications and accuracy of AI through increasingly complex algorithms and models; this, in turn, has spurred research into specialized hardware AI accelerators. Given the rapid pace of advances, it is easy to forget that they are often develope… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

    Comments: 32 pages. 16 figures. Submitted to ACM "Transactions on Computer Systems."

    ACM Class: I.2; C.4

  8. arXiv:2006.12757  [pdf, ps, other

    math.AP math.FA

    Identification of matrix diffusion coefficients in a parabolic PDE

    Authors: Subhankar Mondal, M. Thamban Nair

    Abstract: We consider an inverse problem of identifying the diffusion coefficient in matrix form in a parabolic PDE. In 2006, Cao and Pereverzev, used a \textit{natural linearisation} method for identifying a scalar valued diffusion coefficient in a parabolic PDE. In this paper, we make use of that idea for identifying a matrix valued coefficient, namely, using the notion of a weak solution for a parabolic… ▽ More

    Submitted 23 June, 2020; originally announced June 2020.

    Comments: 22 pages

    MSC Class: 35R30; 65N21; 65N30; 47A52

  9. arXiv:2002.09848  [pdf, ps, other

    math.NA math.FA

    A new regularization method for a parameter identification problem in a non-linear partial differential equation

    Authors: M Thamban Nair, Samprita Das Roy

    Abstract: We consider a parameter identification problem related to a quasi-linear elliptic Neumann boundary value problem involving a parameter function $a(\cdot)$ and the solution $u(\cdot)$, where the problem is to identify $a(\cdot)$ on an interval $I:= g(Γ)$ from the knowledge of the solution $u(\cdot)$ as $g$ on $Γ$, where $Γ$ is a given curve on the boundary of the domain $Ω\subseteq \mathbb{R}^3$ of… ▽ More

    Submitted 23 April, 2020; v1 submitted 23 February, 2020; originally announced February 2020.

    MSC Class: 47A52

  10. arXiv:1908.05871  [pdf, ps, other

    math.ST math.FA

    Regularization of linear ill-posed problems involving multiplication operators

    Authors: Peter Mathé, M. Thamban Nair, Bernd Hofmann

    Abstract: We study regularization of ill-posed equations involving multiplication operators when the multiplier function is positive almost everywhere and zero is an accumulation point of the range of this function. Such equations naturally arise from equations based on non-compact self-adjoint operators in Hilbert space, after applying unitary transformations arising out of the spectral theorem. For classi… ▽ More

    Submitted 16 August, 2019; originally announced August 2019.

    MSC Class: 47A52; 62G05; 65J20

  11. arXiv:1907.11076  [pdf, ps, other

    math.AP math.FA

    On truncated spectral regularization for an ill-posed evolution equation

    Authors: M. Thamban Nair

    Abstract: In this note we consider the {\it spectral truncation} as the regularization for an ill-posed non-homogeneous parabolic final value problem, and obtain error estimates under a genral source condition when the data, which consist of the non-homogeneous term as well as the final value, are noisy. The resulting error estimate is compared with the corresponding estimate under the Lavrentieve method, a… ▽ More

    Submitted 22 July, 2019; originally announced July 2019.

    Comments: 10 pages

    MSC Class: 35K05; 35K99; 47J06; 47H10

  12. arXiv:1903.10970  [pdf, other

    cs.DB

    Apache Hive: From MapReduce to Enterprise-grade Big Data Warehousing

    Authors: Jesús Camacho-Rodríguez, Ashutosh Chauhan, Alan Gates, Eugene Koifman, Owen O'Malley, Vineet Garg, Zoltan Haindrich, Sergey Shelukhin, Prasanth Jayachandran, Siddharth Seth, Deepak Jaiswal, Slim Bouguerra, Nishant Bangarwa, Sankar Hariappan, Anishek Agarwal, Jason Dere, Daniel Dai, Thejas Nair, Nita Dembla, Gopal Vijayaraghavan, Günther Hagleitner

    Abstract: Apache Hive is an open-source relational database system for analytic big-data workloads. In this paper we describe the key innovations on the journey from batch tool to fully fledged enterprise data warehousing system. We present a hybrid architecture that combines traditional MPP techniques with more recent big data and cloud concepts to achieve the scale and performance required by today's anal… ▽ More

    Submitted 26 March, 2019; originally announced March 2019.

