Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by S.K. Srivatsa
Total Records ( 23 ) for S.K. Srivatsa
  N.R. Ananthanarayanan , S.K. Srivatsa and R. VasanthKumar Mehta
  Learning Management System (LMS) is the term used to describe a server-based system that is designed to manage learning content and learner interactions. The LMS enables the learning content to be available online, allowing students to view and interact with learning materials through a web browser on essentially any computer operating system. The production of learning content for computer based training is demanding and expensive. It is therefore, a necessity of re-use e-learning material as many times as possible. Unfortunately, existing electronic courses are seldom reused, as there is usually and always a need to change some part for a new course to be held. To encourage reuse, the approach widely proposed is use small modular learning objects that can be assembled into new courses.
  C. Parthasarathy and S.K. Srivatsa
  The main objective of this study is to detect the existence of secret information hidden within an image. Cryptography is one of the most interested and important area in the computer industry that deals with secures transmission of information. Encryption, the process, which helps for such secure transmission prevents hackers to access the information. And decryption helps to retrieve the original information. Cryptography provides many methods and techniques for secure communication. Currently, there are many industry standard encryption/decryption algorithms including RSA, AES, Robust Security Network (RSN), blowfish and so forth. However, they are fairly complex and require that one spend a lot of time to comprehend and implement them. This study introduces simple Encryption/decryption algorithm that is high-speed and practically make safe. The algorithm manipulates a 128-bit input using flipping, substitution and permutation to achieve its encryption/decryption.
  M.K. Jayanthi , S.K. Srivatsa and T. Ramesh
  This study discusses the analysis, design and evaluation of school e-Learn an interactive e-Learning tool. It covers the performance and evaluation details of usability, designing the evaluation, the objectives and respondents, the study, the Questionnaires questions asked and basic assumptions, what needed to be evaluated, the execution of the evaluation, its results and conclusions. The evaluation results indicated that the e-Learn system produced more rehearsal from students than the traditional teaching and improved their marks. It was easier and more interesting to use with greater facilities to research and rehearse knowledge. There was a general belief in the bended approach that e-Learn system, that it did indeed assist knowledge retention, this in itself is an important factor for the students psyche. As compared with the neutral system the interactive system held interest longer and was more capable of interacting at the students own level.
  T. Sasipraba and S.K. Srivatsa
  This study considers the potentially negative impacts of an increasing deployment of non-congestion-controlled best-effort traffic on the internet. These negative impacts range from extreme unfairness against competing TCP traffic to the potential for congestion collapse. To promote the inclusion of end-to-end congestion control in the design of future protocols using best-effort traffic, we argue that router mechanisms are needed to identify and restrict the bandwidth of selected high-bandwidth best-effort flows in times of congestion. The paper discusses several general approaches for identifying those flows suitable for bandwidth regulation. As a result of its strict adherence to end-to-end congestion control, the current Internet suffers from main maladies: congestion collapse from undelivered packets. This has the beneficial effect of preventing congestion collapse from undelivered packets; because an unresponsive flow`s otherwise undeliverable packets never enter the network in the first place. The end-to-end nature of Internet congestion control is an important factor in its scalability and robustness. However, end-to-end congestion control algorithms alone are incapable of preventing the congestion collapse and unfair bandwidth allocations created by applications, which are unresponsive to network congestion. This study propose and investigate a new congestion avoidance mechanism called Network Border Patrol (NBP).
  T. Bhuvaneswari , K. Prathiba and S.K. Srivatsa
  This study pertains to an application of electronic commerce in the field of healthcare administration and is based on Distributed Knowledge Management (DKM). The DKM is a concept that originated as an abstraction of a business model prepared for the mechanical and agricultural industry. This study suggests a new business model based on DKM for more general use, in the context of healthcare administration.
  R. Seshasayanan and S.K. Srivatsa
