28 results found
Chen T, Gopalan A, 2021, Optimized Online Lecture for Narrow-Bandwidth Network, 10th International Conference on Educational and Information Technology (ICEIT), Publisher: IEEE, Pages: 48-55
Dubbaka A, Gopalan A, 2020, Detecting Learner Engagement in MOOCs using Automatic Facial Expression Recognition, IEEE Global Engineering Education Conference (IEEE EDUCON), Publisher: IEEE, Pages: 447-456, ISSN: 2165-9567
Agrawal V, Gopalan A, 2020, Energy Optimisation of Cascading Neural-network Classifiers, 9th International Conference on Smart Cities and Green ICT Systems (SMARTGREENS), Publisher: SCITEPRESS, Pages: 149-158
Cornet A, Gopalan A, 2018, A Software-based Approach for Source-line Level Energy Estimates and Hardware Usage Accounting on Android, The Eighth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies, ISSN: 2308-412X
Miskin H, Gopalan A, 2017, Skramble: An Embeddable Python Programming Environment for Use in Learning Systems, 8th International Conference on Computer Supported Education (CSEDU), Publisher: SPRINGER-VERLAG BERLIN, Pages: 193-213, ISSN: 1865-0929
Westfield B, Gopalan A, 2016, Orka: A new technique to profile the energy usage of Android applications, 5th International Conference on Smart Cities and Green ICT Systems (SMARTGREENS 2016), Publisher: ScitePress, Pages: 213-224
he ever increasing complexity of mobile devices has opened new, exciting possibilities to both designers of applications and their end users. However, this technological improvement comes with an increase in power consumption, a drain that battery technology has not managed to keep up with. Due to this, application developers are now facing a new optimisation challenge not present for traditional software: minimising energy usage. Developers need guidance to help reduce energy usage while not compromising on the features of their application. Despite research identifying areas of code consuming high energy, developers currently don’t possess the necessary tools to make judgements on their application’s design based on this. This paper presents Orka, a new tool that analyses an Android application and provides feedback on exactly where the application is expanding energy, thus enabling developers to improve its energy-efficiency. Orka profiles an application using user-defined test ca ses, code injection techniques and bytecode analysis. Feedback provided is the energy usage at the method level as well as any consumption due to hardware used. Moreover, to be useful over the entire development life-cycle, this feedback is compared with feedback from previous versions of the application so as to monitor and improve the energy usage.
Miskin H, Gopalan A, 2016, The TuringLab Programming Environment: An online Python programming environment for challenge based learning, 8th International Conference on Computer Supported Education (CSEDU 2016)
Westfield B, Gopalan A, 2016, Orka: A New Technique to Profile the Energy Usage of Android Applications, 5th International Conference on Smart Cities and Green ICT Systems (SMARTGREENS) / 2nd International Conference on Vehicle Technology and Intelligent Transport Systems, Publisher: IEEE, Pages: 213-224
Pediaditakis D, Gopalan A, Dulay N, et al., 2012, Home network management policies: Putting the user in the loop, Pages: 9-16
Home networks are becoming increasingly complex but existing management solutions are not simple to use since they are not tailored to the needs of typical home-users. In this paper we present a new approach to home network management that allows users to formulate quite sophisticated "comic-strip" policies using an attractive iPad application. The policies are based on the management wishes of home users elicited in a user study. Comic-strip policies are passed to a Policy engine running on a new Home Network Router designed to facilitate a variety of management tasks. We illustrate our approach via a number end-to-end experiments in an actual home deployment, using our prototype implementation. © 2012 IEEE.
Increasingly organisations need to exchange and share data amongst their employees as well as with other organisations. This data is often sensitive and/or confidential, and access to it needs to be protected. Architectures to protect disseminated data have been proposed earlier, but absence of a trusted enforcement point on the end-user machine undermines the system security. The reason being, that an adversary can modify critical software components. In this paper, we present a policy-driven approach that allows us to prove the integrity of a system and which decouples authorisation logic from remote attestation. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.
