scispace - formally typeset
Search or ask a question
Author

S. Udhayakumar

Bio: S. Udhayakumar is an academic researcher from Saveetha University. The author has contributed to research in topics: Cloud computing & Mobile computing. The author has an hindex of 4, co-authored 17 publications receiving 92 citations. Previous affiliations of S. Udhayakumar include Rajalakshmi Engineering College & B. S. Abdur Rahman University.

Papers
More filters
Proceedings ArticleDOI
06 Apr 2017
TL;DR: This is a Mobile Integrated and smart irrigation system using IOT based on application controlled monitoring system to control the water supply and monitor the plants through a Smartphone.
Abstract: Agriculture has been the most important practice from very beginning of the human civilization. Traditional methods that are used for irrigation, such as overhead sprinkler and flood type, is not that much efficient. They results in a lot of wastage of water and can also promote disease such as fungus formation due to over moisture in the soil. Automated irrigation system is essential for conservation of the water and indirectly viability of the farm since it is an important commodity. About 85% of total available water resources across the world are solely used for the irrigation purpose. In upcoming years this demand is likely to increase because of increasing population. To meet this demand we must adopt new techniques which will conserve need of water for irrigation process. In automation system water availability to crop is monitored through sensors and as per need watering is done through the controlled irrigation. The almost infinite capabilities of storage and processing, the rapid elasticity makes cloud computing an attractive solution to the large amount of data generated. The idea is to focus on parameters such as temperature and soil moisture. This is a Mobile Integrated and smart irrigation system using IOT based on application controlled monitoring system. The main objective of this project is to control the water supply and monitor the plants through a Smartphone.

95 citations

Proceedings Article
15 Jul 2011
TL;DR: The model is formally specified and verified using Temporal Logic of Action (TLA+) and the adapting trust level is evaluated for a SMS Cloud Service Deployment.
Abstract: The objective of the research work is to propose an adaptive trust model applicable for software services deployed in cloud environment. In the earlier security modeling of cloud based applications, the trust among various services are evaluated either based on Bayesian or fuzzy approaches which are not formally verified before composition. The reputations of the constituent domain specific services are evaluated to determine the overall trust of the demanded service assuming other infrastructure and platform services. The trust relation is migrated between various virtual services in the case of emergent termination or cancellation of the customer demand. The temporal nature of the concurrent service activation and their composition processes are synchronized for each session to complete within the expected time using a Pay First Serve Next (PFSN) technique. The model is formally specified and verified using Temporal Logic of Action (TLA+) and the adapting trust level is evaluated for a SMS Cloud Service Deployment.

8 citations

Proceedings ArticleDOI
01 Nov 2011
TL;DR: The objective of the work is to propose a Trusted Fault Tolerant (TFT) model incorporating user recovery features in mobile Ad Hoc networking using Location Aided Routing (LAR) protocol using nodes which do not actively participate in a network that are considered as selfish or misbehaving nodes.
Abstract: The objective of the work is to propose a Trusted Fault Tolerant (TFT) model incorporating user recovery features in mobile Ad Hoc networking using Location Aided Routing (LAR) protocol. The LAR protocol in mobile Ad Hoc network is challenged by a complicated interaction of contention, congestion and mobility. The fault model addressed here covers the link faults that occur in the packet transmission due to the high mobility of the nodes and the node congestion occurs when there is no capacity for the buffers at the nodes to hold the incoming packets. The location fault occurs when the node moves away from the source to an unreachable location after having received the packets. The implementation model focuses on nodes which do not actively participate in a network that are considered as selfish or misbehaving nodes. The performance of the model is improvised using location awareness feature and node trust levels based on which the recovery of the lost packets is achieved.

7 citations

Book ChapterDOI
01 Jan 2021
TL;DR: In this paper, the authors proposed a solution to the problem of tampering and altering of government records using blockchain implementation, where each individual branch their various information in these blocks and chain them together.
Abstract: One of the major problems in today’s society is the tampering and altering of government records such as police case information, Aadhar card information, driving license and using such false information for obtaining various benefits such as government jobs, passports, visas, and other organizations requiring trust. This project proposes a solution to this problem using blockchain implementation. The idea is to create a block for each individual and branch their various information in these blocks and chain them together. These blocks use hashing and digital signatures as a primary security requirement. Hash values of these blocks are created using the entire contents of the block, and each block contains the hash of previous block, thereby creating a chain. The various hashing algorithms used are SHA-256, and the public-key cryptography is using RSA or ECC algorithm. If someone tries to tamper with the contents of the block, the hash values change and get disconnected from the chain. Every operation on the each of the blocks will be recorded with a time stamp, and it cannot be altered. Hence, this permissioned blockchain network of all the individuals can be used to prevent the tampering and altering of various government records such as police case records, passport records, and PAN and help various organizations such as visa verification and income tax department. This blockchain network provides a solution for all the existing problems in tampering and altering of government records.

