Journal Articles

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/19884

Browse

Search Results

Now showing 1 - 10 of 29
  • Item
    Machine learning-based approaches to enhance the soil fertility—A review
    (Elsevier Ltd, 2024) Sujatha, M.; Jaidhar, C.D.
    Agriculture plays an imperative role in many countries’ economies and is a substantive source of survival. The variation in a soil nutrient decreases crop yield. An accurate soil fertility classification and application of fertilizers are essential for enhancing crop productivity. Currently, soil fertility levels are assessed through laboratory testing of soil samples, and fertilizers are applied randomly. This traditional practice increases fertilization costs and causes environmental pollution. Thus, it is necessary to develop robust and inexpensive soil fertility classification and fertilizer application. This study identifies the machine learning (ML) or deep learning-based soil fertility classifications. A comprehensive review is conducted according to Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines. The purpose of this study is to examine different approaches that researchers use to predict or classify soil fertility. It also discusses the fertilizer recommendation developed by the researchers. The earlier research showed that ML-based approaches could accurately classify soil fertility. Furthermore, this study discusses the importance of soil nutrients and preventive measures to be taken on the imbalance of soil nutrients. This study explores research gaps and challenges in soil fertility classification and fertilizer recommendation systems. Most studies predicted the fertility levels of soil parameters, whereas a few researchers classified soil fertility. Few researchers recommended fertilizers for soil nutrient depletion. Most studies relied on expensive laboratory measurements or regional soil data collected from satellites. Based on the identified research gaps, this study suggests potential future research possibilities in soil fertility classification and the recommendation of fertilizers. It aims to develop a low-cost soil fertility classifier to prescribe fertilizers. The developed model can help farmers to enhance soil fertility with reduced fertilization costs. © 2023 Elsevier Ltd
  • Item
    Location prediction algorithm for a nonlinear vehicular movement in VANET using extended Kalman filter
    (Springer New York LLC barbara.b.bertram@gsk.com, 2017) Jaiswal, R.K.; Jaidhar, C.D.
    Vehicular ad-hoc network (VANET) is an essential component of the intelligent transportation system, that facilitates the road transportation by giving a prior alert on traffic condition, collision detection warning, automatic parking and cruise control using vehicle to vehicle (V2V) and vehicle to roadside unit (V2R) communication. The accuracy of location prediction of the vehicle is a prime concern in VANET which enhances the application performance such as automatic parking, cooperative driving, routing etc. to give some examples. Generally, in a developed country, vehicle speed varies between 0 and 60 km/h in a city due to traffic rules, driving skills and traffic density. Likewise, the movement of the vehicle with steady speed is highly impractical. Subsequently, the relationship between time and speed to reach the destination is nonlinear. With reference to the previous work on location prediction in VANET, nonlinear movement of the vehicle was not considered. Thus, a location prediction algorithm should be designed by considering nonlinear movement. This paper proposes a location prediction algorithm for a nonlinear vehicular movement using extended Kalman filter (EKF). EKF is more appropriate contrasted with the Kalman filter (KF), as it is designed to work with the nonlinear system. The proposed prediction algorithm performance is measured with the real and model based mobility traces for the city and highway scenarios. Also, EKF based prediction performance is compared with KF based prediction on average Euclidean distance error (AEDE), distance error (DE), root mean square error (RMSE) and velocity error (VE). © 2016, Springer Science+Business Media New York.
  • Item
    Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor
    (Elsevier Ltd, 2017) M.a, M.A.; Jaidhar, C.D.
    The Virtual Machine Introspection (VMI) has emerged as a fine-grained, out-of-VM security solution that detects malware by introspecting and reconstructing the volatile memory state of the live guest Operating System (OS). Specifically, it functions by the Virtual Machine Monitor (VMM), or hypervisor. The reconstructed semantic details obtained by the VMI are available in a combination of benign and malicious states at the hypervisor. In order to distinguish between these two states, the existing out-of-VM security solutions require extensive manual analysis. In this paper, we propose an advanced VMM-based, guest-assisted Automated Internal-and-External (A-IntExt) introspection system by leveraging VMI, Memory Forensics Analysis (MFA), and machine learning techniques at the hypervisor. Further, we use the VMI-based technique to introspect digital artifacts of the live guest OS to obtain a semantic view of the processes details. We implemented an Intelligent Cross View Analyzer (ICVA) and implanted it into our proposed A-IntExt system, which examines the data supplied by the VMI to detect hidden, dead, and dubious processes, while also predicting early symptoms of malware execution on the introspected guest OS in a timely manner. Machine learning techniques are used to analyze the executables that are mined and extracted using MFA-based techniques and ascertain the malicious executables. The practicality of the A-IntExt system is evaluated by executing large real-world malware and benign executables onto the live guest OSs. The evaluation results achieved 99.55% accuracy and 0.004 False Positive Rate (FPR) on the 10-fold cross-validation to detect unknown malware on the generated dataset. Additionally, the proposed system was validated against other benchmarked malware datasets and the A-IntExt system outperforms the detection of real-world malware at the VMM with performance exceeding 6.3%. © 2017 Elsevier Ltd
  • Item
    Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM
    (Elsevier B.V., 2018) M.a, A.K.; Jaidhar, C.D.
