首页 > 最新文献

2013 International Conference on Recent Trends in Information Technology (ICRTIT)最新文献

英文 中文
Image recovery from reduced sparse measurements by compressed sensing based on wavelet transform 基于小波变换的压缩感知降稀疏测量图像恢复
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844211
S. Harish, R. Hemalatha, S. Radha
In traditional sampling methods, images are sampled at the Nyquist rate for perfect reconstruction. But most of these acquired data samples are discarded during compression. Compressed Sensing (CS) overcomes this problem by combining the acquisition and compression process. Most of the images are sparse in some domain and thus can be recovered from reduced number of samples than the Nyquist rate. The quality of reconstruction depends upon the sparsity level of the image. Contourlet transform is used to obtain the sparse representation of the image while the wavelet transform reduces the complexity of the compressed sensing algorithm. Thus both the transforms are combined to achieve better recovery from reduced number of sparse measurements. The low frequency wavelet subband contains most of the information and thus more number of samples is taken from this band. The high frequency wavelet bands contain lesser amount of data and thus reduced number of samples is taken from these bands. The recovered image is smoothened by using the Hybrid Mean Median (HMM) Filter because of its nature of preserving the sharp edges in the image. Hence higher quality image is obtained from very less measurements.
在传统的采样方法中,为了实现完美的重构,图像都是按照奈奎斯特速率进行采样的。但在压缩过程中,这些采集到的数据样本大多被丢弃。压缩感知(CS)通过将采集和压缩过程结合起来,克服了这一问题。大多数图像在某些域中是稀疏的,因此可以从比奈奎斯特率更少的样本数中恢复。重建的质量取决于图像的稀疏度。采用轮廓波变换获得图像的稀疏表示,小波变换降低了压缩感知算法的复杂度。因此,这两种变换结合起来,从减少的稀疏测量数量中获得更好的恢复。低频小波子带包含了大部分的信息,因此从低频小波子带中提取的样本数量较多。高频小波带包含的数据量较少,因此从高频小波带中提取的样本数量较少。利用混合均值中值滤波保留图像锐利边缘的特点,对恢复后的图像进行平滑处理。因此,用很少的测量就能获得高质量的图像。
{"title":"Image recovery from reduced sparse measurements by compressed sensing based on wavelet transform","authors":"S. Harish, R. Hemalatha, S. Radha","doi":"10.1109/ICRTIT.2013.6844211","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844211","url":null,"abstract":"In traditional sampling methods, images are sampled at the Nyquist rate for perfect reconstruction. But most of these acquired data samples are discarded during compression. Compressed Sensing (CS) overcomes this problem by combining the acquisition and compression process. Most of the images are sparse in some domain and thus can be recovered from reduced number of samples than the Nyquist rate. The quality of reconstruction depends upon the sparsity level of the image. Contourlet transform is used to obtain the sparse representation of the image while the wavelet transform reduces the complexity of the compressed sensing algorithm. Thus both the transforms are combined to achieve better recovery from reduced number of sparse measurements. The low frequency wavelet subband contains most of the information and thus more number of samples is taken from this band. The high frequency wavelet bands contain lesser amount of data and thus reduced number of samples is taken from these bands. The recovered image is smoothened by using the Hybrid Mean Median (HMM) Filter because of its nature of preserving the sharp edges in the image. Hence higher quality image is obtained from very less measurements.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131058704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance evaluation and comparison of multilingual speech synthesizers for Indian languages 印度语言多语种语音合成器的性能评价与比较
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844268
M. Jeeva, B. Ramani, P. Vijayalakshmi
Given an input text, a text-to-speech (TTS) system is expected to produce a speech signal that is highly intelligible to human listener. State-of-the art synthesis approaches are: unit selection-based concatenative speech synthesis (USS) and hidden Markov model (HMM)-based speech synthesis (HTS). In USS approach, pre-recorded speech units are selected according to the given text and concatenated to produce synthetic speech whereas in HTS approach, features are extracted from the speech units and the context dependent HMMs are trained for these units. These models are concatenated to form sentence HMMs, which synthesize speech for the given text, by extracting features from them and passing it through corresponding source-system filters. For Indian languages, building a speech synthesizer for each language is laborious. In this work, monolingual and multilingual speech synthesizers are developed in the state-of-the-art approaches and the performances are compared for both the systems. Based on the acoustic similarities across Indian languages, a common phoneset and a question set is derived for four of the Indian languages namely, Tamil, Telugu, Malayalam, and Hindi. The performance of the synthesizers developed are evaluated using mean opinion score (MOS) derived from the listeners. The average MOS ranges from 2.57 to 3.88 for the monolingual and multilingual systems.
