Skip to main content

Showing 1–19 of 19 results for author: Thampi, S M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1304.1235  [pdf

    cs.NI cs.MM

    A Review on P2P Video Streaming

    Authors: Sabu M Thampi

    Abstract: The main objective of this article is to provide an overview of P2P based Video-on-Demand and live streaming services. The article starts with an introduction to media streaming and its simplified architecture. Various solutions offering video streaming in the context of widespread usage of Internet are discussed. This is followed by a short introduction to P2P networks and its applications. A bro… ▽ More

    Submitted 3 April, 2013; originally announced April 2013.

  2. arXiv:1205.3231  [pdf

    cs.DB

    Survey on Distributed Data Mining in P2P Networks

    Authors: Rekha Sunny T, Sabu M. Thampi

    Abstract: The exponential increase of availability of digital data and the necessity to process it in business and scientific fields has literally forced upon us the need to analyze and mine useful knowledge from it. Traditionally data mining has used a data warehousing model of gathering all data into a central site, and then running an algorithm upon that data. Such a centralized approach is fundamentally… ▽ More

    Submitted 14 May, 2012; originally announced May 2012.

    Comments: 23 pages 3 figures

  3. An ACO Algorithm for Effective Cluster Head Selection

    Authors: Amritha Sampath, Tripti. C, Sabu M. Thampi

    Abstract: This paper presents an effective algorithm for selecting cluster heads in mobile ad hoc networks using ant colony optimization. A cluster in an ad hoc network consists of a cluster head and cluster members which are at one hop away from the cluster head. The cluster head allocates the resources to its cluster members. Clustering in MANET is done to reduce the communication overhead and thereby inc… ▽ More

    Submitted 26 November, 2011; originally announced November 2011.

    Comments: 7 pages, 5 figures, International Journal of Advances in Information Technology (JAIT); ISSN: 1798-2340; Academy Publishers, Finland

    Journal ref: International Journal of Advances in Information Technology (JAIT), Vol. 2, No. 1, February 2011, pp. 50-56

  4. arXiv:1111.1093  [pdf

    cs.CV cs.IR

    Securing Biometric Images using Reversible Watermarking

    Authors: Sabu M. Thampi, Ann Jisma Jacob

    Abstract: Biometric security is a fast growing area. Protecting biometric data is very important since it can be misused by attackers. In order to increase security of biometric data there are different methods in which watermarking is widely accepted. A more acceptable, new important development in this area is reversible watermarking in which the original image can be completely restored and the watermark… ▽ More

    Submitted 4 November, 2011; originally announced November 2011.

    Comments: 8 pages, 7 figures

    Journal ref: International Journal of Image Processing (IJIP), Volume: 5,Issue:4, September/October 2011

  5. arXiv:1009.1685  [pdf

    cs.NI

    Protocols for Bio-Inspired Resource Discovery and Erasure Coded Replication in P2P Networks

    Authors: Sabu M. Thampi, K Chandra Sekaran

    Abstract: Efficient resource discovery and availability improvement are very important issues in unstructured P2P networks. In this paper, a bio-inspired resource discovery scheme inspired by the principle of elephants migration is proposed. A replication scheme based on Q-learning and erasure codes is also introduced. Simulation results show that the proposed schemes significantly increases query success r… ▽ More

    Submitted 9 September, 2010; originally announced September 2010.

    Comments: 11 pages, 6 figures, INFOCOMP

    Journal ref: INFOCOMP Journal of Computer Science, ISSN 1807-4545, Vol. 9, No. 2, pp. 08-20, June, 2010

  6. arXiv:1008.1629  [pdf

    cs.NI

    Survey of Search and Replication Schemes in Unstructured P2P Networks

    Authors: Sabu M. Thampi, Chandra Sekaran K

    Abstract: P2P computing lifts taxing issues in various areas of computer science. The largely used decentralized unstructured P2P systems are ad hoc in nature and present a number of research challenges. In this paper, we provide a comprehensive theoretical survey of various state-of-the-art search and replication schemes in unstructured P2P networks for file-sharing applications. The classifications of sea… ▽ More

    Submitted 10 August, 2010; originally announced August 2010.

