首页 > 最新文献

International Conference on Information Communication and Embedded Systems (ICICES2014)最新文献

英文 中文
Design of combinational logic circuits for low power reversible logic circuits in quantum cellular automata 量子元胞自动机中低功耗可逆逻辑电路的组合逻辑电路设计
I. Anand, A. Kamaraj
The circuits like Logic gates, Adders, Multipliers are the basic building block of the digital circuits. These combinational circuits can be designed by using the concepts of the reversible logic. The reversible logic is either a physically reversible or logically reversible. In this paper the combinational circuits are logically reversible. One of the applications of the reversible logic is Quantum Cellular Automata (QCA). QCA has attracted feature of extremely small feature size (at the molecular or even atomic scale) and its ultra-low power consumption, making it one candidate for replacing CMOS technology. Thus the design and realization of the Basic Logic gates and Combinational circuits like ripple carry adder, serial adder, multiplexer are done by using the concept of Quantum Cellular Automata. Also, the area and cost of the QCA system is reduced with the help of Coplanar architecture arrangement of cells. The paper is organized as follows; the section one gives the overall introduction about QCA, Clocking of QCA and Wires in QCA. Section two gives information about the basic logic gates. In Section three, design and Simulation of Combinational circuits like half adder, full adder, ripple carry adders and multipliers are discussed. At last the Comparison of Quantum cost of the above designs due to Coplanar architecture was elaborated.
逻辑门、加法器、乘法器等电路是数字电路的基本组成部分。这些组合电路可以用可逆逻辑的概念来设计。可逆逻辑可以是物理可逆的,也可以是逻辑可逆的。在本文中,组合电路是逻辑可逆的。可逆逻辑的应用之一是量子元胞自动机(QCA)。QCA具有极小特征尺寸(在分子甚至原子尺度上)和超低功耗的特点,是取代CMOS技术的候选技术之一。利用量子元胞自动机的概念,设计和实现了基本逻辑门和纹波进位加法器、串行加法器、复用器等组合电路。此外,由于单元的共面结构排列,减少了QCA系统的面积和成本。本文组织如下:第一部分对QCA、QCA的时钟和QCA中的线路进行了全面的介绍。第二节给出了基本逻辑门的信息。第三部分讨论了半加法器、全加法器、纹波进位加法器和乘法器等组合电路的设计与仿真。最后,由于共面结构的原因,对上述设计的量子成本进行了比较。
{"title":"Design of combinational logic circuits for low power reversible logic circuits in quantum cellular automata","authors":"I. Anand, A. Kamaraj","doi":"10.1109/ICICES.2014.7034011","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034011","url":null,"abstract":"The circuits like Logic gates, Adders, Multipliers are the basic building block of the digital circuits. These combinational circuits can be designed by using the concepts of the reversible logic. The reversible logic is either a physically reversible or logically reversible. In this paper the combinational circuits are logically reversible. One of the applications of the reversible logic is Quantum Cellular Automata (QCA). QCA has attracted feature of extremely small feature size (at the molecular or even atomic scale) and its ultra-low power consumption, making it one candidate for replacing CMOS technology. Thus the design and realization of the Basic Logic gates and Combinational circuits like ripple carry adder, serial adder, multiplexer are done by using the concept of Quantum Cellular Automata. Also, the area and cost of the QCA system is reduced with the help of Coplanar architecture arrangement of cells. The paper is organized as follows; the section one gives the overall introduction about QCA, Clocking of QCA and Wires in QCA. Section two gives information about the basic logic gates. In Section three, design and Simulation of Combinational circuits like half adder, full adder, ripple carry adders and multipliers are discussed. At last the Comparison of Quantum cost of the above designs due to Coplanar architecture was elaborated.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88660531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An optimized routing approach in wireless sensor networks 无线传感器网络中的一种优化路由方法
B. Pavithra, A. Asha
Wireless Sensor Networks consists of multi detection stations called sensor nodes, which are small, less weight and portable. They are spatially dispersed for monitoring the environmental conditions and to coordinate the activities systematically. Energy limitation is the fundamental drawback in network lifetime. Here, we propose two routing approaches for transmission of data packets in wireless sensor networks. The data packets are routed either through the established route with the help of relay nodes which act as an intermediate nodes or routed through high energy based clusters to reach the destination. Our work includes fault node recovery mechanisms under both the scenarios. The results obtained with the help of NS-2 simulation software concludes that High energy clusters based routing approach outperforms Relay nodes based routing by taking delivery rate, delay and overhead as parameter metrics into consideration.
