About
94
Publications
113,668
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,775
Citations
Publications
Publications (94)
Optimal task allocation in Large-Scale Computing Systems (LSCSs) that endeavors to balance the load across limited computing resources is considered an
NP-hard problem. MinMin algorithm is one of the most widely used heuristic for scheduling tasks on limited computing resources. The MinMin minimizes
makespan compared to other algorithms, such as He...
Data centre Ethernet (DCE) is a budding research area that has received considerable attention from the ICT sector. The traditional DCEs are considered unreliable despite being widely used in modern day data centres. In Ethernet intermediate layer 2 switching devices, the outgoing traffic is faster than the incoming traffic and therefore results in...
Minimizing energy consumption and network load is a major challenge for network-on-chip (NoC) based multi-processor systems-on-chip (MPSoCs). Efficient task and core mapping can greatly reduce the overall energy consumption and communication overhead among the interdependent tasks. In this paper, we propose a novel Knapsack based bin packing algori...
Multimode capability empowers mobile devices to select the appropriate network to meet the requirements of user and applications. However, network selection is a challenging task owing to heterogeneous nature of network access links. At the same time, pervasiveness of mobile communication networks accompanied by the advances in wireless devices has...
Application performance of video-based services for public safety and security (PSS) systems is of high importance in order to protect citizens, organizations, and institutions against threats to their well-being. Video based services help PSS personnel to efficiently perform their rescue operations. Real-time video streaming of incident-based serv...
Energy estimation of applications helps developers greening the smartphone- and Internet-of-Things-based devices. Traditional energy estimation schemes consider smartphone component’s power measurement or code analysis methods for energy estimation of applications. The existing code analysis method considers the energy cost of software operations t...
Fog and Mobile Edge Computing (FMEC) is a paradigm that augments resource-scarce mobile devices with resource-rich network servers to enable ubiquitous computing. Smartphone applications rely on code offloading techniques to leverage high-performance computing opportunities available on edge and cloud servers for compute-intensive applications. Mob...
Cloud computing provides online services to customers using pay as you go model. Cloud computing enables customers to outsource the large and complex tasks to the cloud data centers for the execution and result generations. Cloud data centers host the incoming tasks by providing resources, such as CPU, RAM, storage, and bandwidth. As the large data...
Internet of Things: Challenges, Advances, and Applications provides a comprehensive introduction to IoT, related technologies, and common issues in the adoption of IoT on a large scale. It surveys recent technological advances and novel solutions for challenges in the IoT environment. Moreover, it provides detailed discussion of the utilization of...
Smartphones are computationally constrained compared
to server devices due to their size and limited battery based
power. Compute-intensive tasks are often offloaded from smartphones
to high-performance computing opportunities provided
by nearby high-end cloud and edge servers. ARM architectures
dominate smartphones while x86 dominate server device...
Inadequate and inappropriate intake of food is known to cause various health issues and diseases. Due to lack of concise information about healthy diet, people have to rely on medicines instead of taking preventive measures in food intake. Due to diversity in food components and large number of dietary sources, it is challenging to perform real-tim...
Recent advances in chip design and integration technologies have led to the development of Single-Chip Cloud computers which are a microcosm of cloud datacenters. Those computers are based on Network-on-Chip (NoC) architectures with deep memory hierarchies. Developing scheduling algorithms to reduce data access latency as well as energy consumption...
There are various algorithms that are designed to satisfy the needs of high performance applications and exhaustive workflows in large-scale computing systems. This work analyzes the impact of optimizing the key performance parameters, such as makespan, power consumption, and resource utilization. Five state of the art heuristics are simulated util...
Recent advancements in location-based recommendation system (LBRS) and the availability of online applications, such as Twitter, Instagram, Foursquare, Path, and Facebook have introduced new research challenges in the area of LBRS. Use of content, such as geo-tagged media, point location-based, and trajectory-based information help in connecting th...
Network congestion poses significant impact on application performance and network throughput in Network-on-Chip (NoC) based systems. Efficient core mapping can significantly reduce the network contention and end-to-end latency leading to improved application performance in NoC based multicore systems. In this work, we propose a Congestion-Aware (C...
