Journal Articles

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/19884

Browse

Search Results

Now showing 1 - 10 of 14
  • Item
    Performance enhancement of electrical distribution systems with multiple distributed generation sources
    (2010) Krishnamurthy, M.; Vittal, K.P.
    The recent trends in electrical power distribution system operation and management are aimed at improving system conditions in order to render good service to the customer. Reforms in the distribution sector have given major scope for employment of distributed generation (DG) resources which will boost system performance. This article proposes a heuristic technique for allocation of multiple distribution generation sources in a distribution system. The allocation is determined based on overall improvement in network performance parameters like reduction in system losses, improvement in voltage stability, improvement in voltage profile. The hybrid of Genetic Algorithm with the proposed Network Performance Enhancement Index (NPEI) along with the heuristic rules facilitates determination of feasible location for insertion of DG sources. A priority list is prepared with decreasing values of NPEI so that the designer can select most feasible locations. The developed approach is tested with different test systems to ascertain its effectiveness.
  • Item
    An efficient cuckoo search algorithm based multilevel thresholding for segmentation of satellite images using different objective functions
    (Elsevier Ltd, 2016) Suresh, S.; Lal, S.
    Satellite image segmentation is challenging due to the presence of weakly correlated and ambiguous multiple regions of interest. Several bio-inspired algorithms were developed to generate optimum threshold values for segmenting such images efficiently. Their exhaustive search nature makes them computationally expensive when extended to multilevel thresholding. In this paper, we propose a computationally efficient image segmentation algorithm, called CSMcCulloch, incorporating McCulloch's method for lévy flight generation in Cuckoo Search (CS) algorithm. We have also investigated the impact of Mantegna?s method forlévy flight generation in CS algorithm (CSMantegna) by comparing it with the conventional CS algorithm which uses the simplified version of the same. CSMantegna algorithm resulted in improved segmentation quality with an expense of computational time. The performance of the proposed CSMcCulloch algorithm is compared with other bio-inspired algorithms such as Particle Swarm Optimization (PSO) algorithm, Darwinian Particle Swarm Optimization (DPSO) algorithm, Artificial Bee Colony (ABC) algorithm, Cuckoo Search (CS) algorithm and CSMantegna algorithm using Otsu's method, Kapur entropy and Tsallis entropy as objective functions. Experimental results were validated by measuring PSNR, MSE, FSIM and CPU running time for all the cases investigated. The proposed CSMcCulloch algorithm evolved to be most promising, and computationally efficient for segmenting satellite images. Convergence rate analysis also reveals that the proposed algorithm outperforms others in attaining stable global optimum thresholds. The experiments results encourages related researches in computer vision, remote sensing and image processing applications. © 2016 Elsevier Ltd. All rights reserved.
  • Item
    Guided SAR image despeckling with probabilistic non local weights
    (Elsevier Ltd, 2017) Gokul, J.; Nair, M.S.; Rajan, J.
    SAR images are generally corrupted by granular disturbances called speckle, which makes visual analysis and detail extraction a difficult task. Non Local despeckling techniques with probabilistic similarity has been a recent trend in SAR despeckling. To achieve effective speckle suppression without compromising detail preservation, we propose an improvement for the existing Generalized Guided Filter with Bayesian Non-Local Means (GGF-BNLM) method. The proposed method (Guided SAR Image Despeckling with Probabilistic Non Local Weights) replaces parametric constants based on heuristics in GGF-BNLM method with dynamically derived values based on the image statistics for weight computation. Proposed changes make GGF-BNLM method adaptive and as a result, significant improvement is achieved in terms of performance. Experimental analysis on SAR images shows excellent speckle reduction without compromising feature preservation when compared to GGF-BNLM method. Results are also compared with other state-of-the-art and classic SAR depseckling techniques to demonstrate the effectiveness of the proposed method. © 2017 Elsevier Ltd
  • Item
    Parallel iterative hill climbing algorithm to solve TSP on GPU
    (John Wiley and Sons Ltd, 2019) Yelmewad, P.; Talawar, B.
