首页 > 最新文献

2015 Eighth International Conference on Contemporary Computing (IC3)最新文献

英文 中文
Investigating syntactic and semantic inconsistencies in Collaborative Software Development 研究协同软件开发中的语法和语义不一致
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346735
R. Arora, S. Goel
Since more than a few decades now, Software Configuration Management (SCM) systems have played a key role in orchestrating concurrent activities of collaborative developers. These SCM systems help in maintaining consistency of volatile codebases that are being frequently modified in order to accommodate change. Additionally, various Collaborative Software Development (CSD) tools have been developed to supplement the underlying SCMs, and provide workspace awareness information to software developers. These tools inform developers about possibilities of arising inconsistencies in project codebase due to concurrent activities by collaborative developers on shared artifacts. This paper elaborates on scenarios of collaborative activities of software developers that introduce syntactic and semantic inconsistencies in the project repositories. Furthermore, a discussion on the current state-of-art research in the area of CSD tools is presented, together with their major contributions. The paper identifies, the crucial problem of semantic inconsistencies caused due to behavioral changes on artifacts that has not been sufficiently addressed by existing CSD tools. Finally, a novel method to capture indirect conflicts (syntactic and semantic) is proposed which uses dependency graphs, with proposed additional notations.
几十年来,软件配置管理(SCM)系统在协调协作开发人员的并发活动方面发挥了关键作用。这些SCM系统有助于维护频繁修改以适应变化的易变代码库的一致性。此外,已经开发了各种协作软件开发(CSD)工具来补充底层scm,并向软件开发人员提供工作空间感知信息。这些工具告知开发人员由于协作开发人员在共享工件上的并发活动而在项目代码库中产生不一致的可能性。本文详细阐述了在项目存储库中引入语法和语义不一致的软件开发人员协作活动的场景。此外,还讨论了当前CSD工具领域的研究现状,以及它们的主要贡献。本文指出,语义不一致的关键问题是由于工件上的行为变化引起的,而现有的CSD工具还没有充分解决这个问题。最后,提出了一种新的方法来捕获间接冲突(语法和语义),该方法使用依赖图,并提出了额外的符号。
{"title":"Investigating syntactic and semantic inconsistencies in Collaborative Software Development","authors":"R. Arora, S. Goel","doi":"10.1109/IC3.2015.7346735","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346735","url":null,"abstract":"Since more than a few decades now, Software Configuration Management (SCM) systems have played a key role in orchestrating concurrent activities of collaborative developers. These SCM systems help in maintaining consistency of volatile codebases that are being frequently modified in order to accommodate change. Additionally, various Collaborative Software Development (CSD) tools have been developed to supplement the underlying SCMs, and provide workspace awareness information to software developers. These tools inform developers about possibilities of arising inconsistencies in project codebase due to concurrent activities by collaborative developers on shared artifacts. This paper elaborates on scenarios of collaborative activities of software developers that introduce syntactic and semantic inconsistencies in the project repositories. Furthermore, a discussion on the current state-of-art research in the area of CSD tools is presented, together with their major contributions. The paper identifies, the crucial problem of semantic inconsistencies caused due to behavioral changes on artifacts that has not been sufficiently addressed by existing CSD tools. Finally, a novel method to capture indirect conflicts (syntactic and semantic) is proposed which uses dependency graphs, with proposed additional notations.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132701123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Implementing security technique on generic database 通用数据库安全技术的实现
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346709
Gaurav Dubey, Vikram Khurana, Shelly Sachdeva
Database maintenance has become an important issue in today's world. Addition or alteration of any field to an existing database schema cost high to a corporation. Whenever new data types are introduced or existing types are modified in a conventional relational database system, the physical design of the database must be changed accordingly. For this reason, it is desirable that a database should be flexible and allow for modification and addition of new types of data without having to change the physical database schema. The generic model is designed to allow a wide variety of data to be accommodated in a general purpose set of data structures. This generic mechanism for data storage has been used in various information systems such as banking, defense, e-commerce and especially healthcare domain. But, addressing security on generic databases is a challenging task. To the best of our knowledge, applying security on generic database has not been addressed yet. Various cryptographic security techniques, such as hashing algorithms, public and private key algorithms, have already been applied on a database. In this paper, we are proposing an extra layer of security to the existing databases, through Negative Database technique. The advantages of the negative database approach on generic database has been demonstrated and emphasized. Correspondingly, the complexity of the proposed algorithm has been computed.
