首页 > 最新文献

2014 International Conference on High Performance Computing and Applications (ICHPCA)最新文献

英文 中文
The impact of delayed ACK on TCP variants protocols in wireless network 无线网络中延迟ACK对TCP变体协议的影响
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045302
S. Bisoy, P. Pattnaik, Amardeep Das, M. R. Panda
TCP is a connection oriented and reliable protocol of transport layer. TCP receiver generates one acknowledgment denoted as ACK for each data packet that received to acknowledges the sender. If the data packet and ACK uses the same path, then there may be collision between them due to channel contention. Finally TCP throughput is reduced due to huge ACK packet generation. TCP performance is very poor due to wireless channel characteristics. Since the packet loss is always related to path length, choosing appropriate delayed window size is an important parameter in wireless network. This paper, analyzes the impact of delayed acknowledgment on TCP variants say Newreno and Vegas in multi hop wireless networks. However the issues of congestion and loss recovery techniques for these two mechanisms are different. In this paper we study how well the TCP variants react with delayed acknowledgement strategy in multi hop network with different topologies and various flow patterns with respect to throughput, average delay and number of retransmission. The simulation result shows that TCP-Vegas achieve higher throughput, fewer retransmissions and less delay than Newreno. The performance of TCP-Vegas with delayed ack gets best performance among TCP variants.
TCP是面向连接的、可靠的传输层协议。TCP接收方对接收到的每个数据包生成一个表示为ACK的确认,以确认发送方。如果数据包和ACK使用相同的路径,那么由于通道争用,它们之间可能会发生冲突。最后,由于产生大量的ACK包,TCP吞吐量降低。由于无线信道的特性,TCP的性能很差。由于丢包总是与路径长度有关,因此选择合适的延迟窗口大小是无线网络中的一个重要参数。本文分析了延迟确认对多跳无线网络中TCP变体Newreno和Vegas的影响。然而,这两种机制的拥塞问题和损失恢复技术是不同的。在本文中,我们研究了在具有不同拓扑结构和不同流模式的多跳网络中,TCP变体在吞吐量、平均延迟和重传次数方面对延迟确认策略的反应。仿真结果表明,TCP-Vegas比Newreno具有更高的吞吐量、更少的重传和更小的延迟。在TCP变体中,延迟返回的TCP- vegas的性能最好。
{"title":"The impact of delayed ACK on TCP variants protocols in wireless network","authors":"S. Bisoy, P. Pattnaik, Amardeep Das, M. R. Panda","doi":"10.1109/ICHPCA.2014.7045302","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045302","url":null,"abstract":"TCP is a connection oriented and reliable protocol of transport layer. TCP receiver generates one acknowledgment denoted as ACK for each data packet that received to acknowledges the sender. If the data packet and ACK uses the same path, then there may be collision between them due to channel contention. Finally TCP throughput is reduced due to huge ACK packet generation. TCP performance is very poor due to wireless channel characteristics. Since the packet loss is always related to path length, choosing appropriate delayed window size is an important parameter in wireless network. This paper, analyzes the impact of delayed acknowledgment on TCP variants say Newreno and Vegas in multi hop wireless networks. However the issues of congestion and loss recovery techniques for these two mechanisms are different. In this paper we study how well the TCP variants react with delayed acknowledgement strategy in multi hop network with different topologies and various flow patterns with respect to throughput, average delay and number of retransmission. The simulation result shows that TCP-Vegas achieve higher throughput, fewer retransmissions and less delay than Newreno. The performance of TCP-Vegas with delayed ack gets best performance among TCP variants.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128502543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intrusion detection systems for High Performance Computing environment 高性能计算环境下的入侵检测系统
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045369
B. K. Mishra, Minakshi Sahu, Satyam Das
The rapid growth of computers transformed the way in which information and data was stored. With this new paradigm of data access, comes the threat of this information being exposed to unauthorized and unintended users. Many systems have been developed which scrutinize the data for a deviation from the normal behavior of a user or system, or search for a known signature within the data. These systems are termed as Intrusion Detection Systems (IDS). Intrusion Detection is the process of monitoring and identifying attempted unauthorized systems access or manipulation. Successful High Performance Computing (HPC) requires a combination of technical innovation as well as political and operational experience to balance out the many (sometimes contradictory) pressures encountered in this field. This is particularly true with respect to operational field. In this paper we try to summarize the various types of Intrusion detection systems available and explain some key points for each particular type of IDS available in the market today and also insight IDS on High Performance Computing (HPC) environment.
