Parmeet Kaur Jaggi

Parmeet Kaur Jaggi
Jaypee Institute of Information Technology | JIIT · Department of Computer Science & IT

PhD(Comp. Engg.)

About

39
Publications
3,841
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
451
Citations

Publications

Publications (39)
Conference Paper
Mobile Ad hoc networks (MANETs) have significantly enhanced the wireless networks as they eliminate the need for fixed infrastructure and are easily deployable. Apart from their application for communication purposes, these are increasingly being used for expanding the computing capabilities of existing cellular mobile systems and for the implement...
Conference Paper
A global checkpoint of a distributed computation is formed by a set of local checkpoints, one from each process in the system. However, a local checkpoint taken by a process may be useless if it cannot be part of any consistent global checkpoint. Since checkpointing is expensive in MANETs due to the limitation of available resources, such useless c...
Conference Paper
The nodes in mobile ad hoc networks (MANETs) are susceptible to various types of failures and therefore the protocols designed for these networks are required to be fault tolerant. Checkpointing and rollback recovery is a well explored fault tolerance technique for the static and cellular mobile distributed systems. However, it is not trivially app...
Chapter
Checkpointing uses stable storage available in the distributed system for saving the consistent states of processes to which they can rollback at the time of recovery. But the checkpointing techniques for wired and cellular mobile systems are not trivially applicable to ad hoc networks as these networks have limited stable storage and wireless link...
Conference Paper
The article proposes a recovery protocol for applications in mobile computing environment by combining movement based checkpointing with message logging. The focus of the scheme is to have a low overhead to the normal application execution due to the recovery scheme. The cost to locate the mobile host, the number of messages exchanged over the wire...
Article
Full-text available
Federated learning (FL) allows multiple nodes or clients to train a model collaboratively without actual sharing of data. Thus, FL avoids data privacy leakage by keeping the data locally at the clients. Fog computing is a natural fit for decentralized FL where local training can take place at fog nodes using the data of connected Internet of Things...
Conference Paper
Federated Learning (FL) is a promising technique for decentralizing machine learning on multiple devices. In a FL environment, clients train an initial global ML model using their local data. They transfer the weights or gradients of the trained model to the server which, in turn, aggregates the received weights or gradients to obtain an improved g...
Article
The paper presents a novel data augmentation-based approach to develop explainable, deep learning models for hate speech detection. Hate speech is widely prevalent on online social media but difficult to detect automatically due to challenges of natural language processing and complexity of hate speech. Further, the decisions of the existing soluti...
Article
Full-text available
Infrastructure as a Service (IaaS) model of cloud computing provides resources, such as storage and computation power from cloud-based physical machines to users in the form of virtual machines (VM). This can be cost-efficient for users as well as cloud service providers if the physical machines and related resources are optimally utilized. At the...
Article
Full-text available
The paper presents RelFL, a Reliable Federated Learning system for collaborative and decentralized training of a deep learning model in a cloud-fog-Internet of Things (IoT) environment. Data generated by IoT devices is used at fog nodes for locally train a global deep learning model received from a cloud server. Further, a subset of reliable fog no...
Article
Full-text available
Existing fault tolerance approaches in the cloud are broadly based on replication and checkpointing. Each of these approaches has its advantages and limitations. This paper presents an adaptable fault tolerance method for determining which of the two approaches will be appropriate for the successful execution of a task in the given cloud conditions...
Article
Internet of Things (IoT) is characterized by the large volumes of data collection. Since IoT devices are themselves resource-constrained, this data is transferred to cloud-based systems for further processing. This data collected over a period of time possesses high utility as it is useful for multiple analytical, predictive and prescriptive tasks....
Article
Full-text available
Study of activities of daily life is gaining wide attention in today’s smart world powered by advanced sensing technologies. It is particularly significant in context of health applications useful for monitoring of elderly living alone and checking on patients in isolation or suffering from chronic diseases. Any significant deviation from an indivi...
Chapter
