Pub Date : 2013-07-25DOI: 10.1109/ICRTIT.2013.6844228
R. Sathiaseelan, Sriram Sitharaman, R. B. Subramanian, R. Senthilkumar
Information Retrieval system produces the result in the order of the most relevant to the least, for given keywords. The user need to know the exact path of the query in the case of retrieval from an XML document or Compact storage structure, this becomes a hurdle for a novice user and it makes the system suitable only for experts. The On Fly Search (OFS) method has been proposed to make the system suitable for all the users and thus helps the users to search the compact storage structures without any knowledge about the content or about the path of the query. It also extends to support the auto complete method for multiple keyword queries. The typographical errors in the query are removed by the usage of fuzzy logic techniques. The effective Indexing Structure in QUICX helps to retrieve the data efficiently from the compact storage structure. The radix trie data structure, ranking function and inverted indexing has been used to have effective on fly search and to retrieve the top k results. The experiments are carried out on standard bench mark datasets like Shakespeare dataset, the results shows that the proposed method helps to retrieve the top-k results for the user query comparatively better than the existing approaches.
{"title":"On fly search approach for compact XML","authors":"R. Sathiaseelan, Sriram Sitharaman, R. B. Subramanian, R. Senthilkumar","doi":"10.1109/ICRTIT.2013.6844228","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844228","url":null,"abstract":"Information Retrieval system produces the result in the order of the most relevant to the least, for given keywords. The user need to know the exact path of the query in the case of retrieval from an XML document or Compact storage structure, this becomes a hurdle for a novice user and it makes the system suitable only for experts. The On Fly Search (OFS) method has been proposed to make the system suitable for all the users and thus helps the users to search the compact storage structures without any knowledge about the content or about the path of the query. It also extends to support the auto complete method for multiple keyword queries. The typographical errors in the query are removed by the usage of fuzzy logic techniques. The effective Indexing Structure in QUICX helps to retrieve the data efficiently from the compact storage structure. The radix trie data structure, ranking function and inverted indexing has been used to have effective on fly search and to retrieve the top k results. The experiments are carried out on standard bench mark datasets like Shakespeare dataset, the results shows that the proposed method helps to retrieve the top-k results for the user query comparatively better than the existing approaches.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126874793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-25DOI: 10.1109/ICRTIT.2013.6844242
K. Jothilakshmi, G. Usha, S. Bose
Mobile Ad-hoc Networks (MANETs) are most popular area with many applications and it had infrastructure-less environment. As a result, malicious nodes can easily able to interrupt a route and access the communication without authentication. This paper proposes a cross layer intrusion detection system to discover the malicious nodes and different types of Dos attacks by exploiting the information available across different layers of protocol stack in order to improve the accuracy of detection. This approach used dynamic anomaly detection for efficient detection of anomalies in MANET. This approach include self healing model for repair the attacks during the transaction. Experiments based on simulation (network simulator 2(ns-2) shows that the proposed approach aided by the combination of cross layer technique, performs better than other existing approaches.