计算机的快速发展改变了信息和数据的存储方式。随着这种新的数据访问模式的出现,这些信息被暴露给未经授权和意外的用户的威胁也随之而来。已经开发了许多系统,这些系统可以仔细检查数据是否偏离用户或系统的正常行为,或者在数据中搜索已知签名。这些系统被称为入侵检测系统(IDS)。入侵检测是监视和识别未经授权的系统访问或操作的过程。成功的高性能计算(HPC)需要技术创新以及政治和操作经验的结合,以平衡在该领域遇到的许多(有时是相互矛盾的)压力。在业务领域尤其如此。在本文中,我们试图总结可用的各种类型的入侵检测系统,并解释当今市场上可用的每种特定类型的入侵检测系统的一些关键点,并深入了解高性能计算(HPC)环境下的入侵检测系统。
{"title":"Intrusion detection systems for High Performance Computing environment","authors":"B. K. Mishra, Minakshi Sahu, Satyam Das","doi":"10.1109/ICHPCA.2014.7045369","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045369","url":null,"abstract":"The rapid growth of computers transformed the way in which information and data was stored. With this new paradigm of data access, comes the threat of this information being exposed to unauthorized and unintended users. Many systems have been developed which scrutinize the data for a deviation from the normal behavior of a user or system, or search for a known signature within the data. These systems are termed as Intrusion Detection Systems (IDS). Intrusion Detection is the process of monitoring and identifying attempted unauthorized systems access or manipulation. Successful High Performance Computing (HPC) requires a combination of technical innovation as well as political and operational experience to balance out the many (sometimes contradictory) pressures encountered in this field. This is particularly true with respect to operational field. In this paper we try to summarize the various types of Intrusion detection systems available and explain some key points for each particular type of IDS available in the market today and also insight IDS on High Performance Computing (HPC) environment.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122421887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Weighted bag hybrid multiple classifier machine for boosting prediction accuracy 用于提高预测精度的加权袋混合多重分类机
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045346
Dwaipayan Chakraborty, S. Saha, Oindrilla Dutta
Ensemblelearning of classifier has been a hot topic in pattern recognition problems for the last twenty years. This is because standalone classifier does not improve the performance when the dataset suffers from class imbalance.Ensemble learning is generally based on boosting and bagging techniques. Boostingcombines multiple classifiers of the same type, trained with weighted sample sets. Our aim is to improve the general boosting algorithm by usingdiversekinds of classifiers to build the ensemble of classifiers. Two different kinds of classifier - BP-MLP and RBFNN are considered for constructing the initial ensemble in our algorithm. Thestrategy is to assign an adaptive weight to the different types of classifiers based on their individual performancein order toboost a particular kind of classifier amongst the above two. Benchmark datasets from UCI repository are used for analysis which confirm that our method outperforms single type of learner based boosting.
