首页 > 最新文献

2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)最新文献

英文 中文
Parallel implementation of arbitrary-sized Discrete Fourier Transform on FPGA FPGA上任意大小离散傅里叶变换的并行实现
L. Shu, Jie Hao, Chengcheng Li, H. Feng, Donglin Wang
Discrete Fourier Transform(DFT) is one of the frequently used kernels in a variety of signal processing applications. Most previous state-of-the-art work has focused on the transform size of a power of 2. And many implementations of non-power-of-two sized DFT is customized for a specific application. In this paper, a parallel-processing architecture based on Field-Programmable Gate Array (FPGA) for arbitrary-sized DFT is proposed. In particular, it is attractive to use to compute DFT with arbitrary prime size. A memory efficient data mapping scheme for twiddle factors is proposed, which reduces the storage size of twiddle factors from n2 to kn(k is a constant). We implement a design with 196 processing elements, which is available for any transform size n from 14 to 1024. For a transform size of 59, the throughput in this design can reach to 737.5 Msps. The design can be easily extended to be one with more processing elements if the hardware has enough resources. And we have built a code generator to automatically generate designs with different numbers of processing elements.
离散傅里叶变换(DFT)是各种信号处理应用中常用的核函数之一。大多数先前的最先进的工作都集中在2的幂变换的大小上。许多非2次幂大小的DFT实现都是针对特定应用程序定制的。本文提出了一种基于现场可编程门阵列(FPGA)的任意尺寸DFT并行处理体系结构。特别地,它对于计算任意素数大小的DFT具有吸引力。提出了一种具有内存效率的旋转因子数据映射方案,将旋转因子的存储容量从n2减小到kn(k为常数)。我们实现了一个包含196个处理元素的设计,可用于从14到1024的任何转换大小n。在变换大小为59的情况下,本设计的吞吐量可以达到737.5 Msps。如果硬件有足够的资源,该设计可以很容易地扩展为具有更多处理元素的设计。我们建立了一个代码生成器来自动生成具有不同数量处理元素的设计。
{"title":"Parallel implementation of arbitrary-sized Discrete Fourier Transform on FPGA","authors":"L. Shu, Jie Hao, Chengcheng Li, H. Feng, Donglin Wang","doi":"10.1109/ICACCS.2016.7586317","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586317","url":null,"abstract":"Discrete Fourier Transform(DFT) is one of the frequently used kernels in a variety of signal processing applications. Most previous state-of-the-art work has focused on the transform size of a power of 2. And many implementations of non-power-of-two sized DFT is customized for a specific application. In this paper, a parallel-processing architecture based on Field-Programmable Gate Array (FPGA) for arbitrary-sized DFT is proposed. In particular, it is attractive to use to compute DFT with arbitrary prime size. A memory efficient data mapping scheme for twiddle factors is proposed, which reduces the storage size of twiddle factors from n2 to kn(k is a constant). We implement a design with 196 processing elements, which is available for any transform size n from 14 to 1024. For a transform size of 59, the throughput in this design can reach to 737.5 Msps. The design can be easily extended to be one with more processing elements if the hardware has enough resources. And we have built a code generator to automatically generate designs with different numbers of processing elements.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124602233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cycle efficient and SNR dependent CQI Decoder implementation 周期效率和信噪比依赖CQI解码器的实现
Ajay Sharma, H. Anand
Channel quality indication (CQI) reports are vital element of Long Term Evolution (LTE) system in providing information on the downlink channel quality. The 3GPP standard mentions the encoding method for CQI is Reed Muller (RM) code and the transmission quality of CQI can be improved by channel coding with RM code. The paper presents a SNR dependent CQI Decoding mechanism over an existing method which utilizes the Fast Hadamard Transform (FHT) as the decoding scheme when CQI number of bits to be decoded is greater than or equal to 11 and the Viterbi Decoding scheme when CQI number of bits to be decoded is greater than 11. The idea in this paper is to present a cycle efficient CQI decoding method where simulations on various Signal to Noise Ratio (SNR) levels, channel types along with the Million Cycles per Second (MCPS) have been have been carried out and have been present.
