2. Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/1/7

Browse

Search Results

Now showing 1 - 10 of 12
  • Item
    Towards a Domain Specific Modeling Tool for Home Automation Systems
    (2020) Patil P.; Aparna R.; Chandrasekaran K.
    There is a steadily growing market for applications enabling home automation system connectivity to control various applications and home appliances for managing and security purposes. Development of Home Automation (HA) systems involves a lot of complexity resulting from the heterogeneous nature of the system and its need to be able to provide data security and authenticity. The software development life cycle can be shortened if there exists a solution that enables a suitable transformation from design to crude implementation. There are less known integrated framework for HA system development from model to implementation. This solution can be obtained through Model-driven Development. This paper aims to propose a Model-driven Development based solution which models the Home automation domain using meta-modeling technique and a platform-independent Domain-specific Modelling Language (DSML) which can be used for developing platform dependant DSML to achieve automated code generation using a model. The DSML proposed has been validated with the help of a proof of concept, using case studies. This approach can shorten the development duration and more emphasis can be given for the better design of the system. © 2020 IEEE.
  • Item
    Singlow: Simulator for General Network Flow Problems
    (2020) Raghavan S.; Bhagtya P.; Chandrasekaran K.
    Simulation is an important process and an inevitable part of engineering. There are several applications of simulation with one of the important being visualization of complex methods and processes. This paper aims at creating a simulator for general network flow optimization problems. This work uses a modular approach for creating a simulator. A simulator in this area is necessary for several reasons. The main reason for requirement is its usefulness in explaining the problems to the people/students who might use these kinds of network optimization methods to solve several variety of problems. This simulator can simulate standard problems namely transportation problems with various methods, network flow problem and some popular problems in that area. This simulator will be helpful for educational institutions to teach the students about the standard problems on network flow optimization. Here this paper proposes a framework i.e. Singlow for the above mentioned purpose. This paper explains the framework with the flow of execution by keeping in mind a general simulation software. The Simulator has been designed and implemented using Processing 3.4, a software which facilitates designing graphical user interfaces. © 2020 IEEE.
  • Item
    Review of techniques for automatic text summarization
    (2020) Prakash B.S.; Sanjeev K.V.; Prakash R.; Chandrasekaran K.; Rathnamma M.V.; Ramana V.V.
    Summarization refers to the process of reducing the textual components such as words and sentences but conveying most of the information in the input text. Research in summarization is very prominent in the current scenario where the textual data available is enormous and contains valuable information. People have been interested in summarization since time immemorial. The methods adopted in the past relied on manually reading the text and based on one’s understanding of the text, manually generating the summary. In the current world, due to the explosion of data from Internet and social media, the manual process is very tedious and time-consuming. As a result, there is a great need to automate the process of summarization. In this paper, we summarize most of the researches in the field of summarization which is unique and path-breaking. © Springer Nature Singapore Pte Ltd. 2020.
  • Item
    Optimized diet plan using unbounded knapsack Algorithm
    (2020) Bobade P.; Kumar P.; Chandrasekaran K.; Usha D.
    Cholesterol, hypertension and diabetes are the three major chronic diseases from which most of the people suffers and these peoples often use search engines to acquire related information about these problems. But, almost every information related to diet on the internet isn't suitable for people to gather information about the diet suggestions. A system for diet suggestion which can advocate a prudent diet for such peoples is suggested in this paper. We designed a system that recommends a proper diet which has the adequate knowledge of three above mentioned highly chronic diseases. We propose a solution to the menu recommending problem using the optimization algorithm known as unbounded knapsack. We designed a model which satisfies the nutritional requirements of individuals while imposing the 'Laws of Nutrition', a set of hypothesis used by almost all Latin America's nutrition scientists. This prototype corresponds to a numerical optimization problem with constraints. We design a menu items generator application model to set up a convenient menu for a user with different properties. © 2020 IEEE.
  • Item
    On Feature Models of Home Automation Systems towards Smart Sensing
    (2020) Patil P.; Aparna R.; Chandrasekaran K.; Rathnamma M.V.; Ramana V.V.
    The growing need for innovation in software products and an increase in their complexity has demanded an evolution in the software industry in recent years. Domain Analysis assists software developers in understanding the domains leading to significant improvement in their software development. Domain Analysis can be easily carried out using Feature Modelling by identifying the commonalities and variations among attributes of the domain. On the other hand, Home Automation is a developing domain and is now seeing an increase in the number and complexity of products. The heterogeneity of the home automation system elements introduced a lot of complexity to the developers. The commonly observable features and variations arising from HA systems allow us to visualize Home Automation (HA) systems as a Software Product Line (SPL). In this paper, we aim to adopt the Feature Modelling technique for Domain Analysis of the HA system. The efficacy and validity of this approach is evaluated with the help of proof of concepts. © 2020 IEEE.
  • Item
