Qualification: 
Ph.D
jinesh@am.amrita.edu

Dr. Jinesh M. K. currently serves as an Assistant Professor (Senior Grade) at the department of Computer Science and Applications, School of Engineering, Amritapuri Campus. He received his doctorate in Computer Science from Amrita Vishwa Vidyapeetham.

Publications

Publication Type: Journal Article

Year of Publication Publication Type Title

2018

Journal Article

Manjusha Nair, Jinesh, M. K., Jayaraman, B., Dr. Bipin G. Nair, and Dr. Shyam Diwakar, “Temporal constrained objects for modelling neuronal dynamics”, PeerJ Computer Science, vol. 4, p. e159, 2018.[Abstract]


Background Several new programming languages and technologies have emerged in the past few decades in order to ease the task of modelling complex systems. Modelling the dynamics of complex systems requires various levels of abstractions and reductive measures in representing the underlying behaviour. This also often requires making a trade-off between how realistic a model should be in order to address the scientific questions of interest and the computational tractability of the model. Methods In this paper, we propose a novel programming paradigm, called \textit{temporal constrained objects,} which facilitates a principled approach to modelling complex dynamical systems. \textit{Temporal constrained objects} are an extension of \textit{constrained objects} with a focus on the analysis and prediction of the dynamic behaviour of a system. The structural aspects of a neuronal system are represented using objects, as in object-oriented languages, while the dynamic behaviour of neurons and synapses are modelled using declarative temporal constraints. Computation in this paradigm is a process of constraint satisfaction within a time-based simulation. Results We identified the feasibility and practicality in automatically mapping different kinds of neuron and synapse models to the constraints of \textit{temporal constrained objects}. Simple neuronal networks were modelled by composing circuit components, implicitly satisfying the internal constraints of each component and interface constraints of the composition. Simulations show that \textit{temporal constrained objects} provide significant conciseness in the formulation of these models. The underlying computational engine employed here automatically finds the solutions to the problems stated, reducing the code for modelling and simulation control. All examples reported in this paper have been programmed and successfully tested using the prototype language called TCOB. The code along with the programming environment are available at http://github.com/compneuro/TCOB_Neuron. Discussion \textit{Temporal constrained objects} provide powerful capabilities for modelling the structural and dynamic aspects of neural systems. Capabilities of the constraint programming paradigm, such as declarative specification, the ability to express partial information and non-directionality, and capabilities of the object-oriented paradigm especially aggregation and inheritance, make this paradigm the right candidate for complex systems and computational modelling studies. With the advent of multi-core parallel computer architectures and techniques or parallel constraint-solving, the paradigm of \textit{temporal constrained objects} lends itself to highly efficient execution which is necessary for modelling and simulation of large brain circuits.

More »»

2017

Journal Article

J. M. Kannimoola, Jayaraman, B., Tambay, P., Achuthan, K., and Jinesh, M. K., “Temporal constrained objects: Application and implementation”, Computer Languages, Systems and Structures, vol. 49, pp. 82-100, 2017.[Abstract]


We present a novel programming concept called temporal constrained objects for modeling of dynamic systems. It is an extension of the paradigm of constrained objects which provides a principled approach to modeling complex engineering systems based upon two main principles: a compositional specification of the structure of the system, using objects, and a declarative specification of its behavior, using constraints. A novel feature of temporal constrained objects is the series variable, the sequence of whose values is determined by constraints that include metric temporal operators. The emergent behavior of a dynamic system is determined through a process of time-based simulation and constraint satisfaction at each step. Each class definition for a temporal constrained object is translated into a Prolog rule with constraint-solving capability. In order to improve the performance for long simulations, a partial evaluation technique is adopted for optimized code generation. This paper describes the syntax of a language called TCOB along with several examples, our objective being to demonstrate the benefits of the programming paradigm. TCOB has been implemented and all examples presented in this paper were tested using this implementation. An overview of the translation as well as partial execution and its performance improvements are presented in the paper. © 2017 Elsevier Ltd

More »»

Publication Type: Conference Paper

Year of Publication Publication Type Title

2017

Conference Paper

N. Mannilthodi and Jinesh, M. K., “Secure IoT: An improbable reality”, in IoTBDS 2017 - Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, 2017, pp. 338-343.[Abstract]


Internet of Things(IoT) has been the buzzword for the past decade. Apart from its hype over opportunities, the security implications of IoT are unsolvable with current technologies. There is a wide range of security challenges in each layer of IoT conceptual model. We discuss the security challenges caused by the complex structures and integration of different techniques from diverse domains. By analysing attacks at the various layers we argue that the current standards are not enough to provide a secure framework for IoT. The economical and practical reasons make it impossible to puzzle out the various security challenges in IoT stack. From this perspective, we should think twice before connecting a device to the network of things. Copyright © 2017 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.

More »»

2016

Conference Paper

M. K. Jinesh, Jayaraman, B., and Dr. Krishnashree Achuthan, “Dynamic Constrained Objects for Vehicular Network Modeling”, in AFMSS 2016, Banglore, 2016, pp. 41–52.

