scispace - formally typeset
Search or ask a question

Showing papers by "Rituparna Chaki published in 2018"


Journal ArticleDOI
TL;DR: An adaptive access control model is proposed keeping in compliance with state–of-the-art scenario towards ensuring quality of context and trust relationship between owners and users and Comparative analysis shows how proposedAccess control model advances the state of art.
Abstract: Traditional discretionary access control (DAC) or mandatory access control (MAC) is not quite effective for remote environment. General role-based access control (RBAC) also has its limitations to ...

20 citations


Book ChapterDOI
01 Jan 2018
TL;DR: It is formally prove that CMS complies useless-prefix garbage collection (UP-GC), and on the basis of number of memory accesses for searching consistent version, CMS performs better in comparison with conventional multi-version permissive STM.
Abstract: In this paper, we propose a novel checkpoint-based multi-versioning concurrency control system (CMS) for software transactional memory (STM). A checkpoint is defined to refer a set of versions. CMS maintains a list of live read-only transactions for every checkpoint. An appropriate object versioning technique decides on how many older versions are to be kept or to be removed. Moreover, the proposed method does not require any global synchronization point, such as centralized logical clock for versioning. Due to its efficient garbage-collecting mechanism, CMS is suitable for both read and write-dominated workload. We formally prove that CMS complies useless-prefix garbage collection (UP-GC). On the basis of number of memory accesses for searching consistent version, CMS performs better in comparison with conventional multi-version permissive STM.

2 citations


Book ChapterDOI
27 Sep 2018
TL;DR: A congestion control model has been proposed, which uses the measure of node level congestion and channel-trust for decision making, and measure two level of congestion control that is node level and channel trustability.
Abstract: Nowadays in the area of Internet of Things (IoT), congestion control has become an essential research area because of people and devices are progressively get connected over the network. The idea behind congestion control mechanisms originated from the point of network bandwidth, node processing ability, server capacities, channel capacity, flow of the link, number and size of distinct flow and channel reliability. Here we have used the concept of different RED, AMID and COAP based congestion control mechanisms. We have measure two level of congestion control that is node level and channel trustability. In this paper we have presented literature review of some of existing congestion control mechanisms. A congestion control model has also been proposed, which uses the measure of node level congestion and channel-trust for decision making.

1 citations


Book ChapterDOI
TL;DR: This work aims to find out an effective assignment of nurses to home patients as well as in-hospital patients based on patients’ varying demands over time according to their health status.
Abstract: The goal of this research is to evolve nurse scheduling problem as a matured computational model towards optimization of multiple and conflicting objectives, the complex shift patterns, etc., in changing the environment. This work aims to find out an effective assignment of nurses to home patients as well as in-hospital patients based on patients’ varying demands over time according to their health status. It proposes nurse scheduling algorithms based on variable time quantum, wait time, context switch time, etc., in different situations when the environment becomes more constrained as well as unconstrained. It develops corresponding cost functions for assigning suitable nurses by considering the penalty cost, swapping cost of nurses. This paper proposes methods to utilize nurses by using nearest neighbour based similarity measure and combined genetic algorithm to generate feasible solutions. Finally, this paper implements the proposed algorithms and compares these with the other popular existing algorithms.

1 citations


Book ChapterDOI
TL;DR: In this article, an n-graph typing signature is built during user profiling based on keyboard usage pattern, which is a behavioral trait of user that is simple, less costly, and workable at any place having only computing device.
Abstract: Typing pattern is a behavioral trait of user that is simple, less costly, and workable at any place having only computing device. In this paper, n-graph typing signature is built during user profiling based on keyboard usage pattern. The main aim of this paper is to increase inclusion of number of typing features (both temporal and global) during decision generation and to simplify the procedure of considering missing typing patterns (various monographs, digraphs, etc), which are not enrolled before. A modular classification model collection–storage–analysis (CSA) is designed to identify user. Typing signature becomes adaptive in nature through learning from environment. Module 1 is used for pattern acquisition and processing, and module 2 is used for storage, whereas module 3 is used for analysis. Final decision is generated on the basis of evaluated match score and enrolled global parameters. Proposed CSA model is capable to reduce space and time overhead in terms of dynamic pattern acquisition and storage without using any approximation method. A customized editor HCI is designed for physical key-based devices to build our own data set. Proposed CSA model can classify typing signature of valid and invalid user without incurring high overhead.