    Middleware Frameworks for Mobile Cloud Computing, Internet of Things and Cloud of Things: A Review
    (2020) Debbarma T.; Chandrasekaran K.
    Mobile cloud computing (MCC) is an extension of cloud computing (CC) technologies. It provides seamless access of different cloud services to smart mobile devices (SMDs). There is no denying that CC can be scaled to a great extent in terms of computing, storage and other services, but the SMDs used for accessing those services are limited on battery capacity, storage and computing power due to their small form factors. The limitations of SMDs can be minimised/resolved by using MCC platforms. Though MCC is advantageous in many ways, it has its own inherent challenges and issues due to the heterogeneous hardware and software platforms used by SMDs and CC platforms, which makes it difficult to have interoperable services and the development of applications for those devices. This paper studied recently (from 2012 onwards) proposed/developed middlewares for the Internet of things (IoT), cloud of things (CoT), context-aware middlewares (CaMs) and mobile cloud middlewares (MCMs). Different middleware architectures are chosen, as in many cases, these technologies converge in terms of features, functions and services they provide. The study finds that the present middlewares lack in providing an integrated solution that complies with interoperability, portability, adaptability, context awareness, security and privacy, service discovery, fault tolerance requirements. At the end of the paper, the challenges pertaining to achieve portability, interoperability, context awareness, security are discussed and identify the gaps in the existing approaches in MCC interoperability and context adaptability. © 2020, Springer Nature Singapore Pte Ltd.
  • Item
    Machine Learning Models with Optimization for Clothing Recommendation from Personal Wardrobe
    (2020) Jain M.; Singh S.; Chandrasekaran K.; Rathnamma M.V.; Venkata Ramana V.
    In the present-day scenario, several clothing recommender systems have been developed for the online e-commerce industry. However, when it comes to recommending clothes that a person already possesses, i.e, from their personal wardrobe, there are very few systems that have been proposed to perform the task. In this paper, we tackle the latter issue, and perform experimental analysis of the various Machine Learning techniques that can be used for carrying out the task. Since the recommendations must be made from a user's personal wardrobe, the recommender system doesn't follow a traditional approach. This is explained in detail in the following sections. Further, the paper contains a complete description of the results obtained from the experiments conducted, and the best approach is specified, with appropriate justification for the same. © 2020 IEEE.
  • Item
    HTmRPL++ : A Trust-Aware RPL Routing Protocol for Fog Enabled Internet of Things
    (2020) Subramanian N.; Mitra S.; Martin J.P.; Chandrasekaran K.
    With the proliferation of Fog computing, computation is moved to edge devices and is not based on a purely centralized approach. In a Fog computing network, the network topology is dynamic. New nodes will join and leave. One of the major issues in Fog computing is trust. Trust is the level of assurance that an object will behave in a satisfactory manner. The Routing Protocol for Low Power and Lossy Networks (RPL) is a protocol used for routing in IoT networks. RPL provides meager protection against routing or other forms of attacks. The resource-constrained nature of Fog nodes prevents the use of heavyweight cryptographic algorithms to achieve secured communication. A lightweight mechanism is thus essential to impart security in Fog-IoT networks. Trust analysis provides a behavior-based analysis of entities in the system with the power to predict future behavior. In this paper, a lightweight Recommendation based Trust Mechanism is proposed to impart security to RPL. © 2020 IEEE.
  • Item
    How do open source app developers perceive API changes related to Android battery optimization? An empirical study
    (2021) Marimuthu C.; Chimalakonda S.; Chandrasekaran K.
    There is an increasing interest shown by researchers and developers in reducing the battery consumption of Android applications. Recently, the battery optimization features such as doze mode, app standby, background execution limits, and background location limits were introduced in the form of API changes. According to the API changes, application developers have to change their source code to manage the behavioral changes caused by operating system limitations. These battery optimization features are evolving rapidly, and the apps show unexpected behaviors until updating the source code. Also, developers find it difficult to cope with the changes. Therefore, there is a need to understand the behavioral changes, application developer's perceptions, and response patterns on the API changes to plan upcoming battery optimization features. In this article, we have collected the relevant GitHub issues from 225 open-source Android repositories and performed a thematic analysis of collected data. This study analyzes the 391 related issues to answer three research questions. This study's important finding is that developers often post issues related to delayed app notifications, inconsistent background location updates, and suspended background tasks, and so on. We found that library developers are showing a quick response to API changes compared with application developers. © 2020 John Wiley & Sons Ltd
  • Item
    A Heuristic Algorithm to Find a Path to be Blocked by Minimizing Traffic Disruption
    (2020) Das M.; Ambati S.S.; Chandrasekaran K.
    This paper discusses the problem of finding a path to be blocked from the source to the destination for a vehicle to pass by in such a way that the traffic disruption caused is minimum. The traffic disruption caused by blocking a path is measured by estimating the number of vehicles that would have crossed any of the vertices in the path if the path had not been blocked. It also presents a heuristic algorithm 'Aggregate Traffic Minimization' (ATM) to solve the above problem. The traffic disruption caused by the path chosen by the ATM algorithm was compared with that of a popular baseline algorithm and was found that ATM outperforms the baseline alzorithm in most cases. © 2020 IEEE.