  The research presented in this study addresses reducing the power consumption of processor by adjusts the clock speed and voltage dynamically for hard real time tasks. The energy efficiency of a DVS algorithm largely depends on the performance of the slack estimation method used in it. The approach uses fixed priorities assigned tasks. It targets energy consumption reduction by using both on-line and off-line decisions, taken both at task level and at task-set level. We consider sets of independent tasks running on processors with dynamic voltage and frequency scaling techniques, where every deadline has to be met. Here we consider a few sets of independent tasks running on processor with dynamic frequency and voltage scaling. By using Hybrid DVS algorithm, the power savings is obtained. The efficient inter and intra algorithms are implemented in VHDL. The simulation and synthesize report are shown. By using this approach we achieve energy reductions.
  T. Bhuvaneswari , Nabajit Dutta and S.K. Srivatsa
  Distributed virtual patient record system is proposed for diagnosis and analysis. It permits physicians located at various places to consult on the status of the patient. In spite of patient data located at various sites, the data can be assembled and the patient record can be constructed dynamically by using the patient’s Social Security Number (SSN). Later, a graphical model could be constructed through which consulting physicians can derive useful information about the current status of the patient. It uses modern distributed objects and emerging telecollaboration tools. In this study, we describe the meaning of distributed virtual patient record, the barriers for implementing the system, requirements of the system and services. In addition, an example named “TeleMed” which implements this concept has been described.
  B. Vinayagasundaram and S.K. Srivatsa
  The main objective of the study is to define the metrics to measure the quality of software in the architecture for an artificial intelligence system. The proposed architecture for measurement consists of four components; Task specification layer, problem solver layer, domain layer and an adapter layer. These four components are hierarchically organized in a layered fashion. In this architecture, the overall structure is decomposed into sub components, in a layered way such that a new layer can be added to the existing layer that can change the behavior of the system. The quality of components in the architecture are measured with metrics such as source code, depth of inheritance, number of paths, complexity level etc., These metrics are related to software quality characteristics suggested by ISO. This study is organized in the following way; Firstly, the study addresses the significance of software architecture in a software intensive AI system, the importance of quality of the software in the architecture and a layered architecture for artificial intelligence system. The secondly, the study addresses the relation ship between the quality characteristics and the metrics used for measuring the quality. The performance of the system with respect to functional requirement and non-functional requirements are measured and discussed.
  M.K. Jayanthi , S.K. Srivatsa and T. Ramesh
  e-Learning is becoming a major component in academia today. There is a need for formalized guidelines in e-Learning that instruct the designer (course instructor) on how to design, maintain and manage a course. There are so many e-Learning systems available in the market. Content available for learning on the web is variable: some of it is excellent, much is mediocre. The content developers, educators and students needs can’t be addressed and their will be a gaps. To bridge the gap an e-Learning system was developed to build fragmented lesson plans of full courses based on the syllabus of our University. The goal of this study is to discuss the overview of the learning object approach to create learning content using oriented analysis and design method and the evaluation results. It covers the performance and evaluation details of usability, designing the evaluation, the objectives and respondents, the study, the questionnaires questions asked and basic assumptions the execution of the evaluation, its results and conclusions.
  M.K. Jayanthi , S.K. Srivatsa and T. Ramesh
  e-Learning is becoming a major component in academia today. This study discusses the key findings of an investigation of e-Learning system a framework for learning by doing and explaining with a computer based Tutoring system. The e-Learning softwares that is commercially available has been developed mainly to satisfy the needs of the industry, whose goal is the fast acquisition of competences. On the other hand, universities deals with learning processes that develop themselves on a medium or a long term period and their main idea is to help students to develop a cognitive representation of those sectors in which they are expected to operate. This is just one of the reasons that induced us to develop our own e-Learning systems using Learning Objects. A study has been conducted to know the impact of Learning objects and e-Learning in Education Sector. The study intends to analyze and to find out the difference between the Traditional Teaching Method and Teaching by using e-Learning among Students of SCSVMV in Concepts of Object Oriented Programming using C++. The results of the study shows that the systematic use of Learning Objects as part of the instructional design process will improve the quality of Teaching and Learning and it plays an important role in e-Learning.
