首页 > 最新文献

2011 World Congress on Information and Communication Technologies最新文献

英文 中文
A novel approach for energy management in wireless Ad Hoc Network by topology control 一种基于拓扑控制的无线自组网能量管理新方法
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141442
Anil Yadav, Raghuraj Singh, A. K. Singh
Mobile Ad Hoc Networks (MANET) are wireless mobile nodes that cooperatively form a network without infrastructure. Because there is no coordination or configuration prior to setup of a MANET, there are several challenges. These challenges include routing packets in an environment where the topology is changing frequently, wireless communications issues, and resource issues such as limited power and storage. Wireless ad hoc network enable new and exciting applications, such as decision making in the battlefield, emergency, search-and-rescue operations, but also pose significant technical challenges. Topology control problems are concerned with which node is able/allowed to communicate with which other nodes. Topology control needs to maintain invariants, e.g., connectivity. This paper considers such problems via minimizing the maximum power and minimizing the total power. In this paper we give a brief overview of topology (arrangement of devices) control problem in wireless ad hoc networks, up to some extent.
移动自组织网络(MANET)是一种无线移动节点,在没有基础设施的情况下协同形成网络。由于在建立MANET之前没有协调或配置,因此存在几个挑战。这些挑战包括在拓扑频繁变化的环境中路由数据包、无线通信问题以及有限的电力和存储等资源问题。无线自组织网络实现了新的和令人兴奋的应用,如战场决策、紧急情况、搜索和救援行动,但也带来了重大的技术挑战。拓扑控制问题涉及哪个节点能够/被允许与哪些其他节点通信。拓扑控制需要保持不变量,例如连通性。本文从最大功率最小和总功率最小两个方面来考虑这类问题。本文在一定程度上对无线自组织网络中的拓扑(设备布置)控制问题作了简要概述。
{"title":"A novel approach for energy management in wireless Ad Hoc Network by topology control","authors":"Anil Yadav, Raghuraj Singh, A. K. Singh","doi":"10.1109/WICT.2011.6141442","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141442","url":null,"abstract":"Mobile Ad Hoc Networks (MANET) are wireless mobile nodes that cooperatively form a network without infrastructure. Because there is no coordination or configuration prior to setup of a MANET, there are several challenges. These challenges include routing packets in an environment where the topology is changing frequently, wireless communications issues, and resource issues such as limited power and storage. Wireless ad hoc network enable new and exciting applications, such as decision making in the battlefield, emergency, search-and-rescue operations, but also pose significant technical challenges. Topology control problems are concerned with which node is able/allowed to communicate with which other nodes. Topology control needs to maintain invariants, e.g., connectivity. This paper considers such problems via minimizing the maximum power and minimizing the total power. In this paper we give a brief overview of topology (arrangement of devices) control problem in wireless ad hoc networks, up to some extent.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130893816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Second order multi-mode allpass filter using single current differencing buffered amplifier 采用单电流差分缓冲放大器的二阶多模全通滤波器
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141353
Gagandeep Kaur
In this paper a second order multi-mode allpass filter is proposed. The main feature of this configuration is that, it can be used in current mode (CM), voltage mode (VM), transimpedance mode (TIM) and transadmittance mode (TAM) without changing the configuration. This filter uses a single current differencing buffered amplifier (CDBA) and a total of five/six passive components. The validity of the proposed filter is verified through PSPICE simulations and results are in good agreement with theoretical one.
