Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533920
K. Kalaivani, A. Raghavendra
Clustering is an attractive and important task in data mining which is used in many applications. However earlier work on clustering focused on only categorical data which is based on attribute values for grouping similar kind of data items thus will leads to convergence problem of clustering process. This proposed work is to enhance the existing k-means clustering process based on the categorical and mixed data types in efficient manner. The goal is to use integrated clustering approach based on high dimensional categorical data that works well for data with mixed continuous and categorical features. The experimental results of the proposed method on several data sets are suggest that the link based cluster ensemble algorithm integrate with proposed k-means algorithm to produce accurate clustering results. In this proposed algorithm prove the convergence property of clustering process, thus will improve the accuracy of clustering results. The scope of this proposed work is used to provide the accurate and efficient results, whenever the user wants to access the data from the database.
{"title":"An integrated clustering approach for high dimensional categorical data","authors":"K. Kalaivani, A. Raghavendra","doi":"10.1109/ICGHPC.2013.6533920","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533920","url":null,"abstract":"Clustering is an attractive and important task in data mining which is used in many applications. However earlier work on clustering focused on only categorical data which is based on attribute values for grouping similar kind of data items thus will leads to convergence problem of clustering process. This proposed work is to enhance the existing k-means clustering process based on the categorical and mixed data types in efficient manner. The goal is to use integrated clustering approach based on high dimensional categorical data that works well for data with mixed continuous and categorical features. The experimental results of the proposed method on several data sets are suggest that the link based cluster ensemble algorithm integrate with proposed k-means algorithm to produce accurate clustering results. In this proposed algorithm prove the convergence property of clustering process, thus will improve the accuracy of clustering results. The scope of this proposed work is used to provide the accurate and efficient results, whenever the user wants to access the data from the database.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122797481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533934
J. Bino, A. Macriga
In the next generation of wireless networks, the entire network operating on different radio frequencies under wireless mode will be available for communication. Cognitive Networks are an emerging new type of networking technology that can utilize both Radio Spectrum and Wireless Station. Based on the Knowledge of the availability of such resources gathered from past experience the resources can be utilized efficiently. Signaling is the major issue in Cognitive Network. Multiple Input Multiple Output (MIMO) technique is used for the transmission of signals in Cognitive Network. In this paper, the performance of MIMO in a scattered environment is analyzed and water filling algorithm is used to maximize the capacity of MIMO channels. We also propose an optimum beamforming algorithm to design beamforming vectors such that, interference caused by the primary transmitter to the cognitive receiver and the interference caused by the cognitive transmitter to the primary receiver is completely nullified while maximizing the rate of both primary and secondary links. The proposed technique does not require any changes in the existing environment between the primary and secondary user. The secondary user will be allowed to transmit concurrently to the primary user. Since the primary user is a licensed one it need not to have any knowledge about the resources utilized and performance of the secondary user and it transmits independently. Further it is also proved that the rate of Cognitive Multiple Input Multiple Output (MIMO) link implemented by the proposed beamforming algorithms is equal to interference free Multiple Input Single Output (MISO) link.
{"title":"Enhancing the performance in cognitive network","authors":"J. Bino, A. Macriga","doi":"10.1109/ICGHPC.2013.6533934","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533934","url":null,"abstract":"In the next generation of wireless networks, the entire network operating on different radio frequencies under wireless mode will be available for communication. Cognitive Networks are an emerging new type of networking technology that can utilize both Radio Spectrum and Wireless Station. Based on the Knowledge of the availability of such resources gathered from past experience the resources can be utilized efficiently. Signaling is the major issue in Cognitive Network. Multiple Input Multiple Output (MIMO) technique is used for the transmission of signals in Cognitive Network. In this paper, the performance of MIMO in a scattered environment is analyzed and water filling algorithm is used to maximize the capacity of MIMO channels. We also propose an optimum beamforming algorithm to design beamforming vectors such that, interference caused by the primary transmitter to the cognitive receiver and the interference caused by the cognitive transmitter to the primary receiver is completely nullified while maximizing the rate of both primary and secondary links. The proposed technique does not require any changes in the existing environment between the primary and secondary user. The secondary user will be allowed to transmit concurrently to the primary user. Since the primary user is a licensed one it need not to have any knowledge about the resources utilized and performance of the secondary user and it transmits independently. Further it is also proved that the rate of Cognitive Multiple Input Multiple Output (MIMO) link implemented by the proposed beamforming algorithms is equal to interference free Multiple Input Single Output (MISO) link.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114259245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533921
Mr M Saravanan, K Suresh Manic
In this technological world development in the field of nanometer technology leads to minimize the power consumption of logic circuits. Reversible logic design has been one of the promising technologies gaining greater interest due to less dissipation of heat and low power consumption. In digital systems code conversion is a widely used process for reasons such as enhancing security of data, reducing the complexity of arithmetic operations and thereby reducing the hardware required, dropping the level of switching activity leading to more speed of operation and power saving etc. This paper proposes novel Reversible logic design for code conversion such as Binary to Gray code, Gray to Binary code, BCD to Excess 3 code, Excess 3 to BCD code.