  S. Meenakshi and S.K. Srivatsa
  Distributed denial of service is a major threat to the availability of Internet services. The distributed, large scale nature of the Internet, makes DDoS attacks stealthy and difficult to counter. Defense against Distributed Denial-of-Service attacks is one of the hardest security problems on the Internet. Recently, these network attacks have been increasing. In order to cope with the increase, many ISP (Internet Service Provider) customers introduced IDSs (Intrusion Detection System). However, the IDSs cannot always detect the network attacks due to dropping the packets when DDoS packets are aggregated to the customer’s link. Attack packets can be identical to legitimate packets, since the attacker only needs volume, not content, to inflict damage. Furthermore, the volume of packets from individual sources can be low enough to escape notice by local administrators. Thus, a detection system based on single site will have either high positive or high negative rates. Therefore more effective countermeasures are required to counter the threat. This requirement has motivated us to propose a novel mechanism against DDoS attack. This study presents the design details of a distributed defense mechanism against DDoS attack. The DDoS attack cannot be addressed through isolated actions of defense nodes. The effectiveness of attack detection increases near the victim and the effectiveness of packet filtering increases near the attack source. So we choose the detection system in the intermediate location to get benefits in both ways. In our approach, the egress routers of the intermediate network coordinate with each other to provide the information necessary to detect and respond to the attack. In our distributed IDS system, there is a corresponding true positive ratio. In this Distributed frame work, the information and services are exchanged between systems through which they act together against the threat.
  A. Rajesh and S.K. Srivatsa
  The approach proposed in this study uses a simple path matching algorithm to perform the structural matching. The novelty in this approach is that the path matching algorithm considers only the paths to leaf nodes in the schema trees for the matching process there by eliminating the need for repeatedly parsing the elements of the schema tree as in the other approaches. This greatly reduces the time required to identify the matches. And the paths are treated as a set of strings comprising of the labels of the nodes in the path. Treating the paths as set of strings greatly simplifies the matching process as the same approaches used in the linguistic matching process can be used in the path matching process.
  R. Manivannan and S.K. Srivatsa
  String matching and string edit distance are fundamental concepts in structural pattern recognition, record linkage and schema matching problems. In this paper, a hybrid string matching approach is introduced. Given two strings, x and y, the similarity of the strings is obtained by using a combination of affine gap method, TFIDF and a custom domain specific dictionary. We’ll show formal properties of the hybrid string matching approach, describe a procedure for its computation and give practical examples.
  S. Rajalakshmi and S.K. Srivatsa
  This research studies the latest research concept in Computer Security namely Identity Based Cryptography. To start with, the paper gives an introduction to the concept called Identity Based Encryption with Mediated RSA and then applies this concept to do secure transactions through Internet. The research also highlights on the future work that can be carried over in this area.
  V.L. Jyothi and S.K. Srivatsa
  Scheduling a task on the same processor enables it to benefit from the data cached from the previous scheduling instance. It also eliminates the need to flush the cache on a context switch to maintain consistency. In contrast, scheduling a task on a different processor can increase the number of cache misses and degrade performance. A scheduler that takes processor affinities into account while making scheduling decisions can improve cache effectiveness and the overall system performance. We propose techniques to account for processor affinities while scheduling tasks in multiprocessor environments. These techniques are incorporated in a proportional share schedulers and results in a practical approach for scheduling tasks in a multiprocessor system. The schedulability of each process is enforced by a guaranteed cpu service rate, independent of the demands of other processes. The resulting scheduler is simulated and evaluated its performance using various application and benchmarks.
  K.R. Reshmy , S.K. Srivatsa and B. Surendrababu