信道质量指示(CQI)报告是长期演进(LTE)系统提供下行信道质量信息的重要组成部分。3GPP标准中提到CQI的编码方法是Reed Muller (RM)码,用RM码对信道进行编码可以提高CQI的传输质量。本文提出了一种依赖信噪比的CQI译码机制,在现有的CQI译码方案中,当CQI译码位数大于等于11时采用快速哈达玛变换(FHT)作为译码方案,当CQI译码位数大于11时采用维特比译码方案。本文的想法是提出一种周期高效的CQI解码方法,其中各种信噪比(SNR)水平,信道类型以及每秒百万周期(MCPS)的模拟已经进行并已经存在。
{"title":"Cycle efficient and SNR dependent CQI Decoder implementation","authors":"Ajay Sharma, H. Anand","doi":"10.1109/ICACCS.2016.7586335","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586335","url":null,"abstract":"Channel quality indication (CQI) reports are vital element of Long Term Evolution (LTE) system in providing information on the downlink channel quality. The 3GPP standard mentions the encoding method for CQI is Reed Muller (RM) code and the transmission quality of CQI can be improved by channel coding with RM code. The paper presents a SNR dependent CQI Decoding mechanism over an existing method which utilizes the Fast Hadamard Transform (FHT) as the decoding scheme when CQI number of bits to be decoded is greater than or equal to 11 and the Viterbi Decoding scheme when CQI number of bits to be decoded is greater than 11. The idea in this paper is to present a cycle efficient CQI decoding method where simulations on various Signal to Noise Ratio (SNR) levels, channel types along with the Million Cycles per Second (MCPS) have been have been carried out and have been present.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125029801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid cryptography mechanism for securing self-organized wireless networks 保护自组织无线网络的混合密码机制
A. Patil, Shital S Mali
Nowadays use of wireless technologies tremendously increased due to the continuous development of these technologies in various applications. One of the development in wireless technologies leads to deployment of the networks in which all mobile nodes will communicate via wireless links directly without use of any base station or predefined infrastructural support. These networks are self-organized networks called mobile ad hoc networks (MANETs) and architecture used for these networks will be either stand alone with one or few nodes communicating with base station or distributed. As communication is done through wireless links, these types of networks are more prone to several kinds of attacks. Authentication and encryption acts as first line of defense while an intrusion detection system (IDS) acts as a second line of defense. One of the intrusion detection system used in MANET is Enhanced Adaptive Acknowledgement (EAACK) which is based on acknowledgement packets for detection of malicious activities. This system increases the overhead of network significantly relative to other system such as watchdog. So, in this paper we adopt the hybrid cryptography to reduce the network overhead and enhance the security of networks significantly.
如今,由于无线技术在各种应用中的不断发展,无线技术的使用大大增加。无线技术的发展之一导致网络的部署,其中所有移动节点将通过无线链路直接通信,而不使用任何基站或预定义的基础设施支持。这些网络是自组织的网络,称为移动自组织网络(manet),用于这些网络的架构要么是独立的,只有一个或几个节点与基站通信,要么是分布式的。由于通信是通过无线链路进行的,这些类型的网络更容易受到几种攻击。身份验证和加密充当第一道防线,而入侵检测系统(IDS)充当第二道防线。在MANET中使用的入侵检测系统之一是增强自适应确认(EAACK),该系统基于确认报文来检测恶意活动。与其他系统(如看门狗)相比,该系统显著增加了网络开销。因此,本文采用混合加密技术来降低网络开销,显著提高网络的安全性。
{"title":"Hybrid cryptography mechanism for securing self-organized wireless networks","authors":"A. Patil, Shital S Mali","doi":"10.1109/ICACCS.2016.7586356","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586356","url":null,"abstract":"Nowadays use of wireless technologies tremendously increased due to the continuous development of these technologies in various applications. One of the development in wireless technologies leads to deployment of the networks in which all mobile nodes will communicate via wireless links directly without use of any base station or predefined infrastructural support. These networks are self-organized networks called mobile ad hoc networks (MANETs) and architecture used for these networks will be either stand alone with one or few nodes communicating with base station or distributed. As communication is done through wireless links, these types of networks are more prone to several kinds of attacks. Authentication and encryption acts as first line of defense while an intrusion detection system (IDS) acts as a second line of defense. One of the intrusion detection system used in MANET is Enhanced Adaptive Acknowledgement (EAACK) which is based on acknowledgement packets for detection of malicious activities. This system increases the overhead of network significantly relative to other system such as watchdog. So, in this paper we adopt the hybrid cryptography to reduce the network overhead and enhance the security of networks significantly.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114218474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An efficient and reliable Cooperative Multicast routing based on hop tree in Ad-hoc Networks Ad-hoc网络中一种高效可靠的基于跳树的协同组播路由
Joshua Reginald Pullagura, D. Rao
A mobile ad-hoc network is an infrastructure less self-configuring network of mobile nodes which move their places randomly, move around or join the network. Over the past few years simulation work has been carried out to achieve a new reliable Routing protocol. This paper mainly concentrates on reducing the factors such as End-to- End Delay, Network Load and Packet loss in conventional AODV and DSR routing protocols. We propose a Cooperative Multicast Ad-hoc on-demand distance vector (CMAODV) Routing protocol. The results indicate that AODV loses more packets than CMAODV. In AODV routing protocol, more number of total packet losses is congestion related and sample data reveals that the packet loss distribution over time is bursting, which makes the tradition Poisson framework unsuitable for modeling it. Preliminary results exhibit self-similar pattern that leads us to believe that fractal model is promising to describe packet loss in ad hoc networks.