Asmare E, Gopalan A, Sloman M, et al., 2012, Self-Management Framework for Mobile Autonomous Systems, Journal of Network and Systems Management, Vol: 20, Pages: 244-275
The advent of mobile and ubiquitous systems has enabled the de- velopment of autonomous systems such as wireless-sensors for environmental data collection and teams of collaborating Unmanned Autonomous Vehicles (UAVs) used in missions unsuitable for humans. However, with these range of new application-domains come a new challenge – enabling self-management in mobile autonomous systems. Autonomous systems have to be able to manage themselves individually as well as to form self-managing teams which are able to recover or adapt to failures, protect themselves from attacks and optimise performance.This paper proposes a novel distributed policy-based framework that en- ables autonomous systems of varying scale to perform self-management indi- vidually and as a team. The framework allows missions to be specified in terms of roles in an adaptable and reusable way, enables dynamic and secure team formation with a utility-based approach for optimal role assignment, caters for communication link maintenance amongst team-members and recovery from failure. Adaptive management is achieved by employing a policy-based archi- tecture to enable dynamic modification of the management strategy relating to resources, role behaviour, communications and team management, without interrupting the basic software within the system.Evaluation of the framework shows that it is scalable with respect to the number of roles, and consequently the number of autonomous systems par- ticipating in the mission. It is also shown to be optimal with respect to role assignments, and robust to intermittent communication link disconnections and permanent team-member failures.
Pediaditakis D, Gopalan A, Dulay N, et al., 2012, A Configuration Service for Home Networks, IEEE Network Operations and Management Symposium (NOMS 2012): Mini-Conference, Pages: 1048-1053
Gopalan A, Znati TF, 2012, Privacy-Preserving Location and Mobility Management To Support Tether-Free Patients in Ad-Hoc Networks, IEEE International Conference on Communications (ICC), Publisher: IEEE, ISSN: 1550-3607
Gopalan A, Karavanis S, Payne T, et al., 2011, Smartphone based e-Learning, Pages: 161-170
Children often attend schools intermittently in rural areas in Africa and India due to socio-economic conditions which make pupils augment their family income by working. An e-Learning solution could aid in raising the level of education by making it easier for children to fit schoolwork into the day, acting as a complement to when they are able to attend school. Traditional distance learning solutions based on computers are not suitable due to lack of infrastructure support. In this paper, we evaluate both text and voice based smartphone prototype environments which could provide the tools and services for pupils to download educational content, interact with teachers as well as other pupils to discuss topics. These have been implemented as a proof-of-concept and the initial evaluation feedback, although not from target users, was very promising. We intend to re-implement the prototype and do a proper evaluation with rural-area school children.
Gopalan A, Karavanis S, Payne T, et al., 2011, Smartphone Based E-Learning, 3rd Int. Conference on Computer Supported Education (CSEDU 2011), Publisher: SciTePress, Pages: 1-12
Children often attend schools intermittently in rural areas in Africa and India due to socio-economic conditions which make pupils augment their family income by working. An e-Learning solution could aid in raising the level of education by making it easier for children to fit schoolwork into the day, acting as a complement to when they are able to attend school. Traditional distance learning solutions based on computers are not suitable due to lack of infrastructure support. In this paper, we evaluate both text and voice based smartphone prototype environments which could provide the tools and services for pupils to download educational content, interact with teachers as well as other pupils to discuss topics. These have been implemented as a proof-of- concept and the initial evaluation feedback, although not from target users, was very promising. We intend to re-implement the prototype and do a proper evaluation with rural-area school children.
Gopalan A, Znati T, 2010, SARA: A service architecture for resource aware ubiquitous environments, PERVASIVE AND MOBILE COMPUTING, Vol: 6, Pages: 1-20, ISSN: 1574-1192
Asmare E, Gopalan A, Sloman M, et al., 2009, A Policy Based Management Architecture for Mobile Collaborative Teams, 2009 IEEE International Conference on Pervasive Computing and Communications (PerCom), Publisher: IEEE Computer Society, Pages: 169-174
AbstractùMany missions are deemed dangerous or impractical to perform by humans, but can use collaborating, self-managing Unmanned Autonomous Vehicles (UAVs) which adapt their behaviour to current context, recover from component failure or optimise performance. This paper describes a policy-based distributed self-management framework for both individual and teams of UAVs. We use three levels of specifications ù policy, mission class and mission instance to enable reuse of both policies and mission classes. The architecture has been tested on devices ranging from small laptops to body area networks. Initial evaluation shows the distributed architecture is scalable and outperforms a centralised mission management scheme.