    Comments: SIGMOD'19, 14 pages

  13. arXiv:1812.02096  [pdf, other

    cs.SE

    How practical is it? Machine Learning for Identifying Conceptual Interoperability Constraints in API Documents

    Authors: Hadil Abukwaik, Mohammed Abufouda, Thejashree Nair, Dieter Rombach

    Abstract: Building meaningful interoperation with external software units requires performing the conceptual interoperability analysis that starts with identifying the conceptual interoperability constraints of each software unit, then it compares the systems' constraints to detect their conceptual mismatch. We call the conceptual interoperability constraints (the COINs) that can be of different types inclu… ▽ More

    Submitted 5 December, 2018; originally announced December 2018.

  14. arXiv:1808.01200  [pdf, other

    cs.CV

    Exploring Uncertainty Measures in Deep Networks for Multiple Sclerosis Lesion Detection and Segmentation

    Authors: Tanya Nair, Doina Precup, Douglas L. Arnold, Tal Arbel

    Abstract: Deep learning (DL) networks have recently been shown to outperform other segmentation methods on various public, medical-image challenge datasets [3,11,16], especially for large pathologies. However, in the context of diseases such as Multiple Sclerosis (MS), monitoring all the focal lesions visible on MRI sequences, even very small ones, is essential for disease staging, prognosis, and evaluating… ▽ More

    Submitted 16 October, 2018; v1 submitted 3 August, 2018; originally announced August 2018.

    Comments: Updated references in Introduction; Accepted to the 21st International Conference on Medical Image Computing and Computer Assisted Intervention (MICCAI 2018)

  15. arXiv:1807.05344  [pdf

    stat.ML cs.LG

    Adversarially Learned Mixture Model

    Authors: Andrew Jesson, Cécile Low-Kam, Tanya Nair, Florian Soudan, Florent Chandelier, Nicolas Chapados

    Abstract: The Adversarially Learned Mixture Model (AMM) is a generative model for unsupervised or semi-supervised data clustering. The AMM is the first adversarially optimized method to model the conditional dependence between inferred continuous and categorical latent variables. Experiments on the MNIST and SVHN datasets show that the AMM allows for semantic separation of complex data when little or no lab… ▽ More

    Submitted 23 April, 2022; v1 submitted 14 July, 2018; originally announced July 2018.

  16. arXiv:1606.09266  [pdf, ps, other

    math.FA

    A Discrete Regularization Method for Ill-Posed Operaror Equations

    Authors: M Thamban Nair

    Abstract: Discrete regularization methods are often applied for obtaining stable approximate solutions for ill-posed operator equations $Tx=y$, where $T: X\to Y$ is a bounded operator between Hilbert spaces with non-closed range $R(T)$ and $y\in R(T)$. Most of the existing such methods involve finite rank bounded projection operators on either the domain space $X$ or on codomain space $Y$ or on both. In thi… ▽ More

    Submitted 29 June, 2016; originally announced June 2016.

  17. Priority based bandwidth allocation in wireless sensor networks

    Authors: Mary Cherian, T. R. Gopalakrishnan Nair

    Abstract: Most of the sensor network applications need real time communication and the need for deadline aware real time communication is becoming eminent in these applications. These applications have different dead line requirements also. The real time applications of wireless sensor networks are bandwidth sensitive and need higher share of bandwidth for higher priority data to meet the dead line requirem… ▽ More

    Submitted 9 December, 2014; originally announced December 2014.

    Comments: 10 pages, International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014

  18. A QoS based Routing Approach using Genetic Algorithms for Bandwidth Maximization in Network

    Authors: T R Gopalakrishnan Nair, Kavitha Sooda, R Selvarani

    Abstract: This paper addresses the path selection problem from a known source to the destination in dense networks. The proposed solution for route discovery uses the genetic algorithm approach for a QoS based network. The multi point crossover and mutation helps in determining the optimal path and alternate path when required. The input to the genetic algorithm is a learnt module which is a part of the cog… ▽ More

    Submitted 8 August, 2014; originally announced August 2014.