移动自组织网络是一种基础设施较少的自配置网络,由移动节点随机移动位置、四处移动或加入网络。在过去的几年中,为了实现一种新的可靠路由协议,进行了仿真工作。本文主要研究了传统AODV和DSR路由协议中减少端到端延迟、网络负载和丢包等因素的方法。提出了一种合作组播自组织按需距离矢量路由协议。结果表明,AODV比CMAODV丢包量大。在AODV路由协议中,更多的丢包总量与拥塞有关,并且样本数据显示丢包随时间的分布呈爆裂性,这使得传统的泊松框架不适合对其进行建模。初步结果显示出自相似模式,使我们相信分形模型有希望描述自组织网络中的丢包。
{"title":"An efficient and reliable Cooperative Multicast routing based on hop tree in Ad-hoc Networks","authors":"Joshua Reginald Pullagura, D. Rao","doi":"10.1109/ICACCS.2016.7586365","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586365","url":null,"abstract":"A mobile ad-hoc network is an infrastructure less self-configuring network of mobile nodes which move their places randomly, move around or join the network. Over the past few years simulation work has been carried out to achieve a new reliable Routing protocol. This paper mainly concentrates on reducing the factors such as End-to- End Delay, Network Load and Packet loss in conventional AODV and DSR routing protocols. We propose a Cooperative Multicast Ad-hoc on-demand distance vector (CMAODV) Routing protocol. The results indicate that AODV loses more packets than CMAODV. In AODV routing protocol, more number of total packet losses is congestion related and sample data reveals that the packet loss distribution over time is bursting, which makes the tradition Poisson framework unsuitable for modeling it. Preliminary results exhibit self-similar pattern that leads us to believe that fractal model is promising to describe packet loss in ad hoc networks.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127905091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative study of an efficient cascaded Inverter with different loads 不同负载下高效级联逆变器的比较研究
P. M. James, Jaimol Thomas
Inverter, a device used for conversion of dc power to ac power has evolved from simple two level converter circuit to multilevel converter systems using efficient configurations. It is of growing interest because of its applications in photovoltaic systems, high voltage direct current transmission system, flexible alternating current transmission devices, industrial drives, isolated power supplies, renewable energy integration etc. Each day much work is being attempted to make better configurations to reduce size, space and cost of the system. This paper discusses one such configuration which is more advantageous than existing configurations and can be easily implemented. It also presents the results of a comparative analysis with an existing configuration of wide acceptance. Control used is sinusoidal pulse width modulation for both topologies compared. MATLAB-Simulink is used to do the simulative analysis.