无线传感器网络由多个被称为传感器节点的检测站组成,这些传感器节点体积小,重量轻,便于携带。它们在空间上分散,用于监测环境条件和系统地协调活动。能量限制是网络寿命的根本缺陷。在此,我们提出了两种无线传感器网络中传输数据包的路由方法。数据包要么在中继节点的帮助下通过建立的路由路由,中继节点作为中间节点,要么通过高能集群路由到达目的地。我们的工作包括两种情况下的故障节点恢复机制。在NS-2仿真软件的帮助下得到的结果表明,以传输速率、延迟和开销为参数指标的高能集群路由方法优于中继节点路由。
{"title":"An optimized routing approach in wireless sensor networks","authors":"B. Pavithra, A. Asha","doi":"10.1109/ICICES.2014.7034181","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034181","url":null,"abstract":"Wireless Sensor Networks consists of multi detection stations called sensor nodes, which are small, less weight and portable. They are spatially dispersed for monitoring the environmental conditions and to coordinate the activities systematically. Energy limitation is the fundamental drawback in network lifetime. Here, we propose two routing approaches for transmission of data packets in wireless sensor networks. The data packets are routed either through the established route with the help of relay nodes which act as an intermediate nodes or routed through high energy based clusters to reach the destination. Our work includes fault node recovery mechanisms under both the scenarios. The results obtained with the help of NS-2 simulation software concludes that High energy clusters based routing approach outperforms Relay nodes based routing by taking delivery rate, delay and overhead as parameter metrics into consideration.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76004324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Wavelet-based watermarking for copy rights protection 基于小波的版权保护水印
H. Suryavanshi, Amit Mishra, S. Sahu, M. Mali
In this paper, a wavelet based scheme for digital image watermarking is presented. This proposed scheme inserts two watermarks in an image which serves two different purposes. The first one is inserted using blind watermarking technique while second one acts as fragile watermark. As it is blind watermarking technique, there is no need of original image at the time of watermark extraction. The insertion of watermark is based on selection of suitable coefficients which are obtained after applying two-level wavelet decomposition. The result produced by this watermarking scheme is good as compared to conventional watermarking techniques.
提出了一种基于小波变换的数字图像水印算法。该方案在图像中插入两个水印,用于两种不同的目的。第一个用盲水印技术插入,第二个作为脆弱水印。由于是盲水印技术,在水印提取时不需要原始图像。采用二级小波分解后,选取合适的系数进行水印的插入。与传统的水印技术相比,该方案的水印效果较好。
{"title":"Wavelet-based watermarking for copy rights protection","authors":"H. Suryavanshi, Amit Mishra, S. Sahu, M. Mali","doi":"10.1109/ICICES.2014.7034007","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034007","url":null,"abstract":"In this paper, a wavelet based scheme for digital image watermarking is presented. This proposed scheme inserts two watermarks in an image which serves two different purposes. The first one is inserted using blind watermarking technique while second one acts as fragile watermark. As it is blind watermarking technique, there is no need of original image at the time of watermark extraction. The insertion of watermark is based on selection of suitable coefficients which are obtained after applying two-level wavelet decomposition. The result produced by this watermarking scheme is good as compared to conventional watermarking techniques.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78611386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Acquaint based grid clustering algorithm for Underwater wireless sensor network 基于熟悉的水下无线传感器网络网格聚类算法
V. Sundarameena, D. Priyatharisini
Underwater wireless sensor network (UWSN) is an important emerging research area in wide range of application, unlike the terrestrial network it uses the acoustic signal which has a unique characteristics like limited bandwidth, high and variable propagation delay, transmit energy, minimum network lifetime and so on. This paper proposes an efficient clustering algorithm having 3D-GRID network architecture and it uses limited control information for data gathering to improve the energy efficiency of the network. The GRID clustering method supports 3D deployment based on geographical location of the sensors which has cluster heads (CH) and non cluster heads (NCH). All the cluster heads are present in the center of the network and all the non-cluster head nodes are in minimum distance to the cluster head. This network structure helps to avoid the control packets for intra communication. For inter communication the CH data packet contains the control packet for route establishment and data transmission. Thus this technique reduce the usage of energy while communication and improve the lifetime of the network.