本文提出了一种二阶多模全通滤波器。该配置的主要特点是,在不改变配置的情况下,它可以在电流模式(CM)、电压模式(VM)、跨阻模式(TIM)和跨导纳模式(TAM)下使用。该滤波器使用单个差动缓冲放大器(CDBA)和总共5 / 6个无源元件。通过PSPICE仿真验证了该滤波器的有效性,仿真结果与理论结果吻合较好。
{"title":"Second order multi-mode allpass filter using single current differencing buffered amplifier","authors":"Gagandeep Kaur","doi":"10.1109/WICT.2011.6141353","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141353","url":null,"abstract":"In this paper a second order multi-mode allpass filter is proposed. The main feature of this configuration is that, it can be used in current mode (CM), voltage mode (VM), transimpedance mode (TIM) and transadmittance mode (TAM) without changing the configuration. This filter uses a single current differencing buffered amplifier (CDBA) and a total of five/six passive components. The validity of the proposed filter is verified through PSPICE simulations and results are in good agreement with theoretical one.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130952154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Discrete wavelet transform based despeckling for SAR images 基于离散小波变换的SAR图像去噪
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141275
S. Roomi, D. Kalaiyarasi, N.Kasturi Rangan
Synthetic aperture radar (SAR) images are inherently affected by multiplicative speckle noise, which is due to the coherent nature of scattering phenomena. To preserve the sharp features and details of the SAR image effectively when despeckling, a new method of speckle reduction in wavelet domain has been presented. In this proposed method ‘symlet’ wavelet is used for despeckling process. This proposed algorithm uses new improved thresholding and polynomial soft thresholding function to threshold the non-edge component present in the corrupted image. The proposed work has been simulated using Matlab 7.0 and the experimental results demonstrate that the new method shows better result compared with various other despeckling techniques.
由于散射现象的相干性,合成孔径雷达(SAR)图像固有地受到乘性散斑噪声的影响。为了在去斑时有效地保留SAR图像的鲜明特征和细节,提出了一种新的小波域去斑方法。在该方法中,采用“符号”小波进行去斑处理。该算法采用改进的阈值法和多项式软阈值法对图像中的非边缘成分进行阈值处理。利用Matlab 7.0对所提出的工作进行了仿真,实验结果表明,与其他各种去斑技术相比,新方法具有更好的效果。
{"title":"Discrete wavelet transform based despeckling for SAR images","authors":"S. Roomi, D. Kalaiyarasi, N.Kasturi Rangan","doi":"10.1109/WICT.2011.6141275","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141275","url":null,"abstract":"Synthetic aperture radar (SAR) images are inherently affected by multiplicative speckle noise, which is due to the coherent nature of scattering phenomena. To preserve the sharp features and details of the SAR image effectively when despeckling, a new method of speckle reduction in wavelet domain has been presented. In this proposed method ‘symlet’ wavelet is used for despeckling process. This proposed algorithm uses new improved thresholding and polynomial soft thresholding function to threshold the non-edge component present in the corrupted image. The proposed work has been simulated using Matlab 7.0 and the experimental results demonstrate that the new method shows better result compared with various other despeckling techniques.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127913887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of artificial bee colony optimization for load frequency control 人工蜂群优化在负荷频率控制中的应用
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141339
Sneha Rathor, D. Acharya, Srihari Gude, P. Mishra
An attempt is made to examine the effective application of artificial bee colony algorithm to optimize the parameters in load frequency control (LFC) of a two area interconnected thermal system. The proportional gains (Kp) and integral gains (Ki) have been optimized to ensure best performance of the system, minimizing the tie-line deviation and frequency deviations of both the areas. The settling time of the deviations have also been considered and the solution that gives best possible settling times for best possible fitness value has been accepted.
