Nithya Kumar

Nithya Kumar

Sunnyvale, California, United States
667 followers 500+ connections

About

Masters Computer Science graduate (Dec '17) from NC State University. Interested in the…

Activity

Join now to see all activity

Experience

  • CodePath Graphic
  • -

    San Jose, California, United States

  • -

    Sunnyvale, California, United States

  • -

    East Palo Alto, California, United States

  • -

    San Jose, California, United States

  • -

    Raleigh, North Carolina, United States

  • -

    Sunnyvale, California, United States

  • -

    Raleigh, North Carolina, United States

  • -

    Chennai, Tamil Nadu

  • -

    Chennai, Tamil Nadu

Education

Volunteer Experience

  • Juniper Networks Graphic

    Volunteer

    Juniper Networks

    - Present 7 years 2 months

    Children

    Served as a volunteer for Juniper's Internet Day event during my summer internship. Internet Day is Juniper's community service event. We, as Juniper Interns reached out to the community to teach elementary school students about the Internet and show them what a career in tech is like.
    https://www.youtube.com/watch?v=A3ep735g2pY

Publications

  • Secure file storage and retrieval in cloud

    International Journal of Information and Computer Security

    Security in cloud storage is an important aspect of cloud computing. In this paper, a novel multi-level encryption scheme which ensures security in cloud is introduced.

    In this scheme, a modified RSA (MRSA) key generation algorithm is used to generate the phase keys. The file is first subjected to encryption using MRSA with phase public keys. For secure transmission, a modified Vernam cipher (MVC) is applied to the file and stored in the cloud. Upon request, the file is obtained by…

    Security in cloud storage is an important aspect of cloud computing. In this paper, a novel multi-level encryption scheme which ensures security in cloud is introduced.

    In this scheme, a modified RSA (MRSA) key generation algorithm is used to generate the phase keys. The file is first subjected to encryption using MRSA with phase public keys. For secure transmission, a modified Vernam cipher (MVC) is applied to the file and stored in the cloud. Upon request, the file is obtained by applying inverse MVC followed by MRSA decryption using the phase private keys.

    Other authors
    See publication
  • An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)

    Journal of Information Security and Applications, Elsevier

    In this paper, a modified and an enhanced scheme based on RSA public-key cryptosystem is developed.

    The proposed algorithm makes use of four large prime numbers which increases the complexity of the system as compared to traditional RSA algorithm which is based on only two large prime numbers.

    Other authors
    See publication
  • Multi-level search space reduction framework for face image database

    International Journal of Intelligent Information Technologies, IGI Global

    In face recognition, searching and retrieval of relevant images from a large database form a major task.

    To address this issue, a Multi-Level Search Space Reduction framework for large scale face image database is proposed. The proposed approach identifies discriminating features and groups face images sharing similar properties using feature-weighted Fuzzy C-Means approach. A hierarchical tree model is then constructed inside every cluster based on the discriminating features which…

    In face recognition, searching and retrieval of relevant images from a large database form a major task.

    To address this issue, a Multi-Level Search Space Reduction framework for large scale face image database is proposed. The proposed approach identifies discriminating features and groups face images sharing similar properties using feature-weighted Fuzzy C-Means approach. A hierarchical tree model is then constructed inside every cluster based on the discriminating features which enables a branch based selection, thereby reducing the search space.

    See publication
  • EDSRPPC: An efficient data storage and retrieval through personalization and prediction in cloud

    IEEE Fifth International Conference on Advanced Computing (ICoAC), 2013

    In this paper, user centric personalization and prediction based searching techniques have been proposed to improve the data storage and retrieval services in cloud.

    Personalization is achieved by categorizing the user's files storage. The middleware is used as a support to the data owner, to perform all the necessary encryption and hashing required for secure storage. The data in the cloud server is partitioned into clusters based on the category and similarity. When a user requests for…

    In this paper, user centric personalization and prediction based searching techniques have been proposed to improve the data storage and retrieval services in cloud.

    Personalization is achieved by categorizing the user's files storage. The middleware is used as a support to the data owner, to perform all the necessary encryption and hashing required for secure storage. The data in the cloud server is partitioned into clusters based on the category and similarity. When a user requests for a file, the middleware receives a set of similar files from the cloud server from which the most relevant file is predicted and returned to the user based on the search log and access rights of the user by boosting and bagging techniques.

