Sumanth Yenduri’s research while affiliated with University of Southern Mississippi and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (33)


MEASURING CLASSIFICATION ACCURACIES USING IMPROVED THERMAL INFRARED DATA
  • Article

August 2014

·

2 Reads

International Journal of Computing

Venkateswarulu Cheruku

·

Sumanth Yenduri

·

S. S. Iyengar

Image classification is one of the major aspects in digital image analysis of remotely sensed data. In this paper, we present the effects on classification accuracy if improved thermal data are used instead of raw thermal data. We use two methods, Artificial Neural Networks (ANN) and Maximum Likelihood Approach (MLH) to demonstrate our purpose. Using each method different combinations of raw and improved data are tested to classify in order to compare the accuracies. As a final note, the findings are discussed.


Resilient Multi Sink Networks Using Simplistic Hop Based Routing

April 2014

·

28 Reads

·

4 Citations

In this paper, we demonstrate the use of a simplistic time based routing protocol called Simple Resilient Multi-hop Routing (SRMR) for a multi sink wireless sensor network (WSN). SRMR will allow the network to maximize efficiency by using a combination of performance metrics. For this simulation we will use the approximate distance measure based upon travel time of messages between sensor nodes. With multi sink architecture, we show efficient routing of data from the network to the closest sink based upon the selected metric. In doing so, we will be able to allow the network to become more resilient to network isolation, excess energy usage, and suboptimal throughput.


Auto-Testing AJAX-Based Web Applications

January 2013

·

59 Reads

International Journal of Applied Research on Information Technology and Computing

Asynchronous JAVASCRIPT and XML (AJAX)-based web applications (web apps) are different from traditional applications as they rely on stateful asynchronous communication and runtime manipulation of the DOM (document object model) tree. In this paper, we try to validate a method proposed by Mesbah et al. (2012) for testing AJAX applications automatically using two case studies. We try to identify AJAX-specific errors. Our goal is to replicate their experiment on two different web applications and comment on the performance of their approach. We use ‘Crawljax’ (designed by Mesbah et al.) to create a state-flow graph. First, we check the DOM validity for every state and, second, we check the navigation of the states. Finally, we present the results from our case studies.


A Parameterization Study of Short Read Assembly Using the Velvet Assembler

January 2012

·

10 Reads

Advances in Intelligent and Soft Computing

In this study, we examine approaches to the problem of assembling large, contiguous sections of genetic code from short reads generated from laboratory techniques. We explore the Eulerian Path approach in detail, utilizing a de Bruijn Graph, and demonstrate current software technologies and algorithms using a sample genome. We investigate the input parameters of Velvet and discuss their implications.


A Bayesian Network Riverine Model Study

December 2011

·

13 Reads

Lecture Notes in Computer Science

In this paper we apply a Bayesian Network Methodology to a riverine model study. We show that continuous variables, following Ebert-Uphoff's method, would improve this model, and we modify an existing share-ware Bayesian Network to simulate continuous variables. We also present a new metric for the Bayesian Network.


Figure 1: Sink Node Network View . 
Figure 2: Stage 1 CASS 
Figure 3: Stage 2 CASS 
Figure 4: Top View of CASS Example Network (Dashed lines Denote pathways). 
Figure 5: Stage 3 CASS (Dashed Lines Denote Pathways) 
To Shift or not To Shift: Maximizing the Efficiency of A Wireless Sensor Network
  • Article
  • Full-text available

October 2011

·

380 Reads

·

5 Citations

International Journal of Networked Computing and Advanced Information Management

Chabli Boler

·

Sumanth Yenduri

·

Wei Ding

·

[...]

