Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mallikarjun Shankar is active.

Publication


Featured researches published by Mallikarjun Shankar.


Archive | 2009

Coverage in Wireless Sensor Networks

Jennifer C. Hou; David K. Y. Yau; Chris Y. T. Ma; Yong Yang; Honghai Zhang; I Hong Hou; Nageswara S. V. Rao; Mallikarjun Shankar

Ad-hoc networks of devices and sensors with (limited) sensing and wireless communication capabilities are becoming increasingly available for commercial and military applications. The first step in deploying these wireless sensor networks is to determine, with respect to application-specific performance criteria, (i) in the case that the sensors are static, where to deploy or activate them; and (ii) in the case that (a subset of) the sensors are mobile, how to plan the trajectory of the mobile sensors. These two cases are collectively termed as the coverage problem in wireless sensor networks. In this chapter, we give a comprehensive treatment of the coverage problem. Specifically, we first introduce several fundamental properties of coverage that have been derived in the literature and the corresponding algorithms that will realize these properties. While giving insights on how optimal operations can be devised, most of the properties are derived (and hence their corresponding algorithms are constructed) under the perfect disk assumption. Hence, we consider in the second part of the chapter coverage in a more realistic setting, and allow (i) the sensing area of a sensor to be anisotropic and of arbitrary shape, depending on the terrain and the meteorological conditions, and (ii) the utilities of coverage in different parts of the monitoring area to be nonuniform, to account for the impact of a threat on the population, or the likelihood of a threat taking place at certain locations. Finally, in the third part of the chapter, we consider mobile sensor coverage, and study how mobile sensors may navigate in a deployment area to maximize threat-based coverage.


2007 IEEE Power Engineering Society General Meeting | 2007

Integrated Hybrid-Simulation of Electric Power and Communications Systems

James J. Nutaro; Phani Teja Kuruganti; Laurie C. Miller; Sara Mullen; Mallikarjun Shankar

The modern power grid is strongly integrated with its communication network. While a power system primarily consists of elements that are modeled by continuous equations, a communication system has discrete event dynamics. We model the integrated operation of these two systems with a hybrid modeling and simulation technique. Systematically combining continuous and discrete event system models is necessary for correctly simulating critical system behaviors. This paper discusses an approach based on the discrete event system specification (DEVS) that characterizes the interaction of the two systems formally to preserve simulation correctness. We demonstrate the implementation of our integrated hybrid simulation technique with detailed generator and network models in a wide-area cooperative automatic load-control scenario.


information processing in sensor networks | 2008

Identification of Low-Level Point Radiation Sources Using a Sensor Network

Nageswara S. V. Rao; Mallikarjun Shankar; Jren-Chit Chin; David K. Y. Yau; Srinivasagopalan Srivathsan; S. Sitharama Iyengar; Yong Yang; Jennifer C. Hou

Identification of a low-level point radiation source amidst background radiation is achieved by a network of radiation sensors using a two-step approach. Based on measurements from three sensors, the geometric difference triangulation method is used to estimate the location and strength of the source. Then a sequential probability ratio test based on current measurements and estimated parameters is employed to finally decide: (1) the presence of a source with the estimated parameters, or (2) the absence of the source, or (3) the insufficiency of measurements to make a decision. This method achieves specified levels of false alarm and missed detection probabilities, while ensuring a close-to-minimal number of measurements for reaching a decision. This method minimizes the ghost-source problem of current estimation methods, and achieves a lower false alarm rate compared with current detection methods. This method is tested and demonstrated using: (1) simulations, and (2) a test-bed that utilizes the scaling properties of point radiation sources to emulate high intensity ones that cannot be easily and safely handled in laboratory experiments.


international conference on embedded networked sensor systems | 2008

Accurate localization of low-level radioactive source under noise and measurement errors

Jren-Chit Chin; David K. Y. Yau; Nageswara S. V. Rao; Yong Yang; Chris Y. T. Ma; Mallikarjun Shankar

