首页 > 最新文献

2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)最新文献

英文 中文
A review on VANET security attacks and their countermeasure VANET安全攻击及其对策综述
Deeksha, Ajay Kumar, M. Bansal
In the development of smart cities across the world VANET plays a vital role for optimized route between source and destination. The VANETs is based on infra-structure less network. It facilitates vehicles to give information about safety through vehicle to vehicle communication (V2V) or vehicle to infrastructure communication (V2I). In VANETs wireless communication between vehicles so attackers violate authenticity, confidentiality and privacy properties which further effect security. The VANET technology is encircled with security challenges these days. This paper presents overview on VANETs architecture, a related survey on VANET with major concern of the security issues. Further, prevention measures of those issues, and comparative analysis is done. From the survey, found out that encryption and authentication plays an important role in VANETS also some research direction defined for future work.
在世界各地的智慧城市发展中,VANET对于优化源到目的之间的路线起着至关重要的作用。VANETs是基于无基础设施的网络。它有助于车辆通过车对车通信(V2V)或车对基础设施通信(V2I)提供有关安全的信息。在VANETs中,攻击者破坏了车辆间无线通信的真实性、保密性和隐私性,进一步影响了安全性。如今,VANET技术面临着诸多安全挑战。本文概述了VANET的体系结构,并对VANET进行了相关的调查,主要关注VANET的安全问题。并对这些问题的预防措施进行了比较分析。从调查中发现,加密与认证在VANETS中发挥着重要的作用,也为今后的工作确定了一些研究方向。
{"title":"A review on VANET security attacks and their countermeasure","authors":"Deeksha, Ajay Kumar, M. Bansal","doi":"10.1109/ISPCC.2017.8269745","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269745","url":null,"abstract":"In the development of smart cities across the world VANET plays a vital role for optimized route between source and destination. The VANETs is based on infra-structure less network. It facilitates vehicles to give information about safety through vehicle to vehicle communication (V2V) or vehicle to infrastructure communication (V2I). In VANETs wireless communication between vehicles so attackers violate authenticity, confidentiality and privacy properties which further effect security. The VANET technology is encircled with security challenges these days. This paper presents overview on VANETs architecture, a related survey on VANET with major concern of the security issues. Further, prevention measures of those issues, and comparative analysis is done. From the survey, found out that encryption and authentication plays an important role in VANETS also some research direction defined for future work.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124169903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
A comparative analysis of various speckle reduction techniques for ultrasound images 超声图像中各种斑点减少技术的比较分析
Simarjot Kaur Randhawa, R. K. Sunkaria
In this work, a comparison of existing speckle reduction techniques have been done. Median and wiener filters, wavelet based methods and SRAD methods have been compared. The methods are first tested on synthetic images for comparison of the results and then applied on real ultrasound images. It is observed that SRAD method outperforms the other techniques for low noise variance. For higher noise variance, exponential thresholding outperforms the remaining techniques. Also, it is observed that wiener filter have a comparable performance and hence performs well over range of noise variance. Wavelet denoising based on the soft thresholding is reported to be least performing.