{"title":"Energy efficient code converters using reversible logic gates","authors":"Mr M Saravanan, K Suresh Manic","doi":"10.1109/ICGHPC.2013.6533921","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533921","url":null,"abstract":"In this technological world development in the field of nanometer technology leads to minimize the power consumption of logic circuits. Reversible logic design has been one of the promising technologies gaining greater interest due to less dissipation of heat and low power consumption. In digital systems code conversion is a widely used process for reasons such as enhancing security of data, reducing the complexity of arithmetic operations and thereby reducing the hardware required, dropping the level of switching activity leading to more speed of operation and power saving etc. This paper proposes novel Reversible logic design for code conversion such as Binary to Gray code, Gray to Binary code, BCD to Excess 3 code, Excess 3 to BCD code.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129980222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533933
A. Prabahar
This paper describes a design of wireless sensor network node (WSN node) for the purpose of voice based applications. For implementing voice based WSN, wireless sensor nodes should be capable of capturing voice, processing it and transmitting it over RF (Radio Frequency) channel. Common WSN applications handle few bytes of data over wireless network. Acoustic WSN applications deal with high data rate voice. Acoustic WSN applications require high performance WSN nodes to accomplish capturing and processing voice. This paper explains how to make high performance WSN nodes by incorporating Digital Signal Processing (DSP) chip with the WSN node and how to implement suitable speech processing algorithm on it. The bottle neck arisen due to usage of DSP chip on WSN node is high power consumption. The techniques which are adopted to reduce the power consumption of DSP chip are described in this paper. The design of hardware is based on ultra low power DSP chip to improve the battery operating time of the WSN node.
{"title":"Development of high performance wireless sensor node for acoustic applications","authors":"A. Prabahar","doi":"10.1109/ICGHPC.2013.6533933","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533933","url":null,"abstract":"This paper describes a design of wireless sensor network node (WSN node) for the purpose of voice based applications. For implementing voice based WSN, wireless sensor nodes should be capable of capturing voice, processing it and transmitting it over RF (Radio Frequency) channel. Common WSN applications handle few bytes of data over wireless network. Acoustic WSN applications deal with high data rate voice. Acoustic WSN applications require high performance WSN nodes to accomplish capturing and processing voice. This paper explains how to make high performance WSN nodes by incorporating Digital Signal Processing (DSP) chip with the WSN node and how to implement suitable speech processing algorithm on it. The bottle neck arisen due to usage of DSP chip on WSN node is high power consumption. The techniques which are adopted to reduce the power consumption of DSP chip are described in this paper. The design of hardware is based on ultra low power DSP chip to improve the battery operating time of the WSN node.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134015192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533902
V. Nirmala, R. K. Sivanandhan, R. S. Lakshmi
Cloud computing is the one which offers infrastructure to the client on a pay as you use model by leveraging on the Internet technology. As this model depicts the electricity billing it is often termed as utility computing. It offers various services to the client based on the need. The need of the resources can be scaled up or down on the basis of the requirement. The IT sectors started using cloud service models. As the use of cloud increases day by day the concerns of cloud also gets increased. There are number of data breaches that are happening day by day that affect the cloud growth. The major concern in adapting cloud is its security. The companies have lot of data that gets increased each day enlarges the complication of data privacy and security. The data that we talk can be classified as either stagnant data i.e., for simple storage as offered by Amazon's Simple Storage Service (S3) or it can be vibrant that changes often. The solution available to protect the stagnant data will be to simply encrypt the data before it gets stored in the server. In order to solve the issues of vibrant data the techniques are being proposed to work out on the encrypted. This paper is a survey of different security issues that affects the cloud environment and related work that are carried out in the area of integrity. The technique proposed combines the encrypting mechanism along with the data integrity check mechanism. The data are double wrapped to ensure no data leakage happens at the server side. The data are also shared with users with proper access mechanism.
