H S Guruprasad

H S Guruprasad
  • PhD
  • Professor at BMS College of Engineering

Professor at Department of Information Science and Engineering, BMS College of Engineering, Bangalore

About

79
Publications
139,055
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
506
Citations
Current institution
BMS College of Engineering
Current position
  • Professor

Publications

Publications (79)
Article
Full-text available
In the present day Internet of Things (IoT) based on cloud computing and Big data concepts has become a new area of research. Novel concepts and implementations are being researched every day. The paper presents an overview of trending technologies in cloud computing and IoT applications. Discussion on these concepts also includes major advantages,...
Article
Full-text available
Cloud computing refers to the model, which is the pool of resources. Cloud makes on-demand delivery of these computational resources (data, software and infrastructure) among multiple services via a computer network with different load conditions of the cloud network. User will be charged for the resources used based upon time. Hence efficient util...
Article
Full-text available
Cloud computing is a new emerging technology in IT field. Cloud computing has capability to provide whole IT as a service to its users. There are many characteristics of cloud computing that makes it attractive in a variety of problems. Users of the cloud are free from the housekeeping activities related to the infrastructure. This is because in cl...
Article
Full-text available
Cloud computing provides the users with flexibility of using computational systems on demand at nominal cost. Execution of resource intensive task on mobile devices is still a big challenge due to resource constraints of mobile devices. Utilizing the servi ces of resource rich cloud servers for offloading the task from mobile device can overcome th...
Conference Paper
Full-text available
Sentiment classification is a process of detecting the polarity of emotions. With the increased use of social media, people from all walks of life started communicating by using their local languages and, English as the common language resulted in an enormous amount of code-mixed data. Therefore, Code-mixed sentiment analysis is the trending resear...
Chapter
Single cloud provider can manage their cloud on their own individually to deliver services to the users based on the need and demand of the user anywhere, anytime. Multi-cloud technology has been proposed in recent years as a revolutionary solution where a user uses more than one cloud platform and each one of them delivers a specific application o...
Article
Full-text available
The federated cloud is the future generation of cloud computing, allowing sharing of computing and storage resources, and servicing of user tasks among cloud providers through a centralized control mechanism. However, a great challenge lies in the efficient management of such federated clouds and fair distribution of the load among heterogeneous cl...
Article
Full-text available
Vehicular networks that deal with sharing of information among vehicles are gaining popularity among the automobile industry as well as the researchers. These networks are prevalent under the umbrella of Intelligent Transportation Systems (ITS) and deal with data that belongs to either the emergency category or the entertaining category. In case of...
Article
Multimedia data transmission, a prevalent and significant requirement in Vehicular Adhoc Networks (VANETs) demands less end-to-end delay. The transmission of data in VANET scenarios is challenging as the vehicles are mostly on move resulting in dynamic topology. RaptorQ (RQ) codes help in error correction, where the redundant symbols sent along wit...
Article
Full-text available
Multimedia data transmission, a prevalent and significant requirement in Vehicular Adhoc NETworks (VANETs) demands less end-to-end delay. The transmission of data in VANET scenarios is challenging as the vehicles are mostly on the move, resulting in dynamic topology. RaptorQ (RQ) codes help in error correction, where the redundant symbols sent alon...
Article
Full-text available
Mobile Cloud Computing is a combination of mobile, cloud and wireless network where data storage and processing happens outside the mobile device. The storage capacity, processing power and battery life can be improved by moving resource intensive applications onto the cloud. In this paper, the performance of the mobile device is measured by using...
Article
Full-text available
A huge portion of the web known as deep web is accessible via search interfaces to myriads of databases on the web. Deep web crawl is concerned with the problem of surfacing hidden content behind search interfaces on the web. Given the dynamic nature of the web, where data sources are constantly changing, it is crucial to discover these resources....
Article
Full-text available
Nowadays enterprises need to maintain plenty of applications accessing by millions of users all over the world. Maintaining their own infrastructure, managing software requirements and handling excessive internet traffic is difficult. This makes them to move towards cloud computing. Cloud computing is a service provisioning technique, where custome...
Conference Paper
Full-text available
As the picture worth thousands words, it is necessary to restore the degraded images degraded because of blur, motion or noise in applications like satellite imaging, medical imaging, military and survivalance applications. Restorations techniques are either nonblind methods where the point spread function (PSF) is available or blind deconvolution....
Article
Full-text available
Web data is becoming very popular for the transformation and distribution of valuable information which can be freely accessible by users. Hence Web is becoming too large and diverse. Organization of data on the Web for the efficient access has become a big challenge for the Web site administrators. So there is a need to apply data mining and neura...