在这项工作中,对现有的散斑消减技术进行了比较。对中值滤波和维纳滤波、基于小波的方法和SRAD方法进行了比较。该方法首先在合成图像上进行测试,以比较结果,然后将其应用于真实超声图像。结果表明,SRAD方法在低噪声方差方面优于其他方法。对于更高的噪声方差,指数阈值优于其他技术。此外,观察到维纳滤波器具有相当的性能,因此在噪声方差范围内表现良好。据报道,基于软阈值的小波去噪性能最差。
{"title":"A comparative analysis of various speckle reduction techniques for ultrasound images","authors":"Simarjot Kaur Randhawa, R. K. Sunkaria","doi":"10.1109/ISPCC.2017.8269659","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269659","url":null,"abstract":"In this work, a comparison of existing speckle reduction techniques have been done. Median and wiener filters, wavelet based methods and SRAD methods have been compared. The methods are first tested on synthetic images for comparison of the results and then applied on real ultrasound images. It is observed that SRAD method outperforms the other techniques for low noise variance. For higher noise variance, exponential thresholding outperforms the remaining techniques. Also, it is observed that wiener filter have a comparable performance and hence performs well over range of noise variance. Wavelet denoising based on the soft thresholding is reported to be least performing.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124355709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and analysis of slotted cantilever structure for piezoelectric energy harvesting 压电能量收集用开缝悬臂结构的设计与分析
P. Asthana, G. Khanna
A micro electro-mechanical system based energy harvester is designed for conversion of mechanical vibration energy via piezoelectric effect. This paper describes vibration based piezoelectric energy harvester in side clamped and slotted form. The cantilever structures are designed in COMSOL Multiphysics tool. A resonant frequency analysis for the cantilever structure has been carried out. The cantilever structures are compared under identical condition of 1 g acceleration. Slotted cantilever structures has a better resonant frequency compared to the side clamped structure, but the peak power density of the system is quite low as compared to the side clamped structure.
设计了一种基于能量采集器的微机电系统,利用压电效应实现机械振动能量的转换。介绍了一种侧面夹紧开槽式振动压电能量采集器。在COMSOL Multiphysics工具中设计悬臂结构。对悬臂结构进行了谐振频率分析。在相同的1g加速度条件下,对悬臂结构进行了比较。狭缝悬臂结构的谐振频率优于侧夹固结构,但系统的峰值功率密度较侧夹固结构低。
{"title":"Design and analysis of slotted cantilever structure for piezoelectric energy harvesting","authors":"P. Asthana, G. Khanna","doi":"10.1109/ISPCC.2017.8269709","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269709","url":null,"abstract":"A micro electro-mechanical system based energy harvester is designed for conversion of mechanical vibration energy via piezoelectric effect. This paper describes vibration based piezoelectric energy harvester in side clamped and slotted form. The cantilever structures are designed in COMSOL Multiphysics tool. A resonant frequency analysis for the cantilever structure has been carried out. The cantilever structures are compared under identical condition of 1 g acceleration. Slotted cantilever structures has a better resonant frequency compared to the side clamped structure, but the peak power density of the system is quite low as compared to the side clamped structure.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122002444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An advance 2D face recognition by feature extraction (ICA) and optimize multilayer architecture 提出了一种基于特征提取和优化多层结构的二维人脸识别方法
R. Kaur, Dolly Sharma, Amit Verma
Facial recognition has most significant real-life requests like investigation and access control. It is associated through the issue of appropriately verifying face pictures and transmit them person in a database. In a past years face study has been emerging active topic. Most of the face detector techniques could be classified into feature based methods and image based also. Feature based techniques adds low-level analysis, feature analysis, etc. Facial recognition is a system capable of verifying / identifying a human after 3D images. By evaluating selected facial unique features from the image and face dataset. Design from transformation method given vector dimensional illustration of individual face in a prepared set of images, Principle component analysis inclines to search a dimensional sub-space whose normal vector features correspond to the maximum variance direction in the real image space. The PCA algorithm evaluates the feature extraction, data, i.e. Eigen Values and vectors of the scatter matrix. In literature survey, Face recognition is a design recognition mission performed exactly on faces. It can be described as categorizing a facial either “known” or “unknown”, after comparing it with deposits known individuals. It is also necessary to need a system that has the capability of knowledge to recognize indefinite faces. Computational representations of facial recognition must statement various difficult issues. After existing work, we study the SIFT structures for the gratitude method. The novel technique is compared with well settled facial recognition methods, name component analysis and eigenvalues and vector. This algorithm is called PCA and ICA (Independent Component Analysis). In research work, we implement the novel approach to detect the face in minimum time and evaluate the better accuracy based on Back Propagation Neural Networks. We design the framework in face recognition using MATLAB 2013a simulation tool. Evaluate the performance parameters, i.e. the FAR (false acceptance rate), FRR (False rejection Rate) and Accuracy and compare the existing performance parameters i.e. accuracy.
面部识别在现实生活中有很多重要的需求,比如调查和访问控制。它通过对人脸图片进行适当的验证,并将其传输到数据库中。在过去的几年里,人脸研究一直是新兴的活跃话题。大多数人脸检测技术可以分为基于特征的方法和基于图像的方法。基于特征的技术增加了低级分析、特征分析等。面部识别是一种能够在3D图像后验证/识别人类的系统。通过评估从图像和人脸数据集中选择的面部独特特征。从变换方法出发,在给定的一组图像中给出单个人脸的向量维表示,主成分分析倾向于搜索法向量特征与真实图像空间中最大方差方向相对应的维度子空间。PCA算法对特征提取数据,即散点矩阵的特征值和向量进行评估。在文献综述中,人脸识别是一项精确地对人脸进行设计识别的任务。它可以被描述为在与已知个体的沉积物进行比较后,将面部分类为“已知”或“未知”。还需要一个具有知识能力的系统来识别不确定的人脸。面部识别的计算表示必须陈述各种困难的问题。在已有工作的基础上,对感恩方法的SIFT结构进行了研究。将该方法与已有的人脸识别方法、名称分量分析方法、特征值与向量分析方法进行了比较。这种算法被称为PCA和ICA(独立成分分析)。在研究工作中,我们实现了在最短时间内检测人脸的新方法,并基于反向传播神经网络评估了更好的准确性。我们使用MATLAB 2013a仿真工具设计了人脸识别框架。评估性能参数,即FAR(错误接受率),FRR(错误拒绝率)和准确性,并比较现有的性能参数,即准确性。
{"title":"An advance 2D face recognition by feature extraction (ICA) and optimize multilayer architecture","authors":"R. Kaur, Dolly Sharma, Amit Verma","doi":"10.1109/ISPCC.2017.8269662","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269662","url":null,"abstract":"Facial recognition has most significant real-life requests like investigation and access control. It is associated through the issue of appropriately verifying face pictures and transmit them person in a database. In a past years face study has been emerging active topic. Most of the face detector techniques could be classified into feature based methods and image based also. Feature based techniques adds low-level analysis, feature analysis, etc. Facial recognition is a system capable of verifying / identifying a human after 3D images. By evaluating selected facial unique features from the image and face dataset. Design from transformation method given vector dimensional illustration of individual face in a prepared set of images, Principle component analysis inclines to search a dimensional sub-space whose normal vector features correspond to the maximum variance direction in the real image space. The PCA algorithm evaluates the feature extraction, data, i.e. Eigen Values and vectors of the scatter matrix. In literature survey, Face recognition is a design recognition mission performed exactly on faces. It can be described as categorizing a facial either “known” or “unknown”, after comparing it with deposits known individuals. It is also necessary to need a system that has the capability of knowledge to recognize indefinite faces. Computational representations of facial recognition must statement various difficult issues. After existing work, we study the SIFT structures for the gratitude method. The novel technique is compared with well settled facial recognition methods, name component analysis and eigenvalues and vector. This algorithm is called PCA and ICA (Independent Component Analysis). In research work, we implement the novel approach to detect the face in minimum time and evaluate the better accuracy based on Back Propagation Neural Networks. We design the framework in face recognition using MATLAB 2013a simulation tool. Evaluate the performance parameters, i.e. the FAR (false acceptance rate), FRR (False rejection Rate) and Accuracy and compare the existing performance parameters i.e. accuracy.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129972652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of 4-bit serial-parallel multiplier in Quantum-Dot Cellular Automata 量子点元胞自动机中4位串并乘法器的设计
Namita, T. Sasamal
Quantum-Dot Cellular Automata (QCA) as technology is a promising candidate that has tremendous potential to replace CMOS due to its outstanding features such as low-power, extremely high density, fast operation speed. However, due to its four-phased clocking scheme and timing requirements, various issues in timing for interconnections and feedback are present. In this paper, the delay transfers and retiming using QCA characteristics to solve timing issues has been explored. The problem in assigning appropriate clock zones and feedback has been addressed. Based on the design rules and constraints, retiming technique has been discussed to perform delay-transfer and time-scaling to achieve efficient clock zone assignment. A serial adder has been designed that uses multilayer crossover. As a case study, a 4-bit serial-parallel multiplier has been designed using the serial adder as basic input circuit to illustrate the rules of retiming.
量子点元胞自动机(Quantum-Dot Cellular Automata, QCA)技术以其低功耗、极高密度、运算速度快等特点,具有取代CMOS的巨大潜力。然而,由于其四阶段时钟方案和时序要求,在互连和反馈的时序方面存在各种问题。本文探讨了利用QCA特性来解决时延传输和重定时问题。分配适当的时钟区域和反馈的问题已经解决。基于设计规则和约束,讨论了重定时技术进行延迟传递和时间缩放,以实现有效的时钟区分配。设计了一种采用多层交叉的串行加法器。作为一个案例研究,设计了一个4位串并乘法器,使用串行加法器作为基本输入电路来说明重定时的规则。
{"title":"Design of 4-bit serial-parallel multiplier in Quantum-Dot Cellular Automata","authors":"Namita, T. Sasamal","doi":"10.1109/ISPCC.2017.8269704","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269704","url":null,"abstract":"Quantum-Dot Cellular Automata (QCA) as technology is a promising candidate that has tremendous potential to replace CMOS due to its outstanding features such as low-power, extremely high density, fast operation speed. However, due to its four-phased clocking scheme and timing requirements, various issues in timing for interconnections and feedback are present. In this paper, the delay transfers and retiming using QCA characteristics to solve timing issues has been explored. The problem in assigning appropriate clock zones and feedback has been addressed. Based on the design rules and constraints, retiming technique has been discussed to perform delay-transfer and time-scaling to achieve efficient clock zone assignment. A serial adder has been designed that uses multilayer crossover. As a case study, a 4-bit serial-parallel multiplier has been designed using the serial adder as basic input circuit to illustrate the rules of retiming.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130040817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A comparative performance analysis of fuzzy C-means based methods for segmentation of brain magnetic resonance images 基于模糊c均值的脑磁共振图像分割方法的性能比较分析
Nighat Nazir
Fuzzy C-means (FCM) is the classical clustering algorithm for segmentation of tissues such as cerebrospinal fluid (CSF), gray matter (GM) and white matter (WM) from magnetic resonance images (MRI). Medical images such as brain MRI are often corrupted by Rician noise thus, segmentation with FCM becomes problematic. Various variants of the classical FCM have been proposed which are robust to image noise. This paper presents a comparative performance evaluation of brain MRI segmentation methods based on Fuzzy C-means using Jaccard similarity (JS).
模糊c均值(FCM)是用于从磁共振图像(MRI)中分割脑脊液(CSF)、灰质(GM)和白质(WM)等组织的经典聚类算法。脑MRI等医学图像经常受到噪声的破坏,因此,FCM分割成为问题。经典FCM的各种变体已被提出,它们对图像噪声具有鲁棒性。本文利用Jaccard相似度(Jaccard similarity, JS)对基于模糊c均值的脑MRI分割方法进行性能比较评价。
{"title":"A comparative performance analysis of fuzzy C-means based methods for segmentation of brain magnetic resonance images","authors":"Nighat Nazir","doi":"10.1109/ISPCC.2017.8269720","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269720","url":null,"abstract":"Fuzzy C-means (FCM) is the classical clustering algorithm for segmentation of tissues such as cerebrospinal fluid (CSF), gray matter (GM) and white matter (WM) from magnetic resonance images (MRI). Medical images such as brain MRI are often corrupted by Rician noise thus, segmentation with FCM becomes problematic. Various variants of the classical FCM have been proposed which are robust to image noise. This paper presents a comparative performance evaluation of brain MRI segmentation methods based on Fuzzy C-means using Jaccard similarity (JS).","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130061665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimodal biometrics by fusion for security using genetic algorithm 多模态生物识别融合安全遗传算法
Nancy Bansal, Amit Verma, Iqbaldeep Kaur, Dolly Sharma
The physiological biometrics like face is combined with behavioral biometrics like speech to achieve the robustness of fusion process of a multimodal system. The selection of the biometrics is dependent on the robustness and uniqueness of the biometric. That is why, the selection of these two biometrics is done in this work. Mel Frequency Cepstral Coefficients has been utilized for speech feature extraction and in addition to this fuzzy logic is also utilized for training purpose. Then, the optimized features values are reduced using genetic algorithm. In the end, fusion is achieved by combination of fuse values obtained from both 2 biometrics. The whole simulation is tested in MATLAB environment.
将人脸等生理生物特征与语音等行为生物特征相结合,实现多模态系统融合过程的鲁棒性。生物特征的选择取决于生物特征的鲁棒性和唯一性。这就是为什么在这项工作中选择这两种生物特征。Mel频率倒谱系数被用于语音特征提取,除此之外,模糊逻辑也被用于训练目的。然后,利用遗传算法对优化后的特征值进行约简。最后,结合两种生物特征的融合值实现融合。整个仿真在MATLAB环境下进行了测试。
{"title":"Multimodal biometrics by fusion for security using genetic algorithm","authors":"Nancy Bansal, Amit Verma, Iqbaldeep Kaur, Dolly Sharma","doi":"10.1109/ISPCC.2017.8269668","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269668","url":null,"abstract":"The physiological biometrics like face is combined with behavioral biometrics like speech to achieve the robustness of fusion process of a multimodal system. The selection of the biometrics is dependent on the robustness and uniqueness of the biometric. That is why, the selection of these two biometrics is done in this work. Mel Frequency Cepstral Coefficients has been utilized for speech feature extraction and in addition to this fuzzy logic is also utilized for training purpose. Then, the optimized features values are reduced using genetic algorithm. In the end, fusion is achieved by combination of fuse values obtained from both 2 biometrics. The whole simulation is tested in MATLAB environment.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134406548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Genetic optimized data deduplication for distributed big data storage systems 分布式大数据存储系统的遗传优化重复数据删除
N. Kumar, Shobha Antwal, Ganesh Samarthyam, S. Jain
Content-Defined Chunking (CDC) detect maximum redundancy in data deduplication systems in the past years. In this research work, we focus on optimizing the deduplication system by adjusting the pertinent factors in content defined chunking (CDC) to identify as the key ingredients by declaring chunk cut-points and efficient fingerprint lookup using bucket based index partitioning. For efficient chunking, we propose Genetic Evolution (GE) algorithm based approach which is optimized Two Thresholds Two Divisors (TTTD-P) CDC algorithm where we significantly reduce the number of computing operations by using single dynamic optimal parameter divisor D with optimal threshold value exploiting the multi-operations nature of TTTD. To reduce the chunk-size variance, TTTD algorithm introduces an additional backup divisor D' that has a higher probability of finding cut-points. However, adding an additional divisor decreases the chunking throughput, meaning that TTTD algorithm aggravates Rabin's CDC performance bottleneck. To this end, Asymmetric Extremum (AE) significantly improves chunking throughput while providing comparable deduplication efficiency by using the local extreme value in a variable-sized asymmetric window to overcome the Rabin, MAXP and TTTD boundaries-shift problem. FAST CDC in the year 2016 is about 10 times faster than unimodal Rabin CDC and about 3 times faster than Gear and Asymmetric Extremum (AE) CDC, while achieving nearby the same deduplication ratio (DR). Therefore, we propose GE based TTTD-P optimized chunking to maximize chunking throughput with increased DR; and bucket indexing approach reduces hash values judgement time to identify and declare redundant chunk about 16 times than unimodal baseline Rabin CDC, 5 times than AE CDC, 1.6 times than FAST CDC. Our experimental results comparative analysis reveals that TTTD-P using fast BUZ rolling hash function with bucket indexing on Hadoop Distributed File System (HDFS) provide a comparatively maximum redundancy detection with higher throughput, higher deduplication ratio, lesser computation time and very low hash values comparison time as being best data deduplication for distributed big data storage systems.
CDC (Content-Defined Chunking)是一种检测重复数据删除系统过去几年最大冗余的技术。在本研究中,我们重点通过调整内容定义分块(CDC)中的相关因素来优化重复数据删除系统,通过声明块切点和使用基于桶的索引分区进行高效指纹查找来识别关键成分。为了实现高效的分块,我们提出了一种基于遗传进化(GE)算法的方法,该方法优化了两阈值两除数(TTTD- p) CDC算法,利用TTTD的多操作特性,使用具有最优阈值的单个动态最优参数除数D,大大减少了计算操作次数。为了减少块大小的差异,TTTD算法引入了一个额外的备份除数D',它具有更高的找到切割点的概率。然而,增加一个额外的除数会降低分块吞吐量,这意味着TTTD算法加剧了Rabin的CDC性能瓶颈。为此,非对称极值(AE)通过在可变大小的非对称窗口中使用局部极值来克服Rabin、MAXP和TTTD边界偏移问题,显著提高了分块吞吐量,同时提供了相当的重复数据删除效率。2016年FAST CDC比单峰Rabin CDC快约10倍,比齿轮和非对称极值(AE) CDC快约3倍,同时实现了几乎相同的重复数据删除比(DR)。因此,我们提出基于GE的TTTD-P优化分块,以在增加DR的情况下最大化分块吞吐量;桶索引方法识别和声明冗余块的哈希值判断时间比单峰基线Rabin CDC减少了16倍,比AE CDC减少了5倍,比FAST CDC减少了1.6倍。我们的实验结果对比分析表明,在Hadoop分布式文件系统(HDFS)上使用带有桶索引的快速BUZ滚动哈希函数的TTTD-P提供了相对最大的冗余检测,具有更高的吞吐量、更高的重复数据删除率、更少的计算时间和非常低的哈希值比较时间,是分布式大数据存储系统的最佳重复数据删除方法。
{"title":"Genetic optimized data deduplication for distributed big data storage systems","authors":"N. Kumar, Shobha Antwal, Ganesh Samarthyam, S. Jain","doi":"10.1109/ISPCC.2017.8269581","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269581","url":null,"abstract":"Content-Defined Chunking (CDC) detect maximum redundancy in data deduplication systems in the past years. In this research work, we focus on optimizing the deduplication system by adjusting the pertinent factors in content defined chunking (CDC) to identify as the key ingredients by declaring chunk cut-points and efficient fingerprint lookup using bucket based index partitioning. For efficient chunking, we propose Genetic Evolution (GE) algorithm based approach which is optimized Two Thresholds Two Divisors (TTTD-P) CDC algorithm where we significantly reduce the number of computing operations by using single dynamic optimal parameter divisor D with optimal threshold value exploiting the multi-operations nature of TTTD. To reduce the chunk-size variance, TTTD algorithm introduces an additional backup divisor D' that has a higher probability of finding cut-points. However, adding an additional divisor decreases the chunking throughput, meaning that TTTD algorithm aggravates Rabin's CDC performance bottleneck. To this end, Asymmetric Extremum (AE) significantly improves chunking throughput while providing comparable deduplication efficiency by using the local extreme value in a variable-sized asymmetric window to overcome the Rabin, MAXP and TTTD boundaries-shift problem. FAST CDC in the year 2016 is about 10 times faster than unimodal Rabin CDC and about 3 times faster than Gear and Asymmetric Extremum (AE) CDC, while achieving nearby the same deduplication ratio (DR). Therefore, we propose GE based TTTD-P optimized chunking to maximize chunking throughput with increased DR; and bucket indexing approach reduces hash values judgement time to identify and declare redundant chunk about 16 times than unimodal baseline Rabin CDC, 5 times than AE CDC, 1.6 times than FAST CDC. Our experimental results comparative analysis reveals that TTTD-P using fast BUZ rolling hash function with bucket indexing on Hadoop Distributed File System (HDFS) provide a comparatively maximum redundancy detection with higher throughput, higher deduplication ratio, lesser computation time and very low hash values comparison time as being best data deduplication for distributed big data storage systems.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134381125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance analysis of a SAC-OCDMA FSO network 一种SAC-OCDMA FSO网络性能分析
U. Bhanja, A. Khuntia, A. Swati
With the emerging of advanced technologies in the global market, now-a-days optical networks are the most ideal medium for high bandwidth communication. Optical wireless networks predicated on free space optics (FSO) technology must be designed to combat changes in the atmosphere, which can affect FSO system performance capacity. FSO is a security module due to Line of sight operation and does not require any system security upgradations. However, FSO requires secured communication for longer distance. FSO has been used in different ways to provide fast communication connectivity in inaccessible areas. Various methodologies are introduced to enhance FSO performance in terms of security that leads to the development of the secured FSO system. Optical code division multiple access (OCDMA) is becoming more popular in the field of optical communication, due to asynchronous transmission, flexibility, security and scalability. The major advantage of OCDMA is its efficient use of spectrum as well as the multiuser communication capabilities. OCDMA requires spectral amplitude coding (SAC) to minimize the impact of multiuser interference and also suppress the effect of phase induced intensity noise (PIIN) with fixed in phase cross-correlation. In this work, SAC-OCDMA over FSO communication design is proposed. In this paper, SAC-OCDMA FSO communication system is evaluated at 10 Gbps using Modified random diagonal (MRD) code that possesses better auto correlation, minimum cross correlation and high cardinality. The proposed SAC-OCDMA MRD is compared with the existing Multi-diagonal (MD) and Random diagonal (RD) codes under different weather conditions. The simulation results signify that optical system based on MRD code is better than MD and RD codes in terms of bit error rate (BER). The simulation results are validated using Optisystem version 14.
随着全球市场先进技术的不断涌现,光网络成为当今高带宽通信最理想的媒介。基于自由空间光学(FSO)技术的光纤无线网络必须设计成能够抵抗大气变化的能力,因为大气变化会影响FSO系统的性能。FSO是一个安全模块,由于视线操作,不需要任何系统安全升级。但是,无线光通信需要更远距离的安全通信。无线光通信以不同的方式用于在人迹罕至的地区提供快速通信连接。介绍了各种方法来提高无线光控系统在安全性方面的性能,从而开发出安全的无线光控系统。光码分多址(OCDMA)由于具有异步传输、灵活性、安全性和可扩展性等优点,在光通信领域得到越来越广泛的应用。OCDMA的主要优点是有效利用频谱和多用户通信能力。OCDMA需要频谱幅度编码(SAC)来最大限度地减少多用户干扰的影响,并抑制具有固定相位互相关的相位诱导强度噪声(PIIN)的影响。在这项工作中,提出了基于FSO的SAC-OCDMA通信设计。本文采用自相关性能好、互相关最小、基数高的改进随机对角码(MRD),对10gbps速率下的SAC-OCDMA FSO通信系统进行了评价。在不同的天气条件下,将所提出的SAC-OCDMA MRD与现有的多对角码(MD)和随机对角码(RD)进行了比较。仿真结果表明,基于MRD码的光学系统在误码率方面优于基于MD和RD码的光学系统。使用Optisystem version 14对仿真结果进行了验证。
{"title":"Performance analysis of a SAC-OCDMA FSO network","authors":"U. Bhanja, A. Khuntia, A. Swati","doi":"10.1109/ISPCC.2017.8269580","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269580","url":null,"abstract":"With the emerging of advanced technologies in the global market, now-a-days optical networks are the most ideal medium for high bandwidth communication. Optical wireless networks predicated on free space optics (FSO) technology must be designed to combat changes in the atmosphere, which can affect FSO system performance capacity. FSO is a security module due to Line of sight operation and does not require any system security upgradations. However, FSO requires secured communication for longer distance. FSO has been used in different ways to provide fast communication connectivity in inaccessible areas. Various methodologies are introduced to enhance FSO performance in terms of security that leads to the development of the secured FSO system. Optical code division multiple access (OCDMA) is becoming more popular in the field of optical communication, due to asynchronous transmission, flexibility, security and scalability. The major advantage of OCDMA is its efficient use of spectrum as well as the multiuser communication capabilities. OCDMA requires spectral amplitude coding (SAC) to minimize the impact of multiuser interference and also suppress the effect of phase induced intensity noise (PIIN) with fixed in phase cross-correlation. In this work, SAC-OCDMA over FSO communication design is proposed. In this paper, SAC-OCDMA FSO communication system is evaluated at 10 Gbps using Modified random diagonal (MRD) code that possesses better auto correlation, minimum cross correlation and high cardinality. The proposed SAC-OCDMA MRD is compared with the existing Multi-diagonal (MD) and Random diagonal (RD) codes under different weather conditions. The simulation results signify that optical system based on MRD code is better than MD and RD codes in terms of bit error rate (BER). The simulation results are validated using Optisystem version 14.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116972946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Review on various authentication scheme over cloud computing 云计算环境下的各种认证方案综述
M. Kaur, Amit Verma, Iqbaldeep Kaur, Dolly Sharma
Cloud computing is basically excogitated from the word internet, which is an advance technology. Cloud computing enables us to access services and infrastructure over the cloud through internet and also permits secure sharing of resources. The use of computing resources as a service with the help of internet is called Cloud Computing. It has started to gain vision in corporate data centers. In recent years, cloud computing is including grid computing because utilization of virtualization at data center could increase. With increase in the number of user and data, there is a need of data confidentiality as well as authenticity of users connected to the cloud so as to protect them from each other as well as from the hackers too.
云计算基本上是从互联网这个词衍生出来的,是一种先进的技术。云计算使我们能够通过互联网访问云上的服务和基础设施,并允许安全共享资源。在互联网的帮助下,将计算资源作为一种服务的使用被称为云计算。它已经开始在企业数据中心获得远见。近年来,云计算包括网格计算,因为数据中心虚拟化的利用率可能会增加。随着用户和数据数量的增加,需要数据的保密性以及连接到云的用户的真实性,以保护他们彼此之间以及黑客。
{"title":"Review on various authentication scheme over cloud computing","authors":"M. Kaur, Amit Verma, Iqbaldeep Kaur, Dolly Sharma","doi":"10.1109/ISPCC.2017.8269650","DOIUrl":"https://doi.org/10.1109/ISPCC.2017.8269650","url":null,"abstract":"Cloud computing is basically excogitated from the word internet, which is an advance technology. Cloud computing enables us to access services and infrastructure over the cloud through internet and also permits secure sharing of resources. The use of computing resources as a service with the help of internet is called Cloud Computing. It has started to gain vision in corporate data centers. In recent years, cloud computing is including grid computing because utilization of virtualization at data center could increase. With increase in the number of user and data, there is a need of data confidentiality as well as authenticity of users connected to the cloud so as to protect them from each other as well as from the hackers too.","PeriodicalId":142166,"journal":{"name":"2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123211558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1