Fog computing uses fog nodes (FNs) near end devices to serve user applications in a highly virtua... more Fog computing uses fog nodes (FNs) near end devices to serve user applications in a highly virtualized environment. FNs are vulnerable to overloading because of the large number of user applications requesting service and their heterogeneous resource requirements. The proposed paper concentrates on maintaining FN in optimal working condition guaranteeing its operational efficiency and quality of service (QoS). This paper presents two methods for workload classification and overload prediction in FN, viz., a threshold-based technique adopting the criteria inferred from experimental results and a method based on Hidden Markov Model (HMM). The paper recommends virtual machine (VM) migration as a solution for avoiding the predicted overloading of FN through a hybrid multiple attribute decision making (MADM) method, for selecting the VM for migration, and an algorithm for finding the destination FN willing to host the migrating VM. Experimental results validate the proposed solution.
Analysis of ECC for application specific WSN security
2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015
The range of applications based on Wireless Sensor Network (WSN) is wide and numerous. Security s... more The range of applications based on Wireless Sensor Network (WSN) is wide and numerous. Security solution implementation is a major issue as these networks are formed from resource constrained tiny sensor nodes which have meager computational power and network lifetime. Moreover, the applications require different levels of security. A standard security solution is not feasible in such networks. Elliptic Curve Cryptography (ECC) is emerging as a promising security solution for WSN. Certain applications that require basic security level need not be burdened by using standard security measures which may tax on their efficiency. The right choice of values of parameters of Elliptic Curves (EC) is of paramount importance while implementing ECC for resource constrained WSN. This paper identifies the relevant parameters of EC for ECC implementation in WSN and analyses the impact of their values on the level of security they offer.
In this paper, a Morphological Generator for Malayalam using Universal Networking Language (UNL )... more In this paper, a Morphological Generator for Malayalam using Universal Networking Language (UNL ) is carried out, which helps to represent and process information across language barriers. UNL translates words with respect to the concepts and relations using semantic net like graphs which contain disambiguated words, binary semantic relations and speech attributes associated with the words. The translation process employs two engines, an EnConverter and a DeConverter. EnConverter encodes the document to be translated into the UNL language. DeConverter decodes the translated UNL document into target language. In this work, a DeConverter for Malayalam is proposed that converts the UNL documents generated to the required target language. A Word dictionary and set of rules of grammar is created for the morphological generation, preserving syntactic, semantic structure and ordering of the generated Malayalam words. Post editing rules can also be performed to improve the accuracy of gener...
International Journal of Computer Applications, 2014
This paper presents a deconverting generator for Malayalam language using Universal Networking La... more This paper presents a deconverting generator for Malayalam language using Universal Networking Language (UNL) for Machine Translation. UNL being an Interlingua representation, conveyed as directed hyper graph with relations and attributes of source language sentence. A set of Universal Words are generated from the source language with its semantic representation, are mapped to UNL features. The work involves identifying the dependent features like syntactic, semantic and lexical features of target language. UNL Relations, UNL Attributes and Universal Word (UW), which are the building blocks of UNL are identified and mapped to the dependent features of Malayalam. Lexical mapping of UWs to root words of Malayalam was done through UNL-Malayalam Word Dictionary. The deconversion is tested against 100 Malayalam Sentences that has achieved an appreciable F-measure score of 0.978. .
Advances in Wireless Technologies and Telecommunication, 2019
Real-time streaming applications (RTSAs) generate huge volumes of temporally ordered, infinite, c... more Real-time streaming applications (RTSAs) generate huge volumes of temporally ordered, infinite, continuous, high speed data streams demanding both real-time and long-term data analytics. Fog computing is a reliable solution for processing and analyzing real-time streaming data as it offers low latency, location-aware, geographically distributed service at fog node and provides long-term services at the cloud data center (DC). This chapter addresses the challenge of coordinating the fog nodes and cloud for efficient processing of real-time streaming data in motion and at rest. The fog-cloud collaboration framework proposed in this chapter employs data stream management system (DSMS) schema at the fog node for real-time stream data processing and response generation. The data representation in micro-clusters at fog node and macro-clusters at DC facilitates accurate data analytics. The coordination between fog node and DC is through local ontology and global ontology respectively.
Fog computing architecture competent to support the mission-oriented network-centric warfare prov... more Fog computing architecture competent to support the mission-oriented network-centric warfare provides the framework for a tactical cloud in this work. The tactical cloud becomes situation-aware of the war from the information relayed by fog nodes (FNs) on the battlefield. This work aims to sustain the network of FNs by maintaining the operational efficiency of the FNs on the battlefield at the tactical edge. The proposed solution monitors and predicts the likely overloading of an FN using the long short-term memory model through a buddy FN at the fog server (FS). This paper also proposes randomised task scheduling (RTS) algorithm to avert the likely overloading of an FN by pre-empting tasks from the FN and scheduling them to another FN. The experimental results demonstrate that RTS with linear complexity has a schedulability measure 8% - 26% higher than that of other base scheduling algorithms. The results show that the LSTM model has low mean absolute error compared to other time-s...
Uploads
Papers by Biji Nair