2. Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/1/7

Browse

Search Results

Now showing 1 - 10 of 14
  • Thumbnail Image
    Item
    Memetic NSGA - A multi-objective genetic algorithm for classification of microarray data
    (2007) Kumar, K, P.; Sharath, S.; D'Souza, G, R.; Sekaran, K.C.
    In Gene Expression studies, the identification of gene subsets responsible for classifying available samples to two or more classes is an important task. One major difficulty in identifying these gene subsets is the availability of only a few samples compared to the number of genes in the samples. Here we treat this problem as a Multi-objective optimization problem of minimizing the gene subset size and minimizing the number ofmisclassified samples. We present a new elitist Non-dominated Sorting-based Genetic Algorithm (NSGA) called Memetic-NSGA which uses the concept of Memes. Memes are a group of genes which have a particular functionality at the phenotype level. We have chosen a 50 gene Leukemia dataset to evaluate our algorithm. A comparative study between Memetic-NSGA and another Non-dominated Sorting Genetic Algorithm, called NSGA-II, is presented. Memetic-NSGA is found to perform better in terms of execution time and gene-subset length identified. � 2007 IEEE.
  • Thumbnail Image
    Item
    Executable specification and prototyping of network protocols using UML and Java
    (2009) Sekaran, K.C.; Gnanamurthy, R.K.
    Network protocols are often implemented in software and / or hardware, and, it becomes essential to design and test them in an efficient manner. This paper explores a dual phase approach for developing network protocols: in the first phase protocols are modeled using UML (Unified Modeling Language) as the formalism, and, in the second phase, use of executable specification and prototyping of protocols based on Java is supported. The prototyping of a protocol is useful for further investigations such as verification ofprotocol properties, test case generation etc. Once the second phase provides a satisfied result, the developers can go ahead in developing and deploying the protocol in the real environment. Yet another objective in this work is to design executable constructs in Java to specify protocols and prototyping them. The protocols designed using this approach ensures sustenance of the models already developed. Illustration of using executable constructs in Java to specify and prototyping ofprotocols, and comparison with native implementations is presented in this paper. �2009 IEEE.
  • Thumbnail Image
    Item
    Developing a conceptual relationship between web service supply chain entities
    (2011) Krithika, V.; Sekaran, K.C.; Kaur, A.; Rajendran, C.
    Globalization has led to a new class of service apart from the services that are offered offline and semionline (in which case part of the service transactions are online and part of it offline) as a result of collaboration of static entities resulting in static service supply chains. The advent of enablers like Service Oriented Architecture and development of web service applications has enabled online / dynamic service supply chain networks (SSCNs) formed by dynamic collaboration of many serving entities. The entities in web SSCNs are interdependent and the performance of one entity impacts the performance of other entities as well as overall performance of service network. It is important to study the relationship and dependency between each entity of web SSCNs. Once the relationship is identified, it will help in devising some composite performance indicator for the entire service supply chain considering the interests of service providers and clients. We take a scenario based illustration of such online service supply chains to show the feasibility of the concept� 2011 IEEE.
  • Thumbnail Image
    Item
    Development of a link layer protocol using UML
    (2001) Sekaran, K.C.
    This paper presents a report on the development of a link layer protocol using an object oriented formal method. It describes the steps involved in the conceptualization, analysis and design of the L2CAP (Logical Link Control and Adaptation Layer Protocol) of the Bluetooth architecture. UML (Unified Modeling Language) is the formal modeling language used in this work. It has been shown how the static, dynamic and operational aspects of the system are captured using various UML diagrams. � 2001 IEEE.
  • Thumbnail Image
    Item
    Detection of reticulation events - A character based method
    (2006) Navada, K.C.; Sekaran, K.C.
    It is observed that during the evolution of species, reticulation is an important event and is very prevalent in several organisms. However, the analytical tools for the representation of these events are still under development. This is primarily because of the difficulty involved in detecting these reticulation events that have taken place during the evolution using the sequences that are currently available in some form. Since it is not possible to get each sequence starting from the root (beginning of the evolution process), inferring the history has to be based on a few assumptions, which are biologically valid. In this paper, we propose an algorithm which, we feel, is a step in this direction. The algorithm detects the sequences which require reticulation events for their formation and returns the count of such sequences. � 2006 IEEE.