{"title":"A framework of cross layer based anomaly intrusion detection and self healing model for MANET","authors":"K. Jothilakshmi, G. Usha, S. Bose","doi":"10.1109/ICRTIT.2013.6844242","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844242","url":null,"abstract":"Mobile Ad-hoc Networks (MANETs) are most popular area with many applications and it had infrastructure-less environment. As a result, malicious nodes can easily able to interrupt a route and access the communication without authentication. This paper proposes a cross layer intrusion detection system to discover the malicious nodes and different types of Dos attacks by exploiting the information available across different layers of protocol stack in order to improve the accuracy of detection. This approach used dynamic anomaly detection for efficient detection of anomalies in MANET. This approach include self healing model for repair the attacks during the transaction. Experiments based on simulation (network simulator 2(ns-2) shows that the proposed approach aided by the combination of cross layer technique, performs better than other existing approaches.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124315994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-25DOI: 10.1109/ICRTIT.2013.6844291
A. P. Theeksha, S. Srikanth
IEEE 802.11ac, also known as gigabit Wi-Fi is the latest and emerging wireless local area network (WLAN) standard. The Very High Throughput (VHT) of the order of Gbps can be achieved primarily with two important modifications when compared with the previous 802.11n standard. The first one is the increased number of spatial streams (8 as compared to 4 in 11n standard) and the second one is the support for multi user - multiple input multiple output (MU-MIMO). This paper places key discussions and simulation results pertaining to these two objectives. It also compares the performance of MU-MIMO and single user - multiple input multiple output (SU-MIMO) precoding techniques assuming perfect Channel State Information at the Transmitter (CSIT) for both high and low correlation channels. The paper also introduces a novel algorithm that optimizes the various precoding algorithms by reducing the computational calculations with the mathematical background for the capacity calculations. By analyzing the performances of various precoding schemes used for SU-MIMO and MU-MIMO, the mode switching SNR can be found out. This quantitative measure of SNR is certainly a powerful measure to choose between SU and MU-MIMO and also to serve all the users to the best possible extent. Also, estimation of the mode selection with very less computational effort highlights the advantages of the algorithm over the existing algorithms.
{"title":"Performance analysis and mode selection of SU-MIMO and MU-MIMO in 802.11ac","authors":"A. P. Theeksha, S. Srikanth","doi":"10.1109/ICRTIT.2013.6844291","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844291","url":null,"abstract":"IEEE 802.11ac, also known as gigabit Wi-Fi is the latest and emerging wireless local area network (WLAN) standard. The Very High Throughput (VHT) of the order of Gbps can be achieved primarily with two important modifications when compared with the previous 802.11n standard. The first one is the increased number of spatial streams (8 as compared to 4 in 11n standard) and the second one is the support for multi user - multiple input multiple output (MU-MIMO). This paper places key discussions and simulation results pertaining to these two objectives. It also compares the performance of MU-MIMO and single user - multiple input multiple output (SU-MIMO) precoding techniques assuming perfect Channel State Information at the Transmitter (CSIT) for both high and low correlation channels. The paper also introduces a novel algorithm that optimizes the various precoding algorithms by reducing the computational calculations with the mathematical background for the capacity calculations. By analyzing the performances of various precoding schemes used for SU-MIMO and MU-MIMO, the mode switching SNR can be found out. This quantitative measure of SNR is certainly a powerful measure to choose between SU and MU-MIMO and also to serve all the users to the best possible extent. Also, estimation of the mode selection with very less computational effort highlights the advantages of the algorithm over the existing algorithms.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134002630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-25DOI: 10.1109/ICRTIT.2013.6844182
N. V. Rao, G. Babu, B. Babu
Handwritten numeral character recognition has been an intensive research in the field of artificial intelligence since many decades. This paper proposes a radial basis function neural network model for recognizing handwritten numerals. The geometric shape of handwritten numerals is described by computing a feature vector based on the skeleton of the images. The normalized central moment features are extracted from the skeleton of the images. Classification is performed with these normalized moment features by a radial basis function neural network. The novelty of this approach is that the normalized moment features from the skeletons gives good recognition rate than the contour images and thinned images with radial basis function neural network. The performance of the proposed work is computed from the error rate. Results of this proposed method on MNIST handwritten numeral database is reported.