逆变器是一种用于将直流电源转换为交流电源的设备,它已经从简单的两电平转换电路发展到采用高效配置的多电平转换系统。它在光伏系统、高压直流输电系统、柔性交流输电装置、工业驱动、隔离电源、可再生能源集成等方面的应用日益受到人们的关注。每天都有大量的工作试图做出更好的配置,以减少系统的尺寸、空间和成本。本文讨论了一种比现有配置更有利且易于实现的配置。它还提出了与广泛接受的现有配置进行比较分析的结果。所采用的控制是正弦脉宽调制,对两种拓扑结构进行比较。利用MATLAB-Simulink进行仿真分析。
{"title":"Comparative study of an efficient cascaded Inverter with different loads","authors":"P. M. James, Jaimol Thomas","doi":"10.1109/ICACCS.2016.7586343","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586343","url":null,"abstract":"Inverter, a device used for conversion of dc power to ac power has evolved from simple two level converter circuit to multilevel converter systems using efficient configurations. It is of growing interest because of its applications in photovoltaic systems, high voltage direct current transmission system, flexible alternating current transmission devices, industrial drives, isolated power supplies, renewable energy integration etc. Each day much work is being attempted to make better configurations to reduce size, space and cost of the system. This paper discusses one such configuration which is more advantageous than existing configurations and can be easily implemented. It also presents the results of a comparative analysis with an existing configuration of wide acceptance. Control used is sinusoidal pulse width modulation for both topologies compared. MATLAB-Simulink is used to do the simulative analysis.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133008203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
National advisory committee 国家咨询委员会
E. Jeyakumar, L. Prabha
{"title":"National advisory committee","authors":"E. Jeyakumar, L. Prabha","doi":"10.1109/icaccs.2016.7586305","DOIUrl":"https://doi.org/10.1109/icaccs.2016.7586305","url":null,"abstract":"","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134089009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proper use of web technology to teach older people: A case study 正确使用网络技术来教育老年人:一个案例研究
Chandrima Chatterjee, Arunasish Acharya
In recent times the rapid development of older communication, it has become necessary to use information communication for more human computer interaction in their everyday life. With the increase of the age, the people becomes more and more older and as a result changes in physical structure, cognitive, behavioral takes place. They becomes dependent on other's. In this context, researchers get motivated to find out the possible ways to use web technology for helping these old aged people in an efficient manner for their daily activities. So, workshop was arranged and in that workshop total of 16 old aged peoples was invited to attend the workshop. In this workshop, they were taught how to use IRCTC website and facebook. The researchers found that the older person uses those applications which draw their interest and comparatively easy to use: face to face coaching method of learning gives better result. To understand new technology they take much time. They need additional tools to remind the easily learnt things. To extend this study, the preferable method of mobile application should be used for teaching older people.
近年来,随着通信技术的飞速发展,人们在日常生活中越来越多地使用信息通信进行人机交互。随着年龄的增长,人们的年龄越来越大,身体结构、认知、行为都发生了变化。他们变得依赖别人。在这种背景下,研究人员有动力去寻找可能的方法,利用网络技术来帮助这些老年人以一种有效的方式进行日常活动。因此,安排了讲习班,在讲习班中,共邀请了16名老年人参加了讲习班。在这个工作坊中,他们学习了如何使用IRCTC网站和facebook。研究人员发现,老年人使用那些吸引他们的兴趣和相对容易使用的应用程序:面对面的指导方法学习效果更好。要了解新技术,他们需要花很多时间。他们需要额外的工具来提醒容易学习的东西。为了扩展本研究,应该使用移动应用程序的最佳方法来对老年人进行教学。
{"title":"Proper use of web technology to teach older people: A case study","authors":"Chandrima Chatterjee, Arunasish Acharya","doi":"10.1109/ICACCS.2016.7586383","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586383","url":null,"abstract":"In recent times the rapid development of older communication, it has become necessary to use information communication for more human computer interaction in their everyday life. With the increase of the age, the people becomes more and more older and as a result changes in physical structure, cognitive, behavioral takes place. They becomes dependent on other's. In this context, researchers get motivated to find out the possible ways to use web technology for helping these old aged people in an efficient manner for their daily activities. So, workshop was arranged and in that workshop total of 16 old aged peoples was invited to attend the workshop. In this workshop, they were taught how to use IRCTC website and facebook. The researchers found that the older person uses those applications which draw their interest and comparatively easy to use: face to face coaching method of learning gives better result. To understand new technology they take much time. They need additional tools to remind the easily learnt things. To extend this study, the preferable method of mobile application should be used for teaching older people.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130284255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving throughput in Hybrid Wireless Networks using P2P based Market guided distributed Routing mechanism 利用基于P2P的市场引导分布式路由机制提高混合无线网络的吞吐量