·

John Harris

In this paper, we address the efficient utilization of a wireless sensor network (WSN) to improve the overall data throughput and to cut down the cost of running it. Sensor nodes closest to the sink node expend more energy as they send more routing messages, which decreases their life and introduces dead spots. Having dead spots will lead to the eventual isolation of the sink nodes from the network. We attempt to solve this problem by distributing multiple sink nodes. This will enable us to utilize the network at its maximal capacity as the sensor nodes start to die off. By adding multiple sink nodes, we will switch between them and choose the one that will yield optimal network coverage after the initial sink node is no longer viable to service or cannot service the network optimally. However, at any point of time, there will be only one active sink node. We will explore in three ways. First, we use a single sink node (with no switching) until it is isolated from the network. Second, we use a combination of highest percentage of network coverage combined with the highest areas of node density on the network to derive the optimal use of the network. We call this the Cluster Algorithm for Sink Selection (CASS). Finally, we try to keep the network optimal by switching to the sink node that is farthest from the current sink (assuming to gain the maximum network reach). We will analyze and discuss our findings with respect to the data through put and life of the network.

Download


Distributed First Stage Detection for Node Capture

December 2010

·

31 Reads

·

8 Citations

The node capture attack on wireless sensor networks (WSNs) can be broken into three stages: node capture, node redeployment, and insider attacks. Existing detection techniques of the attack are mostly implemented in the second stage. Recent discovery proved the feasibility of quick and effective detection in the first stage. We propose a hello message based first stage detection scheme, which is faster, easier to execute, and more reliable than existing approaches. Two implementations FSD and SEFSD are provided. FSD is completely decentralized. SEFSD utilizes the base station to achieve energy efficiency and better security. Simulation shows the scheme outperforms existing techniques while illustrating SEFSD outperforms FSD in terms of message and energy overhead.


Energy saving by centralized sleep in early detection of captured nodes

October 2010

·

11 Reads

·

1 Citation

We have previously shown that the first stage scheme is effective in the detection of physical capture attacks in wireless sensor networks. Like most existing detection schemes, our scheme relies upon message passing. Regular message passing consumes considerable energy. In this paper the first stage scheme is integrated with a novel sleep/wakeup mechanism, which is completely pre-scheduled based upon a node's internal clock. The scheduling tolerates minor clock alignment errors, so no frequent synchronization is needed. In addition, a sink-based dissemination technique is adopted, which replaces frequent and overlapped flooding of many regular nodes with sparse sink-triggered flooding. The adoption further saves energy expense. A LDCFSD protocol has been implemented in simulation. Simulation results have confirmed above conclusion.


First stage detection of compromised nodes in sensor networks

March 2010

·

81 Reads

·

13 Citations

The node capture attack in wireless sensor networks (WSNs) can be decomposed into three stages: physically capture of node, redeployment of compromised node, and rejoin the network for various insider attacks. A well accepted belief - that the physical capture is easy to implement and that its detection is difficult - has directed majority of research effort to defense in stages three and two. The belief was recently proved false [4]. The discovery made first stage detection an attractive tactic. This paper proposes a new approach to detect the attack at the first stage. The detection is based upon the discovery of missing and malfunction of nodes due to the physical capture. The approach is simple, reliable, energy-efficient, completely local, and completely distributed. It can be used along with other approaches at stages two and three. Hence it could be employed in wide range of applications. In simulation we compare our proposal to one of latest successful research in the area. [2] Simulation results have proved that our approach is more effective and more efficient for in detection of node capture attacks.


Citations (13)


... For modeling an unpredictable situation like Urban traffic system it is not always possible to simulate by assuming certain conditions that are normally considered as "Ideal". These limitations of petrinet can be resolved by introducing fuzziness (Yenduri, Perkins & Sarder, 2007) in its outcome. Any IF THEN (Knybel, 2005), rule of the previous function can be defined by the help of petrinet as : ...

