Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 10 of 11
  • Item
    An efficient search to improve neighbour selection mechanism in P2P network
    (2009) Totekar, C.R.; Santhi Thilagam, P.S.
    One of the key challenging aspects of peer-to-peer systems has been efficient search for objects. For this, we need to minimize the number of nodes that have to be searched, by using minimum number of messages during the search process. This can be done by selectively sending requests to nodes having higher probability of a hit for queried object. In this paper, we present an enhanced selective walk searching algorithm along with low cost replication schemes. Our algorithm is based on the fact that most users in peer-to-peer network share various types of data in different proportions. This knowledge of amount of different kinds of data shared by each node is used to selectively forward the query to a node having higher hit-ratio for the data of requested type, based on history of recently succeeded queries. Replication scheme replicates frequently accessed data objects on the nodes which get high number of similar queries or closer to the peers from where most of the queries are being issued. Two simple replication schemes have been discussed and their performances are compared. Experimental results prove that our searching algorithm performs better than the selective walk searching algorithm. © 2009 Springer Berlin Heidelberg.
  • Item
    Q-feedan effective solution for the free-riding problem in unstructured P2P networks
    (2010) Thampi, S.M.; Sekaran K, C.
    This paper presents a solution for reducing the ill effects of free-riders in decentralised unstructured P2P networks. An autonomous replication scheme is proposed to improve the availability and enhance system performance. Q-learning is widely employed in different situations to improve the accuracy in decision making by each peer. Based on the performance of neighbours of a peer, every neighbour is awarded different levels of ranks. At the same time a low-performing node is allowed to improve its rank in different ways. Simulation results show that Q-learning-based free riding control mechanism effectively limits the services received by free-riders and also encourages the low-performing neighbours to improve their position. The popular files are autonomously replicated to nodes possessing required parameters. Due to this improvement of quantity of popular files, free riders are given opportunity to lift their position for active participation in the network for sharing files. Q-feed effectively manages queries from free riders and reduces network traffic significantly. © 2010 S. M. Thampi and C. Sekaran K.
  • Item
    MPI-based parallel synchronous vector evaluated particle swarm optimization for multi-objective design optimization of composite structures
    (2012) Omkar, S.N.; Venkatesh, A.; Mudigere, M.
    This paper presents a decentralized/peer-to-peer architecture-based parallel version of the vector evaluated particle swarm optimization (VEPSO) algorithm for multi-objective design optimization of laminated composite plates using message passing interface (MPI). The design optimization of laminated composite plates being a combinatorially explosive constrained non-linear optimization problem (CNOP), with many design variables and a vast solution space, warrants the use of non-parametric and heuristic optimization algorithms like PSO. Optimization requires minimizing both the weight and cost of these composite plates, simultaneously, which renders the problem multi-objective. Hence VEPSO, a multi-objective variant of the PSO algorithm, is used. Despite the use of such a heuristic, the application problem, being computationally intensive, suffers from long execution times due to sequential computation. Hence, a parallel version of the PSO algorithm for the problem has been developed to run on several nodes of an IBM P720 cluster. The proposed parallel algorithm, using MPI's collective communication directives, establishes a peer-to-peer relationship between the constituent parallel processes, deviating from the more common master-slave approach, in achieving reduction of computation time by factor of up to 10. Finally we show the effectiveness of the proposed parallel algorithm by comparing it with a serial implementation of VEPSO and a parallel implementation of the vector evaluated genetic algorithm (VEGA) for the same design problem. © 2012 Elsevier Ltd. All rights reserved.
  • Item
    Self-optimal clustering technique using optimized threshold function
    (Institute of Electrical and Electronics Engineers Inc., 2014) Verma, N.K.; Roy, A.
    This paper presents a self-optimal clustering (SOC) technique which is an advanced version of improved mountain clustering (IMC) technique. The proposed clustering technique is equipped with major changes and modifications in its previous versions of algorithm. SOC is compared with some of the widely used clustering techniques such as K-means, fuzzy C-means, Expectation and Maximization, and K-medoid. Also, the comparison of the proposed technique is shown with IMC and its last updated version. The quantitative and qualitative performances of all these well-known clustering techniques are presented and compared with the aid of case studies and examples on various benchmarked validation indices. SOC has been evaluated via cluster compactness within itself and separation with other clusters. The optimizing factor in the threshold function is computed via interpolation and found to be effective in forming better quality clusters as verified by visual assessment and various standard validation indices like the global silhouette index, partition index, separation index, and Dunn index. © 2007-2012 IEEE.