G. Poovila, N. Kavitha, Jim Mathew Philip
Next-generation wireless systems visualized to afford all-pervading high-speed access over integration of networks and expected to support the wide range of services. In order to achieve an advanced service, Hybrid Wireless Network (HWN) architectures combine ad-hoc network and infrastructure network routing that support to provide high-throughput wireless networks. In Hybrid Wireless Networks (HWN) the base stations (BSes) in an infrastructure network operate as relays for mobile nodes (MNs) in ad-hoc network for distance communications, while ad-hoc enlarges the coverage of infrastructure network. In an existing research, the routing mechanism uses the link state algorithm for transferring the packets from source to destination by relaying through intermediate hops, uses the shortest path. In addition, ad-hoc networks disadvantages such as delay, packet drop, minimum throughput and more energy consumption are also inherits in routing due to congestion and unavailability of route maintenance. A challenge in this paper is to improve an efficient routing, thus it incorporates the advantages of Distributed Routing Algorithm (DRA) and Trading Market Management from Market-guided distributed Routing mechanism (MDR). By the way, DRA ensured as an efficient routing through simulation results thus improves high throughput. In addition to this mechanism, security features need to included for providing confidentiality, to achieve secure transmission of packets from source to destination. To do so, the data packets needs to encrypted and decrypted with secure algorithm of Rivest-Shamir-Adleman (RSA) in order to prevent from attackers.
下一代无线系统可以通过集成网络提供无处不在的高速接入,并有望支持广泛的服务。为了实现先进的服务,混合无线网络(HWN)架构结合了支持提供高吞吐量无线网络的自组织网络和基础设施网络路由。在混合无线网络(HWN)中,基础设施网络中的基站(bse)作为自组织网络中移动节点(MNs)的中继进行远程通信,而自组织网络则扩大了基础设施网络的覆盖范围。在现有的研究中,路由机制采用链路状态算法,通过中间跳中继将数据包从源传输到目的,使用最短路径。此外,由于路由拥塞和路由维护的不可用性,ad-hoc网络在路由中也继承了延迟、丢包、吞吐量最小和能耗大等缺点。本文面临的挑战是如何改进有效的路由,从而从市场导向的分布式路由机制(MDR)中吸收分布式路由算法(DRA)和交易市场管理的优点。通过仿真结果验证了DRA是一种高效的路由,从而提高了高吞吐量。除了这种机制之外,还需要包括安全特性来提供机密性,以实现数据包从源到目的的安全传输。为了防止攻击者的攻击,需要使用RSA (Rivest-Shamir-Adleman)安全算法对数据包进行加密和解密。
{"title":"Improving throughput in Hybrid Wireless Networks using P2P based Market guided distributed Routing mechanism","authors":"G. Poovila, N. Kavitha, Jim Mathew Philip","doi":"10.1109/ICACCS.2016.7586380","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586380","url":null,"abstract":"Next-generation wireless systems visualized to afford all-pervading high-speed access over integration of networks and expected to support the wide range of services. In order to achieve an advanced service, Hybrid Wireless Network (HWN) architectures combine ad-hoc network and infrastructure network routing that support to provide high-throughput wireless networks. In Hybrid Wireless Networks (HWN) the base stations (BSes) in an infrastructure network operate as relays for mobile nodes (MNs) in ad-hoc network for distance communications, while ad-hoc enlarges the coverage of infrastructure network. In an existing research, the routing mechanism uses the link state algorithm for transferring the packets from source to destination by relaying through intermediate hops, uses the shortest path. In addition, ad-hoc networks disadvantages such as delay, packet drop, minimum throughput and more energy consumption are also inherits in routing due to congestion and unavailability of route maintenance. A challenge in this paper is to improve an efficient routing, thus it incorporates the advantages of Distributed Routing Algorithm (DRA) and Trading Market Management from Market-guided distributed Routing mechanism (MDR). By the way, DRA ensured as an efficient routing through simulation results thus improves high throughput. In addition to this mechanism, security features need to included for providing confidentiality, to achieve secure transmission of packets from source to destination. To do so, the data packets needs to encrypted and decrypted with secure algorithm of Rivest-Shamir-Adleman (RSA) in order to prevent from attackers.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132595062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Online review analytics using word alignment model on Twitter data 使用Twitter数据的单词对齐模型进行在线评论分析