The vast benefits of Internet of Things (IoT) stem from the big data collected by the IoT devices. Currently, majority of this data is transferred to cloud-based servers where it is processed and analyzed for further actions. However, the transfer of the IoT big data to the cloud utilizes high network bandwidth and may also result in unacceptable r...
Chapter
A rise in gender equality and women empowerment has led to women striving for financial independence with a wide variety of career choices. It is commonplace to witness women as accomplished academicians, educationalists, industrialists and entrepreneurs. This paper presents some insights into work-life balance from the perspective of women working...
Article
Social media is one of the major outcomes of progressive changes in the world of technology. The various social webs and mobile technologies have accelerated the rate at which information sharing is done, how relationships developed, and influences are held. Social media is increasingly being used by t...
Chapter
A WSN consists of a large number of limited computation and storage capability wireless sensor nodes, which communicate wirelessly. These sensor nodes typical communicate in short range and collaborate to accomplish the network function. To increase the range of sensing and with the advent of MEMS, mobile sensors and sinks is the technology the wor...
Article
Full-text available
Cloud computing has brought about a transformation in the delivery model of information technology from a product to a service. It has enabled the availability of various software, platforms and infrastructural resources as scalable services on demand over the internet. However, the performance of cloud computing services is hampered due to their i...
Article
A WSN consists of a large number of limited computation and storage capability wireless sensor nodes, which communicate wirelessly. These sensor nodes typical communicate in short range and collaborate to accomplish the network function. To increase the range of sensing and with the advent of MEMS, mobile sensors and sinks is the technology the wor...
Article
The on-demand provisioning and resource availability in cloud computing make it ideal for executing scientific workflow applications. An application can start execution with a minimum number of resources and allocate further resources when required. However, workflow scheduling is a NP hard problem and therefore meta-heuristics based solutions have...
Conference Paper
The paper proposes two distributed algorithms for the construction of a connected dominating set (CDS) in a mobile ad hoc network. The CDS can be used as a virtual backbone for efficient communication in the ad hoc networks and consequently allow scalability of distributed algorithms implemented for these networks. The proposed algorithms organize...
Article
Mobile ad hoc networks (MANETs) are increasingly being employed for expanding the computing capabilities of existing cellular mobile systems and in the implementation of mobile computing grids. However, MANETs are susceptible to various transient as well as permanent failures and a fault tolerance technique is crucial in order to effectively utiliz...
Article
Full-text available
Mobile Ad hoc networks (MANETs) have significantly enhanced the wireless networks by eliminating the need for any fixed infrastructure. Hence, these are increasingly being used for expanding the computing capacity of existing networks or for implementation of autonomous mobile computing grids. However, the fragile nature of MANETs makes the constit...
Article
Heterogeneous networks provide an appealing way of expanding the computing capability of mobile networks by combining infrastructure-less mobile ad-hoc networks with the infrastructure-based cellular mobile networks. The nodes in such a network range from low-power nodes to macro base stations and thus, vary greatly in their capabilities such as co...
Article
The widespread availability and increasing processing power of mobile devices has lead to a focus towards the development of autonomous mobile computing grids (MoGs). Such mobile grids allow the successful execution of distributed applications; without access to any static nodes or wired networks. However, the implementation of a fault tolerance te...
Conference Paper
Mobile Grids (MoGs) are an emerging sphere in distributed computing and are expected to become a crucial part of computational Grids in future. Apart from allowing a convenient user access to the Grid, mobile hosts can act as valuable computing resources in the Grid. However, mobile hosts have limitations of resources such as stable storage, wirele...
Article
Distributed snapshots are a significant paradigm for distributed systems. These are applied for constructing checkpoint protocols, apart from investigating, testing, or proving properties in distributed executions such as deadlocks and termination. Though a number of snapshot algorithms exist for traditional distributed systems, they cannot be dire...
Article
Agile programming involves continually evolving requirements along with a possible change in their business value and an uncertainty in their time of development. This leads to the difficulty in adapting the release plans according to the response of the environment at each iteration step. This paper shows how a machine learning approach can suppor...

Network

Cited By