首页 > 最新文献

2013 International Conference on Recent Trends in Information Technology (ICRTIT)最新文献

英文 中文
On fly search approach for compact XML 紧凑XML的实时搜索方法
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844228
R. Sathiaseelan, Sriram Sitharaman, R. B. Subramanian, R. Senthilkumar
Information Retrieval system produces the result in the order of the most relevant to the least, for given keywords. The user need to know the exact path of the query in the case of retrieval from an XML document or Compact storage structure, this becomes a hurdle for a novice user and it makes the system suitable only for experts. The On Fly Search (OFS) method has been proposed to make the system suitable for all the users and thus helps the users to search the compact storage structures without any knowledge about the content or about the path of the query. It also extends to support the auto complete method for multiple keyword queries. The typographical errors in the query are removed by the usage of fuzzy logic techniques. The effective Indexing Structure in QUICX helps to retrieve the data efficiently from the compact storage structure. The radix trie data structure, ranking function and inverted indexing has been used to have effective on fly search and to retrieve the top k results. The experiments are carried out on standard bench mark datasets like Shakespeare dataset, the results shows that the proposed method helps to retrieve the top-k results for the user query comparatively better than the existing approaches.
信息检索系统对给定的关键词按照相关度高到相关度低的顺序进行检索。在从XML文档或Compact存储结构中检索的情况下,用户需要知道查询的确切路径,这对新手用户来说是一个障碍,它使系统只适合专家。为了使系统适用于所有用户,提出了On Fly Search (OFS)方法,从而帮助用户在不知道查询内容或查询路径的情况下搜索紧凑的存储结构。它还扩展为支持多关键字查询的自动完成方法。使用模糊逻辑技术可以消除查询中的排版错误。quickx中有效的索引结构有助于从紧凑的存储结构中高效地检索数据。利用基数trie数据结构、排序函数和倒排索引实现了高效的在线搜索和前k个结果的检索。在莎士比亚数据集等标准基准数据集上进行了实验,结果表明,与现有方法相比,本文提出的方法能够更好地检索用户查询的top-k结果。
{"title":"On fly search approach for compact XML","authors":"R. Sathiaseelan, Sriram Sitharaman, R. B. Subramanian, R. Senthilkumar","doi":"10.1109/ICRTIT.2013.6844228","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844228","url":null,"abstract":"Information Retrieval system produces the result in the order of the most relevant to the least, for given keywords. The user need to know the exact path of the query in the case of retrieval from an XML document or Compact storage structure, this becomes a hurdle for a novice user and it makes the system suitable only for experts. The On Fly Search (OFS) method has been proposed to make the system suitable for all the users and thus helps the users to search the compact storage structures without any knowledge about the content or about the path of the query. It also extends to support the auto complete method for multiple keyword queries. The typographical errors in the query are removed by the usage of fuzzy logic techniques. The effective Indexing Structure in QUICX helps to retrieve the data efficiently from the compact storage structure. The radix trie data structure, ranking function and inverted indexing has been used to have effective on fly search and to retrieve the top k results. The experiments are carried out on standard bench mark datasets like Shakespeare dataset, the results shows that the proposed method helps to retrieve the top-k results for the user query comparatively better than the existing approaches.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126874793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A framework of cross layer based anomaly intrusion detection and self healing model for MANET 一种基于跨层的MANET异常入侵检测和自修复模型框架
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844242
K. Jothilakshmi, G. Usha, S. Bose
Mobile Ad-hoc Networks (MANETs) are most popular area with many applications and it had infrastructure-less environment. As a result, malicious nodes can easily able to interrupt a route and access the communication without authentication. This paper proposes a cross layer intrusion detection system to discover the malicious nodes and different types of Dos attacks by exploiting the information available across different layers of protocol stack in order to improve the accuracy of detection. This approach used dynamic anomaly detection for efficient detection of anomalies in MANET. This approach include self healing model for repair the attacks during the transaction. Experiments based on simulation (network simulator 2(ns-2) shows that the proposed approach aided by the combination of cross layer technique, performs better than other existing approaches.
