Arjun Kumar | Korea Advanced Institute of Science and Technology (original) (raw)

Arjun Kumar

Address: Korea, Republic of

less

Uploads

Publications by Arjun Kumar

Research paper thumbnail of Battery Health Estimation for IoT Devices using V-edge Dynamics

HotMobile '20: Proceedings of the 21st International Workshop on Mobile Computing Systems and Applications, 2020

Deployments of battery-powered IoT devices have become ubiquitous , monitoring everything from en... more Deployments of battery-powered IoT devices have become ubiquitous , monitoring everything from environmental conditions in smart cities to wildlife movements in remote areas. How to manage the life-cycle of sensors in such large-scale deployments is currently an open issue. Indeed, most deployments let sensors operate until they fail and fix or replace the sensors post-hoc. In this paper, we contribute by developing a new approach for facilitating the life-cycle management of large-scale sensor deployments through online estimation of battery health. Our approach relies on so-called V-edge dynamics which capture and characterize instantaneous voltage drops. Experiments carried out on a dataset of battery discharge measurements demonstrate that our approach is capable of estimating battery health with up to 80% accuracy, depending on the characteristics of the devices and the processing load they undergo. Our method is particularly well-suited for the sensor devices, operating dedicated tasks, that have constant discharge during their operation. CCS CONCEPTS • Computer systems organization → Embedded systems; • Hardware → Batteries; Sensor applications and deployments.

Research paper thumbnail of An Improved Divisibility Test Algorithm for Primality Testing

Security of information is a major concern now a days in the world. Cryptography plays a major ro... more Security of information is a major concern now a days in the world. Cryptography plays a major role in ensuring the safety of the information that is being transferred over the internet or any unsecure medium. Prime Numbers are very important aspect of any Cryptographic System and play a major role in
ensuring the safety of the concerned Cryptographic System. Currently there are various algorithms used for checking that a particular number is a prime or not. Few of the commonly used algorithms are Divisibility Test, Fermat Test, and Chinese Primality Test etc. This paper proposes an enhancement in the Divisibility Primality Testing algorithm that reduces the number of comparisons to be made and thus enhancing the performance of the algorithm. In addition to this the pseudo
code and implementation code of the improved algorithm are provided in detail. An analysis and comparison of the existing algorithm and the enhanced algorithm is also presented in the given paper.

Research paper thumbnail of Secure storage and access of data in cloud computing

Cloud computing is the most demanded advanced technology throughout the world. It is one of the m... more Cloud computing is the most demanded advanced
technology throughout the world. It is one of the most significant topic whose application is being researched in today’s time. One of the prominent services offered in cloud computing is the cloud storage. With the cloud storage, data is stored on multiple third party servers, rather than on the dedicated server used in traditional networked data storage. All data stored on multiple third party servers is not cared by the user and no one knows where exactly data saved. It is cared by the cloud storage provider that claims that they can protect the data but no one believes them. Data stored over cloud and flow through network in the plain text format is security threat. This paper proposes a method that allows user to store and access the data securely from the cloud storage. It also guarantees that no one except the authenticated user can access the data neither the cloud storage provider. This method ensures the security and privacy of data stored on cloud. A further advantage of this method is that if there is security breach at the cloud provider, the user’s data will continue to be secure since all data is encrypted. Users also need not to worry about cloud providers gaining access to their data illegally

Research paper thumbnail of Battery Health Estimation for IoT Devices using V-edge Dynamics

HotMobile '20: Proceedings of the 21st International Workshop on Mobile Computing Systems and Applications, 2020

Deployments of battery-powered IoT devices have become ubiquitous , monitoring everything from en... more Deployments of battery-powered IoT devices have become ubiquitous , monitoring everything from environmental conditions in smart cities to wildlife movements in remote areas. How to manage the life-cycle of sensors in such large-scale deployments is currently an open issue. Indeed, most deployments let sensors operate until they fail and fix or replace the sensors post-hoc. In this paper, we contribute by developing a new approach for facilitating the life-cycle management of large-scale sensor deployments through online estimation of battery health. Our approach relies on so-called V-edge dynamics which capture and characterize instantaneous voltage drops. Experiments carried out on a dataset of battery discharge measurements demonstrate that our approach is capable of estimating battery health with up to 80% accuracy, depending on the characteristics of the devices and the processing load they undergo. Our method is particularly well-suited for the sensor devices, operating dedicated tasks, that have constant discharge during their operation. CCS CONCEPTS • Computer systems organization → Embedded systems; • Hardware → Batteries; Sensor applications and deployments.

Research paper thumbnail of An Improved Divisibility Test Algorithm for Primality Testing

Security of information is a major concern now a days in the world. Cryptography plays a major ro... more Security of information is a major concern now a days in the world. Cryptography plays a major role in ensuring the safety of the information that is being transferred over the internet or any unsecure medium. Prime Numbers are very important aspect of any Cryptographic System and play a major role in
ensuring the safety of the concerned Cryptographic System. Currently there are various algorithms used for checking that a particular number is a prime or not. Few of the commonly used algorithms are Divisibility Test, Fermat Test, and Chinese Primality Test etc. This paper proposes an enhancement in the Divisibility Primality Testing algorithm that reduces the number of comparisons to be made and thus enhancing the performance of the algorithm. In addition to this the pseudo
code and implementation code of the improved algorithm are provided in detail. An analysis and comparison of the existing algorithm and the enhanced algorithm is also presented in the given paper.

Research paper thumbnail of Secure storage and access of data in cloud computing

Cloud computing is the most demanded advanced technology throughout the world. It is one of the m... more Cloud computing is the most demanded advanced
technology throughout the world. It is one of the most significant topic whose application is being researched in today’s time. One of the prominent services offered in cloud computing is the cloud storage. With the cloud storage, data is stored on multiple third party servers, rather than on the dedicated server used in traditional networked data storage. All data stored on multiple third party servers is not cared by the user and no one knows where exactly data saved. It is cared by the cloud storage provider that claims that they can protect the data but no one believes them. Data stored over cloud and flow through network in the plain text format is security threat. This paper proposes a method that allows user to store and access the data securely from the cloud storage. It also guarantees that no one except the authenticated user can access the data neither the cloud storage provider. This method ensures the security and privacy of data stored on cloud. A further advantage of this method is that if there is security breach at the cloud provider, the user’s data will continue to be secure since all data is encrypted. Users also need not to worry about cloud providers gaining access to their data illegally

Log In