给定输入文本,文本到语音(TTS)系统期望产生人类听者高度可理解的语音信号。最先进的合成方法是:基于单元选择的连接语音合成(USS)和基于隐马尔可夫模型(HMM)的语音合成(HTS)。在USS方法中,根据给定的文本选择预录制的语音单元并将其连接以生成合成语音,而在HTS方法中,从语音单元中提取特征,并针对这些单元训练与上下文相关的hmm。这些模型被连接起来形成句子hmm,通过从给定文本中提取特征并将其传递给相应的源系统过滤器来合成语音。对于印度语言来说,为每种语言建立一个语音合成器是很费力的。在这项工作中,单语言和多语言语音合成器以最先进的方法开发,并对两种系统的性能进行了比较。基于印度语言之间的声学相似性,为泰米尔语、泰卢固语、马拉雅拉姆语和印地语这四种印度语言衍生出了一个通用的电话机和一个问题集。所开发的合成器的性能使用来自听众的平均意见评分(MOS)进行评估。单语和多语系统的平均MOS从2.57到3.88不等。
{"title":"Performance evaluation and comparison of multilingual speech synthesizers for Indian languages","authors":"M. Jeeva, B. Ramani, P. Vijayalakshmi","doi":"10.1109/ICRTIT.2013.6844268","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844268","url":null,"abstract":"Given an input text, a text-to-speech (TTS) system is expected to produce a speech signal that is highly intelligible to human listener. State-of-the art synthesis approaches are: unit selection-based concatenative speech synthesis (USS) and hidden Markov model (HMM)-based speech synthesis (HTS). In USS approach, pre-recorded speech units are selected according to the given text and concatenated to produce synthetic speech whereas in HTS approach, features are extracted from the speech units and the context dependent HMMs are trained for these units. These models are concatenated to form sentence HMMs, which synthesize speech for the given text, by extracting features from them and passing it through corresponding source-system filters. For Indian languages, building a speech synthesizer for each language is laborious. In this work, monolingual and multilingual speech synthesizers are developed in the state-of-the-art approaches and the performances are compared for both the systems. Based on the acoustic similarities across Indian languages, a common phoneset and a question set is derived for four of the Indian languages namely, Tamil, Telugu, Malayalam, and Hindi. The performance of the synthesizers developed are evaluated using mean opinion score (MOS) derived from the listeners. The average MOS ranges from 2.57 to 3.88 for the monolingual and multilingual systems.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129480182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Revolutionizing the “DULL” Passport 彻底改变“无趣”护照
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844258
S. Ghatak, P. Nayak, T. Sindhura
In the proposed technique, the first idea of a novel elucidation has been proposed to shelter dull Passport. The contemporary state of dull Passport be defeated by proper Passport verification along with Passport owner authentication. The proposed solution space ensures security against these two which is candidly adoptable in the current milieu of India. As Verification and Authentication are two special stream of Cryptography; the only way to lock facts, proposed contrivance is based on Visual Cryptography and Palm Vein based authentication practice. As a fact of multimedia data hiding, Visual Cryptography is a well-known method of encrypting images into several shares where stacking corresponding shares reveals secrets without intervention of any electronic devices. Palm Vein based biometric is already implemented for user authentication in many countries throughout the world. It is an on-going technology which is very easy to implement and cost effective with respect to resources and time. The said proposal will verify dull Passport through Visual Cryptography and authenticate dull Passport holder at various checkpoints through Palm Vein Authentication in the form of a Multilayer cryptographic technique. The performance of the proposed Visual Cryptographic algorithm is also compared with some existing algorithms. The comparisons shows that the proposed algorithm is better than the existing algorithms with respect to space requirement, Meaningfulness, and security.