    Comments: 13 pages, 3 figures, 5 tables,. arXiv admin note: substantial text overlap with arXiv:1001.3920, arXiv:1408.1358; also substantial text overlap with http://cs-wwwarchiv.cs.unibas.ch/personen/sifalakis_manos/research/ms_setn2004.pdf and other sources without attribution

    Journal ref: International Journal of Artificial Intelligence and Soft Computing (IJAISC), Volume 4, Issue 1,2014, Inderscience Enterprise Ltd, pp. 80,94

  19. An intelligent routing approach using genetic algorithms for quality graded network

    Authors: T. R. Gopalakrishnan Nair, Kavitha Sooda

    Abstract: Intelligent routing in networks has opened up many challenges in modelling and methods, over the past decade. Many techniques do exist for routing on such an environment where path determination was carried out by advertisement, position and near-optimum node selection schemes. In this paper, an efficient routing scheme has been proposed using genetic algorithm for a grade-based two-level node sel… ▽ More

    Submitted 6 August, 2014; originally announced August 2014.

    Comments: 16 Pages, 7 figures, 3 tables. arXiv admin note: substantial text overlap with arXiv:1203.6713

    Journal ref: International Journal of Intelligent Systems Technologies And Applications, InderScience Enterprise Ltd, Volume 1, Issue 3/4, 2012

  20. Competitive performance analysis of two evolutionary algorithms for routing optimization in graded network

    Authors: Kavitha Sooda, T. R. Gopalakrishnan Nair

    Abstract: In this paper we compare the two intelligent route generation system and its performance capability in graded networks using Artificial Bee Colony (ABC) algorithm and Genetic Algorithm (GA). Both ABC and GA have found its importance in optimization technique for determining optimal path while routing operations in the network. The paper shows how ABC approach has been utilized for determining the… ▽ More

    Submitted 5 August, 2014; originally announced August 2014.

    Comments: 6 pages, 7 figures, 2 tables, 3rd IEEE International Advanced Computing Conference (IACC), 2013. arXiv admin note: text overlap with arXiv:1408.1052

  21. Optimal path selection in Graded network using Artificial Bee Colony algorithm with Agent enabled Information

    Authors: Kavitha Sooda, T. R. Gopalakrishnan Nair

    Abstract: In this paper we propose a network aware approach for routing in graded network using Artificial Bee Colony (ABC) algorithm. ABC has been used as a good search process for optimality exploitation and exploration. The paper shows how ABC approach has been utilized for determining the optimal path based on bandwidth availability of the link and how it outperformed non graded network while deriving t… ▽ More

    Submitted 5 August, 2014; originally announced August 2014.

    Comments: 6 pages, 4 figures, 2 tables, Hybrid Intelligent Systems (HIS), 2012 12th International Conference on

  22. arXiv:1408.0595  [pdf

    cs.AI

    Correlating and Cross-linking Knowledge Threads in Informledge System for Creating New Knowledge

    Authors: T. R. Gopalakrishnan Nair, Meenakshi Malhotra

    Abstract: There has been a considerable advance in computing, to mimic the way in which the brain tries to comprehend and structure the information to retrieve meaningful knowledge. It is identified that neuronal entities hold whole of the knowledge that the species makes use of. We intended to develop a modified knowledge based system, termed as Informledge System (ILS) with autonomous nodes and intelligen… ▽ More

    Submitted 4 August, 2014; originally announced August 2014.

    Comments: 6 pages, 6 figures, 3 tables, International Conference on Knowledge Engineering and Ontology Development, 2012

  23. Adaptive Wavelet Based Identification and Extraction of PQRST Combination in Randomly Stretching ECG Sequence

    Authors: T. R. Gopalakrishnan Nair, A. P. Geetha, M. Asharani

    Abstract: Cardiovascular system study using ECG signals have evolved tremendously in the domain of electronics and signal processing. However, there are certain floating challenges unresolved in the analysis and detection of abnormal performances of cardiovascular system. As the medical field is moving towards more automated and intelligent systems, wrong detection or wrong interpretations of ECG waveform o… ▽ More

    Submitted 2 August, 2014; originally announced August 2014.