The localization of a radioactive source can be solved in closed-form using 4 ideal sensors and the Apollonius circle in a noise- and error-free environment. When measurement errors and noise such as background radiation are considered, a larger number of sensors is needed to produce accurate results, particularly for extremely low source intensities. In this paper, we present an efficient fusion algorithm that can exploit measurements from n sensors to improve the localization accuracy, and show how the accuracy scales with n. We report testbed results for a 0.911 μCi source to illustrate the effectiveness of our algorithm, in particular performance comparisons with state-of-the-art fusion algorithms based on Mean of Estimates (MoE) and Maximum Likelihood Estimation (MLE). We show that ITP is more accurate than MoE, whereas the choice between ITP and MLE is generally a tradeoff between accuracy and run time efficiency. Higher-intensity radioactive sources are not safe for actual experiments. In this case, we present simulation results based on a validated simulation model. We show that a low-intensity 400 μCi source, similar to the radioactivity of a concealed dirty bomb, can be localized to within 32.5 m using a sensor density of about 1 per 1100 m2 in a surveillance area.


International Journal of Energy Sector Management | 2008

Integrated modeling of the electric grid, communications, and control

James J. Nutaro; Phani Teja Kuruganti; Mallikarjun Shankar; Laurie C. Miller; Sara Mullen

Purpose – This paper aims to address a central concern in modeling and simulating electric grids and the information infrastructure that monitors and controls them. The paper discusses the need for and methods to construct simulation models that include important interactions between the physical and computational elements of a large power system.Design/methodology/approach – The paper offers a particular approach to modeling and simulation of hybrid systems as an enabling technology for analysis (via simulation) of modern electric power grids. The approach, based on the discrete event system specification, integrates existing simulation tools into a unified simulation scheme. The paper demonstrates this approach with an integrated information and electric grid model of a distributed, automatic frequency maintenance activity.Findings – Power grid modernization efforts need powerful modeling and simulation tools for hybrid systems.Research limitations/implications – The main limitation of this approach is ...


Simulation | 2012

The split system approach to managing time in simulations of hybrid systems having continuous and discrete event components

James J. Nutaro; Phani Teja Kuruganti; Vladimir Protopopescu; Mallikarjun Shankar

The efficient and accurate management of time in simulations of hybrid models is an outstanding engineering problem. General a priori knowledge about the dynamic behavior of the hybrid system (i.e. essentially continuous, essentially discrete, or ‘truly hybrid’) facilitates this task. Indeed, for essentially discrete and essentially continuous systems, existing software packages can be conveniently used to perform quite sophisticated and satisfactory simulations. The situation is different for ‘truly hybrid’ systems, for which direct application of existing software packages results in a lengthy design process, cumbersome software assemblies, inaccurate results, or some combination of these independent of the designer’s a priori knowledge about the system’s structure and behavior. The main goal of this paper is to provide a methodology whereby simulation designers can use a priori knowledge about the hybrid model’s structure to build a straightforward, efficient, and accurate simulator with existing software packages. The proposed methodology is based on a formal decomposition and re-articulation of the hybrid system; this is the main theoretical result of the paper. To set the result in the right perspective, we briefly review the essentially continuous and essentially discrete approaches, which are illustrated with typical examples. Then we present our new, split system approach, first in a general formal context, then in three more specific guises that reflect the viewpoints of three main communities of hybrid system researchers and practitioners. For each of these variants we indicate an implementation path. Our approach is illustrated with an archetypal problem of power grid control.


conference on emerging network experiment and technology | 2008

Quality of monitoring of stochastic events by periodic & proportional-share scheduling of sensor coverage

David K. Y. Yau; Nung Kwan Yip; Chris Y. T. Ma; Nageswara S. V. Rao; Mallikarjun Shankar

We analyze the quality of monitoring (QoM) of stochastic events by a periodic sensor which monitors a point of interest (PoI) for q time every p time. We show how the amount of information captured at a PoI is affected by the proportion q/p, the time interval p over which the proportion is achieved, the event type, and the stochastic event arrival dynamics and staying times. The periodic PoI sensor schedule happens in two broad contexts. In the case of static sensors, a sensor monitoring a PoI may be periodically turned off to conserve energy, thereby extending the lifetime of the monitoring until the sensor can be recharged or replaced. In the case of mobile sensors, a sensor may move between the PoIs in a repeating visit schedule. In this case, the PoIs may vary in importance, and the scheduling objective is to distribute the sensors coverage time in proportion to the importance levels of the PoIs. Based on our QoM analysis, we optimize a class of periodic mobile coverage schedules that can achieve such proportional sharing while maximizing the QoM of the total system.


