Books / Tools
Prof. Ratnesh Kumar’s research area is, “ESSeNCE: Embedded Software, Sensors, Networks, Cyberphysical, Energy”, spanning Sensors, Data Analytics, Networks, Controls, and Formal Methods for Correctness/Accuracy, Efficiency, Safety, Stability, Security, Resiliency, Diagnosability, and Prognosability, in Cyber-Physical (Hybrid) and Embedded and Real-time Systems, Model-based Software and Web-services, Agri-, Bio- and Envionmental Sensing, Wearables, and Power Grid and Energy Harvesting. For full list of publications, refer Ratnesh Kumar’s CV
Prof. Kumar has published extensively in the areas of ESSeNCE: 374 peer reviewed articles (139 Journal articles, 209 Conference articles, and 12 book-chapters, 1 Textbook, and 13 Patents—9 already awarded, and 5 already licensed by companies).
Tools
Books
@book{Kumar_1995_book, doi = {10.1007/978-1-4615-2217-1}, url = {https://doi.org/10.1007/978-1-4615-2217-1}, year = {1995}, publisher = {Springer {US}}, author = {Kumar, Ratnesh and Garg, Vijay K.}, title = {Modeling and Control of Logical Discrete Event Systems} }
For more information, visit this page
Book Chapters
@inbook{takai2018inference, title = {Inference-Based and Modular Decentralized Control of Manufacturing Systems with Event-Driven Dynamics}, author = {Takai, Shigemasa and Kumar, Ratnesh}, booktitle = {Formal Methods in Manufacturing}, pages = {315--342}, year = {2018}, publisher = {CRC Press}, url = {https://www.taylorfrancis.com/chapters/edit/10.1201/9781315216140-11/} }
Unlike information, behaviors cannot be encrypted and may instead be protected by providing covers that generate indistinguishable observations from behaviors needed to be kept secret. Such a scheme may still leak information about secrets due to statistical difference between the occurrence probabilities of the secrets and their covers. Jensen-Shannon Divergence (JSD) is a possible means of quantifying statistical difference between two distributions and can be used to measure such information leak as is presented in this chapter. Using JSD, we quantify loss of secrecy in stochastic partially-observed discrete event systems in two settings: (i) the centralized setting, corresponding to a single attacker/observer, and (ii) the distributed collusive setting, corresponding to multiple attackers/observers, exchanging their observed information. In the centralized case, an observer structure is formed and used to aide the computation of JSD, in the limit, as the length of observations approach infinity to quantify the worst case loss of secrecy. In the distributed collusive case, channel models are introduced to extend the system model to capture the effect of exchange of observations, that allows the JSD computation of the centralized case to be applied over the extended model to measure the distributed secrecy loss.
@inbook{Ibrahim2016, author = {Ibrahim, Mariam and Chen, Jun and Kumar, Ratnesh}, editor = {Pricop, Emil and Stamatescu, Grigore}, title = {Quantification of Centralized/Distributed Secrecy in Stochastic Discrete Event Systems}, booktitle = {Recent Advances in Systems Safety and Security}, year = {2016}, publisher = {Springer International Publishing}, address = {Cham}, pages = {21--40}, isbn = {978-3-319-32525-5}, doi = {10.1007/978-3-319-32525-5_2}, url = {https://doi.org/10.1007/978-3-319-32525-5_2} }
This chapter introduces models for power transmission system enhancement by integrating economic analysis of the transmission cost to accommodate an informed business decision. Continuous and discrete control schemes are proposed as an alternative to transmission expansion to optimize cost effectiveness. Furthermore, this chapter investigates complex planning issues such as transmission limits and general models of series and shunt capacitor switching that allow the planner to carry out an analysis of electricity market efficiency using alternate transmission expansion scenarios. An interesting conclusion is provided that advocates the design of an electricity market based on control expansion efficiency.
@inbook{mccalley2009book, title = {Models for Transmission Expansion Planning Based on Reconfigurable Capacitor Switching}, keywords = {Market efficiency and transmission investment, Models for transmission expansion planning based on reconfigurable capacitor switching, Planning processes-engineering analyses and cost responsibilities}, author = {Mccalley, James and Kumar, Ratnesh and Ajjarapu, Venkataramana and Volij, Oscar and Liu, Haifeng and Jin, Licheng and Shang, Wenzhuo}, year = {2009}, month = dec, day = {7}, doi = {10.1002/9780470529164.ch9}, language = {English}, isbn = {9780470472088}, pages = {181--236}, booktitle = {Economic Market Design and Planning for Electric Power Systems}, publisher = {John Wiley {\&} Sons Inc.}, address = {United States} }
In this paper we introduce and study the notion of safety control of stochastic discrete event systems (DESs), modeled as controlled Markov chains. For non-stochastic DES’s, modeled by state machines or automata, safety is specified as a set of forbidden states, or equivalently by a binary valued vector that imposes an upper bound on the set of states permitted to be visited. We generalize this notion of safety to the setting of stochastic DESs by specifying it as an unit-interval valued vector that imposes an upper bound on the state probability distribution vector. Under the assumption of complete state observation, we identify (i) the set of all state feedback controllers that satisfy the safety requirement for any given safe initial state probability distribution, and (ii) the set of all safe initial state probability distributions for a given state feedback controller.
@inbook{arapostathis2000book, author = {Arapostathis, Aristotle and Kumar, Ratnesh and Tangirala, Sekhar}, editor = {Boel, R. and Stremersch, G.}, title = {Safety Control of Completely Observed Markov Chains}, booktitle = {Discrete Event Systems: Analysis and Control}, year = {2000}, publisher = {Springer US}, address = {Boston, MA}, pages = {421--428}, isbn = {978-1-4615-4493-7}, doi = {10.1007/978-1-4615-4493-7_44}, url = {https://doi.org/10.1007/978-1-4615-4493-7_44} }
This chapter explores the design of wireless sensor networks for applications in precision agriculture. A short review of developments in precision agriculture and recent applications of wireless sensor networks in the area is presented. The authors present their design of medium access control and network layer protocols exploring the challenges and opportunities associated with the design of such a networked system. The physical layer in their network allows multiple power modes in both receive and transmit operations. The MAC layer employs these multiple power modes to implement a novel wake-up synchronization mechanism to reduce the energy overhead. The network layer ensures reliable collection of data while balancing the energy consumption among the nodes. Finally, the authors present an analytical approach to model the behavior of the MAC protocol developed and compare it against the duty-cycle based S-MAC protocol. The results are also confirmed using simulations.
@inbook{Sahota2015, author = {Sahota, Herman S and Kumar, Ratnesh and Kamal, Ahmed E}, booktitle = {Advances in Wireless Technologies and Telecommunication}, doi = {10.4018/978-1-4666-8251-1.ch003}, pages = {56--82}, publisher = {{IGI} Global}, title = {Network Design and Performance Evaluation of Wireless Sensor Network for Precision Agriculture}, url = {https://doi.org/10.4018/978-1-4666-8251-1.ch003} }