    Comments: Signal and Information Processing (SIP), 2013 IEEE China Summit & International Conference on, pp.278,282,Bei**g, China, 6-10 July. 2013

  24. arXiv:1408.0452  [pdf

    cs.CV

    Methodology For Detection of QRS Pattern Using Secondary Wavelets

    Authors: T. R. Gopalakrishnan Nair, A. P. Geetha, Asharani

    Abstract: Applications of wavelet transform to the field of health care signals have paved the way for implementing revolutionary approaches in detecting the presence of certain abnormalities in human health patterns. There were extensive studies carried out using primary wavelets in various signals like Electrocardiogram (ECG), sonogram etc. with a certain amount of success. On the other hand analysis usin… ▽ More

    Submitted 2 August, 2014; originally announced August 2014.

    Comments: 3 pages, 8 figures,Systemics, Cybernetics and Informatics (ICSCI)2012, International Conference on pp.327,330, Dr.MCR HRD Institute, Hyderabad, India, 15-18Feb 2012

  25. arXiv:1407.8377  [pdf

    cs.SE

    SLI, a New Metric to determine Success of a Software Project

    Authors: Shashi Kumar N. R., T. R. Gopalakrishnan Nair, Suma V

    Abstract: Project Management process plays a critical role in managing factors such as cost, time, technology and personnel towards achieving the success of a project and henceforth the sustainability of the company in the industrial market. This paper emphasizes empirical study of several projects developed over a period of time in a product and service based CMMI Level 5 Software Company. The investigatio… ▽ More

    Submitted 31 July, 2014; originally announced July 2014.

    Comments: 5 pages, 4 tables, IEEE International Conference on Electronics and Communication Systems (ICECS)2014

  26. Accurate merging of images for predictive analysis using combined image

    Authors: T. R. Gopalakrishnan Nair, Richa Sharma

    Abstract: Several Scientific and engineering applications require merging of sampled images for complex perception development. In most cases, for such requirements, images are merged at intensity level. Even though it gives fairly good perception of combined scenario of objects and scenes, it is found that they are not sufficient enough to analyze certain engineering cases. The main problem is incoherent m… ▽ More

    Submitted 30 July, 2014; originally announced July 2014.

    Comments: 5 pages, 4 figures,Signal Processing Image Processing & Pattern Recognition (ICSIPR), 2013 International Conference on, Karunya University, Coimbatore, India, pp.169,173, 7-8 Feb. 2013. arXiv admin note: substantial text overlap with arXiv:1407.8123

  27. arXiv:1407.8123  [pdf

    cs.CV

    Merging and Shifting of Images with Prominence Coefficient for Predictive Analysis using Combined Image

    Authors: T. R. Gopalakrishnan Nair, Richa Sharma

    Abstract: Shifting of objects in an image and merging many images after appropriate shifting is being used in several engineering and scientific applications which require complex perception development. A method has been presented here which could be used in precision engineering and biological applications where more precise prediction is required of a combined phenomenon with varying prominence of each p… ▽ More

    Submitted 30 July, 2014; originally announced July 2014.

    Comments: 7 pages,4 figures,Emerging Research in Computing, Information, Communication and Application (ERCICA13), International Conference on, NMIT, Bangalore, India, pp. 205,211, 2-3 Aug.2013 ISBN: 9789351071020

  28. Model based design of super schedulers managing catastrophic scenario in hard real time systems

    Authors: A. Christy Persya, T. R. Gopalakrishnan Nair

    Abstract: The conventional design of real-time approaches depends heavily on the normal performance of systems and it often becomes incapacitated in dealing with catastrophic scenarios effectively. There are several investigations carried out to effectively tackle large scale catastrophe of a plant and how real-time systems must reorganize itself to respond optimally to changing scenarios to reduce catastro… ▽ More

    Submitted 21 July, 2014; originally announced July 2014.