近二十年来,分类器的集成学习一直是模式识别领域的研究热点。这是因为当数据集遭受类不平衡时,独立分类器并不能提高性能。集成学习通常基于提升和套袋技术。boosting结合了多个相同类型的分类器,用加权样本集训练。我们的目标是通过使用不同种类的分类器来构建分类器的集合来改进一般的boosting算法。我们的算法考虑了BP-MLP和RBFNN两种不同的分类器来构造初始集成。该策略是根据不同类型的分类器的个人性能为其分配自适应权重,以便在上述两种分类器中提升特定类型的分类器。来自UCI存储库的基准数据集用于分析,证实我们的方法优于单一类型的基于学习器的提升。
{"title":"Weighted bag hybrid multiple classifier machine for boosting prediction accuracy","authors":"Dwaipayan Chakraborty, S. Saha, Oindrilla Dutta","doi":"10.1109/ICHPCA.2014.7045346","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045346","url":null,"abstract":"Ensemblelearning of classifier has been a hot topic in pattern recognition problems for the last twenty years. This is because standalone classifier does not improve the performance when the dataset suffers from class imbalance.Ensemble learning is generally based on boosting and bagging techniques. Boostingcombines multiple classifiers of the same type, trained with weighted sample sets. Our aim is to improve the general boosting algorithm by usingdiversekinds of classifiers to build the ensemble of classifiers. Two different kinds of classifier - BP-MLP and RBFNN are considered for constructing the initial ensemble in our algorithm. Thestrategy is to assign an adaptive weight to the different types of classifiers based on their individual performancein order toboost a particular kind of classifier amongst the above two. Benchmark datasets from UCI repository are used for analysis which confirm that our method outperforms single type of learner based boosting.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120945421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trigger action reaction model in high performance computing for impact analysis due to Artificial Energy Drinks 人工能量饮料影响分析的高性能计算触发反应模型
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045361
C. Subramaniam, R. V. Selvakarthik, M. Karthikeyan, K. Abinesh Kumar, P. Giridhara Madhavan
The objective of the research work is to propose a trigger-action-reaction (TAR) based impact analysis model with the outcome due to Artificial Energy Drinks (AED) on Indian youth. The AED causes a drastic behavioural changes leading to potential health risks in India and the studies suggest that young people or college students are therefore vulnerable to increased problems from ingesting these products. The young community is more likely to take risks than adults and to suffer high rates of alcohol problems, including alcohol-related traffic accidents, violence, sexual assault, and suicide as per the studies. The reaction induces faster metabolism in youth by AEDs resulting to uncontrollable emotional outbursts leading to different health and legal problems. A parallel action reaction based impact analysis with number of AEDs sold out in India that results in criminal activities due to massive consumption of AEDs by the society. A formal model of trigger-action-reaction is applied and validated by multi-core programming using CUDA.
研究工作的目的是提出一个基于触发-作用-反应(TAR)的影响分析模型,分析人工能量饮料(AED)对印度年轻人的影响。在印度,AED会引起剧烈的行为变化,导致潜在的健康风险,研究表明,年轻人或大学生因此容易因摄入这些产品而出现更多问题。根据研究,年轻人比成年人更有可能冒险,并且遭受酒精问题的高发,包括与酒精有关的交通事故、暴力、性侵犯和自杀。AEDs的反应导致年轻人新陈代谢加快,导致无法控制的情绪爆发,导致各种健康和法律问题。一项基于平行行动反应的影响分析,分析了印度aed售罄的数量,由于社会大量消费aed而导致犯罪活动。应用了正式的触发-作用-反应模型,并通过CUDA多核编程进行了验证。
{"title":"Trigger action reaction model in high performance computing for impact analysis due to Artificial Energy Drinks","authors":"C. Subramaniam, R. V. Selvakarthik, M. Karthikeyan, K. Abinesh Kumar, P. Giridhara Madhavan","doi":"10.1109/ICHPCA.2014.7045361","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045361","url":null,"abstract":"The objective of the research work is to propose a trigger-action-reaction (TAR) based impact analysis model with the outcome due to Artificial Energy Drinks (AED) on Indian youth. The AED causes a drastic behavioural changes leading to potential health risks in India and the studies suggest that young people or college students are therefore vulnerable to increased problems from ingesting these products. The young community is more likely to take risks than adults and to suffer high rates of alcohol problems, including alcohol-related traffic accidents, violence, sexual assault, and suicide as per the studies. The reaction induces faster metabolism in youth by AEDs resulting to uncontrollable emotional outbursts leading to different health and legal problems. A parallel action reaction based impact analysis with number of AEDs sold out in India that results in criminal activities due to massive consumption of AEDs by the society. A formal model of trigger-action-reaction is applied and validated by multi-core programming using CUDA.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129033427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of dense matrix multiplication on 2D mesh 二维网格上密集矩阵乘法的实现
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045321
Bhabani Sankar Samantray, Debananda Kanhar
A large number of algorithms have been developed for solving large dimension matrix multiplication through parallel computation. Lots of algorithms have been developed keeping performance matrices such as speed up, efficiency, isoefficiency etc. in linear order. We have compared the performance of simple block checkerboard partitioning algorithm with cannon's algorithm over 2D mesh topology in HPC Maverick (Rocks 5.4) by taking the mathematical problem matrix multiplication. Till the date not any of the algorithms clearly claimed to be superior then the others. It seems to be advantageous to partition matrix into blocks for multiplying on the 2D Mesh.
通过并行计算求解大维矩阵乘法,已经开发了大量的算法。人们开发了许多算法来保持加速、效率、等效率等性能矩阵的线性顺序。在HPC Maverick (Rocks 5.4)中,以矩阵乘法为数学问题,比较了简单块棋盘划分算法和cannon算法在二维网格拓扑上的性能。到目前为止,没有任何一种算法明确地声称比其他算法优越。将矩阵划分成块,在二维网格上相乘似乎是有利的。
{"title":"Implementation of dense matrix multiplication on 2D mesh","authors":"Bhabani Sankar Samantray, Debananda Kanhar","doi":"10.1109/ICHPCA.2014.7045321","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045321","url":null,"abstract":"A large number of algorithms have been developed for solving large dimension matrix multiplication through parallel computation. Lots of algorithms have been developed keeping performance matrices such as speed up, efficiency, isoefficiency etc. in linear order. We have compared the performance of simple block checkerboard partitioning algorithm with cannon's algorithm over 2D mesh topology in HPC Maverick (Rocks 5.4) by taking the mathematical problem matrix multiplication. Till the date not any of the algorithms clearly claimed to be superior then the others. It seems to be advantageous to partition matrix into blocks for multiplying on the 2D Mesh.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116826654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gradient Local Auto-Correlation for handwritten Devanagari character recognition 手写德文汉字识别的梯度局部自相关
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045339
Mahesh Jangid, S. Srivastava
This manuscript is focus on the utilization of object detection algorithm GLAC (Gradient Local Auto-Correlation) for the handwritten character recognition (HCR) problem. HOG and SIFT are already used in this (HCR) field except GLAC which produced good results than HOG and SIFT for object detection problem like human in images, pedestrian detection and image patch matching. This paper utilized GLAC algorithm to recognize the handwritten Devanagari characters. GLAC applied on two handwritten Devanagari databases, ISIDCHAR and V2DMDCHAR. The images of databases are also normalized with and without preserving aspect ratio. Using GLAC method and SVM classifier, the best results obtained on ISIDCHAR and V2DMDCHAR are 93.21%, 95.21 % respectively that justified the utilization of GLAC algorithm for character recognition problem.
