Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
12 results
Search Results
Item Industrial estate planning for Mangalore Taluk in Karnataka, using remote sensing and GIS(2006) Navalgund, L.; Shreedhara, V.; Srinikethan, G.The present work presents a technique to prepare zoning atlas to classify the environment and risks involved in siting an industry. Based on risks involved in a classified zone, the best-suited industries are recommended. Mangalore city has been taken as the study area has for the present work. Sensitivity of study area has been checked in terms of air pollution, surface water pollution and groundwater pollution. The study relies upon the database procured for this purpose from Central Pollution Control Board (CPCB) and Karnataka State Remote Sensing Technology, Bang lore. The database mainly comprises of topographic maps, thematic maps and groundwater information. Buffering and over-laying of the thematic maps have been carried out as per the guidelines of CPCB. © Enviromedia Printed in India. All rights reserved.Item Developing regression models for predicting pan evaporation from climatic data - A comparison of multiple least-squares, principal components, and partial least-squares approaches(2007) Kovoor, G.M.; Nandagiri, L.Regression models for predicting daily pan evaporation depths from climatic data were developed using three multivariate approaches: multiple least-squares regression (MLR), principal components regression (PCR), and partial least-squares (PLS) regression. The objective was to compare the prediction accuracies of regression models developed by these three approaches using historical climatic datasets of four Indian sites that are located in distinctly different climatic regimes. In all cases (three approaches applied to four climatic datasets), regression models were developed using a part of the data and subsequently validated with the remaining data. Results indicated that although performances of the regression models varied from one climate to another, more or less similar prediction accuracies were obtained by all three approaches, and it was difficult to identify the best approach based on performance statistics. However, the final forms of the regression models developed by the three approaches differed substantially from one another. In all cases, the models derived using PLS contained the smallest number of predictor variables; between two to three out of a possible maximum of six predictor variables. The MLR approach yielded models with three to six predictor variables, and PCR models included all six predictor variables. This implies that the PLS regression models are the most parsimonious in terms of input data required for estimating epan from climate variables, and yet yield predictions that are almost as accurate as the more data-intensive MLR and PCR models. © 2007 ASCE.Item Sharding distributed social databases using social network analysis(Springer-Verlag Wien michaela.bolli@springer.at, 2015) Bhat, P.T.; Thankachan, R.V.; Chandrasekaran, K.Social networking services support millions of users who interact with one another on a regular basis and generate substantial amounts of data. Due to the inherently distributed structure of such networks and the possible remoteness of the users, the data involved must be partitioned into shards and distributed over a number of servers. One of the most important functionalities of a social networking platform is to process queries related, not only to a given users data but also to the users acquaintances. This suggests that a competent sharding algorithm for a distributed social database must make use of the social network’s topology. We describe algorithms that utilize the structure of social networks to prepare shards that result in better query performance, lower network utilization and better load balancing. © 2015, Springer-Verlag Wien.Item Securing native XML database-driven web applications from XQuery injection vulnerabilities(Elsevier Inc. usjcs@elsevier.com, 2016) Palsetia, N.; Deepa, G.; Ahmed Khan, F.; Santhi Thilagam, P.S.; Pais, A.R.Database-driven web applications today are XML-based as they handle highly diverse information and favor integration of data with other applications. Web applications have become the most popular way to deliver essential services to customers, and the increasing dependency of individuals on web applications makes them an attractive target for adversaries. The adversaries exploit vulnerabilities in the database-driven applications to craft injection attacks which include SQL, XQuery and XPath injections. A large amount of work has been done on identification of SQL injection vulnerabilities resulting in several tools available for the purpose. However, a limited work has been done so far for the identification of XML injection vulnerabilities and the existing tools only identify XML injection vulnerabilities which could lead to a specific type of attack. Hence, this work proposes a black-box fuzzing approach to detect different types of XQuery injection vulnerabilities in web applications driven by native XML databases. A prototype XQueryFuzzer is developed and tested on various vulnerable applications developed with BaseX as the native XML database. An experimental evaluation demonstrates that the prototype is effective against detection of XQuery injection vulnerabilities. Three new categories of