Asmare E, Gopalan A, Sloman M, et al., 2009, A Mission Management Framework for Unmanned Autonomous Vehicles, 2nd International Mobilware Conference, Publisher: SPRINGER, Pages: 222-235, ISSN: 1867-8211
Unmanned Autonomous Vehicles (UAVs) are increasingly deployed for missions that are deemed dangerous or impractical to perform by humans in many military and disaster scenarios. UAVs in a team need to operate in sub-groups or independently to perform specific tasks, but still synchronise state information regularly and cope with intermittent communication failures as well as permanent UAV failures. This paper describes a failure management scheme that copes with failures, which may result in disjoint sub-networks within the team. A communication management protocol is proposed to control UAVs performing disconnected individual operations, while maintaining the team's structure by trying to ensure that all members of the mission rendezvous to communicate at intermittent intervals. The evaluation of the proposed approaches shows that the schemes are scalable and perform significantly better than similar centralised approaches.
Sloman M, Asmare E, Gopalan A, et al., 2008, Adaptive self-management of teams of autonomous vehicles, 6th International Workshop on Middleware for Pervasive and Ad-Hoc Computing, Pages: 1-6
Unmanned Autonomous Vehicles (UAVs) are increasingly deployed for missions that are deemed dangerous or impractical to perform by humans in many military and disaster scenarios. Collaborating UAVs in a team form a Self-Managed Cell (SMC) with at least one commander. UAVs in an SMC may need to operate independently or in sub-groups, out of contact with the commander and the rest of the team in order to perform specific tasks, but must still be able to eventually synchronise state information. The SMC must also cope with intermittent and permanent communication failures as well permanent UAV failures. This paper describes a failure management scheme that copes with both communication link and UAV failures, which may result in temporary disjoint sub-networks within the SMC. A communication management protocol is proposed to control UAVs performing disconnected individual operations, while maintaining the SMC's structure by trying to ensure that all members of the mission regardless of destination or task, can communicate by moving UAVs to act as relays or by allowing the UAVs to rendezvous at intermittent intervals.\r\n
Aly M, Gopalan A, Zhao J, et al., 2008, STDCS: A Spatio-Temporal Data-Centric Storage Scheme For Real-Time Sensornet Applications, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Publisher: IEEE
Dulay N, Sloman M, Lupu E, et al., 2008, Secure Distributed Self Management Framework for UXVs, Systems Engineering for Autonomous Systems Defence Technology Centre Conference, 2008
Aly M, Gopalan A, Youssef A, 2007, Load-Balancing Query Hotspots for Next-Generation Sensornet, IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, Publisher: IEEE
Aly M, Gopalan A, 2007, TOLB: A Traffic-Oblivious Load-Balancing Protocol for Next-Generation Sensornets, Publisher: Springer Berlin Heidelberg, Pages: 198-212
Li G, Znati T, Gopalan A, 2006, REAP: ring band-based energy adaptive protocol for information dissemination and forwarding in wireless sensor networks, International Journal of Sensor Networks, Vol: 1, Pages: 103-103, ISSN: 1748-1279
Gopalan A, Dwivedi S, Znati T, et al., 2005, On the Implementation and Performance of the (α, t) Protocol on Linux, SIMULATION, Vol: 81, Pages: 413-424, ISSN: 0037-5497
<jats:p> This article details the design and implementation of the (α, t) protocol, a clustering and routing protocol for ad hoc networks on Linux. Clustering and routing protocols that are developed are normally tested using simulations. Without actual implementation, it is very difficult to perceive how efficient and effective the protocol would prove to be in the real world. The (α, t)-cluster framework deals with a unified approach to adapt dynamically to changing network topology. Nodes are organized into clusters depending on the ability to bound the probability of path failure due to node movement. This clustering scheme forms the basis for an adaptive routing strategy wherein routes within a cluster are maintained proactively and routes between clusters are managed reactively. The authors conclude the article by discussing an experimental study to evaluate the performance of the (α, t) protocol. </jats:p>
Gopalan A, Znati T, 2005, A Context-Aware Data Forwarding Algorithm in Sensor Networks, 38th Annual Simulation Symposium, Publisher: IEEE
Gopalan A, Znati T, 2005, POST: A Peer-to-Peer Overlay Structure for Service and Application Deployment in MANETs, Publisher: Springer Berlin Heidelberg, Pages: 1006-1015, ISSN: 0302-9743
Gopalan A, Dwivedi S, Znati T, et al., 2004, On the implementation and (a,t) performance of the, 37th Annual Simulation Symposium, 2004., Publisher: IEEE
This data is extracted from the Web of Science and reproduced under a licence from Thomson Reuters. You may not copy or re-distribute this data in whole or in part without the written consent of the Science business of Thomson Reuters.