本文主要研究目标检测算法GLAC (Gradient Local Auto-Correlation,梯度局部自相关)在手写字符识别中的应用。除了GLAC在图像中人、行人检测和图像补丁匹配等目标检测问题上取得了比HOG和SIFT更好的效果外,HOG和SIFT已经应用于该(HCR)领域。本文利用GLAC算法对手写体德文汉字进行识别。GLAC应用于两个手写Devanagari数据库,ISIDCHAR和V2DMDCHAR。同时对数据库图像进行了保留宽高比和不保留宽高比的归一化处理。使用GLAC方法和SVM分类器,在ISIDCHAR和V2DMDCHAR上获得的最佳识别率分别为93.21%和95.21%,证明了GLAC算法用于字符识别问题的合理性。
{"title":"Gradient Local Auto-Correlation for handwritten Devanagari character recognition","authors":"Mahesh Jangid, S. Srivastava","doi":"10.1109/ICHPCA.2014.7045339","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045339","url":null,"abstract":"This manuscript is focus on the utilization of object detection algorithm GLAC (Gradient Local Auto-Correlation) for the handwritten character recognition (HCR) problem. HOG and SIFT are already used in this (HCR) field except GLAC which produced good results than HOG and SIFT for object detection problem like human in images, pedestrian detection and image patch matching. This paper utilized GLAC algorithm to recognize the handwritten Devanagari characters. GLAC applied on two handwritten Devanagari databases, ISIDCHAR and V2DMDCHAR. The images of databases are also normalized with and without preserving aspect ratio. Using GLAC method and SVM classifier, the best results obtained on ISIDCHAR and V2DMDCHAR are 93.21%, 95.21 % respectively that justified the utilization of GLAC algorithm for character recognition problem.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115361129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Guided convergence for training feed-forward neural network using novel gravitational search optimization 基于新型引力搜索优化的前馈神经网络导引收敛训练
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045348
S. Saha, Dwaipayan Chakraborty, Oindrilla Dutta
Training of feed-forward neural network using stochastic optimization techniques recently gained a lot of importance invarious pattern recognition and data mining applications because of its capability of escaping local minima trap. However such techniques may suffer from slow and poor convergence. This fact inspires us to work on meta-heuristic optimization technique for training the neural network. In this respect, to train the neural network, we focus on implementing the gravitational search algorithm(GSA) which is based on the Newton's law of motion principle and the interaction of masses. GSA has good ability to search for the global optimum, but it may suffer from slow searching speed in the last iterations. Our work is directed towards the smart convergence by modifying the original GSA and also guiding the algorithm to make it immune to local minima trap. Results on various benchmark datasets prove the robustness of the modified algorithm.
利用随机优化技术训练前馈神经网络,由于其能够避免局部极小陷阱,近年来在模式识别和数据挖掘等领域得到了广泛的应用。然而,这种技术可能遭受缓慢和较差的收敛。这一事实激励我们研究用于训练神经网络的元启发式优化技术。在这方面,为了训练神经网络,我们重点实现了基于牛顿运动定律原理和质量相互作用的引力搜索算法(GSA)。GSA具有良好的全局最优搜索能力,但在最后的迭代中可能存在搜索速度慢的问题。我们的工作是通过修改原始的GSA来实现智能收敛,并指导算法使其不受局部最小陷阱的影响。在各种基准数据集上的实验结果证明了改进算法的鲁棒性。
{"title":"Guided convergence for training feed-forward neural network using novel gravitational search optimization","authors":"S. Saha, Dwaipayan Chakraborty, Oindrilla Dutta","doi":"10.1109/ICHPCA.2014.7045348","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045348","url":null,"abstract":"Training of feed-forward neural network using stochastic optimization techniques recently gained a lot of importance invarious pattern recognition and data mining applications because of its capability of escaping local minima trap. However such techniques may suffer from slow and poor convergence. This fact inspires us to work on meta-heuristic optimization technique for training the neural network. In this respect, to train the neural network, we focus on implementing the gravitational search algorithm(GSA) which is based on the Newton's law of motion principle and the interaction of masses. GSA has good ability to search for the global optimum, but it may suffer from slow searching speed in the last iterations. Our work is directed towards the smart convergence by modifying the original GSA and also guiding the algorithm to make it immune to local minima trap. Results on various benchmark datasets prove the robustness of the modified algorithm.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115434799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Timestamped Signature Scheme with Message Recovery 带消息恢复的时间戳签名方案
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045299
S. Mohanty, Pothuri Bhanu Sai Pavan Kumar, Kodavatikanti Hanok
We propose a timestamped signature scheme which can be verified universally using signer's public parameters. A trusted third party, the Time-Stamping System provides timestamp to a signature without even knowing the content of the document. The proposed scheme can withstand active attacks, such as forgery attack and chosen cipher text attack. It also provides the message recovery feature, i.e., from the time stamped signature, the message can be recovered by the receiver. Hence, the message need not be sent with the signature. The suggested scheme do not require any hash function and there by reduces the verification cost as compared to existing schemes at the expense of marginal increase in signature generation cost. Further, the scheme is more secured as its security lies in solving three computationally hard assumptions.
