Papers by DRX MOHAN KUMAR
2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing
In this paper we present our system for online context recognition of multimodal sequences acquir... more In this paper we present our system for online context recognition of multimodal sequences acquired from multiple sensors. The system uses Dynamic lime Warping (D7W) to recognize multimodal sequences of different lengths, embedded in continuous data streams. We evaluate the performance of our system on two real world datasets: 1) accelerometer data acquired from performning two hand gestures and 2) NOKIA's benchmark dataset for context recognition. The results from both datasets demonstrate that the system can perform online context recognition efficiently and achieve high recognition accuracy.
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems - MSWiM '12, 2012
In opportunistic environments, tasks such as content sharing and service execution among remote d... more In opportunistic environments, tasks such as content sharing and service execution among remote devices are facilitated by relays (devices with short-range wireless connectivity) that receive data, move around, and then forward the data. To achieve high throughput, it is important to secure forwarding and provide incentives for participation by relays. However, it is extremely challenging to monitor the behavior of relays in an opportunistic network due to sparse connectivity. Existing schemes do not work when selfish/malicious relays collude with each other to forge routing metrics, drop useful data, flood the network, or earn extra reward. The credit scheme presented in this paper is the first in which routing as well as forwarding are incentive compatible. To design the scheme, the data transfer and loss in an opportunistic network are modeled as a non-linear generalized flow network. Then, optimality conditions for flow maximization describe the optimal behavior of a relay. This optimal behavior is made incentive compatible by requiring a relay to make a specific payment upon receiving the data and earn reward on forwarding the data. A cryptographic technique is used to make the scheme collusion resistant. Finally, a framework is proposed to implement CRISP in a completely distributed and opportunistic environment. Simulations on real and synthetic mobility traces validate a significant gain in throughput when compared with the existing credit schemes that are not incentive compatible.
The Indian journal of medical research, 2004
Patey mastectomy implies complete removal of breast tissue. Likely area where residual breast tis... more Patey mastectomy implies complete removal of breast tissue. Likely area where residual breast tissue may be left is under the skin flaps. There is no study examining left over breast tissue under the Patey mastectomy skin flap. The present study was undertaken to study the presence of residual breast tissue in skin flaps after Patey mastectomy in patients with breast cancer. In 37 patients of breast cancer undergoing Patey mastectomy, biopsy from under the skin flap at central point of 4 quadrants (upper outer, upper inner, lower inner and lower outer), 3 cm from cut margin of skin was taken to examine for residual breast tissue. In 8 of 37 (21.6%) cases residual breast tissue and in 3 of these (37.5%) tumour tissue was found under the skin flap. Overall in 21.6 per cent biopsies from under the skin flap revealed information of probable therapeutic importance. This information may in future serve as an additional prognostic factor to consider irradiation to reduce the incidence of l...
2008 Eighth International Conference on Peer-to-Peer Computing, 2008
In open environments, such as mobile peer-to-peer systems, participants may need to access resour... more In open environments, such as mobile peer-to-peer systems, participants may need to access resources from unknown users. A critical security concern in such systems is the access of faulty resources, thereby wasting the requester's time and energy and possibly causing damage to her system. A common approach to mitigating the problem involves reputation mechanisms; however, since reputation relies on cooperation, a reputation mechanism's effectiveness can be significantly diminished in hostile environments. Reputation systems also require substantial communication among peers leading to: i) vulnerability to errors caused by intermittent connectivity; ii) message delivery disruptions caused by malicious peers; and iii) energy sapping message overheads. In this paper, we present AREX, a low-cost, adaptive mechanism designed to provide security for peers in hostile and uncertain environments, which are common in mobile P2P systems. AREX features an adaptive exploration strategy that increases the system's utility for benign peers and decreases the system's utility for malicious peers. AREX reduces vulnerabilities and energy costs by operating without communication between peers. Through simulation, we demonstrate AREX's ability to reduce energy costs, protect benign peers, and diminish malicious peers' motivation to attack in a variety of hostile environments.
2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 2008
Abstract Support for intelligent, autonomous, adaptive and distributed resource management is a ... more Abstract Support for intelligent, autonomous, adaptive and distributed resource management is a key to the success of scalable and dynamic wireless sensor network applications. Distributed Independent Reinforcement Learning (DIRL) is a micro-learning framework that enables ...