在提出的技术中,提出了一种新的解释的第一个想法,以保护沉闷的护照。通过适当的护照验证和护照所有者验证,可以解决当代护照无价值的问题。建议的解决方案空间确保了对这两种情况的安全,这在印度当前的环境中是可以接受的。由于验证和认证是密码学的两个特殊流;锁定事实的唯一方法是基于视觉密码学和基于手掌静脉的认证实践。作为多媒体数据隐藏的事实,视觉加密是一种众所周知的将图像加密成多个共享的方法,在没有任何电子设备干预的情况下,将相应的共享堆叠在一起就可以显示秘密。基于手掌静脉的生物识别技术已经在世界上许多国家用于用户认证。这是一项持续发展的技术,非常容易实施,并且在资源和时间方面具有成本效益。该方案将通过视觉加密技术验证钝护照,并以多层加密技术的形式通过棕榈静脉认证在各个检查点对钝护照持有人进行认证。并将所提出的视觉密码算法的性能与现有算法进行了比较。比较表明,该算法在空间要求、意义和安全性方面都优于现有算法。
{"title":"Revolutionizing the “DULL” Passport","authors":"S. Ghatak, P. Nayak, T. Sindhura","doi":"10.1109/ICRTIT.2013.6844258","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844258","url":null,"abstract":"In the proposed technique, the first idea of a novel elucidation has been proposed to shelter dull Passport. The contemporary state of dull Passport be defeated by proper Passport verification along with Passport owner authentication. The proposed solution space ensures security against these two which is candidly adoptable in the current milieu of India. As Verification and Authentication are two special stream of Cryptography; the only way to lock facts, proposed contrivance is based on Visual Cryptography and Palm Vein based authentication practice. As a fact of multimedia data hiding, Visual Cryptography is a well-known method of encrypting images into several shares where stacking corresponding shares reveals secrets without intervention of any electronic devices. Palm Vein based biometric is already implemented for user authentication in many countries throughout the world. It is an on-going technology which is very easy to implement and cost effective with respect to resources and time. The said proposal will verify dull Passport through Visual Cryptography and authenticate dull Passport holder at various checkpoints through Palm Vein Authentication in the form of a Multilayer cryptographic technique. The performance of the proposed Visual Cryptographic algorithm is also compared with some existing algorithms. The comparisons shows that the proposed algorithm is better than the existing algorithms with respect to space requirement, Meaningfulness, and security.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122122889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On fly search approach for compact XML 紧凑XML的实时搜索方法
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844228
R. Sathiaseelan, Sriram Sitharaman, R. B. Subramanian, R. Senthilkumar
Information Retrieval system produces the result in the order of the most relevant to the least, for given keywords. The user need to know the exact path of the query in the case of retrieval from an XML document or Compact storage structure, this becomes a hurdle for a novice user and it makes the system suitable only for experts. The On Fly Search (OFS) method has been proposed to make the system suitable for all the users and thus helps the users to search the compact storage structures without any knowledge about the content or about the path of the query. It also extends to support the auto complete method for multiple keyword queries. The typographical errors in the query are removed by the usage of fuzzy logic techniques. The effective Indexing Structure in QUICX helps to retrieve the data efficiently from the compact storage structure. The radix trie data structure, ranking function and inverted indexing has been used to have effective on fly search and to retrieve the top k results. The experiments are carried out on standard bench mark datasets like Shakespeare dataset, the results shows that the proposed method helps to retrieve the top-k results for the user query comparatively better than the existing approaches.