{"title":"A radial basis function neural network to recognize handwritten numerals with normalized moment features from skeletons","authors":"N. V. Rao, G. Babu, B. Babu","doi":"10.1109/ICRTIT.2013.6844182","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844182","url":null,"abstract":"Handwritten numeral character recognition has been an intensive research in the field of artificial intelligence since many decades. This paper proposes a radial basis function neural network model for recognizing handwritten numerals. The geometric shape of handwritten numerals is described by computing a feature vector based on the skeleton of the images. The normalized central moment features are extracted from the skeleton of the images. Classification is performed with these normalized moment features by a radial basis function neural network. The novelty of this approach is that the normalized moment features from the skeletons gives good recognition rate than the contour images and thinned images with radial basis function neural network. The performance of the proposed work is computed from the error rate. Results of this proposed method on MNIST handwritten numeral database is reported.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117223865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-25DOI: 10.1109/ICRTIT.2013.6844211
S. Harish, R. Hemalatha, S. Radha
In traditional sampling methods, images are sampled at the Nyquist rate for perfect reconstruction. But most of these acquired data samples are discarded during compression. Compressed Sensing (CS) overcomes this problem by combining the acquisition and compression process. Most of the images are sparse in some domain and thus can be recovered from reduced number of samples than the Nyquist rate. The quality of reconstruction depends upon the sparsity level of the image. Contourlet transform is used to obtain the sparse representation of the image while the wavelet transform reduces the complexity of the compressed sensing algorithm. Thus both the transforms are combined to achieve better recovery from reduced number of sparse measurements. The low frequency wavelet subband contains most of the information and thus more number of samples is taken from this band. The high frequency wavelet bands contain lesser amount of data and thus reduced number of samples is taken from these bands. The recovered image is smoothened by using the Hybrid Mean Median (HMM) Filter because of its nature of preserving the sharp edges in the image. Hence higher quality image is obtained from very less measurements.
{"title":"Image recovery from reduced sparse measurements by compressed sensing based on wavelet transform","authors":"S. Harish, R. Hemalatha, S. Radha","doi":"10.1109/ICRTIT.2013.6844211","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844211","url":null,"abstract":"In traditional sampling methods, images are sampled at the Nyquist rate for perfect reconstruction. But most of these acquired data samples are discarded during compression. Compressed Sensing (CS) overcomes this problem by combining the acquisition and compression process. Most of the images are sparse in some domain and thus can be recovered from reduced number of samples than the Nyquist rate. The quality of reconstruction depends upon the sparsity level of the image. Contourlet transform is used to obtain the sparse representation of the image while the wavelet transform reduces the complexity of the compressed sensing algorithm. Thus both the transforms are combined to achieve better recovery from reduced number of sparse measurements. The low frequency wavelet subband contains most of the information and thus more number of samples is taken from this band. The high frequency wavelet bands contain lesser amount of data and thus reduced number of samples is taken from these bands. The recovered image is smoothened by using the Hybrid Mean Median (HMM) Filter because of its nature of preserving the sharp edges in the image. Hence higher quality image is obtained from very less measurements.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131058704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-25DOI: 10.1109/ICRTIT.2013.6844215
Chakradhar P Research, P Yogesh
In this paper we proposed a new Minimum Connected Dominating Set [MCDS] algorithm. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem[1]. The connected dominating set (CDS) is widely used as a virtual backbone in mobile ad-hoc networks. Here the MCDS is a distributed algorithm based on Unit Disk Graph[7]. The node's mobility and residual energy are considered as parameters in construction of stable MCDS. The time complexity of this algorithm is O(n) and the message complexity is O(n). The performance evaluation of this algorithm yields better results in dense networks as well as sparse networks. Size of the MCDS is also small compared to other distributed algorithms[8][9][10].