In the last decade, the rising trend in the popularity of smartphones motivated software developers to increase application functionality. However, increasing application functionality demands extra power budget that as a result, decreases smartphone battery lifetime. Optimizing energy critical sections of an application creates an opportunity to i...
A number of resource-intensive applications, such as augmented reality, natural language processing, object recognition, and multimedia-based software are pushing the computational and energy boundaries of smartphones. Cloud-based services augment the resource-scare capabilities of smartphones while offloading compute-intensive methods to resource-...
The last decade witnessed a tremendous increase in popularity and usage of social network services, such as Facebook, Twitter, and YouTube. Moreover, advances in Web technologies coupled with social networks has enabled users to not only access, but also generate, content in many forms. The overwhelming amount of produced content and resulting netw...
Delay Tolerant Networks (DTN) are deployed to establish communications in challenging environments with frequent disruptions and delays due to intermittently connecting nodes, such as sparsely distributed wireless sensor networks and mobile ad hoc networks. Routing in such networks is difficult as nodes have little information about the state of th...
Cloud computing has emerged as the leading paradigm for information technology businesses. Cloud computing provides a platform to manage and deliver computing services around the world over the Internet. Cloud services have helped businesses utilize computing services on demand with no upfront investments. The cloud computing paradigm has sustained...
Recent growth in the processing and memory resources of mobile devices has fueled research within the field of mobile virtualization. Mobile virtualization enables multiple persona on a single mobile device by hosting heterogeneous operating systems concurrently. However, adding a virtualization layer to resource constrained mobile devices with rea...
Mobile cloud computing presents an effective solution to overcome smartphone constraints, such as limited computational power, storage, and energy. As the traditional mobile application development models do not support computation offloading, mobile cloud computing requires novel application development models that can facilitate the development o...
Virtualization efficiently manages the ever-increasing demand for storage, computing, and networking resources in large-scale Cloud Data Centers. Virtualization attains multifarious resource management objectives including proactive server maintenance, load balancing, pervasive service availability, power management, and fault tolerance by virtual...
Efficiency of Network-on-Chip (NoC) based multi-processor systems largely depends on optimal placement of tasks onto processing elements (PEs). Although number of task mapping heuristics have been proposed in literature, selecting best technique for a given environment remains a challenging problem. Keeping in view the fact that comparisons in orig...
Data centers constitute the foundations of cloud computing. Increased adoption of cloud computing in various sectors of life necessitates the data center growth. Cloud providers are facing numerous challenges in data centers design and operation. This chapter presents the modeling and simulation of the major data center network architectures using...
In recent years, significant advancement in the wireless communication technologies, such as Bluetooth, 802.11/WiFi, and ZigBee, has been seen in mobile ad hoc networks (MANETs). Such technologies enable mobile devices to form on-the-fly data centers where nodes opportunistically participate in data storage and sharing applications. In such a setup...
In this survey, we review different text mining techniques to discover various textual patterns from the social networking sites. Social network applications create opportunities to establish interaction among people leading to mutual learning and sharing of valuable knowledge, such as chat, comments, and discussion boards. Data in social networkin...
As we delve deeper into the ‘Digital Age’, we witness an explosive growth in the volume, velocity, and variety of the data available on the Internet. For example, in 2012 about 2.5 quintillion bytes of data was created on a daily basis that originated from myriad of sources and applications including mobile devices, sensors, individual archives, so...
Virtualization is generally adopted in server and desktop environments to provide for fault tolerance, resource management, and energy efficiency. Virtualization enables parallel execution of multiple operating systems (OSs) while sharing the hardware resources. Virtualization was previously not deemed as feasible technology for mobile and embedded...
For the last few years, academia and research organizations are continuously investigating and resolving the security and privacy issues of mobile cloud computing environment. The additional consideration in designing security services for mobile cloud computing environment should be the resource-constrained mobile devices. The execution of computa...
Over the last few years, vehicular ad hoc networks (VANETs) have gained popularity for their interesting applications. To make efficient routing decisions, VANET routing protocols require road traffic density information for which they use density estimation schemes. This paper presents a distributed mechanism for road vehicular density estimation...