attacks specific to XQuery, but not listed in OWASP are identified during testing. © 2016 Elsevier Inc.Item Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications(Springer Verlag service@springer.de, 2018) Deepa, G.; Santhi Thilagam, P.S.; Ahmed Khan, F.A.; Praseed, A.; Pais, A.R.; Palsetia, N.As web applications become the most popular way to deliver essential services to customers, they also become attractive targets for attackers. The attackers craft injection attacks in database-driven applications through the user-input fields intended for interacting with the applications. Even though precautionary measures such as user-input sanitization is employed at the client side of the application, the attackers can disable the JavaScript at client side and still inject attacks through HTTP parameters. The injected parameters result in attacks due to improper server-side validation of user input. The injected parameters may either contain malicious SQL/XML commands leading to SQL/XPath/XQuery injection or be invalid input that intend to violate the expected behavior of the web application. The former is known as an injection attack, while the latter is called a parameter tampering attack. While SQL injection has been intensively examined by the research community, limited work has been done so far for identifying XML injection and parameter tampering vulnerabilities. Database-driven web applications today rely on XML databases, as XML has gained rapid acceptance due to the fact that it favors integration of data with other applications and handles diverse information. Hence, this work proposes a black-box fuzzing approach to detect XQuery injection and parameter tampering vulnerabilities in web applications driven by native XML databases. A prototype XiParam is developed and tested on vulnerable applications developed with a native XML database, BaseX, as the backend. The experimental evaluation clearly demonstrates that the prototype is effective against detection of both XQuery injection and parameter tampering vulnerabilities. © 2017, Springer-Verlag Berlin Heidelberg.Item Phoneme boundary detection from speech: A rule based approach(Elsevier B.V., 2019) Ramteke, P.B.; Koolagudi, S.G.In this paper, a novel approach has been proposed for the automatic segmentation of speech signal into phonemes. In a well spoken word, phonemes can be characterized by the changes observed in speech waveform. To get phoneme boundaries, the signal level properties of speech waveform i.e. changes in the waveform during transformation from one phoneme to the other are explored. The problem of phoneme level segmentation has been addressed in this work from two aspects 1. Segmentation of phonemes between voiced and unvoiced portions and 2. Segmentation of phonemes within voiced and unvoiced regions. Pitch and zero-frequency filter signal are used to get the region of change from voiced to unvoiced and vice versa. The segmentation of phoneme boundaries within voiced and unvoiced regions are approximated using the properties of power spectrum of correlation of adjacent frames of the signal. A finite set of rules is proposed on the variations observed in the power spectrum during phoneme transitions. The segmentation results of both approaches are combined to get the final phoneme boundaries. Three databases namely TIMIT Corpus, IIIT Hyderabad Marathi database & IIIT Hyderabad Hindi database (IIIT-H Indic Speech Databases) are used to test the proposed approach; an accuracy of 95.40%, 96.87% and 96.12% is achieved within the tolerance range of 10 ms respectively. The results of the proposed approach are observed to give precise phoneme boundaries. © 2019 Elsevier B.V.Item Keyword-based private searching on cloud data along with keyword association and dissociation using cuckoo filter(Springer Verlag service@springer.de, 2019) Vora, A.V.; Hegde, S.Outsourcing of data is a very common scenario in the present-day world and quite often we need to outsource confidential data whose privacy is of utmost concern. Performing encryption before outsourcing the data is a simple solution to preserve privacy. Preferably a public-key encryption technique is used to encrypt the data. A demerit of encrypting data is that while requesting the data from the cloud we need to have some technique which supports search functionality on encrypted data. Without the searchable encryption technique, the cloud is forced to send the whole database, which is highly inefficient and impractical. To address this problem, we consider the email scenario, in which the sender of the email will encrypt email contents using receiver’s public key; hence, only the receiver can decrypt email contents. We propose a scheme that will have encrypted emails stored on the cloud and have capabilities that support searching through the encrypted database. This enables the cloud to reply to a request with a more precise response without compromising any privacy in terms of email contents and also in terms of access patterns. We provide a solution for the email scenario in which we can tag or associate emails with some keywords, and during retrieval, the email owner can request all the emails associated with a particular keyword. Although attempts are seen in the literature to solve this issue they do not have the flexibility of dissociating keywords from an email. Keyword dissociation is essential to modify the association