    See publication

Courses

  • Automated Learning and Data Analysis

    CSC 522

  • Cloud Computing

    IT9042

  • Cloud Computing Technology

    CSC 547

  • Computer Networks

    CSC 570

  • Computer Networks

    IT9303

  • Cryptography

    CSC 591

  • Cryptography and Security

    IT9402

  • Data Intensive Computing

    CSC 591

  • Database Management Systems

    CS9202

  • Database Management concepts and Systems

    CSC 540

  • Design and Analysis Of Algorithms

    CSC 505

  • Digital Image Processing

    IT9024

  • Distributed Systems

    IT9304

  • Formal Languages and Automata

    IT9251

  • Internet Programming

    CS9022

  • Multimedia Systems

    IT9302

  • Object Oriented Analysis and Design

    CS9301

  • Operating Systems

    CS9252

  • Operating Systems Principles

    CSC 501

  • Product Life Cycle Management

    EGR 507

  • Programming In .Net

    CS9045

  • Programming and Data Structures

    CS9203

  • Service Oriented Architecture

    IT9351

  • Software Engineering

    CSC 510

  • Software Engineering

    CS9254

  • User Interface Design

    IT9028

  • Web Technology

    CS9253

  • Wireless Networks

    IT9352

Projects

  • Concurrency Programming using POSIX Threads

    Develop a program using POSIX threads to find the number of occurrences of an input search string in a given new-line delimited source.
    Searches are parallelized among threads where each thread operates on a different data block (not necessarily terminated by a newline). The number of matches per block (partial result of a thread) may be stored in a global array that is aggregated in the main thread (after joining with other threads) to produce a final count.

    See project
  • Process Scheduling in XINU Operating System

    Implemented two new scheduling policies, viz., Exponential Distribution Scheduler and Linux-like Scheduler in XINU OS.

    1) Exponential Distribution Scheduler
    Scheduler chooses the next process based on a random value that follows the exponential distribution. When a rescheduling occurs, the scheduler generates a random number with the exponential distribution, and chooses a process with the lowest priority that is greater than the random number. If the random value is less than the…

    Implemented two new scheduling policies, viz., Exponential Distribution Scheduler and Linux-like Scheduler in XINU OS.

    1) Exponential Distribution Scheduler
    Scheduler chooses the next process based on a random value that follows the exponential distribution. When a rescheduling occurs, the scheduler generates a random number with the exponential distribution, and chooses a process with the lowest priority that is greater than the random number. If the random value is less than the lowest priority in the ready queue, the process with the lowest priority is chosen. If the random value is no less than the highest priority in the ready queue, the process with the largest priority is chosen. When there are processes having the same priority, they are scheduled in a round-robin way.

    2) Linux-like Scheduler
    Scheduler divides CPU time into continuous epochs. In each epoch, every existing process is allowed to execute up to a given time quantum, which specifies the maximum allowed time for a process within the current epoch. The time quantum for a process is computed and refreshed at the beginning of each epoch. If a process has used up its quantum during an epoch, it cannot be scheduled until another epoch starts. On the other hand, a process can be scheduled many times as long as it has not used up its time quantum.

    See project
  • Process Synchronization - Readers/Writers lock implementation in XINU

    Implemented readers-writers lock system in XINU adopting a priority inheritance protocol to avoid priority inversion problem.
    The priority inheritance protocol solves the problem of priority inversion by increasing the priority of the low priority process holding the lock to the priority of the high priority process waiting on the lock.

    See project
  • MapReduce performance evaluation on EC2 (HDFS HA) vs EMR - Online spam reviewers detection

    -

    1. Developed a MapReduce application framework to detect online spam reviewers and by building & comparing two infrastructure models viz., Hadoop HA on EC2 (with EBS) and EMR (with S3) to handle huge volumes of input data

    2. The project successfully detects spammers on different product reviews big datasets and also evaluates the performance of MapReduce on the built EC2 and EMR clusters.

    Other creators
    See project
  • SciBot - SCrum Intercede Bot

    -

    1. SciBot is a Slackbot, a lighter version of the Scrum master. It intends to assists the product owner (or Admin) and the product dev team adhere to the Scrum framework and ease their work in accomplishing the goal

    2. It assists software dev teams manage and maintain Scrum Agile; Supports interaction with Slack and GitHub Rest APIs

    Other creators
    See project
  • Demand paging in XINU OS

    -

    Developed a memory mapping scheme with support for demand paging, backing store management and page replacement (Aging and Second Chance)

    See project
  • Cloud for Big Data Analytics

    -

    The project focuses on developing an open source high performance Big Data Analytics Cloud infrastructure ​that will offer Analytics as a Service​ using OpenStack Platform 10.
    Host OS - RHEL 7.3 with KVM + QEMU as type-2 hypervisor.
    Base image for providing Platform as a Service is Ubuntu-16.04 LTS ​(Xenial Xerus) qcow2 image.
    Two customized images - one for DBs (low speed but high storage) and another for analytics (high speed low storage).
    The analytics image is mainly customized…

    The project focuses on developing an open source high performance Big Data Analytics Cloud infrastructure ​that will offer Analytics as a Service​ using OpenStack Platform 10.
    Host OS - RHEL 7.3 with KVM + QEMU as type-2 hypervisor.
    Base image for providing Platform as a Service is Ubuntu-16.04 LTS ​(Xenial Xerus) qcow2 image.
    Two customized images - one for DBs (low speed but high storage) and another for analytics (high speed low storage).
    The analytics image is mainly customized with: Nutch, Solr, Mortar and Portrait. The database image is configured with: Cassandra and PostgreSQL.

    Other creators
    See project
  • Movie Recommendation Application

    -

    Developed a movie recommendation application to recommend movies and genres to users based on their previous ratings by collaborative filtering using Apache Spark and kNN classification.