研究了人工蜂群算法在两区互联热力系统负荷频率控制参数优化中的有效应用。比例增益(Kp)和积分增益(Ki)经过优化,以确保系统的最佳性能,最大限度地减少两个区域的联络线偏差和频率偏差。还考虑了偏差的沉降时间,并接受了给出最佳可能适应度值的最佳可能沉降时间的解。
{"title":"Application of artificial bee colony optimization for load frequency control","authors":"Sneha Rathor, D. Acharya, Srihari Gude, P. Mishra","doi":"10.1109/WICT.2011.6141339","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141339","url":null,"abstract":"An attempt is made to examine the effective application of artificial bee colony algorithm to optimize the parameters in load frequency control (LFC) of a two area interconnected thermal system. The proportional gains (Kp) and integral gains (Ki) have been optimized to ensure best performance of the system, minimizing the tie-line deviation and frequency deviations of both the areas. The settling time of the deviations have also been considered and the solution that gives best possible settling times for best possible fitness value has been accepted.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125597792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Geometric mean based trust management system for WSNs (GMTMS) 基于几何均值的wsn信任管理系统(GMTMS)
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141286
Shaik Sahil Babu, Arnab Raha, M. K. Naskar
The Wireless Sensor Network (WSN) nodes are high-volume in number, and their deployment environment may be hazardous, unattended and/or hostile and sometimes dangerous. The traditional cryptographic and security mechanisms in WSNs cannot detect the node physical capture, and due to the malicious or selfish nodes even total breakdown of network may take place. Also, the traditional security mechanisms in WSNs requires sophisticated software, hardware, large memory, high processing speed and communication bandwidth at node. Hence, they are not sufficient for secure routing of message from source to destination in WSNs. Alternatively, trust management schemes consist a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). In this paper, we propose a new geometric mean based trust management system by evaluating direct trust from the QoS characteristics (trust metrics) and indirect trust from recommendations by neighbour nodes, which allows for trusted nodes only to participate in routing.
无线传感器网络(WSN)节点数量大,其部署环境可能是危险的、无人值守的和/或敌对的,有时是危险的。无线传感器网络中传统的加密和安全机制无法检测到节点的物理捕获,由于节点的恶意或自私,甚至可能导致网络的完全崩溃。此外,传统的无线传感器网络安全机制需要复杂的软件、硬件、大内存、高处理速度和节点通信带宽。因此,它们不足以实现wsn中消息从源到目的地的安全路由。另外,信任管理方案包含一个强大的工具,用于检测意外的节点行为(错误的或恶意的)。本文提出了一种新的基于几何均值的信任管理系统,该系统通过QoS特征(信任度量)来评估直接信任,通过邻居节点的推荐来评估间接信任,该系统允许受信任节点只参与路由。
{"title":"Geometric mean based trust management system for WSNs (GMTMS)","authors":"Shaik Sahil Babu, Arnab Raha, M. K. Naskar","doi":"10.1109/WICT.2011.6141286","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141286","url":null,"abstract":"The Wireless Sensor Network (WSN) nodes are high-volume in number, and their deployment environment may be hazardous, unattended and/or hostile and sometimes dangerous. The traditional cryptographic and security mechanisms in WSNs cannot detect the node physical capture, and due to the malicious or selfish nodes even total breakdown of network may take place. Also, the traditional security mechanisms in WSNs requires sophisticated software, hardware, large memory, high processing speed and communication bandwidth at node. Hence, they are not sufficient for secure routing of message from source to destination in WSNs. Alternatively, trust management schemes consist a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). In this paper, we propose a new geometric mean based trust management system by evaluating direct trust from the QoS characteristics (trust metrics) and indirect trust from recommendations by neighbour nodes, which allows for trusted nodes only to participate in routing.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126214002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Segmentation and grading of diabetic retinopathic exudates using error-boost feature selection method 基于误差增强特征选择方法的糖尿病视网膜病变渗出物分割与分级
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141299
A.V. Pradeep Kumar, C. Prashanth, G. Kavitha
This paper proposes a method to segment the exudates and lesions in retinal fundus images and classify using selective brightness feature. The exudates are segmented from background and their size is also measured. The segmentation is done by extraction of pixels which fall in the color range of the spots. The essential features inferred from the segmented image include the count of the exudates, maximum size, percentage affected, color intensity of the spot, average size and the area affected by haemorrhages. The diagnosis is supported by error-boost feature selection technique. This technique classifies the retinal images as normal or abnormal based on the features obtained from the segmented image. The abnormal images are further classified as mild, moderate or severe and there is an additional classification based on non-proliferative and severe proliferative diabetic retinopathy. The diagnosis parameter ranges for each feature are set prior to the severity classification. The error boost feature selection algorithm selects the key features which classifies the retinopathy more accurately. The obtained results seem to be clinically relevant.