Reference:

Formal Verification of Urban Traffic System Using the Concept of Fuzzy Workflow Simulation
An Analysis of the D Programming Language

Journal of International Technology and Information Management

... Several nodes with larger weight are selected as RP points, and the shortest path of sink node traversing all RP points is calculated based on traveling salesman theory. By analyzing the forwarding hops and estimating the transmission time, Boler and Yenduri et al. [16] designed a simplistic hop resilient multi-sink routing protocol to generate the routing table by forwarding hops and estimating transmission time to improve energy utilization. Wang et al. [17] partitioned the whole network into several sub-domains with virtual grids, and presented an intelligent data gathering scheme with data fusion based on a neural network to improve network performance. ...

Resilient Multi Sink Networks Using Simplistic Hop Based Routing
  • Citing Conference Paper
  • April 2014

... To reduce the sink maintenance cost without traffic congestion [ 9] comes with the Cluster-based Algorithm for Sink Selection (CASS) model to shift the sink among multiple sinks which means deploying multiple sinks but activating a single sink based on the network reach-ability to the sink. The sink with the highest network reach will be the next active sink. ...

To Shift or not To Shift: Maximizing the Efficiency of A Wireless Sensor Network

International Journal of Networked Computing and Advanced Information Management

... Solutions for early node compromise detection are based on distributed monitoring of neighbouring nodes' aliveness. In these solutions, nodes regularly send notification messages (usually called Heartbeat [2], Beacon [3], or Hello [4], [5] messages) to their one-hop neighbors to prove that they are alive (not being captured). If no message is received from a node (i.e., if a node is not heard) for a certain period of time, then the unheard node is said to have been compromised. ...

Distributed First Stage Detection for Node Capture
  • Citing Article
  • December 2010

... Stemming applied on all words reduces the overall performance, because each inflected form can express different perceptions and is related to different concepts, as discussed by Lemaire (2009) andWiemer-Hastings andZipitria (2001). Part-of-speech tagging is an additional consideration, but is of debatable value (Rishel, Perkins, Yenduri, & Zand, 2006;Wiemer-Hastings & Zipitria, 2001). Behav Res frequently used alternative. ...

Augmentation of a Term/Document Matrix with Part-of- Speech Tags to Improve Accuracy of Latent Semantic Analysis

... There are N = log 2 M simple binary questions to be answered by each worker, where we consider that the binary questions are independent of each other and are of the same difficulty. For each of the questions, the worker can either provide a definitive answer "1" (Yes) / "0" (No) [15], [42], or has a reject option to skip the question, where a skipped answer is denoted as λ. Let a w represent the N -bit word that contains the wth worker's ordered answers to all the microtasks, where a w (i) ∈ {1, 0, λ} for i = 1, . . . ...

Paper-based dichotomous key to computer based application for biological indentification
  • Citing Article
  • January 2007

Journal of Computing Sciences in Colleges

... Moreover, Reference [32] proposes a data-driven simulation method using Arena to automatically model an automotive general assembly plant and rapidly update the model based on dynamic requirements and real-time information. Besides, examples of studies of manufacturing problems using other simulation software such as WITNESS and VisualSim can be found in References [33][34][35][36][37]. ...

Production Design by Simulation Software “Witness” – A Case Study
  • Citing Conference Paper
  • May 2009

... Thus, the difficulty in adopting various security mechanisms or techniques designed for 802.11 networks. Node-capture attacks in WSN can be divided into three stages namely, physical capture of node, redeployment of compromised node and finally rejoining the network for various insider attacks [3]. The first stage was rarely focused on because of the hypothetical belief that physical capture was " easy " to carry out and difficult to detect. ...

First stage detection of compromised nodes in sensor networks
  • Citing Conference Paper
  • March 2010

... Additionally, Janzen and Saiedian [5], Causevic, et al. [10], and Lemos, et al. [18] have also conducted series of experiments to compare the quality of code produced using Test First model with those produced using a more traditional method. Nevertheless, from all of the above-mentioned studies, only research carried out by Pančur and Ciglarič [6], Yenduri and Perkins [19], Madeyski [20] and Janzen and Saiedian [5] clearly explained in detail about the models that they introduced in their research. ...

Impact of Using Test-Driven Development: A Case Study.