水下无线传感器网络(UWSN)是一个重要的新兴研究领域,具有广泛的应用前景。与地面网络不同,水下无线传感器网络利用声信号,具有带宽有限、传播延迟高且可变、传输能量大、网络寿命短等特点。本文提出了一种具有3D-GRID网络结构的高效聚类算法,该算法利用有限的控制信息进行数据采集,以提高网络的能源效率。网格聚类方法支持基于地理位置的传感器三维部署,包括簇头和非簇头。所有簇头节点都位于网络中心,所有非簇头节点与簇头节点的距离最小。这种网络结构有助于避免内部通信的控制数据包。对于内部通信,CH数据包包含路由建立和数据传输的控制数据包。因此,该技术减少了通信时的能源使用,提高了网络的寿命。
{"title":"Acquaint based grid clustering algorithm for Underwater wireless sensor network","authors":"V. Sundarameena, D. Priyatharisini","doi":"10.1109/ICICES.2014.7033927","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033927","url":null,"abstract":"Underwater wireless sensor network (UWSN) is an important emerging research area in wide range of application, unlike the terrestrial network it uses the acoustic signal which has a unique characteristics like limited bandwidth, high and variable propagation delay, transmit energy, minimum network lifetime and so on. This paper proposes an efficient clustering algorithm having 3D-GRID network architecture and it uses limited control information for data gathering to improve the energy efficiency of the network. The GRID clustering method supports 3D deployment based on geographical location of the sensors which has cluster heads (CH) and non cluster heads (NCH). All the cluster heads are present in the center of the network and all the non-cluster head nodes are in minimum distance to the cluster head. This network structure helps to avoid the control packets for intra communication. For inter communication the CH data packet contains the control packet for route establishment and data transmission. Thus this technique reduce the usage of energy while communication and improve the lifetime of the network.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76519906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Crawling the page flipping links 抓取页面翻转链接
K. Priya, S. Dhanalakshmi
The supervised web-scale forum crawler is to crawl relevant forum content from the web with minimum overhead. Forum threads contain information content that is the target of forum crawlers, each forums have different layouts or styles and have different forum software packages, they always have similar constant navigation paths connected by specific URL types to direct users from entry pages to thread page, we reduce the web forum crawling problem to a URL-type recognition problem. And shows how to learn accurate and effective regular expression patterns of constant navigation paths from automatically created training sets using aggregated results from weak page type classifiers. Robust page type classifiers can be experienced from as few as five annotated forums and applied to a large set of unseen forums. The results show that Focus achieved over 98 percent effectiveness and 97 percent coverage on a large set of test forums powered by over 150 different forum software packages., The results of applying Focus on more than 100 community, the concept of constant navigation path could apply to other social media site.
监督的网络规模的论坛爬虫是从网络抓取相关的论坛内容与最小的开销。论坛线程所包含的信息内容是论坛爬虫的目标,每个论坛都有不同的布局或风格,也有不同的论坛软件包,它们总是有相似的恒定导航路径,通过特定的URL类型连接,将用户从入口页面引导到线程页面,我们将web论坛的爬行问题减少为URL类型识别问题。并展示了如何使用来自弱页面类型分类器的聚合结果从自动创建的训练集中学习准确有效的固定导航路径正则表达式模式。健壮的页面类型分类器可以从五个带注释的论坛中体验到,并应用于大量未见过的论坛。结果表明,Focus在由150多个不同的论坛软件包支持的大型测试论坛上实现了超过98%的有效性和97%的覆盖率。将Focus应用于100多个社区的结果表明,持续导航路径的概念可以应用于其他社交媒体网站。
{"title":"Crawling the page flipping links","authors":"K. Priya, S. Dhanalakshmi","doi":"10.1109/ICICES.2014.7033885","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033885","url":null,"abstract":"The supervised web-scale forum crawler is to crawl relevant forum content from the web with minimum overhead. Forum threads contain information content that is the target of forum crawlers, each forums have different layouts or styles and have different forum software packages, they always have similar constant navigation paths connected by specific URL types to direct users from entry pages to thread page, we reduce the web forum crawling problem to a URL-type recognition problem. And shows how to learn accurate and effective regular expression patterns of constant navigation paths from automatically created training sets using aggregated results from weak page type classifiers. Robust page type classifiers can be experienced from as few as five annotated forums and applied to a large set of unseen forums. The results show that Focus achieved over 98 percent effectiveness and 97 percent coverage on a large set of test forums powered by over 150 different forum software packages., The results of applying Focus on more than 100 community, the concept of constant navigation path could apply to other social media site.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81254181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing workflow scheduling through promoting resource reliability and fault tolerance in grid environment 通过提高网格环境下的资源可靠性和容错能力来增强工作流调度能力
R. Sarayu, N. Krishnamoorthy
Grid computing is the form of distributed computing and coordinated resource sharing and problem solving in dynamic virtual organizations. Due to highly dynamic feature dependable workflow scheduling is critical in grid environment. Various scheduling algorithms are posed but hardly consider resource reliability. Current systems mainly consider fault tolerance but resources are not fully utilized. This paper proposes a dependable workflow scheduling system(DGWS) which is based on Markov chain process which increases reliability of workflow scheduling algorithm. The performance evaluation results decreases the length of schedule in workflow and increases the dependability of workflow execution using Fault tolerance technology checkpoint.