提出了一种利用选择性亮度特征对视网膜眼底图像中的渗出物和病变物进行分割和分类的方法。从背景中分割出渗出物并测量其大小。分割是通过提取落在斑点颜色范围内的像素来完成的。从分割图像中推断出的基本特征包括渗出物的数量、最大大小、受影响的百分比、斑点的颜色强度、平均大小和受出血影响的面积。错误增强特征选择技术支持诊断。该技术基于从分割图像中获得的特征对视网膜图像进行正常或异常分类。异常图像进一步分为轻度、中度或重度,并根据非增殖性和重度增殖性糖尿病视网膜病变进行额外的分类。每个特征的诊断参数范围都是在进行严重性分类之前设置的。误差增强特征选择算法选择关键特征,更准确地对视网膜病变进行分类。所得结果似乎具有临床相关性。
{"title":"Segmentation and grading of diabetic retinopathic exudates using error-boost feature selection method","authors":"A.V. Pradeep Kumar, C. Prashanth, G. Kavitha","doi":"10.1109/WICT.2011.6141299","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141299","url":null,"abstract":"This paper proposes a method to segment the exudates and lesions in retinal fundus images and classify using selective brightness feature. The exudates are segmented from background and their size is also measured. The segmentation is done by extraction of pixels which fall in the color range of the spots. The essential features inferred from the segmented image include the count of the exudates, maximum size, percentage affected, color intensity of the spot, average size and the area affected by haemorrhages. The diagnosis is supported by error-boost feature selection technique. This technique classifies the retinal images as normal or abnormal based on the features obtained from the segmented image. The abnormal images are further classified as mild, moderate or severe and there is an additional classification based on non-proliferative and severe proliferative diabetic retinopathy. The diagnosis parameter ranges for each feature are set prior to the severity classification. The error boost feature selection algorithm selects the key features which classifies the retinopathy more accurately. The obtained results seem to be clinically relevant.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122291325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
CBIR using texels of RGB colour textons CBIR使用RGB颜色纹理的纹理
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141388
Sudhakar Putheti, S. Edara, Sai Alekya Edara
The aim of this paper is to increase the success rate of CBIR system with low computational complexity. The success rate of CBIR system depends on localization of the image to be retrieved. This can be achieved by using textons of R, G, B planes of the image which describes the shape. This paper proposes 3 × 3 grids to extract the textons with low computational complexity. The proposed method is based on the texels (low level features) of textons extracted from R,G,B channels of an image as chromatic changes also give shape information. The proposed method is tested on Corel database with more than 1000 natural images. The results demonstrate that it is more efficient than texton co-occurrence matrix, texton multi histogram methods. It has good discrimination power of color, texture and shape features when compared to that of TCM and TMH methods.