2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, 2007
Abstract In wireless sensor networks, resource-constrained nodes are expected to operate in unatt... more Abstract In wireless sensor networks, resource-constrained nodes are expected to operate in unattended highly dynamic environments. Hence, the need for adaptive and autonomous resource/task management in wireless sensor networks is well recognized. We present ...
2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous), 2007
In recent years, ubiquitous computing applications span such areas as telemedicine, banking, and ... more In recent years, ubiquitous computing applications span such areas as telemedicine, banking, and transportation that require user privacy protection. The realization of contextaware ubiquitous computing exasperates existing privacy concerns. Ubiquitous computing applications demand new privacy enhancing technologies for the information and communication environments where the users are equipped with flexible and portable applications to support the capture, communication, recall, organization and reuse of diverse information. In this paper, we develop a novel scheme for the infusion of privacy into context-aware ubiquitous computing. We present Precision, a system for privacy enhanced context-aware information fusion in ubiquitous computing environments. In our scheme, privacy is defined as a set of parameters encapsulated in composite data entities called privons, through which, we aim at infusing privacy into Precision. We evaluate our proposed scheme through real interactions in implementation of privons.
Pervasive and Mobile Computing, 2009
Journal of Surgical Oncology, 2009
Genome study provides significant changes in the advancement of molecular diagnosis and treatment... more Genome study provides significant changes in the advancement of molecular diagnosis and treatment in Breast cancer. Several recent critical advances and high-throughput techniques identified the genomic trouble and dramatically accelerated the pace of research in preventing and curing this malignancy. Tumor-suppressor genes, proto-oncogenes, DNA-repair genes, carcinogen-metabolism genes are critically involved in progression of breast cancer. We reviewed imperative finding in breast genetics, ongoing work to segregate further susceptible genes, and preliminary studies on molecular profiling.
Journal of Parallel and Distributed Computing, 2009
Peer-to-peer (P2P) has become a mainstream architecture in numerous diverse distributed applicati... more Peer-to-peer (P2P) has become a mainstream architecture in numerous diverse distributed applications. However current P2P systems do not provide consistency guarantees under multiple reader multiple writer scenarios. Such a feature is desirable as well as necessary for supporting more diverse applications than merely file-sharing systems. In this paper, we develop a highly scalable and efficient algorithm, called Consistency Maintenance through Virtual servers (CMV), in P2P systems. In this algorithm, consistency of each dynamic file is maintained by a Virtual Server (VS). A file update can only be accepted through the VS to ensure one-copy serializability consistency. The VS of a file is a logical network composed of multiple Replica Peers (RPs) that have replicas of the file. Mathematical analysis is performed for optimal parameter selections that achieve minimum overhead messages for maintaining file consistency. Simulation experiments are conducted to compare the performance of the proposed CMV algorithm with two existing schemes, namely the rumor spreading based scheme and the Update Propagation Through Replica Chain (UPTReC) scheme. Our results show that CMV can quickly commit update to the system and significantly reduce (by more than 90%) overhead messages compared to these schemes under various system conditions.
Computer Communications, 2007
As more and more applications with dynamic files are introduced in peer-to-peer (P2P) systems, fi... more As more and more applications with dynamic files are introduced in peer-to-peer (P2P) systems, file consistency maintenance becomes important. In this paper, we propose a novel file consistency maintenance algorithm, called U pdate P ropagation T hrough Replica Chain (UPTReC), for decentralized and unstructured peer-to-peer (P2P) systems. UPTReC provides a probabilistically guaranteed file consistency. In UPTReC, each file has a logical replica chain composed of all replica peers (RPs) which is defined as a peer that has a replica of the file. Each RP acquires partial knowledge of the bi-directional chain by keeping a list of information about k nearest RPs in each direction. When an RP initiates an update, it pushes the update to all possible online (active) RPs through the replica chain. A reconnected RP pulls an online RP to synchronize the replica status and the chain information. An analytical model is derived to evaluate the performance of the UPTReC algorithm. The analytical results provide insights of the system design in choosing the parameters. Simulation experiments are conducted to compare the performance with an existing update propagation algorithm based on the rumor spreading scheme. The experimental results show that UPTReC can significantly reduce (up to 70%) overhead messages and also achieve smaller stale query ratio for files prone to frequent updates.