{"title":"Energy efficient minimum connected dominating set algorithm for MANETs","authors":"Chakradhar P Research, P Yogesh","doi":"10.1109/ICRTIT.2013.6844215","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844215","url":null,"abstract":"In this paper we proposed a new Minimum Connected Dominating Set [MCDS] algorithm. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem[1]. The connected dominating set (CDS) is widely used as a virtual backbone in mobile ad-hoc networks. Here the MCDS is a distributed algorithm based on Unit Disk Graph[7]. The node's mobility and residual energy are considered as parameters in construction of stable MCDS. The time complexity of this algorithm is O(n) and the message complexity is O(n). The performance evaluation of this algorithm yields better results in dense networks as well as sparse networks. Size of the MCDS is also small compared to other distributed algorithms[8][9][10].","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131402527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-25DOI: 10.1109/ICRTIT.2013.6844244
S. Muruganandham, Venkateshkumar Muthusamy, A. Rajasimmavarman, V. Vaidehi
This paper deals with providing location based services to emergency vehicles and to the ordinary vehicles in a secure manner that needs services in a Vehicular Ad hoc NETwork (VANET). In VANET the vehicles are equipped with the On Board Unit (OBU) in which the developed application obtains the current location of the vehicle and makes updates in the location server and to the Road Side Unit (RSU). The location server is the centralized server that collects all the necessary information like position and the Id of the vehicles that are moving. The emergency vehicle obtains the location of the doctors' vehicle from the location server or from the RSU. Then, the communication phase is established between the vehicles which are based on the Vehicle to Vehicle communication (V2V) model where the vehicles behave as nodes. Thus, by identifying the location information about the vehicle, the privacy of the vehicle users may be revealed. To avoid the issues involved in the privacy of vehicles users, the authentication for the vehicle users has been introduced. The successful authentication preserves the privacy of the vehicle user and establishes the secure communication between the vehicles. The efficiency of the communication is increased by introducing the Trusted Authority (TA). The trusted authority module performs the segregation of sensitive and insensitive messages and only the sensitive messages are encrypted through the pairing technique in the communication phase. Thus, Trusted Authority increases the performance of communication in a secure way between vehicles in emergency situation. The proposed system increases the performance by 19% for 100 characters when compared to existing system.
{"title":"Privacy preserving authentication in VANET for location based services","authors":"S. Muruganandham, Venkateshkumar Muthusamy, A. Rajasimmavarman, V. Vaidehi","doi":"10.1109/ICRTIT.2013.6844244","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844244","url":null,"abstract":"This paper deals with providing location based services to emergency vehicles and to the ordinary vehicles in a secure manner that needs services in a Vehicular Ad hoc NETwork (VANET). In VANET the vehicles are equipped with the On Board Unit (OBU) in which the developed application obtains the current location of the vehicle and makes updates in the location server and to the Road Side Unit (RSU). The location server is the centralized server that collects all the necessary information like position and the Id of the vehicles that are moving. The emergency vehicle obtains the location of the doctors' vehicle from the location server or from the RSU. Then, the communication phase is established between the vehicles which are based on the Vehicle to Vehicle communication (V2V) model where the vehicles behave as nodes. Thus, by identifying the location information about the vehicle, the privacy of the vehicle users may be revealed. To avoid the issues involved in the privacy of vehicles users, the authentication for the vehicle users has been introduced. The successful authentication preserves the privacy of the vehicle user and establishes the secure communication between the vehicles. The efficiency of the communication is increased by introducing the Trusted Authority (TA). The trusted authority module performs the segregation of sensitive and insensitive messages and only the sensitive messages are encrypted through the pairing technique in the communication phase. Thus, Trusted Authority increases the performance of communication in a secure way between vehicles in emergency situation. The proposed system increases the performance by 19% for 100 characters when compared to existing system.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134049574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-25DOI: 10.1109/ICRTIT.2013.6844225
M. A. Maffina, R. Rampriya
The main aim of this project is to provide secure communication among distributed clusters via Message Passing Interface (MPI). When a number of clusters associated to each other are increased then, it becomes a threat to security applications running on the clusters. To handle this security trouble, a MPI is built-up to protect the properties of security in an untrusted network. In the existing system, to generate the symmetric shared key, the participant provide only 1 byte size of random number so there is a chance to find out the key by the intruder. Furthermore, here only text message is passed between the clients. The proposed system is Enhanced Security for Message Passing Interface Chameleon version 2 (ES-MPICH2) in which it maintains the size of random number as 4 bytes, thus it is impossible to find out the key by the unauthorized person. This protocol is extended with features, such as secure file transfer utility and rekeying process. As well it supports to encrypt and decrypt the file upload by the user. We use secure algorithms like interpolation polynomial, AES and SHA-1 for key management, encryption/decryption and providing integrity service. After that those algorithms are integrated into Message Passing Interface Chameleon version 2 (MPICH2) that becomes ES-MPICH2. It supports a large collection of calculation and conversation area. The proposed work is based on both mathematics and cryptography concept that direct to error free message passing among the authorized users with enhanced security.