移动自组织网络(manet)是应用最为广泛的一个领域,它具有无基础设施的环境。因此,恶意节点可以很容易地中断路由并在没有身份验证的情况下访问通信。本文提出了一种跨层入侵检测系统,通过利用不同协议栈层的可用信息来发现恶意节点和不同类型的Dos攻击,以提高检测的准确性。该方法采用动态异常检测方法,有效地检测了MANET中的异常。该方法包括自修复模型,用于在事务期间修复攻击。基于网络模拟器2(ns-2)的仿真实验表明,该方法在交叉层技术的辅助下,性能优于现有的其他方法。
{"title":"A framework of cross layer based anomaly intrusion detection and self healing model for MANET","authors":"K. Jothilakshmi, G. Usha, S. Bose","doi":"10.1109/ICRTIT.2013.6844242","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844242","url":null,"abstract":"Mobile Ad-hoc Networks (MANETs) are most popular area with many applications and it had infrastructure-less environment. As a result, malicious nodes can easily able to interrupt a route and access the communication without authentication. This paper proposes a cross layer intrusion detection system to discover the malicious nodes and different types of Dos attacks by exploiting the information available across different layers of protocol stack in order to improve the accuracy of detection. This approach used dynamic anomaly detection for efficient detection of anomalies in MANET. This approach include self healing model for repair the attacks during the transaction. Experiments based on simulation (network simulator 2(ns-2) shows that the proposed approach aided by the combination of cross layer technique, performs better than other existing approaches.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124315994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance analysis and mode selection of SU-MIMO and MU-MIMO in 802.11ac 802.11ac中SU-MIMO和MU-MIMO的性能分析及模式选择
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844291
A. P. Theeksha, S. Srikanth
IEEE 802.11ac, also known as gigabit Wi-Fi is the latest and emerging wireless local area network (WLAN) standard. The Very High Throughput (VHT) of the order of Gbps can be achieved primarily with two important modifications when compared with the previous 802.11n standard. The first one is the increased number of spatial streams (8 as compared to 4 in 11n standard) and the second one is the support for multi user - multiple input multiple output (MU-MIMO). This paper places key discussions and simulation results pertaining to these two objectives. It also compares the performance of MU-MIMO and single user - multiple input multiple output (SU-MIMO) precoding techniques assuming perfect Channel State Information at the Transmitter (CSIT) for both high and low correlation channels. The paper also introduces a novel algorithm that optimizes the various precoding algorithms by reducing the computational calculations with the mathematical background for the capacity calculations. By analyzing the performances of various precoding schemes used for SU-MIMO and MU-MIMO, the mode switching SNR can be found out. This quantitative measure of SNR is certainly a powerful measure to choose between SU and MU-MIMO and also to serve all the users to the best possible extent. Also, estimation of the mode selection with very less computational effort highlights the advantages of the algorithm over the existing algorithms.
IEEE 802.11ac,也称为千兆Wi-Fi,是最新和新兴的无线局域网(WLAN)标准。与之前的802.11n标准相比,Gbps量级的极高吞吐量(VHT)主要通过两个重要的修改来实现。第一个是增加了空间流的数量(与11n标准中的4个相比增加了8个),第二个是支持多用户多输入多输出(MU-MIMO)。本文给出了与这两个目标相关的关键讨论和仿真结果。它还比较了MU-MIMO和单用户多输入多输出(SU-MIMO)预编码技术的性能,假设发射机(CSIT)具有完美的信道状态信息,适用于高相关信道和低相关信道。在容量计算的数学背景下,提出了一种通过减少计算量来优化各种预编码算法的新算法。通过分析SU-MIMO和MU-MIMO所采用的各种预编码方案的性能,找出模式切换信噪比。这种信噪比的定量测量无疑是在SU和MU-MIMO之间进行选择的有力措施,也可以最大限度地为所有用户服务。此外,该算法以非常少的计算量进行模式选择的估计,突出了该算法相对于现有算法的优势。
{"title":"Performance analysis and mode selection of SU-MIMO and MU-MIMO in 802.11ac","authors":"A. P. Theeksha, S. Srikanth","doi":"10.1109/ICRTIT.2013.6844291","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844291","url":null,"abstract":"IEEE 802.11ac, also known as gigabit Wi-Fi is the latest and emerging wireless local area network (WLAN) standard. The Very High Throughput (VHT) of the order of Gbps can be achieved primarily with two important modifications when compared with the previous 802.11n standard. The first one is the increased number of spatial streams (8 as compared to 4 in 11n standard) and the second one is the support for multi user - multiple input multiple output (MU-MIMO). This paper places key discussions and simulation results pertaining to these two objectives. It also compares the performance of MU-MIMO and single user - multiple input multiple output (SU-MIMO) precoding techniques assuming perfect Channel State Information at the Transmitter (CSIT) for both high and low correlation channels. The paper also introduces a novel algorithm that optimizes the various precoding algorithms by reducing the computational calculations with the mathematical background for the capacity calculations. By analyzing the performances of various precoding schemes used for SU-MIMO and MU-MIMO, the mode switching SNR can be found out. This quantitative measure of SNR is certainly a powerful measure to choose between SU and MU-MIMO and also to serve all the users to the best possible extent. Also, estimation of the mode selection with very less computational effort highlights the advantages of the algorithm over the existing algorithms.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134002630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A radial basis function neural network to recognize handwritten numerals with normalized moment features from skeletons 基于径向基函数神经网络的骨架归一化矩特征手写体数字识别
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844182
N. V. Rao, G. Babu, B. Babu
Handwritten numeral character recognition has been an intensive research in the field of artificial intelligence since many decades. This paper proposes a radial basis function neural network model for recognizing handwritten numerals. The geometric shape of handwritten numerals is described by computing a feature vector based on the skeleton of the images. The normalized central moment features are extracted from the skeleton of the images. Classification is performed with these normalized moment features by a radial basis function neural network. The novelty of this approach is that the normalized moment features from the skeletons gives good recognition rate than the contour images and thinned images with radial basis function neural network. The performance of the proposed work is computed from the error rate. Results of this proposed method on MNIST handwritten numeral database is reported.
几十年来,手写体数字字符识别一直是人工智能领域的研究热点。提出了一种用于手写体数字识别的径向基函数神经网络模型。通过计算基于图像骨架的特征向量来描述手写数字的几何形状。从图像的骨架中提取归一化中心矩特征。通过径向基函数神经网络对这些归一化矩特征进行分类。该方法的新颖之处在于,与利用径向基函数神经网络对轮廓图像和稀疏图像进行识别相比,骨架的归一化矩特征具有更好的识别率。根据错误率计算所建议工作的性能。并报道了该方法在MNIST手写数字数据库上的应用结果。
{"title":"A radial basis function neural network to recognize handwritten numerals with normalized moment features from skeletons","authors":"N. V. Rao, G. Babu, B. Babu","doi":"10.1109/ICRTIT.2013.6844182","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844182","url":null,"abstract":"Handwritten numeral character recognition has been an intensive research in the field of artificial intelligence since many decades. This paper proposes a radial basis function neural network model for recognizing handwritten numerals. The geometric shape of handwritten numerals is described by computing a feature vector based on the skeleton of the images. The normalized central moment features are extracted from the skeleton of the images. Classification is performed with these normalized moment features by a radial basis function neural network. The novelty of this approach is that the normalized moment features from the skeletons gives good recognition rate than the contour images and thinned images with radial basis function neural network. The performance of the proposed work is computed from the error rate. Results of this proposed method on MNIST handwritten numeral database is reported.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117223865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Image recovery from reduced sparse measurements by compressed sensing based on wavelet transform 基于小波变换的压缩感知降稀疏测量图像恢复
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844211
S. Harish, R. Hemalatha, S. Radha
In traditional sampling methods, images are sampled at the Nyquist rate for perfect reconstruction. But most of these acquired data samples are discarded during compression. Compressed Sensing (CS) overcomes this problem by combining the acquisition and compression process. Most of the images are sparse in some domain and thus can be recovered from reduced number of samples than the Nyquist rate. The quality of reconstruction depends upon the sparsity level of the image. Contourlet transform is used to obtain the sparse representation of the image while the wavelet transform reduces the complexity of the compressed sensing algorithm. Thus both the transforms are combined to achieve better recovery from reduced number of sparse measurements. The low frequency wavelet subband contains most of the information and thus more number of samples is taken from this band. The high frequency wavelet bands contain lesser amount of data and thus reduced number of samples is taken from these bands. The recovered image is smoothened by using the Hybrid Mean Median (HMM) Filter because of its nature of preserving the sharp edges in the image. Hence higher quality image is obtained from very less measurements.
在传统的采样方法中,为了实现完美的重构,图像都是按照奈奎斯特速率进行采样的。但在压缩过程中,这些采集到的数据样本大多被丢弃。压缩感知(CS)通过将采集和压缩过程结合起来,克服了这一问题。大多数图像在某些域中是稀疏的,因此可以从比奈奎斯特率更少的样本数中恢复。重建的质量取决于图像的稀疏度。采用轮廓波变换获得图像的稀疏表示,小波变换降低了压缩感知算法的复杂度。因此,这两种变换结合起来,从减少的稀疏测量数量中获得更好的恢复。低频小波子带包含了大部分的信息,因此从低频小波子带中提取的样本数量较多。高频小波带包含的数据量较少,因此从高频小波带中提取的样本数量较少。利用混合均值中值滤波保留图像锐利边缘的特点,对恢复后的图像进行平滑处理。因此,用很少的测量就能获得高质量的图像。
{"title":"Image recovery from reduced sparse measurements by compressed sensing based on wavelet transform","authors":"S. Harish, R. Hemalatha, S. Radha","doi":"10.1109/ICRTIT.2013.6844211","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844211","url":null,"abstract":"In traditional sampling methods, images are sampled at the Nyquist rate for perfect reconstruction. But most of these acquired data samples are discarded during compression. Compressed Sensing (CS) overcomes this problem by combining the acquisition and compression process. Most of the images are sparse in some domain and thus can be recovered from reduced number of samples than the Nyquist rate. The quality of reconstruction depends upon the sparsity level of the image. Contourlet transform is used to obtain the sparse representation of the image while the wavelet transform reduces the complexity of the compressed sensing algorithm. Thus both the transforms are combined to achieve better recovery from reduced number of sparse measurements. The low frequency wavelet subband contains most of the information and thus more number of samples is taken from this band. The high frequency wavelet bands contain lesser amount of data and thus reduced number of samples is taken from these bands. The recovered image is smoothened by using the Hybrid Mean Median (HMM) Filter because of its nature of preserving the sharp edges in the image. Hence higher quality image is obtained from very less measurements.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131058704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy efficient minimum connected dominating set algorithm for MANETs 能源高效的最小连接控制集算法
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844215
Chakradhar P Research, P Yogesh
In this paper we proposed a new Minimum Connected Dominating Set [MCDS] algorithm. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem[1]. The connected dominating set (CDS) is widely used as a virtual backbone in mobile ad-hoc networks. Here the MCDS is a distributed algorithm based on Unit Disk Graph[7]. The node's mobility and residual energy are considered as parameters in construction of stable MCDS. The time complexity of this algorithm is O(n) and the message complexity is O(n). The performance evaluation of this algorithm yields better results in dense networks as well as sparse networks. Size of the MCDS is also small compared to other distributed algorithms[8][9][10].