网格计算是动态虚拟组织中分布式计算、协同资源共享和问题解决的一种形式。由于网格环境下工作流的高度动态性,可靠的工作流调度至关重要。提出了各种调度算法,但很少考虑资源可靠性。目前的系统主要考虑容错,但资源没有得到充分利用。提出了一种基于马尔可夫链过程的可靠工作流调度系统,提高了工作流调度算法的可靠性。通过容错检查点技术,减少了工作流中进度的长度,提高了工作流执行的可靠性。
{"title":"Enhancing workflow scheduling through promoting resource reliability and fault tolerance in grid environment","authors":"R. Sarayu, N. Krishnamoorthy","doi":"10.1109/ICICES.2014.7033921","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033921","url":null,"abstract":"Grid computing is the form of distributed computing and coordinated resource sharing and problem solving in dynamic virtual organizations. Due to highly dynamic feature dependable workflow scheduling is critical in grid environment. Various scheduling algorithms are posed but hardly consider resource reliability. Current systems mainly consider fault tolerance but resources are not fully utilized. This paper proposes a dependable workflow scheduling system(DGWS) which is based on Markov chain process which increases reliability of workflow scheduling algorithm. The performance evaluation results decreases the length of schedule in workflow and increases the dependability of workflow execution using Fault tolerance technology checkpoint.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81283217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Depletion of vampire attacks in medium access control level using interior gateway routing protocol 利用内部网关路由协议消除中等访问控制层的吸血鬼攻击
R. Abirami, G. Premalatha
A wireless sensor network is a group of network nodes which collaborate with each other in a sophisticated fashion. It is built of nodes from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. In WSN, Second layer of the OSI reference layer is a data link layer which has a sub layer of Medium Access Control. The choice of Medium Access Control (MAC) protocol has a direct bearing on the reliability and efficiency of network transmissions due to errors and interferences in wireless communications and to other challenges. They are primarily responsible for regulating access to the shared medium. There are a lot of protocols developed to protect from DOS attack, but it is not completely possible. One such DOS attack is vampire attacks which cause damage in network. Secure level is low; productivity reduces which leads to environmental disasters and cause loss in the information. Routing protocols play an important role in modern wireless communication networks. Hence propose Interior Gateway Routing Protocol (IGRP) where router used it to exchange routing data within an independent system. In WSN routing protocols find the route between nodes and ensure the consistent communication between the nodes in the network.
无线传感器网络是一组以复杂方式相互协作的网络节点。它由几个到几百个甚至几千个节点组成,每个节点连接到一个(有时是几个)传感器。在无线传感器网络中,OSI参考层的第二层是一个数据链路层,它有一个介质访问控制子层。介质访问控制(MAC)协议的选择直接关系到网络传输的可靠性和效率,因为无线通信中的错误和干扰以及其他挑战。他们主要负责调节对共享媒体的访问。有很多协议开发保护免受DOS攻击,但这是不完全可能的。其中一种DOS攻击是吸血鬼攻击,它会对网络造成破坏。安全级别低;生产力降低,导致环境灾难,造成信息损失。路由协议在现代无线通信网络中起着重要的作用。因此提出了内部网关路由协议(IGRP),路由器使用它在一个独立的系统内交换路由数据。在WSN路由协议中,查找节点之间的路由,保证网络中节点之间通信的一致性。
{"title":"Depletion of vampire attacks in medium access control level using interior gateway routing protocol","authors":"R. Abirami, G. Premalatha","doi":"10.1109/ICICES.2014.7033801","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033801","url":null,"abstract":"A wireless sensor network is a group of network nodes which collaborate with each other in a sophisticated fashion. It is built of nodes from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. In WSN, Second layer of the OSI reference layer is a data link layer which has a sub layer of Medium Access Control. The choice of Medium Access Control (MAC) protocol has a direct bearing on the reliability and efficiency of network transmissions due to errors and interferences in wireless communications and to other challenges. They are primarily responsible for regulating access to the shared medium. There are a lot of protocols developed to protect from DOS attack, but it is not completely possible. One such DOS attack is vampire attacks which cause damage in network. Secure level is low; productivity reduces which leads to environmental disasters and cause loss in the information. Routing protocols play an important role in modern wireless communication networks. Hence propose Interior Gateway Routing Protocol (IGRP) where router used it to exchange routing data within an independent system. In WSN routing protocols find the route between nodes and ensure the consistent communication between the nodes in the network.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83862451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Survey on recommendation and visualization techniques for QOS-aware web services 面向qos的web服务推荐和可视化技术综述
J. Christi, K. Premkumar
With the rapid growth of web services, maintaining QOS in providing the services is an important issue. QOS faces various factors like scalability, response time, service selection, quality control and so on. In this service selection and predicting for the best service is a challenge over the World Wide Web. Many approaches have been used to perform this task and the current approaches fail to consider the QOS variance according to user's location and lacks in transparency. So a novel collaborative filtering algorithm is designed for large-scale web service recommendations. For better understanding a recommendation visualization technique is used to show how the services are grouped based on user's choices.
随着web服务的快速发展,在提供服务时保持QOS是一个重要的问题。QOS面临着可扩展性、响应时间、服务选择、质量控制等多方面的因素。在这种情况下,选择和预测最好的服务是万维网面临的一个挑战。目前已有许多方法用于实现该任务,但目前的方法没有考虑到用户位置对QOS的影响,缺乏透明度。为此,设计了一种针对大规模web服务推荐的协同过滤算法。为了更好地理解,使用了推荐可视化技术来显示如何根据用户的选择对服务进行分组。
{"title":"Survey on recommendation and visualization techniques for QOS-aware web services","authors":"J. Christi, K. Premkumar","doi":"10.1109/ICICES.2014.7033942","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033942","url":null,"abstract":"With the rapid growth of web services, maintaining QOS in providing the services is an important issue. QOS faces various factors like scalability, response time, service selection, quality control and so on. In this service selection and predicting for the best service is a challenge over the World Wide Web. Many approaches have been used to perform this task and the current approaches fail to consider the QOS variance according to user's location and lacks in transparency. So a novel collaborative filtering algorithm is designed for large-scale web service recommendations. For better understanding a recommendation visualization technique is used to show how the services are grouped based on user's choices.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79914893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Peak to average power ratio reduction of OFDM system OFDM系统的峰值平均功率比降低
T. Gayathri, K. Bavithra
Orthogonal frequency division multiplexing (OFDM) is a modulation technique that is suitable for high data rate communication. But the main drawback of OFDM is its high peak to average power ratio (PAPR), which can lead to nonlinear distortions in the power amplifiers at the transmitter side. Selected mapping (SLM) based schemes effectively reduce the PAPR of OFDM system. However they require side information (SI) transmission, which suffers a loss in the data throughput in addition to the increased system complexity. A novel SI detection method enabling low complexity data decoding is proposed. Simulation results of this proposed SI detection method shows the bit error rate performance comparable to that of the simplified maximum likelihood data decoding scheme while the computational complexity is close to that of the embedded SI based data decoding scheme.
