Profile
  Facilities , Lab ,etc
  Library
  Courses
  Research
  Annual Report
  Seminars and Events
  Services
  Academic Staff
  Administrative Staff
  Photo Gallery
  Alumni

Science > Department of Computer science


Research papers

Following are the research papers published from the department:

1) Evolution Induced Secondary Immunity: An Artificial Immune System based Intrusion Detection System 

Authors: Divyata Dal, Siby Abraham, Ajith Abraham, Sugata Sanyal and Mukund Sanglikar 

Abstract: The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes a technique of applying Artificial Immune System along with Genetic algorithm to develop an Intrusion Detection System. Far from developing Primary Immune Response, as most of the related works do, it attempts to evolve this Primary Immune Response to a Secondary Immune Response using the concept of memory cells prevalent in Natural Immune Systems. A Genetic Algorithm using genetic operators- selection, cloning, crossover and mutation- facilitates this. Memory cells formed enable faster detection of already encountered attacks. These memory cells, being highly random in nature, are dependent on the evolution of the detectors and guarantee greater immunity from anomalies and attacks. The fact that the whole procedure is enveloped in the concepts of Approximate Binding and Memory Cells of lightweight of Natural Immune Systems makes this system reliable, robust and quick responding

 

2) Finding numerical solution to a Diophantine Equation:simulated annealing as a viable search strategy 

Authors: Siby Abraham ,  Mukund Sanglikar  

Abstract: This paper introduces Simulated Annealing as a viable informed search strategy to find numerical solutions to Diophantine Equations, for which there exists no general method of finding solutions. The methodology proposed uses a tried and tested heuristic as the energy function to guide the search process. It behaves like a typical steepest valley descending till it reaches states facing only worse states as possible successors. Then the difference in heuristic function values of the current state and the candidate successor state is taken as the energy difference (ΔE). The heuristic function value of the initial state is taken as the time-varying parameter ‘Temperature’ (T), which is reduced gradually using a domain dependent annealing schedule. Here, the transition from a current state to a successor state depends on the satisfaction of the probability condition e - (ΔE / T). Experimental results performed on Diophantine Equations of varied types validate the effectiveness of the procedure.

 

3) Solution to Diophantine Equation: A Genetic Algorithm Application 

Authors: Siby Abraham ,  Mukund Sanglikar  

Abstract:  This paper attempts to develop a Diophantine Equation Solver using Genetic Algorithm. It shows how the directed random search procedure of Genetic Algorithm (GA) reduces the search procedure substantially and comes to a solution. The GA developed in this paper obtains quick solutions to the general diophantine equation given by f(a1, a2, ……., an,x1,x2,…….,xk)=N, where ai and N are integers. A chromosome is represented by integers within the supplied range of values. The evolution process is carried out by generating off-springs using genetic operators - mutation and crossover - on a population of five chromosomes. The pure random selection of these operators and subsequent random exchange of genes, in case of mutation or swapping of genes from the randomly generated crossover point onwards, in case of crossover results in diverse nature of chromosomes in the evolution process. In order to overcome plateau and reduce premature convergence in the fitness landscape, we apply biological concept of host-parasite co-evolution. The evaluation function constructed acts as an automatically defined function, which restricts the occurrence of unwanted and already tested chromosomes. The GA developed offers solutions to a diophantine equation within a given range. The methodology also offers an option to switch over to a new initial population of chromosomes when the existing population becomes obsolete.

 

4) Nature’s way of Avoiding Premature Convergence: A case study of Diophantine Equations 

Authors: Siby Abraham ,  Mukund Sanglikar  

Abstract: This paper proposes natural phenomenon of Host Parasite Co-Evolution as a strategy to avoid premature convergence in the fitness landscape of a Genetic Algorithm developed to find numerical solutions to diophantine equations given by

f(a1, a2, a3, …, an, x1, x2, x3,…, xn) = N where a i and N are integers.

The procedure described avoids the occurrence of local hilltops as premature converging points in the search space of the GA developed. It uses selection, inversion and crossover as genetic operators. As the genetic process is evolved, the procedure gets converged prematurely. These premature converging points are taken as attacks by parasites. The candidate solutions are trained to be defensive to these attacks using a composite evaluation function. The parasites, in turn, develop new attacks in the form of creating new converging points. This continuous process of avoidance by hosts and attacks by parasites reciprocally induce evolution. The pressure of this evolving attacks and counter attacks works effectively as a powerful optimization tool and hence directs the procedure to discover a solution by generating untested, diverse and fresh candidates. The paper tries to establish statistically the diversity of attacks of parasites as it happens in nature. It also attempts to demonstrate the inherent relation between number of attacks by parasites and number of generations produced irrespective of the degree of the equation and the number of variables used.