本文提出了一种新的最小连通支配集算法。该算法通过最小化广播风暴问题来实现能源效率[1]。连接支配集(CDS)作为虚拟骨干网在移动自组网中得到了广泛的应用。这里的MCDS是一种基于单位磁盘图的分布式算法[7]。将节点的迁移率和剩余能量作为构建稳定MCDS的参数。该算法的时间复杂度为O(n),消息复杂度为O(n)。该算法的性能评估在密集网络和稀疏网络中都取得了较好的结果。与其他分布式算法相比,MCDS的大小也较小[8][9][10]。
{"title":"Energy efficient minimum connected dominating set algorithm for MANETs","authors":"Chakradhar P Research, P Yogesh","doi":"10.1109/ICRTIT.2013.6844215","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844215","url":null,"abstract":"In this paper we proposed a new Minimum Connected Dominating Set [MCDS] algorithm. This algorithm achieves energy efficiency by minimizing the Broadcast Storm Problem[1]. The connected dominating set (CDS) is widely used as a virtual backbone in mobile ad-hoc networks. Here the MCDS is a distributed algorithm based on Unit Disk Graph[7]. The node's mobility and residual energy are considered as parameters in construction of stable MCDS. The time complexity of this algorithm is O(n) and the message complexity is O(n). The performance evaluation of this algorithm yields better results in dense networks as well as sparse networks. Size of the MCDS is also small compared to other distributed algorithms[8][9][10].","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131402527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy preserving authentication in VANET for location based services 基于位置服务的VANET中的隐私保护身份验证
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844244
S. Muruganandham, Venkateshkumar Muthusamy, A. Rajasimmavarman, V. Vaidehi
This paper deals with providing location based services to emergency vehicles and to the ordinary vehicles in a secure manner that needs services in a Vehicular Ad hoc NETwork (VANET). In VANET the vehicles are equipped with the On Board Unit (OBU) in which the developed application obtains the current location of the vehicle and makes updates in the location server and to the Road Side Unit (RSU). The location server is the centralized server that collects all the necessary information like position and the Id of the vehicles that are moving. The emergency vehicle obtains the location of the doctors' vehicle from the location server or from the RSU. Then, the communication phase is established between the vehicles which are based on the Vehicle to Vehicle communication (V2V) model where the vehicles behave as nodes. Thus, by identifying the location information about the vehicle, the privacy of the vehicle users may be revealed. To avoid the issues involved in the privacy of vehicles users, the authentication for the vehicle users has been introduced. The successful authentication preserves the privacy of the vehicle user and establishes the secure communication between the vehicles. The efficiency of the communication is increased by introducing the Trusted Authority (TA). The trusted authority module performs the segregation of sensitive and insensitive messages and only the sensitive messages are encrypted through the pairing technique in the communication phase. Thus, Trusted Authority increases the performance of communication in a secure way between vehicles in emergency situation. The proposed system increases the performance by 19% for 100 characters when compared to existing system.
本文研究了在车辆自组织网络(VANET)中以安全的方式向应急车辆和普通车辆提供基于位置的服务。在VANET中,车辆配备了车载单元(OBU),其中开发的应用程序获取车辆的当前位置,并在位置服务器和路侧单元(RSU)中进行更新。位置服务器是集中式服务器,它收集所有必要的信息,如位置和正在移动的车辆的Id。急救车辆从位置服务器或RSU获取医生车辆的位置。然后,基于车辆对车辆通信(V2V)模型建立车辆之间的通信阶段,其中车辆作为节点。因此,通过识别车辆的位置信息,可以泄露车辆用户的隐私。为了避免涉及车辆用户隐私的问题,引入了车辆用户身份验证。成功的身份验证保护了车辆用户的隐私,并建立了车辆之间的安全通信。通过引入可信机构(TA),提高了通信的效率。可信权限模块对敏感消息和不敏感消息进行隔离,在通信阶段通过配对技术对敏感消息进行加密。因此,在紧急情况下,可信授权以安全的方式提高了车辆之间的通信性能。与现有系统相比,所提出的系统在100个字符时的性能提高了19%。
{"title":"Privacy preserving authentication in VANET for location based services","authors":"S. Muruganandham, Venkateshkumar Muthusamy, A. Rajasimmavarman, V. Vaidehi","doi":"10.1109/ICRTIT.2013.6844244","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844244","url":null,"abstract":"This paper deals with providing location based services to emergency vehicles and to the ordinary vehicles in a secure manner that needs services in a Vehicular Ad hoc NETwork (VANET). In VANET the vehicles are equipped with the On Board Unit (OBU) in which the developed application obtains the current location of the vehicle and makes updates in the location server and to the Road Side Unit (RSU). The location server is the centralized server that collects all the necessary information like position and the Id of the vehicles that are moving. The emergency vehicle obtains the location of the doctors' vehicle from the location server or from the RSU. Then, the communication phase is established between the vehicles which are based on the Vehicle to Vehicle communication (V2V) model where the vehicles behave as nodes. Thus, by identifying the location information about the vehicle, the privacy of the vehicle users may be revealed. To avoid the issues involved in the privacy of vehicles users, the authentication for the vehicle users has been introduced. The successful authentication preserves the privacy of the vehicle user and establishes the secure communication between the vehicles. The efficiency of the communication is increased by introducing the Trusted Authority (TA). The trusted authority module performs the segregation of sensitive and insensitive messages and only the sensitive messages are encrypted through the pairing technique in the communication phase. Thus, Trusted Authority increases the performance of communication in a secure way between vehicles in emergency situation. The proposed system increases the performance by 19% for 100 characters when compared to existing system.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134049574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An improved and efficient message passing interface for secure communication on distributed clusters 一种改进的高效消息传递接口,用于分布式集群上的安全通信
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844225
M. A. Maffina, R. Rampriya
The main aim of this project is to provide secure communication among distributed clusters via Message Passing Interface (MPI). When a number of clusters associated to each other are increased then, it becomes a threat to security applications running on the clusters. To handle this security trouble, a MPI is built-up to protect the properties of security in an untrusted network. In the existing system, to generate the symmetric shared key, the participant provide only 1 byte size of random number so there is a chance to find out the key by the intruder. Furthermore, here only text message is passed between the clients. The proposed system is Enhanced Security for Message Passing Interface Chameleon version 2 (ES-MPICH2) in which it maintains the size of random number as 4 bytes, thus it is impossible to find out the key by the unauthorized person. This protocol is extended with features, such as secure file transfer utility and rekeying process. As well it supports to encrypt and decrypt the file upload by the user. We use secure algorithms like interpolation polynomial, AES and SHA-1 for key management, encryption/decryption and providing integrity service. After that those algorithms are integrated into Message Passing Interface Chameleon version 2 (MPICH2) that becomes ES-MPICH2. It supports a large collection of calculation and conversation area. The proposed work is based on both mathematics and cryptography concept that direct to error free message passing among the authorized users with enhanced security.
该项目的主要目的是通过消息传递接口(Message Passing Interface, MPI)在分布式集群之间提供安全通信。当相互关联的集群数量增加时,就会对在集群上运行的安全应用程序构成威胁。为了解决这一安全问题,建立了MPI来保护不受信任网络中的安全属性。在现有的系统中,为了生成对称共享密钥,参与者只提供1字节大小的随机数,因此有机会被入侵者找到密钥。此外,这里只有文本消息在客户端之间传递。所提出的系统是Enhanced Security for Message Passing Interface Chameleon version 2 (ES-MPICH2),它将随机数的大小保持在4字节,因此未经授权的人不可能找到密钥。该协议扩展了安全文件传输实用程序和密钥更新过程等功能。它还支持对用户上传的文件进行加密和解密。我们使用插值多项式、AES和SHA-1等安全算法进行密钥管理、加解密和提供完整性服务。之后,这些算法被集成到消息传递接口变色龙版本2 (MPICH2)中,成为ES-MPICH2。它支持大量的集合计算和对话区域。建议的工作是基于数学和密码学的概念,直接在授权用户之间以增强的安全性传递无错误的消息。
{"title":"An improved and efficient message passing interface for secure communication on distributed clusters","authors":"M. A. Maffina, R. Rampriya","doi":"10.1109/ICRTIT.2013.6844225","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844225","url":null,"abstract":"The main aim of this project is to provide secure communication among distributed clusters via Message Passing Interface (MPI). When a number of clusters associated to each other are increased then, it becomes a threat to security applications running on the clusters. To handle this security trouble, a MPI is built-up to protect the properties of security in an untrusted network. In the existing system, to generate the symmetric shared key, the participant provide only 1 byte size of random number so there is a chance to find out the key by the intruder. Furthermore, here only text message is passed between the clients. The proposed system is Enhanced Security for Message Passing Interface Chameleon version 2 (ES-MPICH2) in which it maintains the size of random number as 4 bytes, thus it is impossible to find out the key by the unauthorized person. This protocol is extended with features, such as secure file transfer utility and rekeying process. As well it supports to encrypt and decrypt the file upload by the user. We use secure algorithms like interpolation polynomial, AES and SHA-1 for key management, encryption/decryption and providing integrity service. After that those algorithms are integrated into Message Passing Interface Chameleon version 2 (MPICH2) that becomes ES-MPICH2. It supports a large collection of calculation and conversation area. The proposed work is based on both mathematics and cryptography concept that direct to error free message passing among the authorized users with enhanced security.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122456817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Mobility based minimal network coding (MBMNC) algorithm for mobile ad-hoc network 移动自组网中基于移动性的最小网络编码算法
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844218
Saravanan K, Venkatalakshmi B
Recent times, a new communication archetype called Network Coding (NC) has emerged in which the mediator nodes allowed to carry out encoding and decoding operations on the information they receive. Network capacity of any communication network can be enhanced through this network coding strategy. Mobile Ad-hoc Networks (MANET) often consist of large number of mobile nodes that are strictly power constrained. So, it is important to minimize the power utilization of every single node in order to improve the network lifetime. Blind Encoding consequences superfluous power consumption. If a node moves after encoding the packet due its dynamic nature then obviously waste of time and power occurs. This work proposes an algorithm called mobility based minimal network coding algorithm (MBMNC) for MANET which allows only minimal number of nodes to encode by considering the node mobility. The eligibility criteria of a node to do NC have a dependency on link availability of a node with respect to its neighboring node. The probability of the link availability influences the decision of whether the node is an encoding node or forwarding node. Only a limited number of nodes with high probability of link availability will do network coding. This work proposes a solution for enhancing the network capacity through network coding in consideration with node mobility.
最近,出现了一种称为网络编码(Network Coding, NC)的新通信原型,在这种原型中,中介节点允许对它们接收到的信息执行编码和解码操作。通过这种网络编码策略,可以提高任何通信网络的网络容量。移动自组织网络(MANET)通常由大量受到严格功率限制的移动节点组成。因此,为了改善网络生命周期,最小化每个单个节点的功率利用率是非常重要的。盲目编码会导致多余的功耗。如果一个节点由于其动态特性而在编码后移动,那么显然会浪费时间和功率。本文提出了一种基于移动性的最小网络编码算法(MBMNC),该算法通过考虑节点的移动性,只允许最小数量的节点进行编码。一个节点进行NC的资格标准依赖于该节点相对于其相邻节点的链路可用性。链路可用性的概率影响节点是编码节点还是转发节点的决定。只有具有高链路可用性的有限数量的节点才会进行网络编码。本文提出了一种考虑节点移动性的网络编码增强网络容量的解决方案。
{"title":"Mobility based minimal network coding (MBMNC) algorithm for mobile ad-hoc network","authors":"Saravanan K, Venkatalakshmi B","doi":"10.1109/ICRTIT.2013.6844218","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844218","url":null,"abstract":"Recent times, a new communication archetype called Network Coding (NC) has emerged in which the mediator nodes allowed to carry out encoding and decoding operations on the information they receive. Network capacity of any communication network can be enhanced through this network coding strategy. Mobile Ad-hoc Networks (MANET) often consist of large number of mobile nodes that are strictly power constrained. So, it is important to minimize the power utilization of every single node in order to improve the network lifetime. Blind Encoding consequences superfluous power consumption. If a node moves after encoding the packet due its dynamic nature then obviously waste of time and power occurs. This work proposes an algorithm called mobility based minimal network coding algorithm (MBMNC) for MANET which allows only minimal number of nodes to encode by considering the node mobility. The eligibility criteria of a node to do NC have a dependency on link availability of a node with respect to its neighboring node. The probability of the link availability influences the decision of whether the node is an encoding node or forwarding node. Only a limited number of nodes with high probability of link availability will do network coding. This work proposes a solution for enhancing the network capacity through network coding in consideration with node mobility.