  • Thumbnail Image
    Item
    Design and development of proactive solutions for mitigating denial-of-service attacks
    (2006) Nagesh, H.R.; Sekaran, K.C.
    Denial of Service attacks, orchestrated by a single host or multiple hosts in a coordinated manner, has become an increasingly frequent disturbance in today's Internet. Generally, attackers launch DDoS attacks by directing a massive number of attack sources to send useless traffic to the victim. The victim's services are disrupted when its host or network resources are occupied by the attack traffic. The threat of DDoS attacks has become even more severe as attackers can compromise a huge number of computers using vulnerabilities in popular operating systems [4].This paper deals with Denial of service (DoS) and Distributed DoS (DDoS) attacks. In the first part, we categorize existing defense mechanisms, and analyze their strengths and weaknesses. In the second part of our investigation, we develop and evaluate two defense models for DoS attacks: the Secure Overlay Services (SOS) Model and the Server Hopping Model using distributed firewalls. Each of these models provide defense in a different part of the network, and has different resource requirements. In the third part of our investigation, we assess the effectiveness of our defense models for different types of DoS attack. � 2006 IEEE.
  • Thumbnail Image
    Item
    Active probing based end to end internet path metrics estimation tool
    (2006) Suryanarayana, V.; Sekaran, K.C.
    This paper considers the problem of measuring the various network path metrics such as Connectivity, Capacity, bandwidth, available bandwidth etc. of a network path using probing-based methods. To that end, we propose a new model called an Integrated Metrics Measurement Model (IMMM) to measure all possible performance metrics. It will be designed to probe the network non-intrusively so that the measurements will not disturb the stability of the network. The experimental results of our partial implementation of the proposed model are presented. � 2006 IEEE.
  • Thumbnail Image
    Item
    A phenomic algorithm for inference of gene networks using S-systems and memetic search
    (2012) D'Douza, R.G.L.; Sekaran, K.C.; Kandasamy, A.
    In recent years, evolutionary methods have seen unprecedented success in elucidation of gene networks, especially from microarray data. We have implemented the Phenomic Algorithm which is an evolutionary method for inference of gene networks based on population dynamics. We have used S-systems to model gene interactions and applied memetic search to fine tune the parameters of the inferred networks. We have tested the novel algorithm on artificial gene expression datasets obtained from simulated gene networks. We have also compared the results to those obtained from two other similar algorithms. Results showed that the new method, which we call as Phenomic Algorithm with Memetic Search (PAMS), is an effective method for inference of gene networks. � 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.
  • Thumbnail Image
    Item
    A multiobjective phenomic algorithm for inference of gene networks
    (2012) D'Souza, R.G.L.; Sekaran, K.C.; Kandasamy, A.
    Reconstruction of gene networks has become an important activity in Systems Biology. The potential for better methods of drug discovery and of disease diagnosis hinge upon our understanding of the interaction networks between the genes. Evolutionary methods are proving to be successful in such problems and a number of such methods have been proposed. However, all these methods are based on processing of genotypic information. We have presented an evolutionary algorithm for reconstructing gene networks from expression data using phenotypic interactions, thereby avoiding the need for an explicit objective function. Specifically, we have also extended the basic phenomic algorithm to perform multiobjective optimization for gene network reconstruction. We have applied this novel algorithm to the yeast sporulation dataset and validated it by comparing the results to the links found between genes of the yeast genome at the SGD database. � 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.
  • Thumbnail Image
    Item
    Simulation environment for minimizing response time in an autonomic computing system using fuzzy control
    (2010) Venkatarama, H.S.; Sekaran, K.C.
    eCommerce is an area where an Autonomic Computing system could be very effectively deployed. eCommerce has created demand for high quality information technology services and businesses seek ways to improve the quality of service in a cost-effective way. Properly adjusting tuning parameters for best values is time-consuming and skills-intensive. This paper describes a simulation environment to implement an approach to automate the tuning of MaxClients parameter of Apache web server using a fuzzy controller and knowledge of the affect of the parameter on quality of service. This is an illustration of the self-optimizing characteristic of an autonomic computing system. � 2010 IEEE.