本文的目的是在低计算复杂度的情况下提高CBIR系统的成功率。CBIR系统的成功率取决于被检索图像的定位。这可以通过使用描述形状的图像的R, G, B平面的纹理来实现。本文提出了计算复杂度较低的3 × 3网格来提取文本。该方法基于从图像的R、G、B通道提取的文本的texels(低级特征),因为颜色变化也可以提供形状信息。在Corel数据库中使用1000多张自然图像对该方法进行了测试。结果表明,该方法比文本共现矩阵法、文本多直方图法更有效。与TCM和TMH方法相比,该方法对颜色、纹理和形状特征具有较好的识别能力。
{"title":"CBIR using texels of RGB colour textons","authors":"Sudhakar Putheti, S. Edara, Sai Alekya Edara","doi":"10.1109/WICT.2011.6141388","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141388","url":null,"abstract":"The aim of this paper is to increase the success rate of CBIR system with low computational complexity. The success rate of CBIR system depends on localization of the image to be retrieved. This can be achieved by using textons of R, G, B planes of the image which describes the shape. This paper proposes 3 × 3 grids to extract the textons with low computational complexity. The proposed method is based on the texels (low level features) of textons extracted from R,G,B channels of an image as chromatic changes also give shape information. The proposed method is tested on Corel database with more than 1000 natural images. The results demonstrate that it is more efficient than texton co-occurrence matrix, texton multi histogram methods. It has good discrimination power of color, texture and shape features when compared to that of TCM and TMH methods.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"40 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120910627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Location management in wireless networks: A survey 无线网络中的位置管理:综述
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141309
Poulami Das, A. Chandra
The present wireless networks aim to make anywhere and anytime communication possible. The operations which allow networks to achieve this goal have drawn tremendous attention over the recent past. Location management (LM) is one such operation that aims to determine the exact location of mobile devices. LM facilitates the searching or paging process that is performed during the downlink channel acquisition. Various strategies for LM have been proposed so far with each having their own merits and demerits. Specifically, the cost incurred for LM may be traded off against two major design parameters, namely computational overhead and implementation complexity. Before adopting a scheme for future generation wireless standards, these performance metrics needs to be thoroughly compared. We begin with a description of the wireless architecture that is required for understanding basics of LM. Next, variants of the two primary components of LM, location update (LU) and paging, are surveyed.
目前的无线网络旨在使随时随地的通信成为可能。使网络能够实现这一目标的操作在最近引起了极大的关注。位置管理(LM)就是这样一种操作,旨在确定移动设备的确切位置。LM简化了在下行链路信道获取期间执行的搜索或分页过程。到目前为止,人们提出了各种各样的LM策略,每种策略都有自己的优点和缺点。具体来说,LM的成本可能会与两个主要的设计参数相权衡,即计算开销和实现复杂性。在采用下一代无线标准方案之前,需要彻底比较这些性能指标。我们首先描述无线架构,这是理解LM基础知识所必需的。接下来,考察LM的两个主要组件——位置更新(LU)和分页——的变体。
{"title":"Location management in wireless networks: A survey","authors":"Poulami Das, A. Chandra","doi":"10.1109/WICT.2011.6141309","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141309","url":null,"abstract":"The present wireless networks aim to make anywhere and anytime communication possible. The operations which allow networks to achieve this goal have drawn tremendous attention over the recent past. Location management (LM) is one such operation that aims to determine the exact location of mobile devices. LM facilitates the searching or paging process that is performed during the downlink channel acquisition. Various strategies for LM have been proposed so far with each having their own merits and demerits. Specifically, the cost incurred for LM may be traded off against two major design parameters, namely computational overhead and implementation complexity. Before adopting a scheme for future generation wireless standards, these performance metrics needs to be thoroughly compared. We begin with a description of the wireless architecture that is required for understanding basics of LM. Next, variants of the two primary components of LM, location update (LU) and paging, are surveyed.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121867059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Survey and analysis of optimal scheduling strategies in cloud environment 云环境下最优调度策略的调查与分析
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141347
M. Paul, G. Sanyal
Cloud technologies promise to change the way organizations tackle complex computational problems. Here millions of user share cloud resources by submitting their computing task to the cloud system. So Scheduling these millions of task is a challenge to cloud computing environment. In this paper we have proposed a methodology by using assignment to assign these jobs to the suitable resources so as to minimize the whole completion time. The cost matrix is generated by using credit of a task to be assigned to a particular resource. The task having more credit carries more chance to assign to the best fitted resource. The proposed method has been established in homogeneous cloud environment.