    Comments: 39 Pages 5 Figures

    Journal ref: Network Protocols and Algorithms, ISSN 1943-3581, Vol. 2, No. 1, 2010

  7. `Q-Feed' - An Effective Solution for the Free-riding Problem in Unstructured P2P Networks

    Authors: Sabu M. Thampi, Chandra Sekaran K

    Abstract: This paper presents a solution for reducing the ill effects of free-riders in decentralised unstructured P2P networks. An autonomous replication scheme is proposed to improve the availability and enhance system performance. Q-learning is widely employed in different situations to improve the accuracy in decision making by each peer. Based on the performance of neighbours of a peer, every neighbour… ▽ More

    Submitted 4 June, 2010; originally announced June 2010.

    Comments: 14 pages, 10 figures

    Journal ref: International Journal of Digital Multimedia Broadcasting, 2010

  8. arXiv:1006.1017  [pdf

    cs.NI

    An Enhanced Search Technique for Managing Partial Coverage and Free Riding in P2P Networks

    Authors: Sabu M. Thampi, Chandra Sekaran K

    Abstract: This paper presents a Q-learning based scheme for managing the partial coverage problem and the ill-effects of free riding in unstructured P2P networks. Based on various parameter values collected during query routing, reward for the actions are computed and these rewards are used for updating the corresponding Q-values of peers. Thus, the routing is done through only nodes which have shown high p… ▽ More

    Submitted 4 June, 2010; originally announced June 2010.

    Comments: 9 pages, 17 figures

  9. arXiv:0911.4395  [pdf

    cs.DC cs.NI

    Introduction to Distributed Systems

    Authors: Sabu M. Thampi

    Abstract: Computing has passed through many transformations since the birth of the first computing machines. Developments in technology have resulted in the availability of fast and inexpensive processors, and progresses in communication technology have resulted in the availability of lucrative and highly proficient computer networks. Among these, the centralized networks have one component that is shared… ▽ More

    Submitted 23 November, 2009; originally announced November 2009.

  10. arXiv:0911.4230  [pdf

    cs.CE

    Introduction to Bioinformatics

    Authors: Sabu M. Thampi

    Abstract: Bioinformatics is a new discipline that addresses the need to manage and interpret the data that in the past decade was massively generated by genomic research. This discipline represents the convergence of genomics, biotechnology and information technology, and encompasses analysis and interpretation of data, modeling of biological phenomena, and development of algorithms and statistics. This a… ▽ More

    Submitted 21 November, 2009; originally announced November 2009.

  11. arXiv:0910.4116  [pdf

    cs.NE cs.AI

    Swarm Intelligence

    Authors: Sabu M. Thampi

    Abstract: Biologically inspired computing is an area of computer science which uses the advantageous properties of biological systems. It is the amalgamation of computational intelligence and collective intelligence. Biologically inspired mechanisms have already proved successful in achieving major advances in a wide range of problems in computing and communication systems. The consortium of bio-inspired… ▽ More

    Submitted 21 October, 2009; originally announced October 2009.

  12. arXiv:0903.1734  [pdf

    cs.DC cs.NI

    Review of Replication Schemes for Unstructured P2P Networks

    Authors: Sabu M. Thampi, K. Chandra Sekaran

    Abstract: To improve unstructured P2P system performance, one wants to minimize the number of peers that have to be probed for the shortening of the search time. A solution to the problem is to employ a replication scheme, which provides high hit rate for target files. Replication can also provide load balancing and reduce access latency if the file is accessed by a large population of users. This paper b… ▽ More

    Submitted 29 December, 2009; v1 submitted 10 March, 2009; originally announced March 2009.