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"465 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115629500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A cluster based multiple ontology parallel merge method 一种基于聚类的多本体并行合并方法
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844226
Sunitha Abburu, G. S. Babu
Ontologies are an inevitable aspect of knowledge representation, processing, sharing and reuse and this in itself is the essence and significance of ontology. The number of ontologies available online is growing at a rapid pace. This conspicuous growth of ontologies enables sharing of knowledge in distributed and heterogeneous systems. The tremendous growth of ontologies has implied the popping up of multiple ontologies of the same domain. Applications developed based on these ontologies cannot achieve interoperability. To conquer this problem one of the optimum solution is to merge the ontologies in to a single general complete ontology. This brings up the need for a method which merges multiple ontologies, producing consistent, complete ontology. Another decisive factor worth consideration is the performance of multiple ontology merge process in terms of time. The current research work proposes a new cluster based multiple ontology parallel merge process. The performance of the multiple ontology merge process is fine-tuned by considering the similarity measure and parallel merge process. The proposed method produces consistent, optimum and complete knowledge of the domain as a single ontology with reduced time, which can be used by heterogeneous applications. The proposed method is implemented and a comparison of time complexity of the processing is presented at the end.
本体是知识表示、处理、共享和重用的必然方面,这本身就是本体的本质和意义所在。在线可用本体的数量正在快速增长。本体的显著增长使得分布式和异构系统中的知识共享成为可能。本体的巨大增长意味着同一领域的多个本体的出现。基于这些本体开发的应用程序不能实现互操作性。为了解决这个问题,最优的解决方案之一是将这些本体合并为一个通用的完整本体。这就需要一种方法来合并多个本体,从而产生一致的、完整的本体。另一个值得考虑的决定性因素是多本体合并过程在时间上的表现。目前的研究工作提出了一种新的基于聚类的多本体并行合并过程。通过考虑相似度度量和并行合并过程,对多本体合并过程的性能进行了微调。该方法在较短的时间内生成一致的、最优的、完整的领域本体知识,可用于异构应用。最后对所提出的方法进行了实现,并对处理的时间复杂度进行了比较。
{"title":"A cluster based multiple ontology parallel merge method","authors":"Sunitha Abburu, G. S. Babu","doi":"10.1109/ICRTIT.2013.6844226","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844226","url":null,"abstract":"Ontologies are an inevitable aspect of knowledge representation, processing, sharing and reuse and this in itself is the essence and significance of ontology. The number of ontologies available online is growing at a rapid pace. This conspicuous growth of ontologies enables sharing of knowledge in distributed and heterogeneous systems. The tremendous growth of ontologies has implied the popping up of multiple ontologies of the same domain. Applications developed based on these ontologies cannot achieve interoperability. To conquer this problem one of the optimum solution is to merge the ontologies in to a single general complete ontology. This brings up the need for a method which merges multiple ontologies, producing consistent, complete ontology. Another decisive factor worth consideration is the performance of multiple ontology merge process in terms of time. The current research work proposes a new cluster based multiple ontology parallel merge process. The performance of the multiple ontology merge process is fine-tuned by considering the similarity measure and parallel merge process. The proposed method produces consistent, optimum and complete knowledge of the domain as a single ontology with reduced time, which can be used by heterogeneous applications. The proposed method is implemented and a comparison of time complexity of the processing is presented at the end.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125487521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 International Conference on Recent Trends in Information Technology (ICRTIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1