ACM Transactions on Sensor Networks | 2010

Quality of monitoring of stochastic events by periodic and proportional-share scheduling of sensor coverage

David K. Y. Yau; Nung Kwan Yip; Chris Y. T. Ma; Nageswara S. V. Rao; Mallikarjun Shankar

We analyze the quality of monitoring (QoM) of stochastic events by a periodic sensor which monitors a point of interest (PoI) for q time every p time. We show how the amount of information captured at a PoI is affected by the proportion q/p, the time interval p over which the proportion is achieved, the event type in terms of its stochastic arrival dynamics and staying times and the utility function. The periodic PoI sensor schedule happens in two broad contexts. In the case of static sensors, a sensor monitoring a PoI may be periodically turned off to conserve energy, thereby extending the lifetime of the monitoring until the sensor can be recharged or replaced. In the case of mobile sensors, a sensor may move between the PoIs in a repeating visit schedule. In this case, the PoIs may vary in importance, and the scheduling objective is to distribute the sensors coverage time in proportion to the importance levels of the PoIs. Based on our QoM analysis, we optimize a class of periodic mobile coverage schedules that can achieve such proportional sharing while maximizing the QoM of the total system.


IEEE Transactions on Mobile Computing | 2009

Matching and Fairness in Threat-Based Mobile Sensor Coverage

Chris Y. T. Ma; David K. Y. Yau; Jren-Chit Chin; Nageswara S. V. Rao; Mallikarjun Shankar

Mobile sensors can be used to effect complete coverage of a surveillance area for a given threat over time, thereby reducing the number of sensors necessary. The surveillance area may have a given threat profile as determined by the kind of threat, and accompanying meteorological, environmental, and human factors. In planning the movement of sensors, areas that are deemed higher threat should receive proportionately higher coverage. We propose a coverage algorithm for mobile sensors to achieve a coverage that will match - over the long term and as quantified by an RMSE metric - a given threat profile. Moreover, the algorithm has the following desirable properties: 1) stochastic, so that it is robust to contingencies and makes it hard for an adversary to anticipate the sensors movement, 2) efficient, and 3) practical, by avoiding movement over inaccessible areas. Further to matching, we argue that a fairness measure of performance over the shorter time scale is also important. We show that the RMSE and fairness are, in general, antagonistic, and argue for the need of a combined measure of performance, which we call efficacy. We show how a pause time parameter of the coverage algorithm can be used to control the trade-off between the RMSE and fairness, and present an efficient offline algorithm to determine the optimal pause time maximizing the efficacy. Finally, we discuss the effects of multiple sensors, under both independent and coordinated operation. Extensive simulation results - under realistic coverage scenarios - are presented for performance evaluation.


international conference on data engineering | 2014

Graph databases for large-scale healthcare systems: A framework for efficient data management and data services

Yubin Park; Mallikarjun Shankar; Byung H. Park; Joydeep Ghosh

Designing a database system for both efficient data management and data services has been one of the enduring challenges in the healthcare domain. In many healthcare systems, data services and data management are often viewed as two orthogonal tasks; data services refer to retrieval and analytic queries such as search, joins, statistical data extraction, and simple data mining algorithms, while data management refers to building error-tolerant and non-redundant database systems. The gap between service and management has resulted in rigid database systems and schemas that do not support effective analytics. We compose a rich graph structure from an abstracted healthcare RDBMS to illustrate how we can fill this gap in practice. We show how a healthcare graph can be automatically constructed from a normalized relational database using the proposed “3NF Equivalent Graph” (3EG) transformation. We discuss a set of real world graph queries such as finding self-referrals, shared providers, and collaborative filtering, and evaluate their performance over a relational database and its 3EG-transformed graph. Experimental results show that the graph representation serves as multiple de-normalized tables, thus reducing complexity in a database and enhancing data accessibility of users. Based on this finding, we propose an ensemble framework of databases for healthcare applications.

Collaboration


Dive into the Mallikarjun Shankar's collaboration.

Top Co-Authors

Avatar

Nageswara S. V. Rao

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Sangkeun Lee

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Bryan L. Gorman

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Supriya Chinthavali

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Chris Y. T. Ma

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

James J. Nutaro

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Randy M. Walker

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Sreenivas R. Sukumar

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Mohammed M. Olama

Oak Ridge National Laboratory

View shared research outputs
Researchain Logo
Decentralizing Knowledge