This paper presents a novel position-based routing protocol for vehicular ad hoc networks (VANETs) to enhance traffic safety and traffic organization and facilitate driving through a smart transportation system. The protocol is referred to as the traffic flow-oriented routing (TFOR) protocol for VANETs. It considers a real-time urban scenario with...
Due to the limited computational capability of mobile devices, the research organization and academia are working on computationally secure schemes that have capability for offloading the computational intensive data access operations on the cloud/trusted entity for execution. Most of the existing security schemes, such as proxy re-encryption, mana...
Mobile cloud computing is an emerging technology that is gaining popularity as a means to extend the capabilities of resource-constrained mobile devices such as a smartphone. Mobile cloud computing requires specialized application development models that support computation offloading from a mobile device to the cloud. The computation offloading is...
The information and communication technology (ICT) sector has grown exponentially in the recent years. An essential component of the ICT organizations is constituted by the data centers that are densely populated with redun-dant servers and communicational links to ensure the pro-vision of 99.99 % availability of services; a fact responsi-ble for t...
This paper presents a comparison of cluster-based position and non position-based routing protocols for mobile wireless sensor networks to outline design considerations of protocols for mobile environments. The selected protocols are compared on the basis of multiple parameters, which include packet delivery ratio, packet loss, network lifetime, an...
Smartphones are now capable of supporting a wide range of applications, many of which demand an ever increasing computational power. This poses a challenge because smartphones are resource-constrained devices with limited computation power, memory, storage, and energy. Fortunately, the cloud computing technology offers virtually unlimited dynamic r...
To improve the resource limitation of mobile devices, mobile users may utilize cloud-computational and storage services. Although the utilization of the cloud services improves the processing and storage capacity of mobile devices, the migration of confidential information on untrusted cloud raises security and privacy issues. Considering the secur...
The social computing, such as social networking services (SNSs) and social Networking Platforms (SNPs) provide a coherent medium through which people can be interactive and socialize. The SNP is a Web-based social space, specifically designed for end user-driven applications that facilitate communication, collaboration and sharing of the knowledge...
Data-aware scheduling in today's large-scale computing systems has become a major complex research issue. This problem becomes even more challenging when data is stored and accessed from many highly distributed servers and energy-efficiency is treated as a main scheduling objective. In this paper we approach the independent batch scheduling in grid...
Opportunistic routing is an emerging research area in Wireless Mesh Networks (WMNs), that exploits the broadcast nature of wireless networks to find the optimal routing solution that maximizes throughput and minimizes packet loss. Opportunistic routing protocols mainly suffer from computational overheads, as most of the protocols try to find the be...
With the mushroom growth of state-of-the-art digital image and video manipulations tools, establishing the authenticity of multimedia content has become a challenging issue. Digital image forensics is an increasingly growing research field that symbolises a never ending struggle against forgery and tampering. This survey attempts to cover the blind...
While using the cloud storage services on resource constraint mobile device, the mobile user needs to ensure the confidentiality of the critical data before uploading on the cloud storage. The resource limitation of mobile devices restricts mobile users for executing complex security operations using computational power of mobile devices. To make s...
SUMMARY Data centers are experiencing a remarkable growth in the number of interconnected servers. Being one of the foremost data center design concerns, network infrastructure plays a pivotal role in the initial capital investment and ascertaining the performance parameters for the data center. Legacy data center network (DCN) infrastructure lacks...
Wireless sensor networks (WSNs) are emerging as useful technology for information extraction from the surrounding environment by using numerous small-sized sensor nodes that are mostly deployed in sensitive, unattended, and (sometimes) hostile territories. Traditional cryptographic approaches are widely used to provide security in WSN. However, bec...
In this paper, we present a load-balancing strategy (Adaptive Load Balancing strategy) for data parallel applications to balance the work load effectively on a distributed system. We study its impact on computation-hungry matrix multiplication application. The ALB strategy enhances the performance with features such as intelligent node selection, p...