2015

Conference Paper

L. Mohan, Jinesh, M. K., Bipin, K., Harikrishnan, P., and Shiju Sathyadevan, “Implementation of Scatternet in an Intelligent IoT Gateway”, in Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2, Hyderabad, 2015, vol. 338, pp. 275–287.[Abstract]


Anything and everything will be connected in the world of IoT. This allows a ubiquitous communication around the world. The communication can be a sensed data from the physical world, or control signal for a device or else a usual internet data communication. There can be several ways with which the real world device can communicate to the IoT platform. Bluetooth is one such technology which allows communication between a device in the real world and IoT network. Bluetooth Scatternet concept, gives a bluetooth network the capability to support multiple concurrent bluetooth device communication over a wide area.. This paper discuss about a custom build intra and inter piconet scheduling model and its real-time validation on our own IoT platform which includes the Gateway, AGway (Amrita Gateway) and Middleware, AIoTm (Amrita Internet of Things Middleware). The paper emphasis on scatternet building and scatternet maintenance. The entire implementation is based on the linux bluetooth stack Blue-Z.

More »»

2015

Conference Paper

Shiju Sathyadevan, Kalarickal, B. S., and Jinesh, M. K., “Security, Trust and Implementation Limitations of Prominent IoT Platforms”, in Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014: Volume 2, Advances in Intelligent Systems and Computing, Cham, 2015, vol. 2, pp. 85–95.[Abstract]


Internet of Things (IoT) is indeed a novel technology wave that is bound to make its mark, where anything and everything (Physical objects) is able to communicate over an extended network using both wired and wireless protocols. The term “physical objects” means that any hardware device that can sense a real world parameter and can push the output based on that reading. Considering the number of such devices, volume of data they generate and the security concerns, not only from a communication perspective but also from its mere physical presence outside a secure/monitored vault demands innovative architectural approaches, applications and end user systems. A middleware platform/framework for IoT should be able to handle communication between these heterogeneous devices, their discoveries and services it offers in real time. A move from internet of computers to internet of anything and everything is increasing the span of security threats and risks. A comparative study of existing prominent IoT platforms will help in identifying the limitations and gaps thereby acting as the benchmark in building an efficient solution. More »»

2014

Conference Paper

Shiju Sathyadevan, Akhila, C. A., and Jinesh, M. K., “Customizing EPCglobal to Fit Local ONS Requirements”, in Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 308 of the series Advances in Intelligent Systems and Computing , 2014, vol. 320, pp. 21–30.[Abstract]


Internet of Things (IoT) is the new network of physical object that has the ability to automatically transfer data over a network. This paper proposes an architecture to extend the current object identification scheme in order to custom build the same to uniquely identify each object associated with an RFID tag. The electronic product code (EPC) is a very popularly used identification scheme to identify objects and is stored in the RFID tags. The work described in this paper is based on the EPCglobal framework. Our research study focused primarily on extending the EPCglobal framework, thereby defining a customized identification scheme for each object in an IoT platform. A lookup called object naming service (ONS) is used to locate information about these objects in the EPC network. Object name service makes use of Internet’s existing domain name system (DNS) for looking up information about an EPC.

More »»

2014

Conference Paper

Shiju Sathyadevan, ,, ,, and Jinesh, M. K., “Implementing Scatternet to Enhance Bluetooth Communication Capability”, in CSI Hyderabad, 2014.

Publication Type: Book Chapter

Year of Publication Publication Type Title

2017

Book Chapter

M. K. Jinesh, Jayaraman, B., and Dr. Krishnashree Achuthan, “Dynamic Constrained Objects for Vehicular Network Modeling”, in Formal Methods for Safety and Security: Case Studies for Aerospace Applications, M. Nanda and Jeppu, Y. Singapore: Springer Singapore, 2017, pp. 41–52.[Abstract]


We present a paradigm called dynamic constrained objects for a declarative approach to modeling complex systems. In the basic paradigm of constrained objects, the structure of a complex system is specified through objects (as in object-oriented languages), while the behavior of a complex system is specified declaratively through constraints (as in constraint languages). The emergent behavior of such a complex system is deduced through a process of constraint satisfaction. Our focus in this paper is on systems whose states change with time. Such time-varying behaviors are fundamental in many domains, especially in mission and safety-critical applications. We present an extension of constrained objects with special metric temporal operators over time-series data, and we discuss their properties. We refer to the resulting paradigm as dynamic constrained objects and we illustrate their use for vehicular network modeling. Here, the network of roads and the roadside infrastructure are specified through objects, and the movement of vehicles and associated safety and liveness conditions are specified through time-series variables and metric temporal operators. The paper presents a language called DCOB, for dynamic constrained objectsConstraint object, and examples of its use for vehicular network modeling.

More »»

2016

Book Chapter

M. K. Jinesh, Jayaraman, B., and Dr. Krishnashree Achuthan, “Sybil Attack Detection in Vehicular Networks”, in Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, CRC Press, 2016, pp. 35 -51.[Abstract]


Vehicular communication intends to improve the traffic safety for decreasing number of accidents and manages traffic for saving money and time. In vehicular communication, vehicles communicate wirelessly and so security of this network against attackers should be considered. To become a real technology that has public safety on the roads, vehicular ad hoc network (VANET) needs appropriate security architecture. Secure architecture should protect it from different types of security attacks and preserve privacy for drivers. One of these attacks against ad-hoc networks is Sybil attack that attacker is creating multiple identities that are identities belonging to other vehicles or dummy identities made by the attacker. Attacker is using them to gain a disproportionately large influence in the network leading to accidents or causing delay in some services for the driver using only one physical device. In this paper we present a case study of different selective methods for Sybil attack detection in vehicular networks and discuss about advantages and disadvantages of them for real implementation.

More »»
Binary Data
Faculty Research Interest: 
207
PROGRAMS
OFFERED
6
AMRITA
CAMPUSES
15
CONSTITUENT
SCHOOLS
A
GRADE BY
NAAC, MHRD
8th
RANK(INDIA):
NIRF 2018
150+
INTERNATIONAL
PARTNERS