6 citations


Cited by
More filters
Book
01 Jan 2001
TL;DR: This chapter discusses Decision-Theoretic Foundations, Game Theory, Rationality, and Intelligence, and the Decision-Analytic Approach to Games, which aims to clarify the role of rationality in decision-making.
Abstract: Preface 1. Decision-Theoretic Foundations 1.1 Game Theory, Rationality, and Intelligence 1.2 Basic Concepts of Decision Theory 1.3 Axioms 1.4 The Expected-Utility Maximization Theorem 1.5 Equivalent Representations 1.6 Bayesian Conditional-Probability Systems 1.7 Limitations of the Bayesian Model 1.8 Domination 1.9 Proofs of the Domination Theorems Exercises 2. Basic Models 2.1 Games in Extensive Form 2.2 Strategic Form and the Normal Representation 2.3 Equivalence of Strategic-Form Games 2.4 Reduced Normal Representations 2.5 Elimination of Dominated Strategies 2.6 Multiagent Representations 2.7 Common Knowledge 2.8 Bayesian Games 2.9 Modeling Games with Incomplete Information Exercises 3. Equilibria of Strategic-Form Games 3.1 Domination and Ratonalizability 3.2 Nash Equilibrium 3.3 Computing Nash Equilibria 3.4 Significance of Nash Equilibria 3.5 The Focal-Point Effect 3.6 The Decision-Analytic Approach to Games 3.7 Evolution. Resistance. and Risk Dominance 3.8 Two-Person Zero-Sum Games 3.9 Bayesian Equilibria 3.10 Purification of Randomized Strategies in Equilibria 3.11 Auctions 3.12 Proof of Existence of Equilibrium 3.13 Infinite Strategy Sets Exercises 4. Sequential Equilibria of Extensive-Form Games 4.1 Mixed Strategies and Behavioral Strategies 4.2 Equilibria in Behavioral Strategies 4.3 Sequential Rationality at Information States with Positive Probability 4.4 Consistent Beliefs and Sequential Rationality at All Information States 4.5 Computing Sequential Equilibria 4.6 Subgame-Perfect Equilibria 4.7 Games with Perfect Information 4.8 Adding Chance Events with Small Probability 4.9 Forward Induction 4.10 Voting and Binary Agendas 4.11 Technical Proofs Exercises 5. Refinements of Equilibrium in Strategic Form 5.1 Introduction 5.2 Perfect Equilibria 5.3 Existence of Perfect and Sequential Equilibria 5.4 Proper Equilibria 5.5 Persistent Equilibria 5.6 Stable Sets 01 Equilibria 5.7 Generic Properties 5.8 Conclusions Exercises 6. Games with Communication 6.1 Contracts and Correlated Strategies 6.2 Correlated Equilibria 6.3 Bayesian Games with Communication 6.4 Bayesian Collective-Choice Problems and Bayesian Bargaining Problems 6.5 Trading Problems with Linear Utility 6.6 General Participation Constraints for Bayesian Games with Contracts 6.7 Sender-Receiver Games 6.8 Acceptable and Predominant Correlated Equilibria 6.9 Communication in Extensive-Form and Multistage Games Exercises Bibliographic Note 7. Repeated Games 7.1 The Repeated Prisoners Dilemma 7.2 A General Model of Repeated Garnet 7.3 Stationary Equilibria of Repeated Games with Complete State Information and Discounting 7.4 Repeated Games with Standard Information: Examples 7.5 General Feasibility Theorems for Standard Repeated Games 7.6 Finitely Repeated Games and the Role of Initial Doubt 7.7 Imperfect Observability of Moves 7.8 Repeated Wines in Large Decentralized Groups 7.9 Repeated Games with Incomplete Information 7.10 Continuous Time 7.11 Evolutionary Simulation of Repeated Games Exercises 8. Bargaining and Cooperation in Two-Person Games 8.1 Noncooperative Foundations of Cooperative Game Theory 8.2 Two-Person Bargaining Problems and the Nash Bargaining Solution 8.3 Interpersonal Comparisons of Weighted Utility 8.4 Transferable Utility 8.5 Rational Threats 8.6 Other Bargaining Solutions 8.7 An Alternating-Offer Bargaining Game 8.8 An Alternating-Offer Game with Incomplete Information 8.9 A Discrete Alternating-Offer Game 8.10 Renegotiation Exercises 9. Coalitions in Cooperative Games 9.1 Introduction to Coalitional Analysis 9.2 Characteristic Functions with Transferable Utility 9.3 The Core 9.4 The Shapkey Value 9.5 Values with Cooperation Structures 9.6 Other Solution Concepts 9.7 Colational Games with Nontransferable Utility 9.8 Cores without Transferable Utility 9.9 Values without Transferable Utility Exercises Bibliographic Note 10. Cooperation under Uncertainty 10.1 Introduction 10.2 Concepts of Efficiency 10.3 An Example 10.4 Ex Post Inefficiency and Subsequent Oilers 10.5 Computing Incentive-Efficient Mechanisms 10.6 Inscrutability and Durability 10.7 Mechanism Selection by an Informed Principal 10.8 Neutral Bargaining Solutions 10.9 Dynamic Matching Processes with Incomplete Information Exercises Bibliography Index