Notice of Retraction of "Automatic Incremental View Maintenance in SchemaSQL" by K.R. Reshmy, S.K. Srivatsa and B. Surendrababu published in Information Technology Journal 5 (2): 314-321, 2006.

We have recently been informed that significant portions of the Introduction, discussion sections and figures in the article published by K.R. Reshmy, S.K. Srivatsa and B. Surendrababu published in Information Technology Journal 5 (2): 314-321, 2006 were copied from the following article:

Andreas Koeller and Elke A. Rundensteiner, 2004. Incremental Maintenance of Schema-Restructing Views in SchemaSQL. IEEE Transactions on Knowledge and Data engineering Vol. 16, No. 6, June 2004.

Following a review of the above article, the editors conclude that the work of K.R. Reshmy, S.K. Srivatsa and B. Surendrababu constitutes plagiarism.

Plagiarism is a violation of copyright and a serious breach of scientific ethics. The Editors and Publisher have agreed to officially retract the article.

We anticipate that new development in plagiarism detection software on our manuscript submission system and increasing vigilance of the new Peer-review process will help us to avoid any future occurrences of this most unfortunate situation.

  V. Kannan , P.E. Sankarnarayanan and S.K. Srivatsa
  Simulation of the DC characteristics of depletion mode AlGaAs/GaAs Modulation Doped Field Effect Transistor (MODFET) under backside optical illumination is presented. A device structure with fiber inserted into the substrate up to the GaAs layer is considered for direct illumination into the GaAs layer. The AlGaAs layer is considered transparent to illumination. The photoconductive effect which increases the two dimentional electron gas (2DEG) channel electron concentration alone is considered. These electrons generated in the GaAs layer is collected in 2DEG, which increases the source to drain current. The photo generated holes in GaAs layer drifts towards the semi-insulating substrate and is capacitively coupled into the grounded source. The I-V characteristics of MODFET under dark and illuminated conditions have been simulated and discussed.
  N. Girija and S.K. Srivatsa
  Not Available
  M. Kannan and S.K. Srivatsa
  Parallel processing is an efficient form of information processing with emphasis on the exploitation concurrent events in computations. Considering a sequence of assembly instructions for a specific problem it is found that many of the consecutive instructions are independent of each other, without any data dependencies between them. This work exploits such situations and it executes pairs of instructions, which do not have dependencies between them, on two different processing elements, thus enhancing the speed of operations. It is not always true that any two instructions taken from a sequence of instructions could go in parallel. The various types of dependencies that exist among the instructions are the bottleneck in executing instruction in parallel. The various possible data dependencies and control transfers are handled so that most of the instructions are run pairs. The ILP(Instruction Level Parallelism) architecture designed here is to be used for image processing applications. Since specific hardware solutions are always faster that their software counterparts and we have dedicated hardware units for most frequently used image processing problems of finding DFT and DCT. The proposed architecture improves the performance with a speed up factor of more than 1.5 with lesser data dependencies, we can get a higher speed up factor, upper bounded by the value of 2 by the Amdahl`s law.
  V. Kannan , P.E. Sankarnarayanan and S.K. Srivatsa
  The time dependent characteristics of n-A1GaAs/GaAs Modulation Doped Field Effect Transistors (MODFET) under backside optical illumination is investigated and the transient behaviour of the device have been simulated. A device structure with fiber inserted into the substrate up to GaAs layer is considered for direct illumination into the GaAs layer. Partial depletion of the active region is considered. The excess carriers due to photo generation are obtained by solving the time dependent continuity equation. The energy levels are modified due to generation of carriers. The offset voltage, sheet concentration and time dependent I-V characteristics have been simulated and discussed. The time dependent I-V characteristics is compared with available theoretical data at a particular gate source voltage under illuminated condition.
  A. Ezil Sam Leni and S.K. Srivatsa
  In this study, we propose a new technique based on the information from the Data Link Layer and Network Layer, which reduces the handoff delay and improves the TCP Performance in integrated wireless networks. The Candidate Access Route Discovery (CARD) Protocol is used to identify the Neighbor Routers during handover. The proposed technique is developed to support seamless Intra and Inter System Handoff in next generation wireless networks. The performance of the proposed technique is simulated and the results are also shown in this study.
  G. Anandhi and S.K. Srivatsa
  This study proposes a novel Anonymous and Certificateless Public-Key Infrastructure (AC-PKI) for MANETs. Our contributions are mainly three fold. First, we apply Shamir’s secret-sharing technique to distribute the system trust, essentially a system master-key, across apre-selected set of nodes called Distributed Private-Key Generators (D-PKGs). The D-PKGs collaboratively offer a Prerequisite private-Key-Generation (PKG) service during network operation. Second, we propose offering D-PKGs anonymity protection to defend against pinpoint attacks that are quite easy to conduct and may cause devastating consequencesin MANETs. Last, we determine the optimal secret-sharing parameters for achieving the maximum security.
  M. Kannan and S.K. Srivatsa
  Applications based on Fast Fourier Transform (FFT) such as signal and image processing require high computational power. This paper proposes the implementation of radix-4 based parallel-pipelined Fast Fourier Transform processor which incorporates a low power commutator, butter-fly with multiplier-less architecture. The proposed parallel pipelined architectures have the advantages of high throughput and low power consumption. The multiplier-less architecture uses shift and addition operations to realize complex multiplications.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility