首页 > 最新文献

International Conference on Information Communication and Embedded Systems (ICICES2014)最新文献

英文 中文
Sentiment classification using weakly supervised learning techniques 使用弱监督学习技术的情感分类
P. Bharathi, P. Kalaivaani
Due to the advanced technologies of Web 2.0, people are participating in and exchanging opinions through social media sites such as Web forums and Weblogs etc., Classification and Analysis of such opinions and sentiment information is potentially important for both service and product providers, users because this analysis is used for making valuable decisions. Sentiment is expressed differently in different domains. Applying a sentiment classifiers trained on source domain does not produce good performance on target domain because words that occur in the train domain might not appear in the test domain. We propose a hybrid model to detect sentiment and topics from text by using weakly supervised learning technique. First we create sentiment sensitive thesaurus using both labeled and unlabeled data from multiple domains. The created thesaurus is then used to classify sentiments from text. This model is highly portable to various domains. This is verified by experimental results from four different domains where the hybrid model even outperforms existing semi-supervised approaches.
由于Web 2.0的先进技术,人们通过诸如Web论坛和weblog等社交媒体网站参与和交换意见,对这些意见和情绪信息进行分类和分析对于服务和产品提供商、用户都具有潜在的重要意义,因为这种分析用于做出有价值的决策。情感在不同领域的表达方式不同。应用在源域上训练的情感分类器不会在目标域上产生良好的性能,因为在训练域中出现的单词可能不会出现在测试域中。利用弱监督学习技术,提出了一种从文本中检测情感和主题的混合模型。首先,我们使用来自多个领域的标记和未标记数据创建情感敏感的词库。创建的词库然后用于从文本中分类情感。该模型可高度移植到各种领域。来自四个不同领域的实验结果验证了这一点,其中混合模型甚至优于现有的半监督方法。
{"title":"Sentiment classification using weakly supervised learning techniques","authors":"P. Bharathi, P. Kalaivaani","doi":"10.1109/ICICES.2014.7033924","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033924","url":null,"abstract":"Due to the advanced technologies of Web 2.0, people are participating in and exchanging opinions through social media sites such as Web forums and Weblogs etc., Classification and Analysis of such opinions and sentiment information is potentially important for both service and product providers, users because this analysis is used for making valuable decisions. Sentiment is expressed differently in different domains. Applying a sentiment classifiers trained on source domain does not produce good performance on target domain because words that occur in the train domain might not appear in the test domain. We propose a hybrid model to detect sentiment and topics from text by using weakly supervised learning technique. First we create sentiment sensitive thesaurus using both labeled and unlabeled data from multiple domains. The created thesaurus is then used to classify sentiments from text. This model is highly portable to various domains. This is verified by experimental results from four different domains where the hybrid model even outperforms existing semi-supervised approaches.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"12 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77127058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
StatCom control for voltage stability improvement at a fixed speed wind farm under unbalanced faults 不平衡故障下固定速度风电场电压稳定性改进的StatCom控制
M. Vimalraj, B. Alex, M. Tamilarasi
In this paper investigations on a fixed speed wind farm with squirrel cage induction generators directly connected to the grid in combination with a StatCom under unbalanced grid voltage fault are given by means of theory and simulations. The stability of fixed speed wind turbines can be improved by a StatCom, which is well known and documented in literature for balanced grid voltage dips. Under unbalanced grid voltage dips the negative sequence voltage causes additional generator torque oscillations. A StatCom control structure with the capability to control the positive or negative sequence of the voltage is used. The simulation results clarify the effect of positive and negative sequence voltage compensation by a StatCom on the operation of a fixed speed wind farm. The influence of different StatCom control targets is investigated that lead to an increased network voltage stability and lower torque pulsations.
本文从理论和仿真两方面研究了鼠笼式感应发电机直连并网的固定转速风电场与StatCom在电网电压不平衡故障下的运行情况。固定速度风力涡轮机的稳定性可以通过StatCom来提高,这是众所周知的,并在文献中记录了平衡电网电压降。在电网电压不平衡下降的情况下,负序电压引起附加的发电机转矩振荡。采用StatCom控制结构,能够控制电压的正序或负序。仿真结果阐明了StatCom的正负序电压补偿对固定速度风电场运行的影响。研究了不同的StatCom控制目标对提高网络电压稳定性和降低转矩脉动的影响。
{"title":"StatCom control for voltage stability improvement at a fixed speed wind farm under unbalanced faults","authors":"M. Vimalraj, B. Alex, M. Tamilarasi","doi":"10.1109/ICICES.2014.7034140","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034140","url":null,"abstract":"In this paper investigations on a fixed speed wind farm with squirrel cage induction generators directly connected to the grid in combination with a StatCom under unbalanced grid voltage fault are given by means of theory and simulations. The stability of fixed speed wind turbines can be improved by a StatCom, which is well known and documented in literature for balanced grid voltage dips. Under unbalanced grid voltage dips the negative sequence voltage causes additional generator torque oscillations. A StatCom control structure with the capability to control the positive or negative sequence of the voltage is used. The simulation results clarify the effect of positive and negative sequence voltage compensation by a StatCom on the operation of a fixed speed wind farm. The influence of different StatCom control targets is investigated that lead to an increased network voltage stability and lower torque pulsations.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"247 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77527567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detecting misbehavior node in Wifi networks by co-ordinated sampling of network monitoring 通过网络监测的协同抽样检测Wifi网络中的不良行为节点
M. Shanthi, S. Suresh
We present an approach to detect a selfish node in a wireless network by passive monitoring. This does not require any access to the network nodes. Our approach requires deploying multiple sniffers across the network to capture wireless traffic traces among multiple channels. IEEE 802.11 networks support multiple channels, and a wireless interface can monitor only a single channel at one time. Thus, capturing all frames passing an interface on all channels is an impossible task, and we need strategies to capture the most representative sample. When a large area is to be monitored, several sniffers must be deployed, and these will typically overlap in their area of coverage. The goals of effective wireless monitoring are to capture as many frames as possible, while minimizing the number of those frames that are captured redundantly by more than one sniffer. The above goals May be addressed with a coordinated sampling strategy that directs neighboring sniffer to different channels during any period. These traces are then analyzed using hidden markov model to infer the misbehavior node in wifi networks.
提出了一种利用被动监测方法检测无线网络中自利节点的方法。这不需要访问网络节点。我们的方法需要在整个网络中部署多个嗅探器来捕获多个通道之间的无线流量跟踪。IEEE 802.11网络支持多通道,一个无线接口一次只能监控一个通道。因此,捕获通过所有通道上的接口的所有帧是不可能完成的任务,我们需要捕获最具代表性的样本的策略。当要监视大片区域时,必须部署几个嗅探器,这些嗅探器通常在其覆盖区域重叠。有效的无线监控的目标是捕获尽可能多的帧,同时最小化那些被多个嗅探器冗余捕获的帧的数量。上述目标可以通过协调采样策略来解决,该策略可以在任何时期将相邻嗅探器引导到不同的通道。然后使用隐马尔可夫模型对这些痕迹进行分析,以推断wifi网络中的不当行为节点。
{"title":"Detecting misbehavior node in Wifi networks by co-ordinated sampling of network monitoring","authors":"M. Shanthi, S. Suresh","doi":"10.1109/ICICES.2014.7033760","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033760","url":null,"abstract":"We present an approach to detect a selfish node in a wireless network by passive monitoring. This does not require any access to the network nodes. Our approach requires deploying multiple sniffers across the network to capture wireless traffic traces among multiple channels. IEEE 802.11 networks support multiple channels, and a wireless interface can monitor only a single channel at one time. Thus, capturing all frames passing an interface on all channels is an impossible task, and we need strategies to capture the most representative sample. When a large area is to be monitored, several sniffers must be deployed, and these will typically overlap in their area of coverage. The goals of effective wireless monitoring are to capture as many frames as possible, while minimizing the number of those frames that are captured redundantly by more than one sniffer. The above goals May be addressed with a coordinated sampling strategy that directs neighboring sniffer to different channels during any period. These traces are then analyzed using hidden markov model to infer the misbehavior node in wifi networks.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"27 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91085653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Overview of mobile agent security issues — Solutions 移动代理安全问题概述-解决方案
S. Sobitha Ahila, K. L. Shunmuganathan
Mobile agent systems are an active area of research with many issues still to be addressed before they achieve practical widespread use. Mobile agent is a mobile object that moves from host to host under the control of its own will to achieve task. Mobile agents are mainly intended to be used for applications distributed over large-scale networks since they permit reduction in communication costs by moving computation part to the host on which the target data resides. This paper gives an overview of the main security issues related to the mobile agent paradigm. These issues include security threats, requirements, and techniques for keeping the mobile agent platform and the agent itself secure against each other.
移动代理系统是一个活跃的研究领域,在实现实际广泛应用之前还有许多问题需要解决。移动代理是在自己的意志控制下从一个主机移动到另一个主机以完成任务的移动对象。移动代理主要用于分布在大规模网络上的应用程序,因为它们允许通过将计算部分移动到目标数据所在的主机来降低通信成本。本文概述了与移动代理范例相关的主要安全问题。这些问题包括安全威胁、需求以及保持移动代理平台和代理本身相互安全的技术。
{"title":"Overview of mobile agent security issues — Solutions","authors":"S. Sobitha Ahila, K. L. Shunmuganathan","doi":"10.1109/ICICES.2014.7033808","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033808","url":null,"abstract":"Mobile agent systems are an active area of research with many issues still to be addressed before they achieve practical widespread use. Mobile agent is a mobile object that moves from host to host under the control of its own will to achieve task. Mobile agents are mainly intended to be used for applications distributed over large-scale networks since they permit reduction in communication costs by moving computation part to the host on which the target data resides. This paper gives an overview of the main security issues related to the mobile agent paradigm. These issues include security threats, requirements, and techniques for keeping the mobile agent platform and the agent itself secure against each other.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"32 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72868095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
MISR architectures to remove unknown values in output response compaction 用于在输出响应压缩中删除未知值的MISR架构
S. Aruna, K. S. Neelukumari
MISR architectures are proposed to remove the unknown (X) values in the output sequences. The MISR signature is represented as a system of linear equations in terms of unknown's (X). The method of symbolic simulation is used to represent each bit of the MISR signature. The combination of linear equations of the MISR signature bits is determined with Gauss-Jordan Elimination algorithm to remove unknown values in the output responses. These X-cancelled combinations are then computed in a separate storage register to provide X-free combinations values. Experimental result describes that maximum error coverage and test time can be obtained with the help of theses MISR architectures.
提出了MISR架构来去除输出序列中的未知(X)值。MISR信号被表示为一个未知数(X)形式的线性方程组。MISR信号的每个比特被用符号模拟的方法表示。利用高斯-乔丹消去算法确定MISR签名位的线性方程组合,去除输出响应中的未知值。然后在一个单独的存储寄存器中计算这些取消x的组合,以提供没有x的组合值。实验结果表明,利用这些MISR架构可以获得最大的误差覆盖率和测试时间。
{"title":"MISR architectures to remove unknown values in output response compaction","authors":"S. Aruna, K. S. Neelukumari","doi":"10.1109/ICICES.2014.7034081","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034081","url":null,"abstract":"MISR architectures are proposed to remove the unknown (X) values in the output sequences. The MISR signature is represented as a system of linear equations in terms of unknown's (X). The method of symbolic simulation is used to represent each bit of the MISR signature. The combination of linear equations of the MISR signature bits is determined with Gauss-Jordan Elimination algorithm to remove unknown values in the output responses. These X-cancelled combinations are then computed in a separate storage register to provide X-free combinations values. Experimental result describes that maximum error coverage and test time can be obtained with the help of theses MISR architectures.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"77 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73810618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An experimental analysis to study the characteristic features of gas sensor 通过实验分析研究了气体传感器的特性
S. Marcia, R. Meenupriya, S. Priyadharshini, P. Bhuvaneswari
This paper investigates the sensing characteristics of the gas sensor. When Gas Sensor is subjected to ethanol gas, the corresponding analog voltage output is obtained. This analog voltage output is proportional to the concentration of the ethanol gas in the vicinity of the sensor. In order to enhance the accuracy of sensing, various analysis such as range analysis, orientation analysis and concentration analysis are performed. Based on the experimental results obtained, the optimal values for sensing in real time is determined. Further the response and recovery time of gas sensing characteristics is also measured to validate the usage of gas sensor in multi-sensing scenario.
本文研究了气体传感器的传感特性。当气体传感器受到乙醇气体时,得到相应的模拟电压输出。这个模拟电压输出与传感器附近乙醇气体的浓度成正比。为了提高传感精度,进行了距离分析、方位分析和浓度分析等多种分析。根据得到的实验结果,确定了实时传感的最优值。此外,还测量了气敏特性的响应时间和恢复时间,以验证气敏传感器在多传感场景中的使用。
{"title":"An experimental analysis to study the characteristic features of gas sensor","authors":"S. Marcia, R. Meenupriya, S. Priyadharshini, P. Bhuvaneswari","doi":"10.1109/ICICES.2014.7034093","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034093","url":null,"abstract":"This paper investigates the sensing characteristics of the gas sensor. When Gas Sensor is subjected to ethanol gas, the corresponding analog voltage output is obtained. This analog voltage output is proportional to the concentration of the ethanol gas in the vicinity of the sensor. In order to enhance the accuracy of sensing, various analysis such as range analysis, orientation analysis and concentration analysis are performed. Based on the experimental results obtained, the optimal values for sensing in real time is determined. Further the response and recovery time of gas sensing characteristics is also measured to validate the usage of gas sensor in multi-sensing scenario.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"51 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73373991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Various job scheduling algorithms in cloud computing: A survey 云计算中的各种作业调度算法:综述
Yash Dave, Avani S. Shelat, Dhara Patel, R. Jhaveri
Cloud Computing provides a Computing environment where different resources, infrastructures, development platforms and software are delivered as a service to customers virtually on pay per time basis. Low cost, scalability, reliability, utility-based computing are important aspects of cloud computing. Job scheduling is an essential and most important part in any cloud environment. With increasing number of users, Job scheduling becomes a strenuous task. Ordering the jobs by scheduler while maintaining the balance between quality of services (QoS), efficiency and fairness of jobs is quite challenging. Scheduling algorithms are implemented considering parameters such as throughput, resource utilization, latency, cost, priority, computational time, physical distances, performance, bandwidth, resource availability. Though there are different scheduling algorithms available in cloud computing, a very less comparative study has been done on performance of various scheduling algorithms with respect to above mentioned parameters. This paper aims at a comparative study of various types of job scheduling algorithms that provide efficient cloud services.
云计算提供了一个计算环境,在这个环境中,不同的资源、基础设施、开发平台和软件作为服务交付给客户,实际上是按时间付费的。低成本、可扩展性、可靠性和基于效用的计算是云计算的重要方面。作业调度是任何云环境中必不可少且最重要的部分。随着用户数量的增加,作业调度成为一项繁重的任务。在保持服务质量(QoS)、效率和作业公平性之间的平衡的同时,按调度器对作业进行排序是相当具有挑战性的。调度算法的实现考虑了吞吐量、资源利用率、延迟、成本、优先级、计算时间、物理距离、性能、带宽、资源可用性等参数。虽然云计算中有不同的调度算法,但对各种调度算法在上述参数下的性能比较研究很少。本文旨在对提供高效云服务的各类作业调度算法进行比较研究。
{"title":"Various job scheduling algorithms in cloud computing: A survey","authors":"Yash Dave, Avani S. Shelat, Dhara Patel, R. Jhaveri","doi":"10.1109/ICICES.2014.7033909","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033909","url":null,"abstract":"Cloud Computing provides a Computing environment where different resources, infrastructures, development platforms and software are delivered as a service to customers virtually on pay per time basis. Low cost, scalability, reliability, utility-based computing are important aspects of cloud computing. Job scheduling is an essential and most important part in any cloud environment. With increasing number of users, Job scheduling becomes a strenuous task. Ordering the jobs by scheduler while maintaining the balance between quality of services (QoS), efficiency and fairness of jobs is quite challenging. Scheduling algorithms are implemented considering parameters such as throughput, resource utilization, latency, cost, priority, computational time, physical distances, performance, bandwidth, resource availability. Though there are different scheduling algorithms available in cloud computing, a very less comparative study has been done on performance of various scheduling algorithms with respect to above mentioned parameters. This paper aims at a comparative study of various types of job scheduling algorithms that provide efficient cloud services.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"128 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73323997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Performance analysis of 1 bit full adder using GDI logic 使用GDI逻辑的1位全加法器的性能分析
S. Mohan, N. Rangaswamy
This paper focuses on the design of 1 bit full adder circuit using Gate Diffusion Input Logic. The proposed adder schematics are developed using DSCH2 CAD tool, and their layouts are generated with Microwind 3 VLSI CAD tool. A 1 bit adder circuits are analyzed using standard CMOS 120nm features with corresponding voltage of 1.2V. The Simulated results of the proposed adder is compared with those of Pass transistor, Transmission Function, and CMOS based adder circuits. The proposed adder dissipates low power and responds faster.
本文重点研究了采用门扩散输入逻辑的1位全加法器电路的设计。利用DSCH2 CAD工具编制了加法器原理图,并利用Microwind 3 VLSI CAD工具生成了加法器版图图。采用标准CMOS 120nm特性和1.2V电压对1位加法器电路进行了分析。将该加法器的仿真结果与通管、传输函数和CMOS加法器电路的仿真结果进行了比较。该加法器功耗低,响应速度快。
{"title":"Performance analysis of 1 bit full adder using GDI logic","authors":"S. Mohan, N. Rangaswamy","doi":"10.1109/ICICES.2014.7034029","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034029","url":null,"abstract":"This paper focuses on the design of 1 bit full adder circuit using Gate Diffusion Input Logic. The proposed adder schematics are developed using DSCH2 CAD tool, and their layouts are generated with Microwind 3 VLSI CAD tool. A 1 bit adder circuits are analyzed using standard CMOS 120nm features with corresponding voltage of 1.2V. The Simulated results of the proposed adder is compared with those of Pass transistor, Transmission Function, and CMOS based adder circuits. The proposed adder dissipates low power and responds faster.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"8 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74460985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementing high throughput group-based MAC for WLANs 为无线局域网实现高吞吐量的基于组的MAC
E. Porkodi, M. .. Kumar, J. Gobinath
The IEEE 802.11n-2009 based Wireless Local Area Networks (WLANs) standard presents very high data rate at the physical layer and seeks to attain a throughput at the Medium Access Control (MAC) layer that is higher than 100 Mbps. The mechanism of frame aggregation and Block-ACK frames are implemented to increase the MAC efficiency. However the standard does not introduce a mechanism to reduce the probability of collision. Where, with high data rate, an AP would able to serve more number of stations, which results in a high collision rate. This paper proposes a Group-based MAC (GMAC) scheme that minimizes the probability of collision and also applies frame aggregation to improve the efficiency. Here, grouping the contending station in such a way that each group has one station that is the group leader. This means that only the leader stations contend, hence, reduces the probability of a collision. We evaluate the performance of our proposal with analytic result. The result shows that GMAC attain a high throughput, high fairness, low delay and attains a high performance with high data rates.
基于IEEE 802.11n-2009的无线局域网(wlan)标准在物理层提供了非常高的数据速率,并寻求在介质访问控制(MAC)层实现高于100 Mbps的吞吐量。采用帧聚合机制和Block-ACK帧机制,提高MAC效率。然而,该标准并没有引入降低碰撞概率的机制。其中,在高数据速率下,AP将能够服务更多的站点,这将导致高碰撞率。本文提出了一种基于组的MAC (GMAC)方案,该方案最大限度地降低了冲突的概率,并利用帧聚合技术提高了效率。在这里,以这样一种方式对竞争站进行分组,即每个组都有一个站作为组长。这意味着只有领先的站点竞争,因此减少了碰撞的可能性。我们用分析结果来评价我们的建议的性能。结果表明,GMAC具有高吞吐量、高公平性、低时延和高数据速率下的高性能。
{"title":"Implementing high throughput group-based MAC for WLANs","authors":"E. Porkodi, M. .. Kumar, J. Gobinath","doi":"10.1109/ICICES.2014.7034136","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034136","url":null,"abstract":"The IEEE 802.11n-2009 based Wireless Local Area Networks (WLANs) standard presents very high data rate at the physical layer and seeks to attain a throughput at the Medium Access Control (MAC) layer that is higher than 100 Mbps. The mechanism of frame aggregation and Block-ACK frames are implemented to increase the MAC efficiency. However the standard does not introduce a mechanism to reduce the probability of collision. Where, with high data rate, an AP would able to serve more number of stations, which results in a high collision rate. This paper proposes a Group-based MAC (GMAC) scheme that minimizes the probability of collision and also applies frame aggregation to improve the efficiency. Here, grouping the contending station in such a way that each group has one station that is the group leader. This means that only the leader stations contend, hence, reduces the probability of a collision. We evaluate the performance of our proposal with analytic result. The result shows that GMAC attain a high throughput, high fairness, low delay and attains a high performance with high data rates.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"38 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74579760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nepotism responsive of data mining for prejudice inimitability 裙带关系对偏见不可模仿性数据挖掘的响应
C. B. Saravanan, R. Sugumar
In the milieu of civil rights law, favoritism refers to undue or crooked healing of people based on affiliate-ship to a sort or a marginal, without gaze at to dignitary merit. Rules extract from statistics bases by in filament mining piece, such as classification or pact rules, when used for verdict tasks such as benefit or acclaim endorsement, can be prejudiced in the above sense. In this paper, the impression of inequitable classification rules is forging and premeditated. On stipulation that a pledge of non-favoritism is exposed to be a non-trivial task. A naive loom, like captivating away all bigoted constituencies, is exposed to be not ample when other milieu fluency is available. Loom lead to a strict formulation of the redlining crisis alongside with a ritual corollary pertaining to prejudiced rules with apparently safe ones by affluence of milieu acuity.
在民权法的环境中,偏袒指的是基于对某一类人或边缘人的从属关系而不顾尊严的不正当或不正当的治疗。从统计基础中提取的规则,如分类规则或契约规则,在用于诸如利益或赞誉背书等判决任务时,可能存在上述意义上的偏见。在本文中,不公平分类规则的印象是形成的和有预谋的。前提是保证不偏袒是一项非常重要的任务。天真的织布机,就像吸引所有偏执的选民一样,在其他环境的流畅性可用时,是不够的。织机导致了对红线危机的严格表述,同时伴随着一种与偏见规则有关的仪式必然结果,这种规则与富裕的环境敏锐度明显安全的规则有关。
{"title":"Nepotism responsive of data mining for prejudice inimitability","authors":"C. B. Saravanan, R. Sugumar","doi":"10.1109/ICICES.2014.7033813","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033813","url":null,"abstract":"In the milieu of civil rights law, favoritism refers to undue or crooked healing of people based on affiliate-ship to a sort or a marginal, without gaze at to dignitary merit. Rules extract from statistics bases by in filament mining piece, such as classification or pact rules, when used for verdict tasks such as benefit or acclaim endorsement, can be prejudiced in the above sense. In this paper, the impression of inequitable classification rules is forging and premeditated. On stipulation that a pledge of non-favoritism is exposed to be a non-trivial task. A naive loom, like captivating away all bigoted constituencies, is exposed to be not ample when other milieu fluency is available. Loom lead to a strict formulation of the redlining crisis alongside with a ritual corollary pertaining to prejudiced rules with apparently safe ones by affluence of milieu acuity.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"20 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74885095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Conference on Information Communication and Embedded Systems (ICICES2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1