信息检索系统对给定的关键词按照相关度高到相关度低的顺序进行检索。在从XML文档或Compact存储结构中检索的情况下,用户需要知道查询的确切路径,这对新手用户来说是一个障碍,它使系统只适合专家。为了使系统适用于所有用户,提出了On Fly Search (OFS)方法,从而帮助用户在不知道查询内容或查询路径的情况下搜索紧凑的存储结构。它还扩展为支持多关键字查询的自动完成方法。使用模糊逻辑技术可以消除查询中的排版错误。quickx中有效的索引结构有助于从紧凑的存储结构中高效地检索数据。利用基数trie数据结构、排序函数和倒排索引实现了高效的在线搜索和前k个结果的检索。在莎士比亚数据集等标准基准数据集上进行了实验,结果表明,与现有方法相比,本文提出的方法能够更好地检索用户查询的top-k结果。
{"title":"On fly search approach for compact XML","authors":"R. Sathiaseelan, Sriram Sitharaman, R. B. Subramanian, R. Senthilkumar","doi":"10.1109/ICRTIT.2013.6844228","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844228","url":null,"abstract":"Information Retrieval system produces the result in the order of the most relevant to the least, for given keywords. The user need to know the exact path of the query in the case of retrieval from an XML document or Compact storage structure, this becomes a hurdle for a novice user and it makes the system suitable only for experts. The On Fly Search (OFS) method has been proposed to make the system suitable for all the users and thus helps the users to search the compact storage structures without any knowledge about the content or about the path of the query. It also extends to support the auto complete method for multiple keyword queries. The typographical errors in the query are removed by the usage of fuzzy logic techniques. The effective Indexing Structure in QUICX helps to retrieve the data efficiently from the compact storage structure. The radix trie data structure, ranking function and inverted indexing has been used to have effective on fly search and to retrieve the top k results. The experiments are carried out on standard bench mark datasets like Shakespeare dataset, the results shows that the proposed method helps to retrieve the top-k results for the user query comparatively better than the existing approaches.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126874793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Symbolic execution — An efficient approach for test case generation 符号执行——生成测试用例的有效方法
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844266
S. Vengadeswaran, K. Geetha
In the process of software development, testing is the critical activity which consumes more than 50% of resources and time. A challenging step in software testing process is to generate test cases that will sufficiently test the functionality of the software being developed. A technique commonly used to generate the test cases is through branch coverage. Even though the above technique successfully generates test cases for the input program, there are few limitations during which this technique does not prove to be useful. Especially when an infeasible path is encountered in the program under test, the test cases generated does not reflect the reality. To overcome such situation test cases generation through symbolic execution is proposed in this paper.
在软件开发过程中,测试是消耗50%以上资源和时间的关键活动。软件测试过程中一个具有挑战性的步骤是生成能够充分测试所开发软件功能的测试用例。通常用于生成测试用例的技术是通过分支覆盖。尽管上述技术成功地为输入程序生成了测试用例,但是在一些限制中,该技术没有被证明是有用的。特别是当在测试程序中遇到不可行的路径时,生成的测试用例不能反映实际情况。为了克服这种情况,本文提出了通过符号执行生成测试用例的方法。
{"title":"Symbolic execution — An efficient approach for test case generation","authors":"S. Vengadeswaran, K. Geetha","doi":"10.1109/ICRTIT.2013.6844266","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844266","url":null,"abstract":"In the process of software development, testing is the critical activity which consumes more than 50% of resources and time. A challenging step in software testing process is to generate test cases that will sufficiently test the functionality of the software being developed. A technique commonly used to generate the test cases is through branch coverage. Even though the above technique successfully generates test cases for the input program, there are few limitations during which this technique does not prove to be useful. Especially when an infeasible path is encountered in the program under test, the test cases generated does not reflect the reality. To overcome such situation test cases generation through symbolic execution is proposed in this paper.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127279554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application based topology adaptation in NoC architecture with reduced power dissipation 基于应用的NoC架构拓扑自适应,降低功耗
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844255
D. Prathiba, S. Umamaheswari
The proposed reconfigurable architecture for Networks-on-chip (NoC) changes the network topology by dynamically changing the router connections. This ReNoC can adapt more than one application on a single chip for desired application known at runtime. The router connections are changed by using the configuration switches. This scenario gives the reconfigured NoC architecture and is achieved by data transmission between the source and destination of the NoC architecture. In this proposed reconfigurable NoC architecture, the energy consumption induced by the links is more than that of the router. So, data encoding and decoding t techniques are used to reduce the energy consumption of data transmission and hence the power dissipation in the NoC architecture.