3,569 citations

Journal ArticleDOI
14 Feb 2020-Sensors
TL;DR: A survey aimed at summarizing the current state of the art regarding smart irrigation systems, which determines the parameters that are monitored in irrigation systems regarding water quantity and quality, soil characteristics and weather conditions.
Abstract: Water management is paramount in countries with water scarcity. This also affects agriculture, as a large amount of water is dedicated to that use. The possible consequences of global warming lead to the consideration of creating water adaptation measures to ensure the availability of water for food production and consumption. Thus, studies aimed at saving water usage in the irrigation process have increased over the years. Typical commercial sensors for agriculture irrigation systems are very expensive, making it impossible for smaller farmers to implement this type of system. However, manufacturers are currently offering low-cost sensors that can be connected to nodes to implement affordable systems for irrigation management and agriculture monitoring. Due to the recent advances in IoT and WSN technologies that can be applied in the development of these systems, we present a survey aimed at summarizing the current state of the art regarding smart irrigation systems. We determine the parameters that are monitored in irrigation systems regarding water quantity and quality, soil characteristics and weather conditions. We provide an overview of the most utilized nodes and wireless technologies. Lastly, we will discuss the challenges and the best practices for the implementation of sensor-based irrigation systems.

264 citations

Journal ArticleDOI
TL;DR: The aim to analyze recently developed IoT applications in the agriculture and farming industries to provide an overview of sensor data collections, technologies, and sub-verticals such as water management and crop management and provide recommendations for future research to include IoT systems' scalability, heterogeneity aspects, IoT system architecture, data analysis methods, size or scale of the observed land or agricultural domain.
Abstract: It is essential to increase the productivity of agricultural and farming processes to improve yields and cost-effectiveness with new technology such as the Internet of Things (IoT). In particular, IoT can make agricultural and farming industry processes more efficient by reducing human intervention through automation. In this study, the aim to analyze recently developed IoT applications in the agriculture and farming industries to provide an overview of sensor data collections, technologies, and sub-verticals such as water management and crop management. In this review, data is extracted from 60 peer-reviewed scientific publications (2016-2018) with a focus on IoT sub-verticals and sensor data collection for measurements to make accurate decisions. Our results from the reported studies show water management is the highest sub-vertical (28.08%) followed by crop management (14.60%) then smart farming (10.11%). From the data collection, livestock management and irrigation management resulted in the same percentage (5.61%). In regard to sensor data collection, the highest result was for the measurement of environmental temperature (24.87%) and environmental humidity (19.79%). There are also some other sensor data regarding soil moisture (15.73%) and soil pH (7.61%). Research indicates that of the technologies used in IoT application development, Wi-Fi is the most frequently used (30.27%) followed by mobile technology (21.10%). As per our review of the research, we can conclude that the agricultural sector (76.1%) is researched considerably more than compared to the farming sector (23.8%). This study should be used as a reference for members of the agricultural industry to improve and develop the use of IoT to enhance agricultural production efficiencies. This study also provides recommendations for future research to include IoT systems' scalability, heterogeneity aspects, IoT system architecture, data analysis methods, size or scale of the observed land or agricultural domain, IoT security and threat solutions/protocols, operational technology, data storage, cloud platform, and power supplies.

105 citations

Journal ArticleDOI
TL;DR: Various reputation-based trust management systems are reviewed, including trust management in cloud computing, peer-to-peer system, and Adhoc system, which aims to build trust between cloud services.
Abstract: The extremely vibrant, scattered, and non–transparent nature of cloud computing formulate trust management a significant challenge. According to scholars the trust and security are the two issues that are in the topmost obstacles for adopting cloud computing. Also, SLA (Service Level Agreement) alone is not necessary to build trust between cloud because of vague and unpredictable clauses. Getting feedback from the consumers is the best way to know the trustworthiness of the cloud services, which will help them improve in the future. Several researchers have stated the necessity of building a robust management system and suggested many ideas to manage trust based on consumers' feedback. This paper has reviewed various reputation-based trust management systems, including trust management in cloud computing, peer-to-peer system, and Adhoc system.

88 citations

Journal ArticleDOI
TL;DR: The subsystems and the architecture of an intelligent irrigation system for precision agriculture, the AREThOU5A IoT platform, and the operation of the IoT node that is utilized in the platform are described.
Abstract: Agriculture 4.0, as the future of farming technology, includes several key enabling technologies towards sustainable agriculture. The use of state-of-the-art technologies, such as the Internet of Things, transform traditional cultivation practices, like irrigation, to modern solutions of precision agriculture. In this paper, we present in detail the subsystems and the architecture of an intelligent irrigation system for precision agriculture, the AREThOU5A IoT platform. We describe the operation of the IoT node that is utilized in the platform. Moreover, we apply the radiofrequency energy harvesting technique to the presented IoT platform, as an alternative technique to deliver power to the IoT node of the platform. To this end, we fabricate and validate a rectenna module for radiofrequency energy harvesting. Experimental results of the fabricated rectenna exhibit a satisfactory performance as a harvester of ambient sources in an outdoor environment.

66 citations