Energy consumption of the Information and Communication Technology (ICT) sector has grown exponentially in recent years. A major component of the today’s ICT is constituted by the data centers which have experienced an unprecedented growth in their size and population, recently. The Internet giants like Google, IBM and Microsoft house large data ce...
An optimization of power and energy consumptions is the important concern for a design of modern-day and future computing and communication systems. Various techniques and high performance technologies have been investigated and developed for an efficient management of such systems. All these technologies should be able to provide good performance...
The Information and Communication Technology sector is considered to be a major consumer of energy and has become an active participant in Green House Gas emissions. Lots of efforts have been devoted to make network infrastructure and network protocols power-aware and green. Among these efforts, Adaptive Link Rate (ALR) is one of the most widely di...
In this paper we present a performance evaluation study of three fundamentally different ad-hoc routing protocols using different mobility patterns with special focus on three well-known performance metrics, namely the throughput, the end-to-end delay, and the packet loss. Simulations study is carried out in a standard simulator that provides the s...
Wireless mesh networks (WMNs) have gained considerable popularity in recent times thanks to their self-healing, self-organizing, and self-configuring nature. Because of their ability to provide high throughput and minimum packet delay, WMNs are considered to be favorable for broadband applications. For such applications, WMNs employ multiple channe...
Data Centers (DCs) are experiencing a tremendous growth in the number of hosted servers. Aggregate bandwidth requirement is a major bottleneck to data center performance. New Data Center Network (DCN) architectures are proposed to handle different challenges faced by current DCN architecture. In this paper we have implemented and simulated two prom...
In a Delay Tolerant Network (DTN), the nodes have intermittent connectivity and complete path(s) between the source and destination may not exist. The communication takes place opportunistically when any two nodes enter the effective range. One of the major challenges in DTNs is message forwarding when a sender must select a best neighbor that has...
This paper presents two new routing protocols for mobile sensor networks, viz. power-controlled routing (PCR) and its enhanced version, i.e. Enhanced Power-Controlled Routing (EPCR). In both the protocols, fixed transmission power is employed in the clustering phase but when ordinary nodes are about to send their data to their respective cluster-he...
Load balancing and task partitioning are important components of distributed computing. The optimum performance from the distributed
computing system is achieved by using effective scheduling and load balancing strategy. Researchers have well explored CPU,
memory, and I/O-intensive tasks scheduling, and load balancing techniques. But one of the mai...
Electron diffraction provides useful information about the internal composition of materials and has been in the use of material scientists for more than fifty years. In order to extract useful information from offline diffraction images, they are manually analyzed by using some photometric technique. Manual analysis is however a cumbersome, labori...
Mobilecloud computing is gaining popularity among mobile users. The ABI Research predicts that the number of mobilecloud computing subscribers is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2014. Despite the hype achieved by mobilecloud computing, the growth of mobilecloud co...
Distributed Cyber Physical Systems (DCPSs) are networks of computing systems that utilize information from their physical surroundings to provide important services, such as smart health, energy efficient grid and cloud computing, and smart security-aware grids. Ensuring the energy efficiency, thermal safety, and long term uninterrupted computing o...
One of the most important objectives of a wireless network is to facilitate a prediction of users' mobility regard- less of their point of attachment to the network. In indoor environments the effective users' motion prediction system and wireless localization technology play an important role in all aspects of people's daily lives. In this paper w...
We present a sleep/wake schedule protocol for minimizing end-to-end delay for event driven multi-hop wireless sensor networks. In contrast to generic sleep/wake scheduling schemes, our proposed algorithm performs scheduling that is dependent on traffic loads. Nodes adapt their sleep/wake schedule based on traffic loads in response to three importan...
This paper presents a distributed grid based robust clustering protocol for mobile wireless sensor networks. An overwhelming majority of current research on sensor network routing protocols considers static networks only, while we consider mobile environment. grid based robust clustering is a distributed location based, energy aware clustering prot...
Routing in infrastructure less vehicular ad hoc networks is challenging because of the dynamic network, predictable topology, high speed of nodes, and predictable mobility patterns. This paper presents an enhanced routing protocol specifically designed for city environments. It uses vehicular speed and directional density for dynamic junction selec...