3. Book Chapters
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/1/8
Browse
9 results
Search Results
Item A Systematic Mapping Study of Content Based Filtering Recommender Systems(2019) Jain M.; Singh S.; Chandrasekaran K.There has been extremely limited use of recommender systems for clothing suggestions. A clear idea of where recommender systems are used would facilitate the correct method of implementation for the domain given above. In order to propose a solution, there is a need to properly analyse the various existing approaches and solutions developed in a particular field. This study will help us gain clarity to answer several research questions in the chosen domain. A systematic mapping study is carried out to identify as well as classify the research papers pertaining to the chosen field. © 2019, Springer Nature Switzerland AG.Item Envisioned Network Architectures for IoT Applications(2019) Sarwesh P.; Shet N.S.V.; Chandrasekaran K.Internet of Things is the auspicious technology that connects different internet enabled devices in single network architecture. IoT contributes effective service in various applications such as industrial automation, health care sectors, and home automation. Availability of low cost devices makes IoT as innovative paradigm in large-scale wireless network research. Challenges in IoT applications vary from each other. For example, in smart grid applications QoS is more important, whereas for land slide monitoring applications, energy efficiency and reliability are the major requirements. Thus, in this chapter, we come up with various network architectures that are suitable for IoT applications. The network architectures are designed by combining different optimization techniques into single network design, to satisfy specific network requirements. This chapter elaborates the major issues that affect the network performance and suitable solutions for those issues by means of efficient network architectures. © 2019, Springer International Publishing AG, part of Springer Nature.Item A probe into the technological enablers of microservice architectures(2019) Joseph C.T.; Chandrasekaran K.Microservice architectures (MSA), composed of loosely coupled and autonomous units called microservices, are gaining wide adoption in the software field. With characteristics that are loyal to the requirements of the Cloud environment, such as inherent support for continuous integration/continuous deployment (CI/CD), MSA are actively embraced by the Cloud computing community. Containers employing lightweight virtualization have also been increasingly adopted in the Cloud environment. The containers wrap applications along with their dependencies into self-contained units, which can be deployed independently. These features make it the unanimously accepted technology to enable seamless execution of microservices in the Cloud. With this outlook, this chapter undertakes a study on how containers may be used to support the execution of microservices. The study also includes other technologies that, in collaboration with container technologies, provide the support required for running microservices in the Cloud. An interesting concern for applications running on containers is resource management. Nevertheless, this is a significant aspect for supporting microservices as well. Such issues have been identified and research works addressing all or some of these issues, have been considered. The various relevant studies have been classified into different categories and the future directions have been identified, which can be used by researchers aiming to enhance the technological support for microservices in Cloud. © Springer Nature Singapore Pte Ltd. 2019.Item Identity and access management in the cloud computing environments(2016) Thomas M.V.; Chandrasekaran K.Nowadays, the issue of identity and access management (IAM) has become an important research topic in cloud computing. In the distributed computing environments like cloud computing, effective authentication and authorization are essential to make sure that unauthorized users do not access the resources, thereby ensuring the confidentiality, integrity, and availability of information hosted in the cloud environment. In this chapter, the authors discuss the issue of identity and access management in cloud computing, analyzing the work carried out by others in the area. Also, various issues in the current IAM scenario in cloud computing, such as authentication, authorization, access control models, identity life cycle management, cloud identity-as-a-service, federated identity management and also, the identity and access management in the inter-cloud environment are discussed. The authors conclude this chapter discussing a few research issues in the area of identity and access management in the cloud and inter-cloud environments. © 2017 by IGI Global. All rights reserved.Item Virtual machine migration—a perspective study(2018) Joseph C.T.; Martin J.P.; Chandrasekaran K.; Kandasamy A.The technology of Cloud computing has been ruling the IT world for the past few decades. One of the most notable tools that helped in prolonging the reign of Cloud computing is virtualization. While virtualization continues to be a boon for the Cloud technology, it is not short of its own pitfalls. One such pitfall results from the migration of virtual machines. Though migration incurs an overhead on the system, an