 

5) Finding Solution to a Hard Problem: An Evolutionary and Coevolutionary Approach  

Authors: Siby Abraham, Mukund Sanglikar  

 Abstract: This paper introduces a strategy, which uses Genetic Algorithm as an evolutionary technique and Competitive Two-population Co-evolution as a co-evolutionary technique for finding a solution to a hard problem. The strategy is applied to find numerical solution to a Diophantine Equation, for which there does not exist a method to solve. The GA uses selection, inversion and crossover as genetic operators and helps to undergo evolution on a population of twenty-five chromosomes. The local optimum points encountered in the fitness landscape during the evolution are tackled using Competitive Two-population Co-evolution by creating populations of local optimum points and fitness values of new untested and fit chromosomes. The paper shows that the strategy is continuous, random, evolutionary and adaptive in nature and is open to the concept of introduction of a fresh population in the rare event that the present population looses its diversity and hence becomes obsolete

 

6)  Particle swarm optimisation based Diophantine equation solver 

Authors:Siby Abraham ,  Sugata Sanyal, Mukund Sanglikar  

Abstract: The paper introduces particle swarm optimization as a viable strategy to find numerical solution of Diophantine equation, for which there exists no general method of finding solutions. The proposed methodology uses a population of integer particles. The candidate solutions in the feasible space are optimized to have better positions through particle best and global best positions. The methodology, which follows fully connected neighbourhood topology, can offer many solutions of such equations. 

 

7) Defect-based Reliability Analysis Model for Business Systems      Deployed on a large Scale

Authors: Nita Sarang, Mukund A. Sanglikar 

Abstract: Quality of software releases is paramount in business systems deployed on a large-scale. As the deployed software systems grow in functionality, the software maintenance task becomes increasingly complex; maintaining quality control over the life of the software is a challenge. We undertake an analysis of defect data from two product-lines in a specific business domain. We use hypothesis testing to understand the underlying software maintenance process and establish the defect models. The defect models are used to define an optimal level of testing that meets the software reliability requirements. 

 

8) An Analysis of Effort Variance in Software Maintenance Projects

Authors: Nita Sarang, Mukund A. Sanglikar 

Abstract: Quantitative project management, understanding process variations and improving overall process capability, are fundamental aspects of process improvements and are now strongly propagated by all best-practice models of process improvement. Organizations are moving to the next level of quantitative management where empirical methods are used to establish process predictability, thus enabling better project planning and management. In this paper we use empirical methods to analyze Effort Variance in software maintenance projects. The Effort Variance model established was used to identify process improvements and baseline performance.

 

 

9) Computational Diagnosis of Learning Disability 

Authors: Kavita Jain, Pooja Manghirmalani, Jyotshna Dongardive and Siby Abraham  

Abstract:  The paper proposes a perceptron based artificial neural   network model for diagnosing learning disability using curriculum based test conducted by special educators in medical environment. The model comprises of a single input layer with eleven units which correspond to different sections of a conventional test and one output unit. The method is not only devoid of typical computational complexity and sophistication associated with other methods but gives comparable experimental results on detection measures like accuracy, sensitivity and specificity.

 

10) Building Consensus of Human Papillomavirus using Genetic Algorithm

Authors Aditya Bir, Jyotsna Dongerdive, Suruchi Jamkhedkar, Siby Abraham.

Abstract: The paper introduces novel three tier architecture to
build consensus of Human Papillomavirus (HPV). The proposed procedure is based on simulation and uses all complete genomic DNA sequences of registered HPV strains available in NCBI GenBank. It uses the multiple sequence alignment tool Clustal X to align these sequences.  Genetic Algorithm (GA) is used to evolve an optimized population of complete genomic DNA sequences. The GA, which uses domain specific genetic operators like migration, rank selection, mutation and crossover, adopts a novel methodology in defining the fitness function. A modified approach of the Weight Matrix Algorithm is applied on the optimized and evolved population to find a consensus of HPV. The effectiveness of the procedure is validated with experimental results.

 

11) Finding Motifs Using Harmony Search

Authors Jyotsna Dongerdive, Aarti Patil, Aditya Bir, Suruchi Jamkhedkar, Siby Abraham. 

Abstract:  The paper proposes a novel methodology for finding motifs of biological sequences. It uses music inspired meta-heuristic optimization technique called harmony search to find Motif. The model is based on randomly generated l-mers as the initial harmony memory. Pitch adjustment and random selection are used to generate new l-mers, which are adjudged by a defined objective function. The proposed method is experimentally validated using sequences of Human Papillomavirus strains obtained from accredited and authorized sources.