    Traveling Salesman Problem (TSP) is an NP-hard combinatorial optimization problem. Heuristic algorithms provide satisfactory solutions to large instance TSP in a reasonable amount of time. However, heuristic methods result in suboptimal solutions as they do not cover the search space adequately. Sequential heuristic approaches spend significant CPU time in neighborhood generation for large input instances. Neighborhood generation time can be reduced by generating in parallel. GPUs have been shown to be effective in exploiting data and memory level parallelism in large complex problems. This work presents a GPU-based Parallel Iterative Hill Climbing (PIHC) algorithm using the nearest neighborhood heuristic to arrive at near-optimal solutions of large TSPLIB instances in a reasonable amount of time. Multiple construction heuristics approaches, thread mapping strategies, and data structures for TSPLIB instances have been evaluated. We demonstrate improved cost quality on symmetric TSPLIB instances up to 85,900 cities. The PIHC GPU implementation gives up to 193× speedup over its sequential counterpart and up to 979.96× speedup over a state-of-the-art GPU-based TSP solver. The PIHC implementation gives a cost quality with error rate 0.72% in the best case and 8.06% in the worst case. © 2018 John Wiley & Sons, Ltd.
  • Item
    Detection of phishing websites using an efficient feature-based machine learning framework
    (Springer London, 2019) Rao, R.S.; Pais, A.R.
    Phishing is a cyber-attack which targets naive online users tricking into revealing sensitive information such as username, password, social security number or credit card number etc. Attackers fool the Internet users by masking webpage as a trustworthy or legitimate page to retrieve personal information. There are many anti-phishing solutions such as blacklist or whitelist, heuristic and visual similarity-based methods proposed to date, but online users are still getting trapped into revealing sensitive information in phishing websites. In this paper, we propose a novel classification model, based on heuristic features that are extracted from URL, source code, and third-party services to overcome the disadvantages of existing anti-phishing techniques. Our model has been evaluated using eight different machine learning algorithms and out of which, the Random Forest (RF) algorithm performed the best with an accuracy of 99.31%. The experiments were repeated with different (orthogonal and oblique) random forest classifiers to find the best classifier for the phishing website detection. Principal component analysis Random Forest (PCA-RF) performed the best out of all oblique Random Forests (oRFs) with an accuracy of 99.55%. We have also tested our model with the third-party-based features and without third-party-based features to determine the effectiveness of third-party services in the classification of suspicious websites. We also compared our results with the baseline models (CANTINA and CANTINA+). Our proposed technique outperformed these methods and also detected zero-day phishing attacks. © 2018, The Natural Computing Applications Forum.
  • Item
    E-Var: Enhanced void avoidance routing algorithm for underwater acoustic sensor networks
    (Institution of Engineering and Technology kvukmirovic@theiet.org, 2019) Nazareth, P.; Chandavarkar, B.R.
    Underwater acoustic sensor networks (UASNs) have gained attention among researchers due to its various aquatic applications. On the other hand, UASNs encounter many research challenges due to its inherent characteristics such as high propagation delay, limited bandwidth, high bit-error-rate, limited energy, and communication void during routing. These limitations severely affect the performance of delay-sensitive and reliable applications of UASNs. The primary objective of this study is to address the communication void during routing. Various methods, such as backward–forwarding, passive participation, flooding, heuristic, and transmission power adjustments, are proposed to address the communication void during routing. The major drawbacks of these methods are void as a part of routing, loops, unreachable data to the sink, and more number of transmission of duplicate packets. This study proposes a void avoidance routing algorithm referred to as enhanced-void avoidance routing (E-VAR) using an idea of void awareness among the nodes. The E-VAR inhibits the participation of void in routing, thereby resulting in better performance in comparison with the state-of-the-art. Through MATLAB simulations, E-VAR is compared with interference-aware routing and state-of-the-art backward–forwarding, in terms of the number of nodes reachable and unreachable due to looping to the sink, average hop-count, and distance. © The Institution of Engineering and Technology 2019.
  • Item
    Fuzzy uncertainty and its applications in reinforced concrete structures
    (Emerald Group Holdings Ltd., 2020) Worabo Woju, U.W.; Balu, A.S.
    Purpose: The aim of this paper is mainly to handle the fuzzy uncertainties present in structures appropriately. In general, uncertainties of variables are classified as aleatory and epistemic. The different sources of uncertainties in reinforced concrete structures include the randomness, mathematical models, physical models, environmental factors and gross errors. The effects of imprecise data in reinforced concrete structures are studied here by using fuzzy concepts. The aim of this paper is mainly to handle the uncertainties of variables with unclear boundaries. Design/methodology/approach: To achieve the intended objective, the reinforced concrete beam subjected to flexure and shear was designed as per Euro Code (EC2). Then, different design parameters such as corrosion parameters, material properties and empirical expressions of time-dependent material properties were identified through a thorough literature review. Findings: The fuzziness of variables was identified, and their membership functions were generated by using the heuristic method and drawn by MATLAB R2018a software. In addition to the identification of fuzziness of variables, the study further extended to design optimization of reinforced concrete structure by using fuzzy relation and fuzzy composition. Originality/value: In the design codes of the concrete structure, the concrete grades such as C16/20, C20/25, C25/30, C30/37 and so on are provided and being adopted for design in which the intermediate grades are not considered, but using fuzzy concepts the intermediate grades of concrete can be recognized by their respective degree of membership. In the design of reinforced concrete structure using fuzzy relation and composition methods, the optimum design is considered when the degree of membership tends to unity. In addition to design optimization, the level of structural performance evaluation can also be carried out by using fuzzy concepts. © 2020, Emerald Publishing Limited.