提出的片上网络(NoC)可重构架构通过动态改变路由器连接来改变网络拓扑结构。这种ReNoC可以在单个芯片上适应多个应用程序,以满足运行时已知的所需应用程序。通过配置开关改变路由器连接。该场景给出了重新配置的NoC体系结构,并通过NoC体系结构的源和目标之间的数据传输来实现。在这种可重构的NoC架构中,链路引起的能量消耗大于路由器的能量消耗。因此,采用数据编码和解码技术来降低数据传输的能耗,从而降低NoC架构中的功耗。
{"title":"Application based topology adaptation in NoC architecture with reduced power dissipation","authors":"D. Prathiba, S. Umamaheswari","doi":"10.1109/ICRTIT.2013.6844255","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844255","url":null,"abstract":"The proposed reconfigurable architecture for Networks-on-chip (NoC) changes the network topology by dynamically changing the router connections. This ReNoC can adapt more than one application on a single chip for desired application known at runtime. The router connections are changed by using the configuration switches. This scenario gives the reconfigured NoC architecture and is achieved by data transmission between the source and destination of the NoC architecture. In this proposed reconfigurable NoC architecture, the energy consumption induced by the links is more than that of the router. So, data encoding and decoding t techniques are used to reduce the energy consumption of data transmission and hence the power dissipation in the NoC architecture.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122877642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficient minimum connected dominating set algorithm for MANETs 能源高效的最小连接控制集算法
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844215
Chakradhar P Research, P Yogesh
In this paper we proposed a new Minimum Connected Dominating Set [MCDS] algorithm. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem[1]. The connected dominating set (CDS) is widely used as a virtual backbone in mobile ad-hoc networks. Here the MCDS is a distributed algorithm based on Unit Disk Graph[7]. The node's mobility and residual energy are considered as parameters in construction of stable MCDS. The time complexity of this algorithm is O(n) and the message complexity is O(n). The performance evaluation of this algorithm yields better results in dense networks as well as sparse networks. Size of the MCDS is also small compared to other distributed algorithms[8][9][10].
本文提出了一种新的最小连通支配集算法。该算法通过最小化广播风暴问题来实现能源效率[1]。连接支配集(CDS)作为虚拟骨干网在移动自组网中得到了广泛的应用。这里的MCDS是一种基于单位磁盘图的分布式算法[7]。将节点的迁移率和剩余能量作为构建稳定MCDS的参数。该算法的时间复杂度为O(n),消息复杂度为O(n)。该算法的性能评估在密集网络和稀疏网络中都取得了较好的结果。与其他分布式算法相比,MCDS的大小也较小[8][9][10]。
{"title":"Energy efficient minimum connected dominating set algorithm for MANETs","authors":"Chakradhar P Research, P Yogesh","doi":"10.1109/ICRTIT.2013.6844215","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844215","url":null,"abstract":"In this paper we proposed a new Minimum Connected Dominating Set [MCDS] algorithm. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem[1]. The connected dominating set (CDS) is widely used as a virtual backbone in mobile ad-hoc networks. Here the MCDS is a distributed algorithm based on Unit Disk Graph[7]. The node's mobility and residual energy are considered as parameters in construction of stable MCDS. The time complexity of this algorithm is O(n) and the message complexity is O(n). The performance evaluation of this algorithm yields better results in dense networks as well as sparse networks. Size of the MCDS is also small compared to other distributed algorithms[8][9][10].","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131402527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An improved and efficient message passing interface for secure communication on distributed clusters 一种改进的高效消息传递接口,用于分布式集群上的安全通信
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844225
M. A. Maffina, R. Rampriya
The main aim of this project is to provide secure communication among distributed clusters via Message Passing Interface (MPI). When a number of clusters associated to each other are increased then, it becomes a threat to security applications running on the clusters. To handle this security trouble, a MPI is built-up to protect the properties of security in an untrusted network. In the existing system, to generate the symmetric shared key, the participant provide only 1 byte size of random number so there is a chance to find out the key by the intruder. Furthermore, here only text message is passed between the clients. The proposed system is Enhanced Security for Message Passing Interface Chameleon version 2 (ES-MPICH2) in which it maintains the size of random number as 4 bytes, thus it is impossible to find out the key by the unauthorized person. This protocol is extended with features, such as secure file transfer utility and rekeying process. As well it supports to encrypt and decrypt the file upload by the user. We use secure algorithms like interpolation polynomial, AES and SHA-1 for key management, encryption/decryption and providing integrity service. After that those algorithms are integrated into Message Passing Interface Chameleon version 2 (MPICH2) that becomes ES-MPICH2. It supports a large collection of calculation and conversation area. The proposed work is based on both mathematics and cryptography concept that direct to error free message passing among the authorized users with enhanced security.