 

12) Envelope Model: Data Access from any where 

Authors Sushil Kulkarni  

Abstract In this paper, a definition of mobile database and mobile transaction with illustrations from spatial and temporal databases are given. Corresponding to mobile transaction mobile query is defined. New model called Envelope model is presented to execute a mobile query using various base stations of the closed spheres. A mobile query is defined as the union of jumping queries and contains only one unary or binary operator operating on database. A mobile transaction is the union of jumping transactions where each jumping transaction is the unit of execution at the base station. The jumping condition is checked prior to the starting of each jumping query at the base station. This model is implemented using developed environment called Data Invoking Capsule. It is located at every base station and its main job is to transfer the messages from one base station to another, executing jumping queries and storing envelopes. A mobile unit makes a request to execute mobile query to base station called initializer, who creates a basket that store jumping query number and the directed parse tree. This basket is carried by the mobile unit till mobile query is completely executed. Directed parse tree is created by an initalizer using parse tree. It gives guidelines for execution of jumping query at the respective base stations. After the jumping query is executed an envelope is created, that store jumping query number and the result obtained by executing jumping query. Envelope flies from one base station to another as required by another base station for executing next jumping query under the guidelines of directed parse tree. Every base station may not have the required database on which jumping query is executed so the method is proposed to execute it. Algorithms for creating directed parse tree and an envelope model are provided. Parallel execution of jumping transaction at a base station is also discussed. Envelope model for mobile transaction is introduced.

 

13) Spatio-Temporal Schema Model and Carrie and Courier mobile query processor for Spatio-Temporal database 

Authors Sushil Kulkarni, Dr. M.A. Sangalikar  

Abstract:  Geographical Information Systems and their underlying support, spatio-temporal database systems, deal with data related to changes in geographical space according to time. The space of interest is two dimensional abstraction of the surface of the earth and the change of attribute instances related to it. In this paper, we propose Y- schema, which will enable to handle spatio-temporal data. Also we know that in urban area, mobile users are increasing day by day and there is a demand of retrieving, manipulating spatio-temporal data. Here we are proposing a query processor called Carrier and Courier processor to handle the spatio-temporal mobile queries.

 

13) Envelope Transaction Mobile Model 

Authors Sushil Kulkarni, Dr. M.A. Sangalikar  

Abstract:  A long lived mobile transaction is divided into different sub-transactions called jumping transactions. The proposed model explains the commit of jumping transaction at the server or at mobile unit. Model takes care of disconnection because of jumping nature of mobile unit. This model relaxes isolation property using intension commit of jumping transaction.

 

14) Lock Mechanism for a cluster of peers 

Authors Sushil Kulkarni, Dr. M.A. Sangalikar  

Abstract:  A new approach for caching data objects and locks by a centroid from a server in a cluster of peers using ad hoc transactions is presented. A cluster of peers is formed by a set of mobile hosts, which are clustered around a single mobile host called a centroid. A set of mobile hosts are called peers. A centroid is formed as a temporary work group for processing and exchanging information. In life cycle of a mobile transaction processing system, data is cached from the server and a centroid is disconnected from the server to create its own cluster of peers.  A dynamically configurable data processing space, called an envelope repository, is created to process various transactions at the centroid. The processed data is kept in an envelope at the private work space of the centroid and is brought to the envelope repository whenever required. 

 

15) Envelope Transaction Mechanism for a Cluster of Peers

Authors Sushil Kulkarni, Dr. M.A. Sangalikar  

Abstract:  A new approach for mobile transaction processing is presented in a cluster of peers. A cluster is a dynamic collection of mobile hosts called peers and are clustered around a single mobile host called a centroid to form a temporary work group for processing and exchanging information. All peers are connected to the centroid using a short range wireless network. All peers and the centroid are members of a peer connected set. The centroid is chosen in such a way that it has a strong connection to the mobile support station. After collecting data from a server, the centroid is free to disconnect from the server and ready to create its own cluster of peers. A dynamically configurable data processing space, called envelope repository, is created to process various transactions at the centroid. The processed data is kept in an envelope at a private work space of the centroid and is brought to the envelope repository whenever required. Peer initiates a jumping transaction to fetch data objects to the centroid. The jumping transaction initiates an envelope transaction to acquire the necessary locks on data objects at envelope repository. After getting the locks, pseudo transaction processes the data objects to give the result stored in an envelope. Envelope pseudo write protocol is designed to make jumping transactions globally serialized.

 



Related Links