该项目的主要目的是通过消息传递接口(Message Passing Interface, MPI)在分布式集群之间提供安全通信。当相互关联的集群数量增加时,就会对在集群上运行的安全应用程序构成威胁。为了解决这一安全问题,建立了MPI来保护不受信任网络中的安全属性。在现有的系统中,为了生成对称共享密钥,参与者只提供1字节大小的随机数,因此有机会被入侵者找到密钥。此外,这里只有文本消息在客户端之间传递。所提出的系统是Enhanced Security for Message Passing Interface Chameleon version 2 (ES-MPICH2),它将随机数的大小保持在4字节,因此未经授权的人不可能找到密钥。该协议扩展了安全文件传输实用程序和密钥更新过程等功能。它还支持对用户上传的文件进行加密和解密。我们使用插值多项式、AES和SHA-1等安全算法进行密钥管理、加解密和提供完整性服务。之后,这些算法被集成到消息传递接口变色龙版本2 (MPICH2)中,成为ES-MPICH2。它支持大量的集合计算和对话区域。建议的工作是基于数学和密码学的概念,直接在授权用户之间以增强的安全性传递无错误的消息。
{"title":"An improved and efficient message passing interface for secure communication on distributed clusters","authors":"M. A. Maffina, R. Rampriya","doi":"10.1109/ICRTIT.2013.6844225","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844225","url":null,"abstract":"The main aim of this project is to provide secure communication among distributed clusters via Message Passing Interface (MPI). When a number of clusters associated to each other are increased then, it becomes a threat to security applications running on the clusters. To handle this security trouble, a MPI is built-up to protect the properties of security in an untrusted network. In the existing system, to generate the symmetric shared key, the participant provide only 1 byte size of random number so there is a chance to find out the key by the intruder. Furthermore, here only text message is passed between the clients. The proposed system is Enhanced Security for Message Passing Interface Chameleon version 2 (ES-MPICH2) in which it maintains the size of random number as 4 bytes, thus it is impossible to find out the key by the unauthorized person. This protocol is extended with features, such as secure file transfer utility and rekeying process. As well it supports to encrypt and decrypt the file upload by the user. We use secure algorithms like interpolation polynomial, AES and SHA-1 for key management, encryption/decryption and providing integrity service. After that those algorithms are integrated into Message Passing Interface Chameleon version 2 (MPICH2) that becomes ES-MPICH2. It supports a large collection of calculation and conversation area. The proposed work is based on both mathematics and cryptography concept that direct to error free message passing among the authorized users with enhanced security.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122456817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-25DOI: 10.1109/ICRTIT.2013.6844218
Saravanan K, Venkatalakshmi B
Recent times, a new communication archetype called Network Coding (NC) has emerged in which the mediator nodes allowed to carry out encoding and decoding operations on the information they receive. Network capacity of any communication network can be enhanced through this network coding strategy. Mobile Ad-hoc Networks (MANET) often consist of large number of mobile nodes that are strictly power constrained. So, it is important to minimize the power utilization of every single node in order to improve the network lifetime. Blind Encoding consequences superfluous power consumption. If a node moves after encoding the packet due its dynamic nature then obviously waste of time and power occurs. This work proposes an algorithm called mobility based minimal network coding algorithm (MBMNC) for MANET which allows only minimal number of nodes to encode by considering the node mobility. The eligibility criteria of a node to do NC have a dependency on link availability of a node with respect to its neighboring node. The probability of the link availability influences the decision of whether the node is an encoding node or forwarding node. Only a limited number of nodes with high probability of link availability will do network coding. This work proposes a solution for enhancing the network capacity through network coding in consideration with node mobility.