    Other creators
    See project
  • Systems Buffer & Recovery Management

    -

    The project aims to develop algorithms to track systems buffer pool, implement FIFO buffer replacement policy and perform Undo-Redo recovery management.

    Other creators
    See project
  • Health Management Database Application

    -

    Database application to assist people track and manage health status information using JDBC and Oracle DB integrated into a web GUI.

    The project attempts to build a health management system to keep track of patient's health (both healthy and otherwise) with a collaborative effort from doctors and health supporters.

    People can track their observations about certain health indicators and activities of daily living whose patterns can be reflective of their health status. Tracking…

    Database application to assist people track and manage health status information using JDBC and Oracle DB integrated into a web GUI.

    The project attempts to build a health management system to keep track of patient's health (both healthy and otherwise) with a collaborative effort from doctors and health supporters.

    People can track their observations about certain health indicators and activities of daily living whose patterns can be reflective of their health status. Tracking such information can help create alerts when something is wrong or when patients become slack about health management.

    Other creators
    See project
  • Secure File Storage and Retrieval in Cloud

    -

    A novel multi-level encryption scheme using enhanced RSA and MVC algorithms to make the cloud data safe from any kind of attacks is introduced.

    The system is designed for a community of users where any user can upload a file and share a secret key among all the users, thereby resulting in a mutually trusted multi-owner file sharing framework.

    Implemented using Java and Eucalyptus cloud.

    Other creators
    See project
  • Enhanced and Secured RSA Key Generation Scheme

    -

    An enhanced and secured RSA key generation scheme is proposed based on four prime numbers (instead of the conventional 2 prime number based RSA) along with a complex computation for the encryption key.

    Real-time cryptanalysis was performed to prove the efficiency of the scheme.

    Implemented using Java.

    Other creators
    See project
  • Search Space Reduction in Face Image Database with application to Face Recognition

    -

    Developed an efficient search space reduction methodology for retrieving matching image from large scale face image database using improved and novel data mining algorithms.

    This work was done as a part of the project proposal titled “Face Recognition System with video analytics” funded by Baba Atomic Research Centre-Board of Research in Nuclear Sciences (BARC-BRNS).

    Done under the guidance of Dr. V. Vaidehi, Director, AU-KBC Research Centre, Madras Institute of Technology, Anna…

    Developed an efficient search space reduction methodology for retrieving matching image from large scale face image database using improved and novel data mining algorithms.

    This work was done as a part of the project proposal titled “Face Recognition System with video analytics” funded by Baba Atomic Research Centre-Board of Research in Nuclear Sciences (BARC-BRNS).

    Done under the guidance of Dr. V. Vaidehi, Director, AU-KBC Research Centre, Madras Institute of Technology, Anna University, Chennai.

    Implemented using OpenCV and C++.

    Other creators
    See project
  • Personalization by means of Web Prediction

    -

    Designed a three-tier framework for categorized and secured data storage.

    Formulated a boosted clustering algorithm to ensure optimal information retrieval and high-level personalization.

    Funded by Centre for Technology Development and Transfer (CTDT), Anna University, Chennai, India.

    Done under the guidance of Dr. P. Varalakshmi, Assistant Professor (Sr. Gr.), Department of Computer Technology, Madras Institute of Technology, Anna University, Chennai.

    Implemented…

    Designed a three-tier framework for categorized and secured data storage.

    Formulated a boosted clustering algorithm to ensure optimal information retrieval and high-level personalization.

    Funded by Centre for Technology Development and Transfer (CTDT), Anna University, Chennai, India.

    Done under the guidance of Dr. P. Varalakshmi, Assistant Professor (Sr. Gr.), Department of Computer Technology, Madras Institute of Technology, Anna University, Chennai.

    Implemented using Java.

    Other creators
    See project
  • Highly Confidential Security System

    -

    Developed a secure web application using HTML, J2EE, AJAX and Web services to store confidential information (like passwords and credentials).

    In the back end, the data is stored in encrypted format and upon retrieval it is decrypted.

Honors & Awards

  • Cumulative Grade Point Average (CGPA) 10.0 in 1st Semester

    Anna University

    Received a gold coin from the Vice Chancellor, Anna University.

  • School Topper

    Prince Matriculation Higher Secondary School

    Received cash reward from the Principal, Prince Matriculation Higher Secondary School.

Test Scores

  • Graduate Record Examination (GRE)

    Score: 319/340

  • Test of English as a Foreign Language (TOEFL iBT)

    Score: 106/120

    28 (R) - 22 (L) - 27 (S) - 29 (W)

Languages

  • English

    Full professional proficiency

  • Tamil

    Native or bilingual proficiency

  • Hindi

    Elementary proficiency

  • Sanskrit

    Elementary proficiency

Recommendations received

More activity by Nithya

View Nithya’s full profile

  • See who you know in common
  • Get introduced
  • Contact Nithya directly
Join to view full profile

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Nithya Kumar in United States

Add new skills with these courses