{"title":"Data confidentiality and integrity verification using user authenticator scheme in cloud","authors":"V. Nirmala, R. K. Sivanandhan, R. S. Lakshmi","doi":"10.1109/ICGHPC.2013.6533902","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533902","url":null,"abstract":"Cloud computing is the one which offers infrastructure to the client on a pay as you use model by leveraging on the Internet technology. As this model depicts the electricity billing it is often termed as utility computing. It offers various services to the client based on the need. The need of the resources can be scaled up or down on the basis of the requirement. The IT sectors started using cloud service models. As the use of cloud increases day by day the concerns of cloud also gets increased. There are number of data breaches that are happening day by day that affect the cloud growth. The major concern in adapting cloud is its security. The companies have lot of data that gets increased each day enlarges the complication of data privacy and security. The data that we talk can be classified as either stagnant data i.e., for simple storage as offered by Amazon's Simple Storage Service (S3) or it can be vibrant that changes often. The solution available to protect the stagnant data will be to simply encrypt the data before it gets stored in the server. In order to solve the issues of vibrant data the techniques are being proposed to work out on the encrypted. This paper is a survey of different security issues that affects the cloud environment and related work that are carried out in the area of integrity. The technique proposed combines the encrypting mechanism along with the data integrity check mechanism. The data are double wrapped to ensure no data leakage happens at the server side. The data are also shared with users with proper access mechanism.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117116352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-14DOI: 10.1109/ICGHPC.2013.6533931
S. Balaji, M. Prabha
USOR deals with the concept of unlinkability, unobservability and anonymity by combining group signature and ID-based encryption for route discovery. Apart from the security, there is another requirement in transmission is effective and efficient delivery of data. USOR uses ordinary distance calculations to get the knowledge about neighbour nodes. At the same time we can't incorporate the entire information about the network into single node or every node. We know that nodes in ad-hoc network have limited storage and battery power. Already half of the power vested in security, remaining power has to be used for calculating routes and data transmission. For that we are merging the above USOR with Better Approach To Mobile Ad-hoc Networking, or B.A.T.M.A.N. which is a routing protocol that has the knowledge of its best route alone - no single node has all the data. This technique eliminates extending the information to the concerning network changes to every node in the network. Each node only maintains the best hop details not the entire network topology. From this we are achieving fast transmission of data in a secure way with minimum node failure rate.
USOR通过组合组签名和基于id的加密进行路由发现,处理了不可链接性、不可观察性和匿名性的概念。在传输中,除了安全性之外,还有一个要求是数据的有效和高效的传递。USOR使用普通的距离计算来获得关于邻居节点的知识。同时,我们不能将整个网络的信息整合到单个节点或每个节点中。我们知道,自组织网络中的节点存储和电池电量有限。已经有一半的电力用于安全,剩余的电力必须用于计算路线和数据传输。为此,我们将上述USOR与更好的移动自组织网络方法(Better Approach To Mobile Ad-hoc Networking,简称b.a.t.m.a.n)合并在一起。b.a.t.m.a.n是一种路由协议,它只知道最佳路由——没有一个节点拥有所有数据。这种技术避免了将有关网络更改的信息扩展到网络中的每个节点。每个节点只维护最佳跳的详细信息,而不是整个网络拓扑。由此,我们以最小的节点故障率以安全的方式实现了数据的快速传输。
{"title":"UOSPR: UnObservable secure proactive routing protocol for fast and secure transmission using B.A.T.M.A.N","authors":"S. Balaji, M. Prabha","doi":"10.1109/ICGHPC.2013.6533931","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533931","url":null,"abstract":"USOR deals with the concept of unlinkability, unobservability and anonymity by combining group signature and ID-based encryption for route discovery. Apart from the security, there is another requirement in transmission is effective and efficient delivery of data. USOR uses ordinary distance calculations to get the knowledge about neighbour nodes. At the same time we can't incorporate the entire information about the network into single node or every node. We know that nodes in ad-hoc network have limited storage and battery power. Already half of the power vested in security, remaining power has to be used for calculating routes and data transmission. For that we are merging the above USOR with Better Approach To Mobile Ad-hoc Networking, or B.A.T.M.A.N. which is a routing protocol that has the knowledge of its best route alone - no single node has all the data. This technique eliminates extending the information to the concerning network changes to every node in the network. Each node only maintains the best hop details not the entire network topology. From this we are achieving fast transmission of data in a secure way with minimum node failure rate.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"59 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123939075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}