T. Lavanya, J. C. Pamila, K. Veningston
Opinions are vital in almost all human activities and are key influencers of online user's behavior. In this regard, when we need to make a decision, we often search for the opinions of others. Opinions and its related concepts such as sentiments and emotions are the subjects of study of sentiment analysis and opinion mining. The inception of mining opinions from online reviews coincide with the social media on the Web, e.g., reviews, discussion forums, blogs, micro blogs, Twitter, and social networks. Due to the large volume of opinionated data generated and available in digital forms, it become essential to mine such data and find opinions or sentiments in order to obtain the overall opinion on the topic i.e. products, politics, sports, education reforms, and so on. In this direction, it is proposed to design an algorithm which extracts opinion targets and opinion words using word alignment model for online reviews extracted from Twitter. An opinion target is defined as the topic about which users express their opinions. An opinion words are defined as the words that are used to express users' opinions. The aim of the project is to determine the thoughts of blog or review writer with respect to some topic or the overall contextual polarity of online reviews using word alignment model. The key objective of this project is to design an algorithm that predict opinion words and opinion targets for analyzing the market status of a product by mining user reviews posted in social networking site namely the Twitter. For evaluation, Benchmark Customer Review Dataset and real tweets dataset pertaining to product reviews extracted using Twitter API. The results are measured in terms of Precision and Recall for accuracy of finding opinion words and targets in order to be an essential ingredient for opinion mining and sentiment analysis. The experimental results show that the proposed method achieves better accuracy in an efficient way. In addition, the ultimate outcome of this project to make choice of designing potential consumer oriented products e.g. Mobile, laptop, and so on.
意见在几乎所有的人类活动中都是至关重要的,是影响网络用户行为的关键因素。在这方面,当我们需要做决定时,我们经常会征求别人的意见。意见及其相关概念如情感和情绪是情感分析和意见挖掘的研究对象。从在线评论中挖掘意见的开始与网络上的社交媒体相吻合,例如评论、论坛、博客、微博、Twitter和社交网络。由于大量的自以为是的数据以数字形式产生和可用,因此挖掘这些数据并找到意见或情绪以获得对主题(即产品,政治,体育,教育改革等)的总体意见变得至关重要。在这个方向上,我们提出了一种算法,利用从Twitter中提取的在线评论的词对齐模型来提取意见目标和意见词。意见目标定义为用户表达意见的主题。意见词是用来表达用户意见的词。该项目的目的是确定博客或评论作者对某些主题的想法或使用单词对齐模型的在线评论的整体上下文极性。本项目的主要目标是设计一种算法,通过挖掘社交网站即Twitter上发布的用户评论,预测意见词和意见目标,分析产品的市场状况。为了进行评估,使用Twitter API提取与产品评论相关的基准客户评论数据集和真实tweets数据集。结果用Precision和Recall来衡量发现意见词和目标的准确性,这是意见挖掘和情感分析的重要组成部分。实验结果表明,该方法有效地提高了识别精度。此外,这个项目的最终结果是选择设计潜在的面向消费者的产品,如手机,笔记本电脑等。
{"title":"Online review analytics using word alignment model on Twitter data","authors":"T. Lavanya, J. C. Pamila, K. Veningston","doi":"10.1109/ICACCS.2016.7586388","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586388","url":null,"abstract":"Opinions are vital in almost all human activities and are key influencers of online user's behavior. In this regard, when we need to make a decision, we often search for the opinions of others. Opinions and its related concepts such as sentiments and emotions are the subjects of study of sentiment analysis and opinion mining. The inception of mining opinions from online reviews coincide with the social media on the Web, e.g., reviews, discussion forums, blogs, micro blogs, Twitter, and social networks. Due to the large volume of opinionated data generated and available in digital forms, it become essential to mine such data and find opinions or sentiments in order to obtain the overall opinion on the topic i.e. products, politics, sports, education reforms, and so on. In this direction, it is proposed to design an algorithm which extracts opinion targets and opinion words using word alignment model for online reviews extracted from Twitter. An opinion target is defined as the topic about which users express their opinions. An opinion words are defined as the words that are used to express users' opinions. The aim of the project is to determine the thoughts of blog or review writer with respect to some topic or the