    In order to fulfill the requirements like stringent timing restraints and demand on resources, Cyber–Physical System (CPS) must deploy on the virtualized environment such as cloud computing. To protect Virtual Machines (VMs) in which CPSs are functioning against malware-based attacks, malware detection and mitigation technique is emerging as a highly crucial concern. The traditional VM-based anti-malware software themselves a potential target for malware-based attack since they are easily subverted by sophisticated malware. Thus, a reliable and robust malware monitoring and detection systems are needed to detect and mitigate rapidly the malware based cyber-attacks in real time particularly for virtualized environment. The Virtual Machine Introspection (VMI) has emerged as a fine-grained out-of-VM security solution to detect malware by introspecting and reconstructing the volatile memory state of the live guest Operating System (OS) by functioning at the Virtual Machine Monitor (VMM) or hypervisor. However, the reconstructed semantic details by the VMI are available in a combination of benign and malicious states at the hypervisor. In order to distinguish between these two states, extensive manual analysis is required by the existing out-of-VM security solutions. To address the foremost issue, in this paper, we propose an advanced VMM-based guest-assisted Automated Multilevel Malware Detection System (AMMDS) that leverages both VMI and Memory Forensic Analysis (MFA) techniques to predict early symptoms of malware execution by detecting stealthy hidden processes on a live guest OS. More specifically, the AMMDS system detects and classifies the actual running malicious executables from the semantically reconstructed process view of the guest OS. The two sub-components of the AMMDS are: Online Malware Detector (OMD) and Offline Malware Classifier (OFMC). The OMD recognizes whether the running processes are benign or malicious using its Local Malware Signature Database (LMSD) and online malware scanner and the OFMC classify unknown malware by adopting machine learning techniques at the hypervisor. The AMMDS has been evaluated by executing large real-world malware and benign executables on to the live guest OSs. The evaluation results achieved 100% of accuracy and zero False Positive Rate (FPR) on the 10-fold cross-validation in classifying unknown malware with maximum performance overhead of 5.8%. © 2017 Elsevier B.V.
  • Item
    A Performance Evaluation of Location Prediction Position-Based Routing Using Real GPS Traces for VANET
    (Springer New York LLC barbara.b.bertram@gsk.com, 2018) Jaiswal, R.K.; Jaidhar, C.D.
    Vehicular ad-hoc network (VANET) is an emerging paradigm for road transportation which minimizes traffic, accidents and improves fuel efficiency. VANET uses the position of the vehicle obtained from satellite system such as global positioning system (GPS), global navigation satellite system, Compass and Galileo as a location id in position-based routing protocol. The position obtained from the satellite system is likely to have an error due to environmental and technical issues which effect the routing performance. Thus, this paper proposes a position-based routing protocol which uses Kalman filter based location prediction technique to improve routing performance by minimizing location error. The routing protocol performance is evaluated on NS-3.23 simulator with real time GPS traces and simulator generated mobility on Two-ray ground and Winner-II propagation model for 500 m transmission range. Further, performance is compared with other prediction-based routing protocol on the metrics of packet delivery ratio, average delay and throughput. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.
  • Item
    Low latency and energy efficient cluster based routing design for wireless sensor network
    (Institute of Advanced Engineering and Science info@iaesjournal.com, 2019) Basavaraj, G.N.; Jaidhar, C.D.
    Wireless sensor network (WSN) has attained wide adoption across various sectors and is considered to be key component of future real-time application such as BigData, Internet of things (IoT) etc. The modern application requires low latency and scalable real-time data access considering heterogeneous network. However, provisioning low latency real-time data access incurs energy overhead among sensor device. Clustering technique aided in providing scalability and minimizing energy consumption among sensor device. However, it incurs energy overhead among cluster head and sensor device closer to sink. To address, many optimization technique is been presented in recent time for optimal cluster selection. However, these technique are designed considering homogenous network. To address, this work presented Low Latency and Energy Efficient Routing (LLEER) design for heterogeneous WSN. The LLEER adopts multi-objective function such as connectivity, connection time, radio signal strength, coverage time, and network traffic for cluster head and hop node selection. Experiment are conducted to evaluate LLEER design shows significant performance improvement over state-of-art model in terms of network lifetime considering total node death, first node death, and loss of connectivity, communication overhead, and packet transmission latency. Proposed LLEER brings a good trade-off between energy efficiency, and latency requirement of future real-time application. © 2019 Institute of Advanced Engineering and Science. All rights reserved.
  • Item
    Enhanced mobility aware routing protocol for Low Power and Lossy Networks
    (Springer New York LLC barbara.b.bertram@gsk.com, 2019) Sanshi, S.; Jaidhar, C.D.