    Comments: 7 pages, 4 figures,Information Communication and Embedded Systems (ICICES), 2013, IEEE International Conference on, Chennai, India, pp.1149,1155, 21-22 Feb. 2013

  29. arXiv:1407.5327  [pdf

    cs.NI cs.NE

    A Comparative Analysis for Determining the Optimal Path using PSO and GA

    Authors: Kavitha Sooda, T. R. Gopalakrishnan Nair

    Abstract: Significant research has been carried out recently to find the optimal path in network routing. Among them, the evolutionary algorithm approach is an area where work is carried out extensively. We in this paper have used particle swarm optimization (PSO) and genetic algorithm (GA) for finding the optimal path and the concept of region based network is introduced along with the use of indirect enco… ▽ More

    Submitted 20 July, 2014; originally announced July 2014.

    Comments: 5 pages, 4 figures, 1 tables. arXiv admin note: substantial text overlap with arXiv:1107.1945

    Journal ref: pages: 8-12, International Journal of Computer Applications, Volume 32, No 4, October 2011 ISSN 0975 - 8887

  30. arXiv:1407.5323  [pdf

    cs.SE

    A Parametric Analysis of Project Management Performance to Enhance Software Development Process

    Authors: Shashikumar N. R., T. R. Gopalakrishnan Nair, Suma V

    Abstract: Project Management process plays a significant role in effective development of software projects. Key challenges in the project management process are the estimation of time, cost, defect count, and subsequently selection of apt developers. Therefore precise estimation of above stated factors decides the success level of a project. This paper provides an empirical study of several projects develo… ▽ More

    Submitted 20 July, 2014; originally announced July 2014.

    Comments: 6 pages, 5 figures, 1 tables, IEEE International Conference on Advanced Research in Engineering and Technology (ICARET - 2013)

  31. arXiv:1407.5320  [pdf

    cs.DC cs.NI

    An Optimum Scheduling Approach for Creating Optimal Priority of Jobs with Business Values in Cloud Computing

    Authors: Vivek Sharma, T. R. Gopalakrishnan Nair

    Abstract: Realizing an optimal task scheduling by taking into account the business importance of jobs has become a matter of interest in pay and use model of Cloud computing. Introduction of an appropriate model for an efficient task scheduling technique could derive benefit to the service providers as well as clients. In this paper, we have addressed two major challenges which has implications on the perfo… ▽ More

    Submitted 20 July, 2014; originally announced July 2014.

    Comments: 8 pages, 6 figures, 6 tables, International Conference on Advances in Cloud Computing (ACC12)

  32. arXiv:1407.5319  [pdf

    cs.SE

    Impact Analysis of Allocation of Resources by Project Manager on Success of Software Projects

    Authors: T. R. Gopalakrishnan Nair, Suma V, Shashi Kumar N. R

    Abstract: Generation Production of successful software project is one of the prime considerations of software industry. Engineering high quality software products is further influenced by several factors such as budget, schedule, resource constraints etc. A project manager is responsible for estimation and allocation of these resources in a project. Hence, role of project manager has a vital influence on su… ▽ More

    Submitted 20 July, 2014; originally announced July 2014.

    Comments: 5 pages,5 figures, 1 tables, International Conference on Data Mining and Computer Engineering (ICDMCE'2012) December 21-22, 2012 Bangkok (Thailand)

  33. arXiv:1407.3930  [pdf

    cs.NI

    Comparative performance analysis of AntHocNet and DSR in optimal path route determination

    Authors: T. R. Gopalakrishnan Nair, Kavitha Sooda, Kavya B. S, Sushma M

    Abstract: One of the key challenges in current Internet routing is the application of improved bio-inspired algorithms in deriving the path towards the destination. Current routing trends determine the optimal path based on throughput, delay or combination of these two metric. Here in this paper, we compare the performance of the two algorithms, AntHocNet (AHN) and Dynamic Source Routing (DSR) for determini… ▽ More

    Submitted 15 July, 2014; originally announced July 2014.