    Comments: 7 pages

  13. arXiv:0812.0438  [pdf

    cs.DB cs.CR

    An Introduction to Knowledge Management

    Authors: Sabu M. Thampi

    Abstract: Knowledge has been lately recognized as one of the most important assets of organizations. Managing knowledge has grown to be imperative for the success of a company. This paper presents an overview of Knowledge Management and various aspects of secure knowledge management. A case study of knowledge management activities at Tata Steel is also discussed

    Submitted 2 December, 2008; originally announced December 2008.

  14. arXiv:0803.0053  [pdf

    cs.DC cs.IR

    Mobile Agents for Content-Based WWW Distributed Image Retrieval

    Authors: Sabu M. Thampi, K. Chandra Sekaran

    Abstract: At present, the de-facto standard for providing contents in the Internet is the World Wide Web. A technology, which is now emerging on the Web, is Content-Based Image Retrieval (CBIR). CBIR applies methods and algorithms from computer science to analyse and index images based on their visual content. Mobile agents push the flexibility of distributed systems to their limits since not only computa… ▽ More

    Submitted 1 March, 2008; originally announced March 2008.

  15. arXiv:0802.3746  [pdf

    cs.CR cs.IR

    Information Hiding Techniques: A Tutorial Review

    Authors: Sabu M. Thampi

    Abstract: The purpose of this tutorial is to present an overview of various information hiding techniques. A brief history of steganography is provided along with techniques that were used to hide information. Text, image and audio based information hiding techniques are discussed. This paper also provides a basic introduction to digital watermarking.

    Submitted 26 February, 2008; originally announced February 2008.

  16. arXiv:0710.2227  [pdf

    cs.NE cs.AI

    A System for Predicting Subcellular Localization of Yeast Genome Using Neural Network

    Authors: Sabu M. Thampi, K. Chandra Sekaran

    Abstract: The subcellular location of a protein can provide valuable information about its function. With the rapid increase of sequenced genomic data, the need for an automated and accurate tool to predict subcellular localization becomes increasingly important. Many efforts have been made to predict protein subcellular localization. This paper aims to merge the artificial neural networks and bioinformat… ▽ More

    Submitted 11 October, 2007; originally announced October 2007.

  17. arXiv:0710.1404  [pdf

    cs.DB cs.IR

    Performance Comparison of Persistence Frameworks

    Authors: Sabu M. Thampi, Ashwin a K

    Abstract: One of the essential and most complex components in the software development process is the database. The complexity increases when the "orientation" of the interacting components differs. A persistence framework moves the program data in its most natural form to and from a permanent data store, the database. Thus a persistence framework manages the database and the mapping between the database… ▽ More

    Submitted 7 October, 2007; originally announced October 2007.

  18. arXiv:0710.0748  [pdf

    cs.DM cs.CC

    A Fast Heuristic Algorithm Based on Verification and Elimination Methods for Maximum Clique Problem

    Authors: Murali Krishna P, Sabu . M Thampi

    Abstract: A clique in an undirected graph G= (V, E) is a subset V' V of vertices, each pair of which is connected by an edge in E. The clique problem is an optimization problem of finding a clique of maximum size in graph. The clique problem is NP-Complete. We have succeeded in developing a fast algorithm for maximum clique problem by employing the method of verification and elimination. For a graph of si… ▽ More

    Submitted 3 October, 2007; originally announced October 2007.

    Comments: 06 pages,01 figures

  19. arXiv:cs/0411041  [pdf

    cs.CR

    Content Based Image Retrieval with Mobile Agents and Steganography

    Authors: Sabu . M Thampi, K. Chandra Sekaran

    Abstract: In this paper we present an image retrieval system based on Gabor texture features, steganography, and mobile agents.. By employing the information hiding technique, the image attributes can be hidden in an image without degrading the image quality. Thus the image retrieval process becomes simple. Java based mobile agents manage the query phase of the system. Based on the simulation results, the… ▽ More

    Submitted 19 June, 2006; v1 submitted 15 November, 2004; originally announced November 2004.

    Comments: 6 pages, 10 figures