  • Item
    Spatio-temporal probabilistic query generation model and sink attributes for energy-efficient wireless sensor networks
    (Institution of Engineering and Technology journals@theiet.org, 2016) Kumar, P.; Chaturvedi, A.
    Proliferation in Micro-Electro-Mechanical-Systems (MEMS) technology along with advancement in distributed computing infrastructure has facilitated the versatile usage and deployment of wireless sensors networks (WSNs) in last one and half decades. WSNs support large number of applications from the civilian and military regimes. Irrespective of these regimes; owing to difficulty associated with battery replenishment, proper energy usage has been at centre stage in WSNs operations. The lifetime of WSNs typically depends upon sensor's energy dissipation pattern, which is non-homogeneous with respect to spatial distribution over any short epochs. The genesis behind this nonhomogeneity is random generation of queries, which owes to application specific spatio-temporal parameters. Importance of spatio-temporal parameters is ubiquitous in WSNs paradigm and uncertainties are inevitable with these parameters, although the degree of uncertainties varies in accordance to applications served. Thus, from network design perspectives, precision involved with spatio-temporal aspects must be given due priority to obtain a mathematical model that maintains a good rapport with realistic query generation process. With these motivations, the study explores: (i) uses of energy-efficient clustering schemes, (ii) incorporation of spatio-temporal parameters uncertainties into probabilistic model of query generation using fuzzy-intervals bound, and (iii) sink attributes to enhance network lifetime. For various network surveillance scenarios; the performance measures average residual energy status and service-time-duration are estimated and analysed. © The Institution of Engineering and Technology 2016.
  • Item
    Live migration of virtual machines with their local persistent storage in a data intensive cloud
    (Inderscience Enterprises Ltd. editor@inderscience.com, 2017) Modi, A.; Achar, R.; Santhi Thilagam, P.S.
    Processing large volumes of data to drive their core business has been the primary objective of many firms and scientific applications in these days. Cloud computing being a large-scale distributed computing paradigm can be used to cater for the needs of data intensive applications. There are various approaches for managing the workload on a data intensive cloud. Live migration of a virtual machine is the most prominent paradigm. Existing approaches to live migration use network attached storage where just the run time state needs to be transferred. Live migration of virtual machines with local persistent storage has been shown to have performance advantages like security, availability and privacy. This paper presents an optimised approach for migration of a virtual machine along with its local storage by considering the locality of storage access. Count map combined with a restricted block transfer mechanism is used to minimise the downtime and overhead. The solution proposed is tested by various parameters like bandwidth, write access patterns and threshold. Results show the improvement in downtime and reduction in overhead. © © 2017 Inderscience Enterprises Ltd.
  • Item
    Social network pruning for building optimal social network: A user perspective
    (Elsevier B.V., 2017) Sumith, N.; Annappa, B.; Bhattacharya, S.
    Social networks with millions of nodes and edges are difficult to visualize and understand. Therefore, approaches to simplify social networks are needed. This paper addresses the problem of pruning social network while not only retaining but also improving its information propagation properties. The paper presents an approach which examines the nodal attribute of a node and develops a criterion to retain a subset of nodes to form a pruned graph of the original social network. To authenticate feasibility of the proposed approach to information propagation process, it is evaluated on small world properties such as average clustering coefficient, diameter, path length, connected components and modularity. The pruned graph, when compared to original social network, shows improvement in small world properties which are essential for information propagation. Results also give a significantly more refined picture of social network, than has been previously highlighted. The efficacy of the pruned graph is demonstrated in the information diffusion process under Independent Cascade (IC) and Linear Threshold (LT) models on various seeding strategies. In all size ranges and across various seeding strategies, the proposed approach performs consistently well in IC model and outperforms other approaches in LT model. Although, the paper discusses the problem with the context of information propagation for viral marketing, the pruned graph generated from the proposed approach is also suitable for any application, where information propagation has to take place reasonably fast and effectively. © 2016 Elsevier B.V.
  • Item
    Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM
    (Elsevier B.V., 2018) M.a, A.K.; Jaidhar, C.D.