    Comments: 7 pages, 4 figures, 4 tables. arXiv admin note: text overlap with arXiv:1101.0209 by other authors

    Journal ref: Anusandhana Journal, NMIT, Volume 1, Issue 2, December, 2012, pp 1-7

  34. GPU Acclerated Automated Feature Extraction from Satellite Images

    Authors: K. Phani Tejaswi, D. Shanmukha Rao, Thara Nair, A. V. V. Prasad

    Abstract: The availability of large volumes of remote sensing data insists on higher degree of automation in feature extraction, making it a need of the hour.The huge quantum of data that needs to be processed entails accelerated processing to be enabled.GPUs, which were originally designed to provide efficient visualization, are being massively employed for computation intensive parallel processing environ… ▽ More

    Submitted 15 April, 2013; originally announced April 2013.

    Journal ref: International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.2, March 2013

  35. arXiv:1209.6466  [pdf

    cs.SE

    Four-Step Approach Model of Inspection (FAMI) for Effective Defect Management in Software Development

    Authors: Suma V., T. R. Gopalakrishnan Nair

    Abstract: IT industry should inculcate effective defect management on a continual basis to deploy nearly a zerodefect product to their customers. Inspection is one of the most imperative and effective strategies of defect management. Nevertheless, existing defect management strategies in leading software industries are successful to deliver a maximum of 96% defect-free product. An empirical study of various… ▽ More

    Submitted 28 September, 2012; originally announced September 2012.

    Comments: 13 Pages, 8 Tables, 6 Figures; InterJRI Science and Technology, Volume3, Issue 1, August 2010

  36. Defect Management Strategies in Software Development

    Authors: V. Suma, T. R. Gopalakrishnan Nair

    Abstract: Software is a unique entity that has laid a strong impact on all other fields either related or not related to software. These include medical, scientific, business, educational, defence, transport, telecommunication to name a few. State-of-the-art professional domain activities demands the development of high quality software. High quality software attributes to a defect-free product, which is co… ▽ More

    Submitted 25 September, 2012; originally announced September 2012.

    Comments: 27 Pages, 3 Figures, 5 Tables, 12 Equations

    Journal ref: Intec Web Publishers, Vienna, Austria, November 2009, ISBN: 978-953-307-017-9

  37. Influenza Virus Vaccine Efficacy Based On Conserved Sequence Alignment

    Authors: Baby Jerald, T. R. Gopalakrishnan Nair

    Abstract: The rapid outbreak of bird flu challenges the outcome of effective vaccine for the upcoming years. The recent research established different norms to eliminate flu pandemics. This can be made possible with skilled experimental analyses and by tracking the recent virulent strain and can be broadly applicable with effective testing of vaccine efficacy. Every year World Health Organization (WHO) reve… ▽ More

    Submitted 2 June, 2012; originally announced June 2012.

    Comments: International Conference on Biomedical Engineering (ICoBE), 2012 Date of Conference: 27-28 Feb. 2012 Page(s): 327 - 329, 2 figures, 3 pages

  38. arXiv:1206.0425  [pdf

    cs.OH

    Transformation of Traditional Marketing Communications in to Paradigms of Social Media Networking

    Authors: T. R. Gopalakrishnan Nair, Kumarashvari Subramaniam

    Abstract: Effective Communication for marketing is a vital field in business organizations, which is used to convey the details about their products and services to the market segments and subsequently to build long lasting customer relationships. This paper focuses on an emerging component of the integrated marketing communication, ie. social media networking, as it is increasingly becoming the trend. In 2… ▽ More

    Submitted 3 June, 2012; originally announced June 2012.

    Comments: Asia-Pacific Business Research Conference, 13th -14th February 2012, Kuala Lumpur, Malaysia

  39. arXiv:1206.0420  [pdf

    cs.NI

    Multipath Routing With Novel Packet Scheduling Approach In Wireless Sensor Networks

    Authors: Mary Cherian, T. R. Gopalakrishnan Nair

    Abstract: Wireless sensor networks sense and monitor real-time events. They supervise a geographic area where a phenomenon is to be monitored. The data in sensor networks have different levels of priority and hence their criticality differs. In order to keep up the real time commitment, the applications need higher transmission rates and reliability in information delivery. In this work we propose a multipa… ▽ More

    Submitted 3 June, 2012; originally announced June 2012.