efficient system cannot neglect migrating the virtual machines. This work attempts to carry out a perspective study on virtual machine migration. The various migration techniques proposed in the literature have been classified based on the aspects of migration that they consider. A survey of the various metrics that characterize the performance of a migration technique is also done. © 2018, Springer Nature Singapore Pte Ltd.Item Unraveling the challenges for the application of fog computing in different realms: A multifaceted study(2019) Martin J.P.; Kandasamy A.; Chandrasekaran K.Fog computing is an emerging paradigm that deals with distributing data and computation at intermediate layers between the cloud and the edge. Cloud computing was introduced to support the increasing computing requirements of users. Later, it was observed that end users experienced a delay involved in uploading the large amounts of data to the cloud for processing. Such a seemingly centralized approach did not provide a good user experience. To overcome this limitation, processing capability was incorporated in devices at the edge. This led to the rise of edge computing. This paradigm suffered because edge devices had limited capability in terms of computing resources and storage requirements. Relying on these edge devices alone was not sufficient. Thus, a paradigm was needed without the delay in uploading to the cloud and without the resource availability constraints. This is where fog computing came into existence. This abstract paradigm involves the establishment of fog nodes at different levels between the edge and the cloud. Fog nodes can be different entities, such as personal computers (PCs). There are different realms where fog computing may be applied, such as vehicular networks and the Internet of Things. In all realms, resource management decisions will vary based on the environmental conditions. This chapter attempts to classify the various approaches for managing resources in the fog environment based on their application realm, and to identify future research directions. © Springer Nature Singapore Pte Ltd. 2019.Item A survey on recurrent neural network architectures for sequential learning(2019) Shiva Prakash B.; Sanjeev K.V.; Prakash R.; Chandrasekaran K.The expanding textual information and significance of examining the substance has started a colossal research in the field of synopsis. Text summarization is the process of conveying the gist of a text with a minimized representation. The requirement for automation of the procedure is at its apex with exponential burst of information because of digitization. Text captioning comes under the branch of abstractive summarization which captures the gist of the article in a few words. In this paper, we present an approach to text captioning using recurrent neural networks which comprise of an encoder–decoder model. The key challenges dealt here was to figure out the ideal input required to produce the desired output. The model performs better when the input is fed with the summary as compared to the original article itself. The recurrent neural network model with LSTM results has been effective in transcribing a caption for the textual data. © Springer Nature Singapore Pte Ltd. 2019Item Sustainable software development with a shared repository(2018) Debbarma T.; Chandrasekaran K.Cloud-based computing services trend has significantly increased the building of new cloud data centres in the recent times. These data centres consume a large amount of electrical energy to run the Information Communication Technology (ICT) devices and for its cooling, as a result of that emission of $$CO:2$$ and Greenhouse Gas (GHG) has increased largely. This paper proposes a Sustainable Software Development Life Cycle (SDLC) Model. This model would contribute towards making the cloud computing systems more energy efficient and the ICT a green and sustainable development ecosystem. The Green Cloud Computing will be considered as an implementation platform for the proposed Sustainable SDLC. It is proposed that reusable, modular and cloud-shared development approach be used to make the software development and the software more energy efficient. The SDLC will use a cloud repository which will be accessible as per software development organizations cloud deployment model. © Springer Nature Singapore Pte Ltd. 2018Item A review on mobile cloud computing interoperability issues and challenges(2020) Debbarma T.; Chandrasekaran K.Mobile cloud computing (MCC) is the convergence of two recent technologies namely “Cloud Computing” and “Mobile Computing” with wireless networks as a communication backbone. There are mainly three paradigms that use the concepts of MCC, viz. edge computing, fog computing and cloudlets. Due to the presence of various heterogeneous hardware and software platforms in MCC, there are many interoperability issues which create vendor/services lock-in problems, it also makes data and application portability difficult. This paper studies the different paradigms of MCC and the challenges in making them interoperable in heterogeneous hardware and software platforms. We have summarized some of the MCC-based research papers and their findings. Contribution of this paper is the summary of challenges and research scopes in the field of MCC where it needs to be addressed to mitigate the interoperability issues. © Springer Nature Singapore Pte Ltd. 2020.