between keywords and emails to enable better filtering of emails. Our technique also supports the functionality of keyword dissociation. The solution allows single-database private information retrieval writing in an oblivious way with sublinear communication cost. We have theoretically proved the correctness and security of our technique. © 2018, Springer-Verlag GmbH Germany, part of Springer Nature.Item Human gait recognition based on histogram of oriented gradients and Haralick texture descriptor(Springer, 2020) Anusha, R.; Jaidhar, C.D.Gait recognition is an evolving technology in the biometric domain; it aims to recognize people through an analysis of their walking pattern. One of the significant challenges of the appearance-based gait recognition system is to augment its performance by using a distinctive low-dimensional feature vector. Therefore, this study proposes the low-dimensional features that are capable of effectively capturing the spatial, gradient, and texture information in this context. These features are obtained by the computation of histogram of oriented gradients, followed by sum variance Haralick texture descriptor from nine cells of gait gradient magnitude image. Further, the performance of the proposed method is validated on five widely used gait databases. They include CASIA A gait database, CASIA B gait database, OU-ISIR D gait database, CMU MoBo database, and KTH video database. The experimental results demonstrated that the proposed approach could choose significant discriminatory features for individual identification and consequently, outperform certain state-of-the-art methods in terms of recognition performance. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.Item Affective database for e-learning and classroom environments using Indian students’ faces, hand gestures and body postures(Elsevier B.V., 2020) Ashwin, T.S.; Guddeti, R.M.R.Automatic recognition of the students’ affective states is a challenging task. These affective states are recognized using their facial expressions, hand gestures, and body postures. An intelligent tutoring system and smart classroom environment can be made more personalized using students’ affective state analysis, and it is performed using machine or deep learning techniques. Effective recognition of affective states is mainly dependent on the quality of the database used. But, there exist very few standard databases for the students’ affective state recognition and its analysis that works for both e-learning and classroom environments. In this paper, we propose a new affective database for both the e-learning and classroom environments using the students’ facial expressions, hand gestures, and body postures. The database consists of both posed (acted) and spontaneous (natural) expressions with single and multi-person in a single image frame with more than 4000 manually annotated image frames with object localization. The classification was done manually using the gold standard study for both Ekman's basic emotions and learning-centered emotions, including neutral. The annotators reliably agree when discriminating against the recognized affective states with Cohen's ? = 0.48. The created database is more robust as it considers various image variants such as occlusion, background clutter, pose, illumination, cultural & regional background, intra-class variations, cropped images, multipoint view, and deformations. Further, we analyzed the classification accuracy of our database using a few state-of-the-art machine and deep learning techniques. Experimental results demonstrate that the convolutional neural network based architecture achieved an accuracy of 83% and 76% for detection and classification, respectively. © 2020 Elsevier B.V.Item FarSight: Long-Term Disease Prediction Using Unstructured Clinical Nursing Notes(IEEE Computer Society, 2021) Gangavarapu, T.; S. Krishnan, G.S.; Kamath S?, S.; Jeganathan, J.Accurate risk stratification using patient data is a vital task in channeling prioritized care. Most state-of-the-art models are predominantly reliant on digitized data in the form of structured Electronic Health Records (EHRs). Those models overlook the valuable patient-specific information embedded in unstructured clinical notes, which is the prevalent medium employed by caregivers to record patients' disease timeline. The availability of such patient-specific data presents an unprecedented opportunity to build intelligent systems that provide exclusive insights into patients' disease physiology. Moreover, very few works have attempted to benchmark the performance of deep neural architectures against the state-of-the-art models on publicly available datasets. This article presents significant observations from our benchmarking experiments on the applicability of deep learning models for the clinical task of ICD-9 code group prediction. We present FarSight, a long-term aggregation mechanism intended to recognize the onset of the disease with the earliest detected symptoms. Vector space and topic modeling approaches are utilized to capture the semantic information in the patient representations. Experiments on MIMIC-III database underscored the superior performance of the proposed models built on unstructured data when compared to structured EHR based state-of-the-art model, achieving an improvement of 19.34 percent in AUPRC and 5.41 percent in AUROC. © 2013 IEEE.