    Comments: pages 5, figures 5, ISSN: 1793-821X (Online Version); 1793-8201 (Print Version), International Journal of Computer Theory and Engineering, Vol. 3, No. 5, October 2011,pp. 666-670

  40. Pre-allocation Strategies of Computational Resources in Cloud Computing using Adaptive Resonance Theory-2

    Authors: T. R. Gopalakrishnan Nair, P Jayarekha

    Abstract: One of the major challenges of cloud computing is the management of request-response coupling and optimal allocation strategies of computational resources for the various types of service requests. In the normal situations the intelligence required to classify the nature and order of the request using standard methods is insufficient because the arrival of request is at a random fashion and it is… ▽ More

    Submitted 3 June, 2012; originally announced June 2012.

    Comments: pages 11, figures 3, International Journal on Cloud Computing: Services and Architecture(IJCCSA),Vol.1, No.2, August 2011

  41. arXiv:1206.0361  [pdf

    cs.SE

    Defect Management Using Depth of Inspection and the Inspection Performance Metric

    Authors: T. R. Gopalakrishnan Nair, V Suma

    Abstract: Advancement in fundamental engineering aspects of software development enables IT enterprises to develop a more cost effective and better quality product through aptly organized defect management strategies. Inspection continues to be the most effective and efficient technique of defect management. To have an appropriate measurement of the inspection process, the process metric, Depth of Inspectio… ▽ More

    Submitted 2 June, 2012; originally announced June 2012.

    Comments: 6 pages, CrossTalk, 2011, pp no. 22-27

  42. arXiv:1205.3570  [pdf

    cs.NI

    A QoS-Aware Routing Protocol for Real-time Applications in Wireless Sensor Networks

    Authors: Mary Cherian, T. R Gopalakrishnan Nair

    Abstract: The paper presents a quality of service aware routing protocol which provides low latency for high priority packets. Packets are differentiated based on their priority by applying queuing theory. Low priority packets are transferred through less energy paths. The sensor nodes interact with the pivot nodes which in turn communicate with the sink node. This protocol can be applied in monitoring cont… ▽ More

    Submitted 16 May, 2012; originally announced May 2012.

    Comments: 10 pages. arXiv admin note: text overlap with arXiv:1001.5339 by other authors

    Journal ref: Innovative Systems Design and Engineering, ISSN 2222-1727 (Paper),ISSN 2222-2871 (Online), Vol 2, No 7, 2011 pp. 84-93

  43. arXiv:1204.2616  [pdf

    cs.MM cs.CR

    Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

    Authors: T. R. Gopalakrishnan Nair, Suma V, Manas S

    Abstract: Retention of secrecy is one of the significant features during communication activity. Steganography is one of the popular methods to achieve secret communication between sender and receiver by hiding message in any form of cover media such as an audio, video, text, images etc. Least significant bit encoding is the simplest encoding method used by many steganography programs to hide secret message… ▽ More

    Submitted 12 April, 2012; originally announced April 2012.

    Comments: 8 Pages, 4 Figures, Swarm Evolutionary and Memetric Computing Conference (SEMCCO), Vishakhapatnam

  44. arXiv:1204.2613  [pdf

    cs.OH

    Cloud Computing For Microfinances

    Authors: Suma. V, Bhagavant Deshpande, Vaidehi. M, T. R. Gopalakrishnan Nair

    Abstract: Evolution of Science and Engineering has led to the growth of several commercial applications. The wide spread implementation of commercial based applications has in turn directed the emergence of advanced technologies such as cloud computing. India has well proven itself as a potential hub for advanced technologies including cloud based industrial market. Microfinance system has emerged out as a… ▽ More

    Submitted 12 April, 2012; originally announced April 2012.

    Comments: 3 Pages, 2 Figures, International Conference On Systemics, Cybernetics and Informatics

  45. arXiv:1203.6721  [pdf

    q-bio.BM

    Evaluation of the Structural disorder of the protein FMR1 with Carbon Composition

    Authors: Baby Jerald A., T. R. Gopalakrishnan Nair, Ekambaram Rajasekaran

    Abstract: Ever since the disorder of proteins is the main cause for many diseases. As compared with other disorders, the major reason that causes disease is of structural inability of many proteins. The potentially imminent availability of recent datasets helps one to discover the protein disorders, however in majority of cases, the stability of proteins depend on the carbon content. Addressing this distinc… ▽ More

    Submitted 30 March, 2012; originally announced March 2012.