Asian Journal of Surgery, 2007
INTRODUCTION: We analysed the results of penis-preserving (conservative) treatment of early stage... more INTRODUCTION: We analysed the results of penis-preserving (conservative) treatment of early stage cancer of the penis with neodymium: yttrium-aluminium-garnet (Nd:YAG) laser with long-term followup in a developing country. METHODS: This was a retrospective study of 32 patients with cancer penis from 1993 to 2005 who were treated by Nd:YAG laser local excision and in situ coagulation of the tumour bed. RESULTS: Out of 32 patients who were treated with Nd:YAG laser, 25 had pT 1 and seven had pT 2 stage cancer penis. The median follow-up was 70 months (range, 6-120 months). Two had stopped attending the follow-up clinic after 6-12 months. Three patients had concurrent and six had delayed inguinal block dissection. There was no mortality but two (6.25%) patients developed recurrence in 48-60 months post laser excision. Penis was preserved in all 32 patients. All patients were satisfied with the cosmetic result. Eight patients practiced celibacy, in 23 sexual functions were normal and in one this information was not available. Micturition was in standing posture in all 32 patients. CONCLUSION: The result of this study shows that Nd:YAG laser treatment of early stage cancer penis has good local control with preservation of the penis.
Acta Crystallographica Section E Structure Reports Online, 2013
Acta Crystallographica Section E Structure Reports Online, 2012
Bond lengths and angles in the title compound (Fig. 1) have normal values (Allen et al., 1987) an... more Bond lengths and angles in the title compound (Fig. 1) have normal values (Allen et al., 1987) and are comparable with the similar crystal structures (Rodrigues et al., 2011; Akkurt et al., 2011; Kant et al., 2012). The molecule is twisted at the supporting information sup-9 Acta Cryst. (2012). E68, o3061 N1-H1•••O25 i 0.86 2.09 2.890 (4) 155 Symmetry code: (i) −x+3/2, y−1/2, −z+1/2.
Acta Crystallographica Section E Structure Reports Online, 2013
Journal of Evolution of medical and Dental Sciences, 2014
BACKGROUND: Thyroid abnormalities are common in chronic heart failure. Severity of heart failure ... more BACKGROUND: Thyroid abnormalities are common in chronic heart failure. Severity of heart failure rises by several fold in patients with thyroid dysfunction. OBJECTIVES: The purpose of this cross sectional comparative study is to determine the correlation between low T3 syndrome and chronic heart failure & predicting the severity of chronic heart failure. METHODS: In this descriptive, cross sectional study, all patients who presented to the Department of medicine with chronic heart failure during this study period of 12 months from January 2010-December 2011 in K.R.Hospital, Mysore were included. Patients were grouped into Low T3 chronic heart failure (10); hypothyroid chronic heart failure (29) and chronic heart failure (11) were included. RESULTS: Mean age of low T3 chronic heart failure patients was higher [60.50±6.15(SD) years], Higher number of hypertensives were seen in low T3 chronic heart rate patients, Cardiomyopathy was most common etiology for chronic heart failure patients (42%) and was common in the age group of 55-60 years (38%) in present study, idiopathic etiology was common in the age group of 60-65 years (63%), hypertensive heart disease as etiology was common with age group of 45-50 years (42.8%), IHD etiology was common with age group of 55-60 years (36.3%). Idiopathic etiology was common etiology with low T3 chronic heart rate patients (60%) and all patients was seen in the age group of 55-65 years. Mean pulse rate was higher in low T3 chronic heart failure group [104±6.9 (SD) beats/min]. Systolic blood pressure was high in low T3 chronic heart rate group [131±20.8 (SD) mm of Hg]; diastolic blood pressure was higher in low T3 chronic heart rate groups [84.6±12.4 (SD) mm of Hg]. S3 heart sound was present in more number of patients with low T3 chronic heart rate (60%), Systolic dysfunction on 2D Echo was more in low T3 chronic heart failure group (20%), Diastolic dysfunction on 2D Echo was more in low T3 chronic heart failure group (30%), Global hypokinesia was seen in more number of patients with low T3 chronic heart failure (30%).Segmental hypokinesia was seen in more number of patients with low T3 chronic heart failure (3%). Mean ejection fraction was seen in more number of patients with low T3 chronic heart failure [36.78±5.08 (SD) %].Mean ejection fraction was lower in low T3 chronic heart failure [34.8±3.293 (SD) %].The high pulmonary artery systolic pressure was seen in more number of patients in low T3 chronic heart failure (70%). CONCLUSION: There is significant percentage of chronic heart failure patients having low T3 alone as biochemical parameter. It is important to recognize patients with chronic heart failure as it is associated with increased severity of heart failure.
Uploads
Papers by DRX MOHAN KUMAR