提出了一种可以使用签名者的公共参数进行通用验证的时间戳签名方案。作为受信任的第三方,时间戳系统在不知道文档内容的情况下为签名提供时间戳。该方案可以抵御主动攻击,如伪造攻击和选择密文攻击。它还提供了消息恢复功能,即接收方可以从带有时间戳的签名中恢复消息。因此,消息不需要与签名一起发送。建议的方案不需要任何哈希函数,与现有方案相比,以签名生成成本的边际增加为代价,从而降低了验证成本。此外,该方案更安全,因为它的安全性在于解决三个计算困难的假设。
{"title":"A Timestamped Signature Scheme with Message Recovery","authors":"S. Mohanty, Pothuri Bhanu Sai Pavan Kumar, Kodavatikanti Hanok","doi":"10.1109/ICHPCA.2014.7045299","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045299","url":null,"abstract":"We propose a timestamped signature scheme which can be verified universally using signer's public parameters. A trusted third party, the Time-Stamping System provides timestamp to a signature without even knowing the content of the document. The proposed scheme can withstand active attacks, such as forgery attack and chosen cipher text attack. It also provides the message recovery feature, i.e., from the time stamped signature, the message can be recovered by the receiver. Hence, the message need not be sent with the signature. The suggested scheme do not require any hash function and there by reduces the verification cost as compared to existing schemes at the expense of marginal increase in signature generation cost. Further, the scheme is more secured as its security lies in solving three computationally hard assumptions.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123430331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BER performance comparison of MIMO system with STBC and MRC over different fading channels 不同衰落信道下STBC和MRC MIMO系统的误码率性能比较
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045307
Keerti Tiwari, D. Saini
In the present wireless scenario, multiple-input and multiple-output (MIMO) is an emerging technique in wireless communication to achieve reliability and high throughput. Transmit diversity i.e. Alamouti space time block codes (STBC) and receiver diversity i.e. maximal ratio combining (MRC), are used to improve the link performance. In this paper, bit error rate (BER) performance is evaluated using distinct modulation schemes like BPSK, QPSK, and 16-QAM with STBC and MRC diversity techniques over Rayleigh, Rician and Nakagami-m fading channels. It is shown by simulated results that improved BER is achieved using MRC. Signal-to-noise ratio (SNR) is considered from 0 to 20 dB.
在当前的无线环境下,多输入多输出(MIMO)技术是一种新兴的无线通信技术,其目的是实现无线通信的可靠性和高吞吐量。发射分集即Alamouti空时分组码(STBC)和接收分集即最大比组合(MRC)用于提高链路性能。在本文中,使用不同的调制方案,如BPSK, QPSK和16-QAM与STBC和MRC分集技术在瑞利,专家和Nakagami-m衰落信道上评估误码率(BER)性能。仿真结果表明,采用MRC可以提高误码率。信噪比(SNR)考虑范围从0到20 dB。
{"title":"BER performance comparison of MIMO system with STBC and MRC over different fading channels","authors":"Keerti Tiwari, D. Saini","doi":"10.1109/ICHPCA.2014.7045307","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045307","url":null,"abstract":"In the present wireless scenario, multiple-input and multiple-output (MIMO) is an emerging technique in wireless communication to achieve reliability and high throughput. Transmit diversity i.e. Alamouti space time block codes (STBC) and receiver diversity i.e. maximal ratio combining (MRC), are used to improve the link performance. In this paper, bit error rate (BER) performance is evaluated using distinct modulation schemes like BPSK, QPSK, and 16-QAM with STBC and MRC diversity techniques over Rayleigh, Rician and Nakagami-m fading channels. It is shown by simulated results that improved BER is achieved using MRC. Signal-to-noise ratio (SNR) is considered from 0 to 20 dB.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121740231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