    Comments: 6 Pages, 1 Figure, 2nd Annual International Conference on BioInformatics and Computational Biology (BICB 2012), Bangkok, Thailand

    Journal ref: 2nd Annual International Conference on BioInformatics and Computational Biology (BICB 2012), Bangkok, Thailand

  46. Critical Task Re-assignment under Hybrid Scheduling Approach in Multiprocessor Real-Time Systems

    Authors: Gopalakrishnan T. R. Nair, Christy A. Persya

    Abstract: Embedded hard real time systems require substantial amount of emergency processing power for the management of large scale systems like a nuclear power plant under the threat of an earth quake or a future transport systems under a peril. In order to meet a fully coordinated supervisory control of multiple domains of a large scale system, it requires the scenario of engaging multiprocessor real tim… ▽ More

    Submitted 30 March, 2012; originally announced March 2012.

    Comments: 8 Pages, 7 Figures, The 23rd IASTED International Conference on Parallel and Distributed Computing Systems (PDCS 2011)

  47. Creating Intelligent Linking for Information Threading in Knowledge Networks

    Authors: Dr T. R. Gopalakrishnan Nair, Meenakshi Malhotra

    Abstract: Informledge System (ILS) is a knowledge network with autonomous nodes and intelligent links that integrate and structure the pieces of knowledge. In this paper, we aim to put forward the link dynamics involved in intelligent processing of information in ILS. There has been advancement in knowledge management field which involve managing information in databases from a single domain. ILS works with… ▽ More

    Submitted 30 March, 2012; originally announced March 2012.

    Comments: 5 Pages, 6 Figures, 2 Tables, India Conference (INDICON), 2011

    Journal ref: India Conference (INDICON), 2011

  48. Application of Genetic Algorithm on Quality Graded Networks for Intelligent Routing

    Authors: T. R. Gopalakrishnan Nair, Kavitha Sooda

    Abstract: In the past decade, significant research has been carried out for realizing intelligent network routing using advertisement, position and near-optimum node selection schemes. In this paper, a grade-based two-level node selection method along with genetic algorithm (GA) is proposed for realizing an efficient routing scheme. This method assumes that the nodes are intelligent and that there exists a… ▽ More

    Submitted 30 March, 2012; originally announced March 2012.

    Comments: 6 Pages, 6 Figures, 3 Tables, 2011 World Congress on Information and Communication Technologies

    Journal ref: Information and Communication Technologies (WICT), 2011 World Congress on Information and Communication Technologies

  49. arXiv:1203.6445  [pdf

    cs.SE

    Analysis of Test Efficiency during Software Development Process

    Authors: T. R. Gopalakrishnan Nair, V. Suma, Pranesh Kumar Tiwari

    Abstract: One of the prerequisites of any organization is an unvarying sustainability in the dynamic and competitive industrial environment. Development of high quality software is therefore an inevitable constraint of any software industry. Defect management being one of the highly influencing factors for the production of high quality software, it is obligatory for the software organizations to orient the… ▽ More

    Submitted 29 March, 2012; originally announced March 2012.

    Comments: 6 Pages, 6 Figures, Proceedings of the Annual International Conference on Software Engineering and Applications (SEA 2010-2011)

  50. An Analytical Approach for Project Managers in Effective Defect Management in Software Process

    Authors: T. R. Gopalakrishnan Nair, V. Suma, N. R. Shashi Kumar

    Abstract: Defect estimation and prediction are some of the main modulating factors for the success of software projects in any software industry. Maturity and competency of a project manager in efficient prediction and estimation of resource capabilities are one of the strategic driving forces towards the generation of high quality software. Currently, there are no estimation techniques developed through em… ▽ More

    Submitted 29 March, 2012; originally announced March 2012.

    Comments: 7 Pages, 8 Figures, 4 Tables 2011 5th Malaysian Conference in Software Engineering (MySEC)

    Journal ref: 2011 5th Malaysian Conference in Software Engineering (MySEC)