该项目的主要目的是通过消息传递接口(Message Passing Interface, MPI)在分布式集群之间提供安全通信。当相互关联的集群数量增加时,就会对在集群上运行的安全应用程序构成威胁。为了解决这一安全问题,建立了MPI来保护不受信任网络中的安全属性。在现有的系统中,为了生成对称共享密钥,参与者只提供1字节大小的随机数,因此有机会被入侵者找到密钥。此外,这里只有文本消息在客户端之间传递。所提出的系统是Enhanced Security for Message Passing Interface Chameleon version 2 (ES-MPICH2),它将随机数的大小保持在4字节,因此未经授权的人不可能找到密钥。该协议扩展了安全文件传输实用程序和密钥更新过程等功能。它还支持对用户上传的文件进行加密和解密。我们使用插值多项式、AES和SHA-1等安全算法进行密钥管理、加解密和提供完整性服务。之后,这些算法被集成到消息传递接口变色龙版本2 (MPICH2)中,成为ES-MPICH2。它支持大量的集合计算和对话区域。建议的工作是基于数学和密码学的概念,直接在授权用户之间以增强的安全性传递无错误的消息。
{"title":"An improved and efficient message passing interface for secure communication on distributed clusters","authors":"M. A. Maffina, R. Rampriya","doi":"10.1109/ICRTIT.2013.6844225","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844225","url":null,"abstract":"The main aim of this project is to provide secure communication among distributed clusters via Message Passing Interface (MPI). When a number of clusters associated to each other are increased then, it becomes a threat to security applications running on the clusters. To handle this security trouble, a MPI is built-up to protect the properties of security in an untrusted network. In the existing system, to generate the symmetric shared key, the participant provide only 1 byte size of random number so there is a chance to find out the key by the intruder. Furthermore, here only text message is passed between the clients. The proposed system is Enhanced Security for Message Passing Interface Chameleon version 2 (ES-MPICH2) in which it maintains the size of random number as 4 bytes, thus it is impossible to find out the key by the unauthorized person. This protocol is extended with features, such as secure file transfer utility and rekeying process. As well it supports to encrypt and decrypt the file upload by the user. We use secure algorithms like interpolation polynomial, AES and SHA-1 for key management, encryption/decryption and providing integrity service. After that those algorithms are integrated into Message Passing Interface Chameleon version 2 (MPICH2) that becomes ES-MPICH2. It supports a large collection of calculation and conversation area. The proposed work is based on both mathematics and cryptography concept that direct to error free message passing among the authorized users with enhanced security.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122456817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Mobility based minimal network coding (MBMNC) algorithm for mobile ad-hoc network 移动自组网中基于移动性的最小网络编码算法
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844218
Saravanan K, Venkatalakshmi B
Recent times, a new communication archetype called Network Coding (NC) has emerged in which the mediator nodes allowed to carry out encoding and decoding operations on the information they receive. Network capacity of any communication network can be enhanced through this network coding strategy. Mobile Ad-hoc Networks (MANET) often consist of large number of mobile nodes that are strictly power constrained. So, it is important to minimize the power utilization of every single node in order to improve the network lifetime. Blind Encoding consequences superfluous power consumption. If a node moves after encoding the packet due its dynamic nature then obviously waste of time and power occurs. This work proposes an algorithm called mobility based minimal network coding algorithm (MBMNC) for MANET which allows only minimal number of nodes to encode by considering the node mobility. The eligibility criteria of a node to do NC have a dependency on link availability of a node with respect to its neighboring node. The probability of the link availability influences the decision of whether the node is an encoding node or forwarding node. Only a limited number of nodes with high probability of link availability will do network coding. This work proposes a solution for enhancing the network capacity through network coding in consideration with node mobility.
