Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
7 results
Search Results
Item A parallel dynamic programming approach for data analysis(Institute of Electrical and Electronics Engineers Inc., 2016) Deepak, A.; Shravya, K.S.; Chandrasekaran, K.In spite of presence of many classical and modified data analysis techniques, data analysis in the field of software engineering still remains a challenge because of the presence of large number of both continuous and discreet explanatory variables judging the outcome of one and more than one dependant variables. Requirement for an efficient multivariate data analysis technique which fulfils the constraints associated with software data led to the design of OSR (optimized set reduction) which uses a greedy algorithm for data analysis using both the principles of machine learning and conventional statistics. With the incoming of big data and other increasing dimensions of data set, we, through this paper, try to propose a new algorithm, based on the similar lines of optimised set reduction, using its strength to extract subsets. As the current trend of programming demands an algorithm to execute in parallel, we also propose a modification to our algorithm for it to run in a multicore platform with good efficiency. © 2015 IEEE.Item Implementation and evaluation of Proportional Integral Controller Enhanced (PIE) algorithm in ns-3(Association for Computing Machinery acmhelp@acm.org, 2016) Shravya, K.S.; Murali, S.; Tahiliani, M.P.This paper proposes a new ns-3 model and presents the evaluation results for Proportional Integral controller Enhanced (PIE), a recently designed Active Queue Management (AQM) mechanism to address the problem of bufferbloat. The problem of bufferbloat arises due to the presence of large unmanaged buffers in routers. This leads to high queuing latency and significantly degrades the performance of time-sensitive and interactive traffic. AQM mechanisms that aim to address the problem of bufferbloat try to achieve an optimal trade-off between high link utilization and low mean queue length. PIE is a lightweight AQM mechanism that tries to achieve the same. To our knowledge, ns-3 network simulator does not have a model for simulating PIE. Hence, in this paper, we implement a ns-3 model for PIE, and show that the results obtained from it are in line with those obtained from the ns-2 model of PIE, implemented by its authors. © 2016 ACM.Item Using genetic algorithm for process migration in multicore kernels(Springer Verlag service@springer.de, 2017) Shravya, K.S.; Deepak, A.; Chandrasekaran, K.Process migration is used in multicore operating systems to improve their performance. The implementation of the migration event contributes largely to the performance of the scheduling algorithm and hence decides how effective a multicore kernel is. There have been several effective algorithms which decide how a process can be migrated from one core to another in a multicore operating system. This paper looks further into the mechanism of process migration in multicore operating systems. The main aim of this paper is not to answer how the process migration should take place but it aims to answer when process migration should take place and to decide the site of process migration. For this, an artificial intelligence concept called genetic algorithm is used. Genetic algorithm works on the theory of survival of the fittest to find an optimally good solution during decision making phase. © Springer Nature Singapore Pte Ltd. 2017.Item Image processing approach to diagnose eye diseases(Springer Verlag service@springer.de, 2017) Prashasthi, P.; Shravya, K.S.; Deepak, A.; Mulimani, M.; Shashidhar, K.G.Image processing and machine learning techniques are used for automatic detection of abnormalities in eye. The proposed methodology requires a clear photograph of eye (not necessarily a fundoscopic image) from which the chromatic and spatial property of the sclera and iris is extracted. These features are used in the diagnosis of various diseases considered. The changes in the colour of iris is a symptom for corneal infections and cataract, the spatial distribution of different colours distinguishes diseases like subconjunctival haemorrhage and conjunctivitis, and the spatial arrangement of iris and sclera is an indicator of palsy. We used various classifiers of which adaboost classifier which was found to give a substantially high accuracy i.e., about 95% accuracy when compared to others (k-NN and naive-Bayes). To enumerate the accuracy of the method proposed, we used 150 samples in which 23% were used for testing and 77% were used for training. © Springer International Publishing AG 2017.Item Design and implementation of AQM evaluation suite for ns-3(Association for Computing Machinery acmhelp@acm.org, 2017) Deepak, A.; Shravya, K.S.; Tahiliani, M.P.Excessive buffering in network devices should be avoided because it leads to a series of performance issues such as high queuing latency and variations in delay. Active Queue Management (AQM) algorithms play a vital role in monitoring and controlling the queue length in these devices. Recently there has been a significant progress in the design and development of new AQM algorithms. However, thoroughly evaluating the performance of AQM algorithms is a nontrivial task. In an effort to simplify this, the Active Queue Management and Packet Scheduling Working Group at IETF have proposed informational guidelines in RFC 7928 to test the applicability, performance and deployment complexity of AQM algorithms. This paper presents the design and implementation of an AQM evaluation framework for ns-3 which helps to quickly study the performance of AQM algorithms based on the guidelines mentioned in RFC 7928. The proposed framework automates simulation setup, topology creation, trafiéc generation, program execution, results collection and their graphical representation using ns-3, based on the scenarios mentioned in the RFC. © 2017 ACM.Item Smart key generation for smart cities(Institute of Electrical and Electronics Engineers Inc., 2017) Shravya, K.S.; Deepak, A.; Chandrasekaran, K.Statistical results have predicted that 70% of world's population will reside in cities by the year 2050. With the advancement in the field of information and communication technology, the concept of smart cities is gaining more prominence. Smart cities use the ICT technology to improve the functioning of the city and enhance the community services provided. To keep the data in smart city secure, different existing security mechanisms have been deployed directly in smart or have been modified to smart city scale. Most of the security mechanisms today need cryptographic keys, hence, key generation plays a pivotal role in the security of any smart city. In this paper, we proposes a key generation methodology especially designed for smart cities using a random number generator which collects entropy from different user end devices and sensors present in the city and generate secure random keys at a central node. We have also tested our method against NSIT random number test suite and have got acceptable results. © 2017 IEEE.Item Data Center TCP in ns-3: Implementation, Validation and Evaluation(Association for Computing Machinery, 2020) Jain, V.; Henderson, T.R.; Shravya, K.S.; Tahiliani, M.P.Data Center TCP (DCTCP) is a standard congestion control scheme used to provide high burst tolerance, low latency and high throughput in Data Center Networks (DCNs). It uses in-network feedback obtained through Explicit Congestion Notification (ECN) to scale the congestion window (cwnd). Recently, there have been significant efforts to extend DCTCP to provide low latency transport (e.g., TCP Prague) in a Wide Area Network, but with congestion control and in-network queuing mechanisms that are backward compatible with legacy implementations. This paper presents the implementation and validation of a new ns-3 model for DCTCP which can be used to implement its extensions, such as TCP Prague. The proposed model is verified and validated by comparing it to the Linux model of DCTCP by using ns-3 Direct Code Execution (DCE), a framework to run ns-3 simulations using Linux network stack. The results obtained from this comparison show that the ns-3 model and Linux model of DCTCP exhibit similar characteristics. © 2020 ACM.
