Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
125 results
Search Results
Item Ambi graph: Modeling ambient intelligent system(2009) Chandrasekaran, K.; Ramya, I.R.; Syama, R.In computing, ambient intelligence (AmI)[2,3] refers to electronic environments that are sensitive and responsive to the presence of people. In an ambient intelligent world, devices work in concert to support people in carrying out their everyday life activities, tasks and rituals in easy, natural way using information and intelligence that is hidden in the network connecting these devices. The ambient intelligence paradigm builds upon ubiquitous computing [4] and human-centric computer interaction design. In this paper, we introduce a notation, called Ambi Graphs, for specifying the work flow in any ambient intelligence system. An ambi graph is elegant when it is designed to adapt to the wide range of users that work on it. © 2009 IEEE.Item Petri net based verification of a cooperative work flow model(2009) Annappa, B.; Jiju, P.; Chandrasekaran, K.; Shet, K.C.This paper exploits the theory of Petri nets to verify reachability and soundness of a cooperative workflow model. First, we outline a cooperative workflow model, which is a modified version of Bonita workflow model. Bonita is open source cooperative workflow management software which is an ongoing project from object web consortium. Then we describe the cooperative workflow model using a special kind of Petri net called Wf-net. Next we employ WF-net for verification of the model for reachability and soundness properties. The Petri net based verification shows that the model is reachable and sound. ©2009 IEEE.Item Lightning electromagnetic fields at different heights above the ground(2009) Chandrasekaran, K.; Durai Kannu, P.This paper presents the computed results of electric and magnetic fields generated by the near by lightning. The electric and magnetic fields have been computed for different heights ranging from 10 m to 2 km above the ground and for the lateral distances varying from 20 m to 2 km from the lightning return stroke. For airborne vehicles e.g, satellite launch vehicles, missiles etc, it has become necessary to understand the behavior of these when illuminated by a strong electromagnetic fields generated by a near by lightning. The coupling of these fields with the above system could be by means of the leakage of the transient electromagnetic fields through the joints of the vehicles, leakage through the improperly shielded cables, leaks through the edges of closed doors etc. This results the generation of transient voltages and currents with the internal circuitry of such systems. The objective of this work is to compute the fields along the airborne vehicles when excited by plane electromagnetic fields. These plane electromagnetic fields consist of electric and magnetic fields, where the fields could get modified at different heights from the ground plane and for different distances from the lightning channel. ©2009 IEEE.Item Meta-level constructs in content personalization of a web application(2010) Annappa, B.; Chandrasekaran, K.; Shet, K.C.In today's business environment, web applications become more and more complex but they still need to be flexible for changes, easy to maintain and the development life cycle need to be short. A reflective technique seems to be the best way to achieve flexibility of the web applications when adding the personalization features like recommendations, special offers, etc. Most of the algorithms help to achieve personalization; but, little attention has been paid to the design and modeling process of internet applications. Personalization will help to cope with increasing complexity of Business Enterprise level Applications. High-level, cleanly layered solutions open up promising possibilities to overcome these difficulties. This paper gives an insight into the content personalization of a web application using meta-level constructs. ©2010 IEEE.Item Horizontal component of electric field due to lightning return strokes(2011) Chandrasekaran, K.; Punekar, G.S.Lightning generated horizontal electric field above the ground have been computed and reported for a typical height of 10 m (above the ground plane), at a radial distance of 750 m from the striking point. The results are presented for typical first and subsequent return strokes of lightning involving two cases, (i) perfectly conducting ground (ii) finitely conducting ground (ω g=0.0001 S/m). The ground conductivity effects on the horizontal electric field components (static, induction and radiation) are studied. A comparison is made on the basis of computed results with typical first and subsequent strokes. © 2011 IEEE.Item Analyzing design patterns for extensibility(2011) Annappa, B.; Rajendran, R.; Chandrasekaran, K.; Shet, K.C.A system is said to be extensible, if any changes can be made to any of the existing system functionalities and/or addition of new functionalities with minimum impact. To achieve extensibility, it has to be planned properly starting from the initial stage of the application development. Keeping in mind all the possible future changes to be made, the designer should select the proper design patterns and finish the design for the application. Once the application design is finished, it should be analyzed to make sure that the application is extensible. © Springer-Verlag Berlin Heidelberg 2011.Item IT service provisioning by passing hints in module interfaces(2012) Naik, N.N.; Veigas, J.P.; Chandrasekaran, K.Communication is a crucial aspect in the domain of IT service provisioning, where data is being transmitted from the sending entity to the receiving entity by the interaction of applications via an interface. When the data is transferred, large amount of time is consumed for its computation by the service at the receiving side. When two applications interact via an interface the communication can be made effective by enhancing the IT service provisioning system with inclusion of web services by some faster means. In this paper we discuss how IT service provisioning can be handled by making use of hints using web services that can be passed by the modules within the application via interfaces from a client to the service, which can avoid expensive computation by the service. The hint is passed in its request and if correct, a service can avoid the computation and communication overhead leading to better system performance. If the message or hint is incorrect it leads to erroneous computations. Passing hints between the modules within an application should take place in an effective, non-erroneous way by imparting quality and less computation by the service involved between two communicating entities contributing towards the promises of services provided by cloud computing. © 2012 IEEE.Item Key update mechanism in PKI: Study & a new approach(IEEE Computer Society help@computer.org, 2013) Spoorthi, V.; Rajendran, B.; Chandrasekaran, K.Public-Key Infrastructure (PKI) provides robust and scalable security services like authentication and non-repudiation using digital certificates. An efficient key management is necessary for a long term implementation of PKI. As a part of key management, key pair of all the entities within the PKI system is updated regularly to minimize overuse of keys and to comply with the organization's policies. In a hierarchical PKI system, root Certificate Authority (CA) is the highest trust anchor and hence updating its key pair is a challenging task. It requires proper authentication of certificate issuing entities to its subordinates and storage of keys for future reference. This paper discusses the various mechanisms available for updating root CA key pairs and brings out pros and cons in each. Considering the shortcomings of these methods, a new method for key pair update has been proposed, which is less complex and easy to implement. In addition, some of the open-source tools available to implement these techniques and open challenges which need to be addressed to have been highlighted. © 2013 IEEE.Item Tutorial: Resource management in cloud computing(IEEE Computer Society help@computer.org, 2013) Chandrasekaran, K.Resource management in cloud computing is to mean the efficient use of heterogeneous and geographically distributed resources for client requests for cloud service provisioning. Since the resources spread across multiple organizations with different policy of usages, the management of these is really a big challenge. The tutorial introduces the notions of resources and resource management in a cloud computing environment and, introduces the research in this domain with some interesting approaches and results. © 2013 IEEE.Item Energy-efficient edge-based network partitioning scheme for wireless sensor networks(2013) Muni, V.K.; Kandasamy, A.; Chandrasekaran, K.The easy use of Wireless Sensor Networks has attracted applications from various fields. Day to day rise in wireless sensor network applications introduce new challenges to researchers. One such critical challenge is, optimal usage of network resources. Energy is one of the most important concerns in wireless sensor networks. Even though there has been an extensive research work done on this issue, the problem is still open with new requirements emerging every day. Exchange of control information consumes most of network resources to carry out network operations. An attempt has been made in the recent past to avoid this wastage of resources, by exploiting the properties of resource abundant sources in the network. Base station is one such source in wireless sensor network. The base station is resource abundant and less constrained network component in wireless sensor networks. The recent research works have focused more in this direction to explore the benefits of base station characteristics. In this perspective, a novel network partitioning mechanism is proposed here, to build energy efficient wireless sensor networks. The system proposed, distributes network load uniformly with little control overhead on energy resources in the network. The uniform distribution of sensor nodes in every part helps the network to distribute the load uniformly. From simulation results, it is noted that, the proposed system elevates the average lifetime of sensor nodes. © 2013 IEEE.