AODV routing protocol modification with dqueue(dqAODV) for VANET in city scenarios 城市场景下VANET使用dqueue(dqAODV)修改AODV路由协议
Pub Date : 2014-12-01 DOI: 10.1109/ICHPCA.2014.7045367
Soumen Saha, Utpal Roy, D. Sinha
Vehicular ad hoc network (VANET) is considered as a sub-set of mobile ad hoc network (MANET). It provides smart Transport System i.e., wireless ad-hoc communication in between vehicles and vehicle to roadside equipments. Based on this technology road network is classified into two types 1. vehicle to vehicle interaction, 2. vehicle to infrastructure interaction. The objective of VANET is to provide safe, secure and automated traffic system. For this automated traffic technique several types of routing protocols have been developed. But routing protocols of MANET are not directly applicable to VANET. In this study, we proposed a modified AODV routing protocol in the context of VANET with the help of dqueue introduction into the RREQ header in the C++ code of built-in AODV protocol in NCTUns-6.0 simulator. Recently Saha et al [1] has reported the results showing the nature of modified AODV obtained from the rudimentary version of their simulation code. It is mainly based on packed delivery throughput. It shows greater In-throughput information of packet transmission compare to original AODV. It has been observed from the study that our protocols needs less overhead and yield greater performance in compared to conventional AODV.
车载自组网(VANET)被认为是移动自组网(MANET)的子集。它提供智能交通系统,即车辆与车辆与路边设备之间的无线自组织通信。基于该技术的路网可分为两类:1.路网;2.车对车交互。车辆与基础设施的交互。VANET的目标是提供安全、可靠和自动化的交通系统。针对这种自动通信技术,已经开发了几种类型的路由协议。但是MANET的路由协议并不直接适用于VANET。在本研究中,我们在NCTUns-6.0模拟器中内置AODV协议的c++代码中,通过在RREQ头中引入队列,提出了一种VANET环境下的改进AODV路由协议。最近Saha等人[1]报道了从他们的模拟代码的初级版本获得的修改后的AODV的性质的结果。它主要是基于包装的交付吞吐量。与原始的AODV相比,它显示了更多的数据包传输的吞吐信息。从研究中可以观察到,与传统的AODV相比,我们的协议需要更少的开销并产生更高的性能。
{"title":"AODV routing protocol modification with dqueue(dqAODV) for VANET in city scenarios","authors":"Soumen Saha, Utpal Roy, D. Sinha","doi":"10.1109/ICHPCA.2014.7045367","DOIUrl":"https://doi.org/10.1109/ICHPCA.2014.7045367","url":null,"abstract":"Vehicular ad hoc network (VANET) is considered as a sub-set of mobile ad hoc network (MANET). It provides smart Transport System i.e., wireless ad-hoc communication in between vehicles and vehicle to roadside equipments. Based on this technology road network is classified into two types 1. vehicle to vehicle interaction, 2. vehicle to infrastructure interaction. The objective of VANET is to provide safe, secure and automated traffic system. For this automated traffic technique several types of routing protocols have been developed. But routing protocols of MANET are not directly applicable to VANET. In this study, we proposed a modified AODV routing protocol in the context of VANET with the help of dqueue introduction into the RREQ header in the C++ code of built-in AODV protocol in NCTUns-6.0 simulator. Recently Saha et al [1] has reported the results showing the nature of modified AODV obtained from the rudimentary version of their simulation code. It is mainly based on packed delivery throughput. It shows greater In-throughput information of packet transmission compare to original AODV. It has been observed from the study that our protocols needs less overhead and yield greater performance in compared to conventional AODV.","PeriodicalId":197528,"journal":{"name":"2014 International Conference on High Performance Computing and Applications (ICHPCA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129502530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 International Conference on High Performance Computing and Applications (ICHPCA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1