    In order to fulfill the requirements like stringent timing restraints and demand on resources, Cyber–Physical System (CPS) must deploy on the virtualized environment such as cloud computing. To protect Virtual Machines (VMs) in which CPSs are functioning against malware-based attacks, malware detection and mitigation technique is emerging as a highly crucial concern. The traditional VM-based anti-malware software themselves a potential target for malware-based attack since they are easily subverted by sophisticated malware. Thus, a reliable and robust malware monitoring and detection systems are needed to detect and mitigate rapidly the malware based cyber-attacks in real time particularly for virtualized environment. The Virtual Machine Introspection (VMI) has emerged as a fine-grained out-of-VM security solution to detect malware by introspecting and reconstructing the volatile memory state of the live guest Operating System (OS) by functioning at the Virtual Machine Monitor (VMM) or hypervisor. However, the reconstructed semantic details by the VMI are available in a combination of benign and malicious states at the hypervisor. In order to distinguish between these two states, extensive manual analysis is required by the existing out-of-VM security solutions. To address the foremost issue, in this paper, we propose an advanced VMM-based guest-assisted Automated Multilevel Malware Detection System (AMMDS) that leverages both VMI and Memory Forensic Analysis (MFA) techniques to predict early symptoms of malware execution by detecting stealthy hidden processes on a live guest OS. More specifically, the AMMDS system detects and classifies the actual running malicious executables from the semantically reconstructed process view of the guest OS. The two sub-components of the AMMDS are: Online Malware Detector (OMD) and Offline Malware Classifier (OFMC). The OMD recognizes whether the running processes are benign or malicious using its Local Malware Signature Database (LMSD) and online malware scanner and the OFMC classify unknown malware by adopting machine learning techniques at the hypervisor. The AMMDS has been evaluated by executing large real-world malware and benign executables on to the live guest OSs. The evaluation results achieved 100% of accuracy and zero False Positive Rate (FPR) on the 10-fold cross-validation in classifying unknown malware with maximum performance overhead of 5.8%. © 2017 Elsevier B.V.
  • Item
    LBF-NoC: Learning-Based Framework to Predict Performance, Power and Area for Network-On-Chip Architectures
    (World Scientific, 2022) Kumar, A.; Talawar, B.
    Extensive large-scale data and applications have increasing requests for high-performance computations which is fulfilled by Chip Multiprocessors (CMP) and System-on-Chips (SoCs). Network-on-Chips (NoCs) emerged as the reliable on-chip communication framework for CMPs and SoCs. NoC architectures are evaluated based on design parameters such as latency, area, and power. Cycle-accurate simulators are used to perform the design space exploration of NoC architectures. Cycle-accurate simulators become slow for interactive usage as the NoC topology size increases. To overcome these limitations, we employ a Machine Learning (ML) approach to predict the NoC simulation results within a short span of time. LBF-NoC: Learning-based framework is proposed to predict performance, power and area for Direct and Indirect NoC architectures. This provides chip designers with an efficient way to analyze various NoC features. LBF-NoC is modeled using distinct ML regression algorithms to predict overall performance of NoCs considering different synthetic traffic patterns. The performance metrics of five different (Mesh, Torus, Cmesh, Fat-Tree and Flattened Butterfly) NoC architectures can be analyzed using the proposed LBF-NoC framework. BookSim simulator is employed to validate the results. Various architecture sizes from 2×2 to 45×45 are used in the experiments considering various virtual channels, traffic patterns, and injection rates. The prediction error of LBF-NoC is 6% to 8%, and the overall speedup is 5000× to 5500× with respect to BookSim simulator. © 2022 World Scientific Publishing Company.
  • Item
    Energy- and Reliability-Aware Provisioning of Parallelized Service Function Chains With Delay Guarantees
    (Institute of Electrical and Electronics Engineers Inc., 2024) Chintapalli, V.R.; Killi, B.R.; Partani, R.; Tamma, B.R.; Siva Ram Murthy, C.
    Network Functions Virtualization (NFV) leverages virtualization and cloud computing technologies to make networks more flexible, manageable, and scalable. Instead of using traditional hardware middleboxes, NFV uses more flexible Virtual Network Functions (VNFs) running on commodity servers. One of the key challenges in NFV is to ensure strict reliability and low latency while also improving energy efficiency. Any software or hardware failures in an NFV environment can disrupt the service provided by a chain of VNFs, known as a Service Function Chain (SFC), resulting in significant data loss, delays, and wasted resources. Due to the sequential nature of SFC, latency increases linearly with the number of VNFs. To address this issue, researchers have proposed parallelized SFC or VNF parallelization, which allows multiple independent VNFs in an SFC to run in parallel. In this work, we propose a method to solve the parallelized SFC deployment problem as an Integer Linear Program (ILP) that minimizes energy consumption while ensuring reliability and delay constraints. Since the problem is NP-hard, we also propose a heuristic scheme named ERASE that determines the placement of VNFs and routes traffic through them in a way that minimizes energy consumption while meeting capacity, reliability, and delay requirements. The effectiveness of ERASE is evaluated through extensive simulations and it is shown to perform better than benchmark schemes in terms of total energy consumption and reliability achieved. © 2017 IEEE.