Article
Full-text available
The emerging trend of Internet of Things (IoT) has spread across almost all components of modern life, starting from smart building, smart city, medical care, wearable devices, automobiles or industries. However, physical things getting attached to the Internet poses new challenges of making the entire system more vulnerable, prone to attacks and m...
Article
Full-text available
Numerous cloud simulator tools and frameworks have been developed to aid the simulation of cloud environments in order to test any newly proposed algorithm, model or concept without having to incur the cost of deploying the same on an actual cloud infrastructure. These cloud simulation frameworks are documented and well-illustrated with examples by...
Article
Full-text available
Cloud computing is an emerging technology which provides metering based services to consumers. Cloud computing offers ITC based services and provide computing resources through virtualization over internet. Data center is heart of cloud computing which contains collection of servers on which Business information is stored and applications run. Data...
Article
Full-text available
Virtual Machine (VM) refers to an operating system or application environment running on a software that imitates dedicated hardware without change in end-user experience. VM migration refers to the movement of VMs from one physical machine to the other while trying to minimize its impact on the performance of VM and its applications. VM migration...
Article
Full-text available
Video is a significant medium in data communication through which enormous information could be conveyed in less time. Video Streaming helps us play the streamed data immediately without waiting for the entire file to get downloaded. When the quality of service of video streaming is considered, delay and jitter act as very important parameters, as...
Article
Full-text available
Clustering is an exploratory technique that structures the data items into groups based on their similarity or relativeness. Clustering is used in Web usage scenario to form clusters of users showing same behaviour and clusters of pages with similar or related information. The Clustering of users results in the establishment of groups of users with...
Article
Full-text available
Towards the dawn of the 20 th century, there have been numerous advancements in the field of computing. This has been possible because of the cumulative efforts of not only the intelligentsia but also due to the rise in the computational capabilities of machines. One of these advancements is the number of sorting algorithms that are available today...
Conference Paper
Full-text available
Vehicular Adhoc NETworks (VANET), a special category of Mobile Adhoc Networks (MANET) are networks formed by vehicles which help the vehicles communicate with one another. The challenging mode of communication in VANETs is the video mode which can be used to give faster and clear information to the end users in vehicles. The transmission of video s...
Article
Full-text available
As we are living in a data-driven era with fast growing technologies, there exists a bulk of data generated, captured and also maintained for a variety of purposes. So there is a need of efficient, adequate tools to visualize the data and extract knowledge from them. This is possible with different visual analytic techniques. In this paper, we have...
Article
Full-text available
Right from the time to establish aerospace and aviation industries till the air vehicle departures safely, passenger information, co-ordination and integration amongst several stakeholders are very crucial. The pressure from customers to get best services has led these industries to roll over to digital technologies used by Big Data, Cloud Computin...
Article
Full-text available
Cloud computing has major role in parallel and distributed data processing. Hadoop environment is mainly used for storage and processing of such data. In Hadoop, MapReduce framework is a programming model which processes terabytes of data in very less time. MapReduce framework uses a task scheduling method to schedule task. There are various method...
Article
Full-text available
This paper contains description of Radio Frequency Identification (RFID) and its Application in various fields. Various research papers discussed in this paper describe different perspective of how RFID Technology is used. RFID is a wireless technology used basically for tracking assets. It is receiving considerable worldwide attention and is widel...
Article
Full-text available
Efficient Resource Scheduling is one of the major challenges in Cloud Computing. There are multiple users requesting for the cloud services. With the limited resources, it is challenging for cloud service provider to allocate resources to the jobs submitted by the cloud user. A PLW scheduling algorithm is proposed in order to efficiently schedule r...
Article
Full-text available
Learning analytics is a research topic that is gaining increasing popularity in recent time. It analyzes the learning data available in order to make aware or improvise the process itself and/or the outcome such as student performance. In this survey paper, we look at the recent research work that has been conducted around learning analytics, frame...
Article
Full-text available
Cloud computing, a realization of utility computing, is an emerging technology. Due to its characteristics, such as flexibility, on-demand service and so on, it is being adopted in IT industry. An organization or an entity which makes use of cloud computing are called clients and the entity responsible for delivering the cloud computing services to...
Article
Full-text available