云技术有望改变组织处理复杂计算问题的方式。在这里,数百万用户通过向云系统提交计算任务来共享云资源。因此,调度这些数以百万计的任务对云计算环境来说是一个挑战。在本文中,我们提出了一种方法,通过使用分配来分配这些工作到适当的资源,以尽量减少整个完成时间。成本矩阵通过使用分配给特定资源的任务的信用来生成。拥有更多信用的任务有更多的机会分配给最合适的资源。该方法已在同构云环境中得到验证。
{"title":"Survey and analysis of optimal scheduling strategies in cloud environment","authors":"M. Paul, G. Sanyal","doi":"10.1109/WICT.2011.6141347","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141347","url":null,"abstract":"Cloud technologies promise to change the way organizations tackle complex computational problems. Here millions of user share cloud resources by submitting their computing task to the cloud system. So Scheduling these millions of task is a challenge to cloud computing environment. In this paper we have proposed a methodology by using assignment to assign these jobs to the suitable resources so as to minimize the whole completion time. The cost matrix is generated by using credit of a task to be assigned to a particular resource. The task having more credit carries more chance to assign to the best fitted resource. The proposed method has been established in homogeneous cloud environment.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127796719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Design of shared-nothing cluster architecture for fast accessing and highly availability of data in heterogeneous database environment 针对异构数据库环境中数据的快速访问和高可用性,设计无共享集群架构
Pub Date : 2011-12-01 DOI: 10.1109/WICT.2011.6141227
D. Sukheja, U. Singh
Database systems have been essential for all forms of data processing for a long time. In recent years, the amount of processed data has been growing dramatically, even in small projects. At the other hand, database management systems tend to be static in terms of size and performance, which makes scaling a difficult and expensive task. Enterprises may have multiple database systems spread across the organization for redundancy or for serving different applications. In such systems, query workloads can be distributed across different servers for better performance. In this paper, we focus on complex queries whose evaluation tends to be time-consuming and design the secured share nothing clustering architecture to improve the performance of application and also assure to the user to availability of the data. The proposed architecture is very helpful towards a two phase query optimizer. In the first phase, the synchroniz and decomposes a query into subqueries and transfer them to appropriate cluster nodes. In the second phase, each cluster node optimizes and evaluates its subquery locally
长期以来,数据库系统对所有形式的数据处理都是必不可少的。近年来,即使在小型项目中,处理的数据量也在急剧增长。另一方面,数据库管理系统在大小和性能方面往往是静态的,这使得扩展成为一项困难且昂贵的任务。为了冗余或服务于不同的应用程序,企业可能在组织中分布多个数据库系统。在这样的系统中,查询工作负载可以分布在不同的服务器上,以获得更好的性能。本文针对复杂查询费时的问题,设计了安全的无共享集群架构,以提高应用程序的性能,同时保证数据的可用性。所提出的体系结构对两阶段查询优化器非常有帮助。在第一阶段,将查询同步并分解为子查询,并将它们传输到适当的集群节点。在第二阶段,每个集群节点在本地优化和评估其子查询
{"title":"Design of shared-nothing cluster architecture for fast accessing and highly availability of data in heterogeneous database environment","authors":"D. Sukheja, U. Singh","doi":"10.1109/WICT.2011.6141227","DOIUrl":"https://doi.org/10.1109/WICT.2011.6141227","url":null,"abstract":"Database systems have been essential for all forms of data processing for a long time. In recent years, the amount of processed data has been growing dramatically, even in small projects. At the other hand, database management systems tend to be static in terms of size and performance, which makes scaling a difficult and expensive task. Enterprises may have multiple database systems spread across the organization for redundancy or for serving different applications. In such systems, query workloads can be distributed across different servers for better performance. In this paper, we focus on complex queries whose evaluation tends to be time-consuming and design the secured share nothing clustering architecture to improve the performance of application and also assure to the user to availability of the data. The proposed architecture is very helpful towards a two phase query optimizer. In the first phase, the synchroniz and decomposes a query into subqueries and transfer them to appropriate cluster nodes. In the second phase, each cluster node optimizes and evaluates its subquery locally","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134191809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2011 World Congress on Information and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1