overall contextual polarity of online reviews using word alignment model. The key objective of this project is to design an algorithm that predict opinion words and opinion targets for analyzing the market status of a product by mining user reviews posted in social networking site namely the Twitter. For evaluation, Benchmark Customer Review Dataset and real tweets dataset pertaining to product reviews extracted using Twitter API. The results are measured in terms of Precision and Recall for accuracy of finding opinion words and targets in order to be an essential ingredient for opinion mining and sentiment analysis. The experimental results show that the proposed method achieves better accuracy in an efficient way. In addition, the ultimate outcome of this project to make choice of designing potential consumer oriented products e.g. Mobile, laptop, and so on.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114086680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Improved velocity Energy-efficient and Link-aware Cluster-Tree based data collection scheme for mobile networks 一种改进的速度节能和链路感知的基于簇树的移动网络数据采集方案
S. Gopalakrishnan, P. M. Kumar
Data Collection schemes fail to supply a secure reliable network in terms of quality, traffic, and end-to-end affiliation. during this paper, a Improved rate Energy-efficient and Link-aware Cluster-Tree (IVELCT) theme for knowledge assortment in WSNs is projected which might effectively mitigate the issues of coverage distance, mobility, delay, traffic, tree intensity, and end-to-end affiliation. The projected IVELCT constructs the information assortment Tree (DCT) supported the cluster head location. the information assortment node within the DCT doesn't participate in sensing on this explicit spherical, however, it merely collects the information packet from the cluster head and delivers it to the sink. The designed IVELCT theme minimizes the energy exploitation, reduces the end-to-end delay and traffic in cluster head in WSNs by effective usage of the DCT. The strength of the IVELCT algorithmic rule is to construct an easy tree structure, thereby reducing the energy consumption of the cluster head and avoids frequent cluster formation. It additionally maintains the cluster for a substantial quantity of your time. Simulation results have incontestable that IVELCT provides higher QoS in terms of energy consumption, throughput, end-to-end delay, and network time period for mobility-based WSNs.
数据采集方案在质量、流量和端到端从属关系方面无法提供安全可靠的网络。在本文中,提出了一种用于WSNs知识分类的改进速率节能和链路感知聚类树(IVELCT)主题,该主题可以有效地缓解覆盖距离、移动性、延迟、流量、树强度和端到端关联等问题。投影IVELCT构建支持簇头位置的信息分类树(DCT)。DCT内的信息分类节点不参与该显式球面上的感知,而只是从簇头收集信息包并将其传递给sink。设计的IVELCT主题通过有效利用DCT,最大限度地减少了WSNs的能量消耗,减少了端到端延迟和簇头流量。IVELCT算法规则的优势在于构造简单的树状结构,从而减少簇头的能量消耗,避免频繁的簇形成。它还会为您的大量时间维护集群。仿真结果表明,IVELCT在能量消耗、吞吐量、端到端延迟和网络周期等方面为基于移动性的wsn提供了更高的QoS。
{"title":"An Improved velocity Energy-efficient and Link-aware Cluster-Tree based data collection scheme for mobile networks","authors":"S. Gopalakrishnan, P. M. Kumar","doi":"10.1109/ICACCS.2016.7586372","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586372","url":null,"abstract":"Data Collection schemes fail to supply a secure reliable network in terms of quality, traffic, and end-to-end affiliation. during this paper, a Improved rate Energy-efficient and Link-aware Cluster-Tree (IVELCT) theme for knowledge assortment in WSNs is projected which might effectively mitigate the issues of coverage distance, mobility, delay, traffic, tree intensity, and end-to-end affiliation. The projected IVELCT constructs the information assortment Tree (DCT) supported the cluster head location. the information assortment node within the DCT doesn't participate in sensing on this explicit spherical, however, it merely collects the information packet from the cluster head and delivers it to the sink. The designed IVELCT theme minimizes the energy exploitation, reduces the end-to-end delay and traffic in cluster head in WSNs by effective usage of the DCT. The strength of the IVELCT algorithmic rule is to construct an easy tree structure, thereby reducing the energy consumption of the cluster head and avoids frequent cluster formation. It additionally maintains the cluster for a substantial quantity of your time. Simulation results have incontestable that IVELCT provides higher QoS in terms of energy consumption, throughput, end-to-end delay, and network time period for mobility-based WSNs.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123536827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1