Twitter is a popular micro blogging service where users create status messages (called “tweets”). Tweets are short messages with a maximum length of 140 characters. The distinguishing characteristics of tweets are hashtags. Hashtags are used for logically grouping tweets and searching them. Authors of those messages write about their life, share op...
Article
Full-text available
Load Balancing is a critical operation in cloud Computing. Load Balancing makes the efficient utilization of the resources in the cloud infrastructure resulting in the optimal pricing model for the end user and also maintaining the QoS for the end user. This paper proposes a novel algorithm for three tier cloud architecture, ELBMM which is an enhan...
Article
Full-text available
Clustering is a discovery process in data mining which groups set of data items, in such a way that maximizes the similarity within clusters and minimizes the similarity between two different clusters. These discovered clusters depict the characteristics of the underlying data distribution. Clustering is useful in characterizing customer groups bas...
Article
Full-text available
Cloud Computing provides the computer resources in an effective manner. Security in cloud is one of the major drawbacks. Among many security issues in cloud, the Virtual Machine Security is one of the very serious issues.Thus, monitoring of virtual machine is essential. The survey includes various existing Virtual Machine security problems and also...
Article
Full-text available
Network coding has been a challenging concept in networks compared to the most prevalent store and forward technique. This has been quite successful in both the wired and wireless arena. The enhancements achieved in the performance of various wireless networks with the usage of network coding are identified and a survey has been done. The paper als...
Article
Full-text available
The Autonomous position detection and tracking system enhances the accuracy of locating friends and family member's positions by using GPS and standard web technology. This system includes a mobile client, a repository, a web client and a map service. The mobile client is used to find location and send a Popup SMS to user when his/her friends or fa...
Article
Full-text available
AWireless Sensor Network is composed of many tiny, low-power nodes that integrate sensing units, transceivers, and processing unit and wireless communication capabilities. These devices are deployed in a region of interested area to collect the information from the environment, which will be sent to a remote base station. Wireless Sensor Networks a...
Article
Full-text available
Cloud computing is one of the latest models used for sharing pool of resources like CPU, memory, network bandwidth, hard drive etc. over the Internet. These resources are requested by the cloud user and are used on a rented basis just like electricity, water, LPG etc. When requests are made by the cloud user, allocation has to be done by the cloud...
Article
Full-text available
In Cloud computing, user can remotely store and retrieve their data based on-demand service, without the burden of local data storage and maintenance. However, the protection of the confidential data processed and generated during the computation is becoming the major security concern. The main objective of cloud computing enables customers with li...
Article
Full-text available
Security is one of the major concerns in Vehicular ad hoc networks (VANETs). The existing VANETs use the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. The paper proposes an Expedite Message Authentication Protocol (EMAP) for VANETs, which replaces the time-consuming CRL checking process by an efficient...
Article
Full-text available
In recent years mobile applications and mobile devices are developing rapidly. With the growth of the mobile applications and cloud computing concepts, cloud computing has becoming a potential technology for mobile services. Mobile cloud computing integrates the cloud computing into mobile environment and overcomes the problems related to performan...
Article
Full-text available
Cloud environments are mainly used for storage and processing of data. Cloud computing provides applications, platforms and infrastructure over the internet. Wireless Sensor Network is an very important technology in which sensor are placed in distributed manner to monitor physical and environment changes such as temperature, pressure etc. Combinin...
Article
Full-text available
This paper contributes to the growing knowledge of how to migrate existing systems to cloud computing environment. An increasing number of companies are expected to migrate their systems to cloud enabled infrastructures. Since migration is likely to encounter several kinds of challenges, it is important to identify and share the process and require...
Article
Full-text available
Cloud computing is an on-demand service because it offers dynamic flexible resource allocation for reliable and guaranteed services in pay as-you-use manner. Due to the ever increasing demands of the users for services or resources, it becomes difficult to allocate resources accurately to the user demands in order to satisfy their requests and also...
Article
Full-text available
Mobile applications are growing explosively with cloud computing concept. Mobile Cloud Computing is a new technology for mobile services. It integrates the cloud computing into mobile environment to overcome some obstacles related to performance, environment and security. This paper gives survey of Mobile Cloud Computing with respect to its definit...
Article
Full-text available
Cloud computing is an Internet-based computing solution which provides the resources in an effective manner. A very serious issue in cloud computing is security which is a major obstacle for the adoption of cloud. The most important threats of cloud computing are Multitenancy, Availability, Loss of control, Loss of Data, outside attacks, DOS attack...
Article
Full-text available
Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, applications and services) that can be rapidly provisioned and released. Resource Provisioning means the selection, deployment, and run-time management of software (e.g., database server managem...
Article
Full-text available
Cloud Computing allows the user to access the cloud services dynamically over the internet wherever and whenever needed.Cloud is majorly divided into two types, private cloud and public cloud. This paper discusses about implementing a private cloud using open source software and operating system. This private cloud is capable of providing the infra...
Article
Full-text available
Video is the most recommended media for information dissemination in VANETs (Vehicular Adhoc NETworks) as it gives clear and quick understanding of information to the drivers. The real time and on-demand videos help people on move in various possible ways. The real time videos which give information on any critical events like accidents, traffic co...
Article
Full-text available
Optimization of resource utilization especially energy with higher Quality of Service (QoS) parameter such as packet delivery ratio etc, is an open and active research issue in wireless sensor networks (WSN). Existing methods such as direct transmission, multi-hop routing, minimum transmission energy and static clustering methods were not optimal f...
Article
Full-text available
Web Usage Mining is the application of data mining techniques to learn usage patterns from Web server log file in order to understand and better serve the requirements of web based applications. Web Usage Mining includes three most important steps namely Data Preprocessing, Pattern discovery and Analysis of the discovered patterns. One of the most...
Article
Full-text available
This paper focus on the design and implementation of a software solution for fast reconfiguration of a Virtual private LAN service (VPLS) service for a business enterprise in the MPLS VPN network. The VPLS service as is a transparent LAN service for two or more customers sites is provisioned with the Service Access Point (SAP), Service Distribution...
Article
Full-text available
A Cloud is a vast pool of shared resources. It provides its resources as services to the requested users on demand over the internet. Generally multiple services are hosted by the Cloud, so managing the QoS for these services in the Cloud is a major challenge. Hence in order to achieve good QoS and high performance of the Cloud, an effective resour...
Article
Full-text available
Clustering Web Usage data is one of the important tasks of Web Usage Mining, which helps to find Web user clusters and Web page clusters. Web user clusters establish groups of users exhibiting similar browsing patterns and Web page clusters provide useful knowledge to personalized Web services. Different types of clustering algorithms such as parti...
Conference Paper
Full-text available
During the process of imagery, the factors including the motion between earth and the platform, atmosphere disturbance, out of focus, non-ideal sampling and so on, all can make the images blurred and degraded. Super resolution technology is the signal processing based method which can detect and remove the blur caused by the imaging system as well...
Article
Full-text available
This paper proposes a dynamic bandwidth management algorithm in which more bandwidth is allocated for higher class users and also higher priority is given to the videos with higher popularity within a class using agent technology. The popularity and weight profile of the videos which is used for efficiently allocating bandwidth is periodically upda...
Article
Full-text available
This paper proposes a load sharing algorithm with higher priority given to the videos with higher weights using agent technology. A mobile agent periodically updates the popularity and the weight of the videos which is used for efficiently allocating the channels. The proposed approach reduces the load on the central multimedia server, allocates mo...
Article
Full-text available
This paper proposes a dynamic bandwidth allocation for load sharing algorithm with a VoD architecture using agent technology. A mobile agent periodically updates the popularity of the videos which is used for the dynamic allocation of bandwidth. The proposed approach reduces the load on the central multimedia server, reduces storage redundancy amon...
Article
Full-text available
This paper proposes an efficient bandwidth allocation algorithm in which higher priority is given to the videos with higher weights using agent technology. The popularity and weight profile of the videos which is used for efficiently allocating bandwidth is periodically updated by a mobile agent. The proposed approach allocates more bandwidth for h...
Article
Full-text available
This paper proposes a load balancing algorithm for a distributed VoD architecture using agents. A mobile agent is used to frequently update the popularity of the videos based on which channel allocation is done effectively. The proposed approach groups a set of local proxy servers into a Local Proxy Server Group [LPG] for load balancing among the p...
Conference Paper
Full-text available
In this paper, we propose a unique VoD architecture and implementation for efficient QoS. This scheme reduces the bandwidth demand between the centralized multimedia server (CMS) and the proxy servers by sharing the videos among the proxy servers of the local proxy servers group [LPSG], which are connected to each other and coordinated by a coordin...
Article
Full-text available
Summary This paper proposes a load sharing algorithm with a VoD architecture using agent technology. A mobile agent periodically updates the popularity of the videos which is used for efficiently allocating the channels. The proposed approach reduces the load on the central multimedia server, reduces storage redundancy among the proxy servers and m...

Questions

Network

Cited By