最近,出现了一种称为网络编码(Network Coding, NC)的新通信原型,在这种原型中,中介节点允许对它们接收到的信息执行编码和解码操作。通过这种网络编码策略,可以提高任何通信网络的网络容量。移动自组织网络(MANET)通常由大量受到严格功率限制的移动节点组成。因此,为了改善网络生命周期,最小化每个单个节点的功率利用率是非常重要的。盲目编码会导致多余的功耗。如果一个节点由于其动态特性而在编码后移动,那么显然会浪费时间和功率。本文提出了一种基于移动性的最小网络编码算法(MBMNC),该算法通过考虑节点的移动性,只允许最小数量的节点进行编码。一个节点进行NC的资格标准依赖于该节点相对于其相邻节点的链路可用性。链路可用性的概率影响节点是编码节点还是转发节点的决定。只有具有高链路可用性的有限数量的节点才会进行网络编码。本文提出了一种考虑节点移动性的网络编码增强网络容量的解决方案。
{"title":"Mobility based minimal network coding (MBMNC) algorithm for mobile ad-hoc network","authors":"Saravanan K, Venkatalakshmi B","doi":"10.1109/ICRTIT.2013.6844218","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844218","url":null,"abstract":"Recent times, a new communication archetype called Network Coding (NC) has emerged in which the mediator nodes allowed to carry out encoding and decoding operations on the information they receive. Network capacity of any communication network can be enhanced through this network coding strategy. Mobile Ad-hoc Networks (MANET) often consist of large number of mobile nodes that are strictly power constrained. So, it is important to minimize the power utilization of every single node in order to improve the network lifetime. Blind Encoding consequences superfluous power consumption. If a node moves after encoding the packet due its dynamic nature then obviously waste of time and power occurs. This work proposes an algorithm called mobility based minimal network coding algorithm (MBMNC) for MANET which allows only minimal number of nodes to encode by considering the node mobility. The eligibility criteria of a node to do NC have a dependency on link availability of a node with respect to its neighboring node. The probability of the link availability influences the decision of whether the node is an encoding node or forwarding node. Only a limited number of nodes with high probability of link availability will do network coding. This work proposes a solution for enhancing the network capacity through network coding in consideration with node mobility.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"465 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115629500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A cluster based multiple ontology parallel merge method 一种基于聚类的多本体并行合并方法
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844226
Sunitha Abburu, G. S. Babu
Ontologies are an inevitable aspect of knowledge representation, processing, sharing and reuse and this in itself is the essence and significance of ontology. The number of ontologies available online is growing at a rapid pace. This conspicuous growth of ontologies enables sharing of knowledge in distributed and heterogeneous systems. The tremendous growth of ontologies has implied the popping up of multiple ontologies of the same domain. Applications developed based on these ontologies cannot achieve interoperability. To conquer this problem one of the optimum solution is to merge the ontologies in to a single general complete ontology. This brings up the need for a method which merges multiple ontologies, producing consistent, complete ontology. Another decisive factor worth consideration is the performance of multiple ontology merge process in terms of time. The current research work proposes a new cluster based multiple ontology parallel merge process. The performance of the multiple ontology merge process is fine-tuned by considering the similarity measure and parallel merge process. The proposed method produces consistent, optimum and complete knowledge of the domain as a single ontology with reduced time, which can be used by heterogeneous applications. The proposed method is implemented and a comparison of time complexity of the processing is presented at the end.
本体是知识表示、处理、共享和重用的必然方面,这本身就是本体的本质和意义所在。在线可用本体的数量正在快速增长。本体的显著增长使得分布式和异构系统中的知识共享成为可能。本体的巨大增长意味着同一领域的多个本体的出现。基于这些本体开发的应用程序不能实现互操作性。为了解决这个问题,最优的解决方案之一是将这些本体合并为一个通用的完整本体。这就需要一种方法来合并多个本体,从而产生一致的、完整的本体。另一个值得考虑的决定性因素是多本体合并过程在时间上的表现。目前的研究工作提出了一种新的基于聚类的多本体并行合并过程。通过考虑相似度度量和并行合并过程,对多本体合并过程的性能进行了微调。该方法在较短的时间内生成一致的、最优的、完整的领域本体知识,可用于异构应用。最后对所提出的方法进行了实现,并对处理的时间复杂度进行了比较。
{"title":"A cluster based multiple ontology parallel merge method","authors":"Sunitha Abburu, G. S. Babu","doi":"10.1109/ICRTIT.2013.6844226","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844226","url":null,"abstract":"Ontologies are an inevitable aspect of knowledge representation, processing, sharing and reuse and this in itself is the essence and significance of ontology. The number of ontologies available online is growing at a rapid pace. This conspicuous growth of ontologies enables sharing of knowledge in distributed and heterogeneous systems. The tremendous growth of ontologies has implied the popping up of multiple ontologies of the same domain. Applications developed based on these ontologies cannot achieve interoperability. To conquer this problem one of the optimum solution is to merge the ontologies in to a single general complete ontology. This brings up the need for a method which merges multiple ontologies, producing consistent, complete ontology. Another decisive factor worth consideration is the performance of multiple ontology merge process in terms of time. The current research work proposes a new cluster based multiple ontology parallel merge process. The performance of the multiple ontology merge process is fine-tuned by considering the similarity measure and parallel merge process. The proposed method produces consistent, optimum and complete knowledge of the domain as a single ontology with reduced time, which can be used by heterogeneous applications. The proposed method is implemented and a comparison of time complexity of the processing is presented at the end.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125487521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 International Conference on Recent Trends in Information Technology (ICRTIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1