正交频分复用(OFDM)是一种适用于高数据速率通信的调制技术。但OFDM的主要缺点是其峰值平均功率比(PAPR)高,这可能导致发射机侧功率放大器的非线性失真。基于选择映射(SLM)的方案有效地降低了OFDM系统的PAPR。然而,它们需要侧信息(SI)传输,这不仅增加了系统复杂性,而且还损失了数据吞吐量。提出了一种低复杂度数据解码的SI检测方法。仿真结果表明,该方法的误码率性能与简化的最大似然数据解码方案相当,而计算复杂度接近基于嵌入式SI的数据解码方案。
{"title":"Peak to average power ratio reduction of OFDM system","authors":"T. Gayathri, K. Bavithra","doi":"10.1109/ICICES.2014.7034004","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034004","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is a modulation technique that is suitable for high data rate communication. But the main drawback of OFDM is its high peak to average power ratio (PAPR), which can lead to nonlinear distortions in the power amplifiers at the transmitter side. Selected mapping (SLM) based schemes effectively reduce the PAPR of OFDM system. However they require side information (SI) transmission, which suffers a loss in the data throughput in addition to the increased system complexity. A novel SI detection method enabling low complexity data decoding is proposed. Simulation results of this proposed SI detection method shows the bit error rate performance comparable to that of the simplified maximum likelihood data decoding scheme while the computational complexity is close to that of the embedded SI based data decoding scheme.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88419990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SYN flooding attack — Identification and analysis SYN泛洪攻击-识别和分析
K. Geetha, N. Sreenath
This paper analyzes one type of denial of service attacks in Mobile Adhoc Networks called SYN flooding attack, and its impact on the quality of service parameters. Denial of service attacks generally take away the resources and the services of the node and deny further legitimate services. In SYN flooding attack, an attack node sends many TCP (Transmission Control Protocol) SYN requests with spoofed source addresses to a node. Each request makes the destination node to allocate its resources out of the availability. The destination sends the acknowledgement to the spoofed address and waits for the third message from the source, since TCP connection is established after a three way handshake. But, the source address is a spoofed address and it will not respond with an acknowledgement. In the mean time, the attacker sends a lot of SYN requests. All the victim's resources are exhausted and hence further connection requests cannot be considered, denying the legitimate accesses. In this paper, it is assumed that the data sent from the source to destination is multimedia data with the communication between a client and server. This paper provides a detailed analysis on the SYN Flooding attack and analyzes the various parameters which are affected by the attack. The necessary condition for the identification of SYN flood attack, which is the ratio of the number of acknowledgements received from the client to the SYN acknowledgements sent from the server is checked. The protocols used are selective proactive and reactive routing protocols. This attack affects the quality of service parameters like packet delivery ratio, average end to end delay, throughput and jitter.
本文分析了移动自组网中的一种拒绝服务攻击——SYN泛洪攻击及其对服务参数质量的影响。拒绝服务攻击通常会夺走节点的资源和服务,并拒绝进一步的合法服务。SYN泛洪攻击是指攻击节点向一个节点发送大量带有欺骗源地址的TCP (Transmission Control Protocol) SYN请求。每个请求都使目标节点在可用性之外分配其资源。由于TCP连接是在三次握手之后建立的,因此目的地址向被欺骗的地址发送确认,并等待来自源的第三条消息。但是,源地址是一个欺骗地址,它不会响应一个确认。同时,攻击者发送大量SYN请求。所有受害者的资源被耗尽,因此不能考虑进一步的连接请求,拒绝合法的访问。本文假设从源端到目的端发送的数据为多媒体数据,并在客户端和服务器端之间进行通信。本文对SYN泛洪攻击进行了详细的分析,分析了受SYN泛洪攻击影响的各种参数。检查识别SYN flood攻击的必要条件,即客户端收到的SYN确认数与服务器发送的SYN确认数的比值。使用的协议是选择性的主动路由协议和被动路由协议。这种攻击会影响业务质量参数,如数据包发送比、平均端到端延迟、吞吐量和抖动。
{"title":"SYN flooding attack — Identification and analysis","authors":"K. Geetha, N. Sreenath","doi":"10.1109/ICICES.2014.7033828","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033828","url":null,"abstract":"This paper analyzes one type of denial of service attacks in Mobile Adhoc Networks called SYN flooding attack, and its impact on the quality of service parameters. Denial of service attacks generally take away the resources and the services of the node and deny further legitimate services. In SYN flooding attack, an attack node sends many TCP (Transmission Control Protocol) SYN requests with spoofed source addresses to a node. Each request makes the destination node to allocate its resources out of the availability. The destination sends the acknowledgement to the spoofed address and waits for the third message from the source, since TCP connection is established after a three way handshake. But, the source address is a spoofed address and it will not respond with an acknowledgement. In the mean time, the attacker sends a lot of SYN requests. All the victim's resources are exhausted and hence further connection requests cannot be considered, denying the legitimate accesses. In this paper, it is assumed that the data sent from the source to destination is multimedia data with the communication between a client and server. This paper provides a detailed analysis on the SYN Flooding attack and analyzes the various parameters which are affected by the attack. The necessary condition for the identification of SYN flood attack, which is the ratio of the number of acknowledgements received from the client to the SYN acknowledgements sent from the server is checked. The protocols used are selective proactive and reactive routing protocols. This attack affects the quality of service parameters like packet delivery ratio, average end to end delay, throughput and jitter.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88762708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
期刊
International Conference on Information Communication and Embedded Systems (ICICES2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1