{"title":"Mobility based minimal network coding (MBMNC) algorithm for mobile ad-hoc network","authors":"Saravanan K, Venkatalakshmi B","doi":"10.1109/ICRTIT.2013.6844218","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844218","url":null,"abstract":"Recent times, a new communication archetype called Network Coding (NC) has emerged in which the mediator nodes allowed to carry out encoding and decoding operations on the information they receive. Network capacity of any communication network can be enhanced through this network coding strategy. Mobile Ad-hoc Networks (MANET) often consist of large number of mobile nodes that are strictly power constrained. So, it is important to minimize the power utilization of every single node in order to improve the network lifetime. Blind Encoding consequences superfluous power consumption. If a node moves after encoding the packet due its dynamic nature then obviously waste of time and power occurs. This work proposes an algorithm called mobility based minimal network coding algorithm (MBMNC) for MANET which allows only minimal number of nodes to encode by considering the node mobility. The eligibility criteria of a node to do NC have a dependency on link availability of a node with respect to its neighboring node. The probability of the link availability influences the decision of whether the node is an encoding node or forwarding node. Only a limited number of nodes with high probability of link availability will do network coding. This work proposes a solution for enhancing the network capacity through network coding in consideration with node mobility.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"465 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115629500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-25DOI: 10.1109/ICRTIT.2013.6844226
Sunitha Abburu, G. S. Babu
Ontologies are an inevitable aspect of knowledge representation, processing, sharing and reuse and this in itself is the essence and significance of ontology. The number of ontologies available online is growing at a rapid pace. This conspicuous growth of ontologies enables sharing of knowledge in distributed and heterogeneous systems. The tremendous growth of ontologies has implied the popping up of multiple ontologies of the same domain. Applications developed based on these ontologies cannot achieve interoperability. To conquer this problem one of the optimum solution is to merge the ontologies in to a single general complete ontology. This brings up the need for a method which merges multiple ontologies, producing consistent, complete ontology. Another decisive factor worth consideration is the performance of multiple ontology merge process in terms of time. The current research work proposes a new cluster based multiple ontology parallel merge process. The performance of the multiple ontology merge process is fine-tuned by considering the similarity measure and parallel merge process. The proposed method produces consistent, optimum and complete knowledge of the domain as a single ontology with reduced time, which can be used by heterogeneous applications. The proposed method is implemented and a comparison of time complexity of the processing is presented at the end.
{"title":"A cluster based multiple ontology parallel merge method","authors":"Sunitha Abburu, G. S. Babu","doi":"10.1109/ICRTIT.2013.6844226","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844226","url":null,"abstract":"Ontologies are an inevitable aspect of knowledge representation, processing, sharing and reuse and this in itself is the essence and significance of ontology. The number of ontologies available online is growing at a rapid pace. This conspicuous growth of ontologies enables sharing of knowledge in distributed and heterogeneous systems. The tremendous growth of ontologies has implied the popping up of multiple ontologies of the same domain. Applications developed based on these ontologies cannot achieve interoperability. To conquer this problem one of the optimum solution is to merge the ontologies in to a single general complete ontology. This brings up the need for a method which merges multiple ontologies, producing consistent, complete ontology. Another decisive factor worth consideration is the performance of multiple ontology merge process in terms of time. The current research work proposes a new cluster based multiple ontology parallel merge process. The performance of the multiple ontology merge process is fine-tuned by considering the similarity measure and parallel merge process. The proposed method produces consistent, optimum and complete knowledge of the domain as a single ontology with reduced time, which can be used by heterogeneous applications. The proposed method is implemented and a comparison of time complexity of the processing is presented at the end.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125487521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}