  • Item
    Efficient deep learning techniques for the detection of phishing websites
    (Springer, 2020) Somesha, M.; Pais, A.R.; Rao, R.S.; Rathour, V.S.
    Phishing is a fraudulent practice and a form of cyber-attack designed and executed with the sole purpose of gathering sensitive information by masquerading the genuine websites. Phishers fool users by replicating the original and genuine contents to reveal personal information such as security number, credit card number, password, etc. There are many anti-phishing techniques such as blacklist- or whitelist-, heuristic-feature- and visual-similarity-based methods proposed as of today. Modern browsers adapt to reduce the chances of users getting trapped into a vicious agenda, but still users fall as prey to phishers and end up revealing their secret information. In a previous work, the authors proposed a machine learning approach based on heuristic features for phishing website detection and achieved an accuracy of 99.5% using 18 features. In this paper, we have proposed novel phishing URL detection models using (a) Deep Neural Network (DNN), (b) Long Short-Term Memory (LSTM) and (c) Convolution Neural Network (CNN) using only 10 features of our earlier work. The proposed technique achieves an accuracy of 99.52% for DNN, 99.57% for LSTM and 99.43% for CNN. The proposed techniques utilize only one third-party service feature, thus making it more robust to failure and increases the speed of phishing detection. © 2020, Indian Academy of Sciences.
  • Item
    IntMA: Dynamic Interaction-aware resource allocation for containerized microservices in cloud environments
    (Elsevier B.V., 2020) Joseph, C.T.; Chandrasekaran, K.
    The Information Technology sector has undergone tremendous changes arising due to the emergence and prevalence of Cloud Computing. Microservice Architectures have also been attracting attention from several industries and researchers. Due to the suitability of microservices for the Cloud environments, an increasing number of Cloud applications are now provided as microservices. However, this transition to microservices brings a wide range of infrastructural orchestration challenges. Though several research works have discussed the engineering of microservice-based applications, there is an inevitable need for research on handling the operational phases of the microservice components. Microservice application deployment in containerized datacenters must be optimized to enhance the overall system performance. In this research work, the deployment of microservice application modules on the Cloud infrastructure is first modelled as a Binary Quadratic Programming Problem. In order to reduce the adverse impact of communication latencies on the response time, the interaction pattern between the microservice components is modelled as an undirected doubly weighted complete Interaction Graph. A novel, robust heuristic approach IntMA is also proposed for deploying the microservices in an interaction-aware manner with the aid of the interaction information obtained from the Interaction Graph. The proposed allocation policies are implemented in Kubernetes. The effectiveness of the proposed approach is evaluated on the Google Cloud Platform, using different microservice reference applications. Experimental results indicate that the proposed approach improves the response time and throughput of the microservice-based systems. © 2020 Elsevier B.V.
  • Item
    A heuristic technique to detect phishing websites using TWSVM classifier
    (Springer Science and Business Media Deutschland GmbH, 2021) Rao, R.S.; Pais, A.R.; Anand, P.
    Phishing websites are on the rise and are hosted on compromised domains such that legitimate behavior is embedded into the designed phishing site to overcome the detection. The traditional heuristic techniques using HTTPS, search engine, Page Ranking and WHOIS information may fail in detecting phishing sites hosted on the compromised domain. Moreover, list-based techniques fail to detect phishing sites when the target website is not in the whitelisted data. In this paper, we propose a novel heuristic technique using TWSVM to detect malicious registered phishing sites and also sites which are hosted on compromised servers, to overcome the aforementioned limitations. Our technique detects the phishing websites hosted on compromised domains by comparing the log-in page and home page of the visiting website. The hyperlink and URL-based features are used to detect phishing sites which are maliciously registered. We have used different versions of support vector machines (SVMs) for the classification of phishing websites. We found that twin support vector machine classifier (TWSVM) outperformed the other versions with a significant accuracy of 98.05% and recall of 98.33%. © 2020, Springer-Verlag London Ltd., part of Springer Nature.