    Due to the technological advancement in Low Power and Lossy Networks (LLNs), sensor node mobility becomes a basic requirement for many extensive applications. Routing protocol designed for LLNs must ensure real-time data transmission with minimum power consumption. However, the existing mobility support protocols cannot work efficiently in LLNs as they are unable to adapt to the change in the network topology quickly. Therefore, we propose an Enhanced Routing Protocol for LLNs (ERPL), which updates the Preferred Parent (PP) of the Mobile Node (MN) quickly whenever the MN moves away from the already selected PP. Further, a new objective function that takes the mobility of the node into an account while selecting a PP is proposed. Performance of the ERPL has been evaluated with the varying system and traffic parameters under different topologies similar to most of the real-life networks. The simulation results showed that the proposed ERPL reduced the power consumption, packet overhead, latency and increased the packet delivery ratio as compared to other existing works. © 2017, Springer Science+Business Media, LLC, part of Springer Nature.
  • Item
    Windows malware detection system based on LSVC recommended hybrid features
    (Springer-Verlag France 22, Rue de Palestro Paris 75002, 2019) Shiva Darshan, S.L.; Jaidhar, C.D.
    To combat exponentially evolved modern malware, an effective Malware Detection System and precise malware classification is highly essential. In this paper, the Linear Support Vector Classification (LSVC) recommended Hybrid Features based Malware Detection System (HF-MDS) has been proposed. It uses a combination of the static and dynamic features of the Portable Executable (PE) files as hybrid features to identify unknown malware. The application program interface calls invoked by the PE files during their execution along with their correspondent category are collected and considered as dynamic features from the PE file behavioural report produced by the Cuckoo Sandbox. The PE files’ header details such as optional header, disk operating system header, and file header are treated as static features. The LSVC is used as a feature selector to choose prominent static and dynamic features from their respective Original Feature Space. The features recommended by the LSVC are highly discriminative and used as final features for the classification process. Different sets of experiments were conducted using real-world malware samples to verify the combination of static and dynamic features, which encourage the classifier to attain high accuracy. The tenfold cross-validation experimental results demonstrate that the proposed HF-MDS is proficient in precisely detecting malware and benign PE files by attaining detection accuracy of 99.743% with sequential minimal optimization classifier consisting of hybrid features. © 2018, Springer-Verlag France SAS, part of Springer Nature.
  • Item
    Fuzzy optimised routing metric with mobility support for RPL
    (Institution of Engineering and Technology JBristow@theiet.org, 2019) Sanshi, S.; Jaidhar, C.D.
    Recently, many Internet of Things (IoT) applications have emerged with mobility as a fundamental requirement. The presence of a mobile node that changes location around the application domain affects the performance of the Routing Protocol for Low Power Lossy Network (RPL) designed for IoT, leading to repeated disruptions that cause data loss and more power dissipation. In this study, a fuzzy optimised routing metric with mobility support (FL-RPL) has been proposed to enhance the performance of the RPL. The fuzzy inference system considers various routing metrics to pick a suitable candidate parent as the preferred parent node to forward the data to the sink node. Further, timer functions have been added to maintain consistent neighbours to support mobility and seamless connectivity. The FL-RPL has been implemented and tested with different parameter settings for a practical scenario. The obtained simulation results clearly demonstrated that the proposed solution increased packet delivery ratio by approximately 12%, and reduced power consumption by 20% compared with the standard RPL. © 2019 The Institution of Engineering and Technology.
  • Item
    Experimental analysis of Android malware detection based on combinations of permissions and API-calls
    (Springer-Verlag France 22, Rue de Palestro Paris 75002, 2019) Singh, A.K.; Jaidhar, C.D.; M.a, M.A.A.
    Android-based smartphones are gaining popularity, due to its cost efficiency and various applications. These smartphones provide the full experience of a computing device to its user, and usually ends up being used as a personal computer. Since the Android operating system is open-source software, many contributors are adding to its development to make the interface more attractive and tweaking the performance. In order to gain more popularity, many refined versions are being offered to customers, whose feedback will enable it to be made even more powerful and user-friendly. However, this has attracted many malicious code-writers to gain anonymous access to the user’s private data. Moreover, the malware causes an increase of resource consumption. To prevent this, various techniques are currently being used that include static analysis-based detection and dynamic analysis-based detection. But, due to the enhancement in Android malware code-writing techniques, some of these techniques are getting overwhelmed. Therefore, there is a need for an effective Android malware detection approach for which experimental studies were conducted in the present work using the static features of the Android applications such as Standard Permissions with Application Programming Interface (API) calls, Non-standard Permissions with API-calls, API-calls with Standard and Nonstandard Permissions. To select the prominent features, Feature Selection Techniques (FSTs) such as the BI-Normal Separation (BNS), Mutual Information (MI), Relevancy Score (RS), and the Kullback-Leibler (KL) were employed and their effectiveness was measured using the Linear-Support Vector Machine (L-SVM) classifier. It was observed that this classifier achieved Android malware detection accuracy of 99.6% for the combined features as recommended by the BI-Normal Separation FST. © 2019, Springer-Verlag France SAS, part of Springer Nature.