数据库维护已成为当今世界的一个重要问题。在现有数据库模式中添加或更改任何字段都会给公司带来很高的成本。每当在传统的关系数据库系统中引入新的数据类型或修改现有类型时,数据库的物理设计必须进行相应的更改。由于这个原因,数据库应该是灵活的,并且允许修改和添加新类型的数据,而不必更改物理数据库模式。通用模型被设计成允许在一组通用的数据结构中容纳各种各样的数据。这种通用的数据存储机制已被用于各种信息系统,如银行、国防、电子商务,特别是医疗保健领域。但是,处理通用数据库的安全性是一项具有挑战性的任务。据我们所知,在通用数据库上应用安全性还没有得到解决。各种加密安全技术,如散列算法、公钥和私钥算法,已经应用于数据库。在本文中,我们提出了一个额外的安全层,现有的数据库,通过负数据库技术。论证并强调了否定数据库方法相对于通用数据库的优势。相应的,计算了该算法的复杂度。
{"title":"Implementing security technique on generic database","authors":"Gaurav Dubey, Vikram Khurana, Shelly Sachdeva","doi":"10.1109/IC3.2015.7346709","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346709","url":null,"abstract":"Database maintenance has become an important issue in today's world. Addition or alteration of any field to an existing database schema cost high to a corporation. Whenever new data types are introduced or existing types are modified in a conventional relational database system, the physical design of the database must be changed accordingly. For this reason, it is desirable that a database should be flexible and allow for modification and addition of new types of data without having to change the physical database schema. The generic model is designed to allow a wide variety of data to be accommodated in a general purpose set of data structures. This generic mechanism for data storage has been used in various information systems such as banking, defense, e-commerce and especially healthcare domain. But, addressing security on generic databases is a challenging task. To the best of our knowledge, applying security on generic database has not been addressed yet. Various cryptographic security techniques, such as hashing algorithms, public and private key algorithms, have already been applied on a database. In this paper, we are proposing an extra layer of security to the existing databases, through Negative Database technique. The advantages of the negative database approach on generic database has been demonstrated and emphasized. Correspondingly, the complexity of the proposed algorithm has been computed.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"2 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113998850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Pruned feature space for metamorphic malware detection using Markov Blanket 基于马尔可夫毯的变形恶意软件检测的修剪特征空间
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346710
Jithu Raphel, P. Vinod
The proposed non-signature based system creates a meta feature space for the detection of metamorphic malware samples where three sets of features are extracted from the files: (a) branch opcodes (b) unigrams (c) bigrams. The feature space is initially pruned using Naïve Bayes method. After the rare feature elimination process, the relevant opcodes that are highly contributing towards the target class are selected, thereby forming a relevant feature set. Next phase is to remove the redundant features that are present in the relevant feature set using the Markov Blanket approach. Prominent features extracted are used for generating the training models and unseen instances are tested using the optimal models. Proposed system is capable of detecting the NGVCK viruses and MWORM with an accuracy of 100% using the meta opcode space of 25 features. A promising F1-score of 1.0 was gained and the results demonstrate the efficiency of the proposed metamorphic malware detector.
提出的基于非签名的系统为检测变形恶意软件样本创建了一个元特征空间,其中从文件中提取了三组特征:(a)分支操作码(b)元图(c)元图。使用Naïve贝叶斯方法对特征空间进行初始剪枝。经过稀有特征剔除过程,选取对目标类贡献较大的相关操作码,形成相关特征集。下一阶段是使用马尔可夫毯方法去除相关特征集中存在的冗余特征。提取的显著特征用于生成训练模型,未见实例使用最优模型进行测试。该系统能够利用25个特征的元操作码空间检测NGVCK病毒和MWORM,准确率达到100%。结果表明,所提出的变形恶意软件检测器的检测效率达到了1.0。
{"title":"Pruned feature space for metamorphic malware detection using Markov Blanket","authors":"Jithu Raphel, P. Vinod","doi":"10.1109/IC3.2015.7346710","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346710","url":null,"abstract":"The proposed non-signature based system creates a meta feature space for the detection of metamorphic malware samples where three sets of features are extracted from the files: (a) branch opcodes (b) unigrams (c) bigrams. The feature space is initially pruned using Naïve Bayes method. After the rare feature elimination process, the relevant opcodes that are highly contributing towards the target class are selected, thereby forming a relevant feature set. Next phase is to remove the redundant features that are present in the relevant feature set using the Markov Blanket approach. Prominent features extracted are used for generating the training models and unseen instances are tested using the optimal models. Proposed system is capable of detecting the NGVCK viruses and MWORM with an accuracy of 100% using the meta opcode space of 25 features. A promising F1-score of 1.0 was gained and the results demonstrate the efficiency of the proposed metamorphic malware detector.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114008711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A workload balanced approach for resource scheduling in cloud computing 云计算中资源调度的工作负载平衡方法
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346649
R. Kapur
The era of cloud based multimedia applications has lead to a huge increase in the no. of requests on cloud. The increased no. of requests on cloud leads to an increased workload, making workload balancing an important QoS Parameter. Workload Balancing also leads to a judicious use of resources like electricity etc. and thus promotes the concept of Green IT. The paper presents a new Load Balanced Resource Scheduling Algorithm (LBRS) which performs the resource scheduling in a balanced banner. The simulations and results demonstrated in the paper prove that the LBRS algorithm outperforms an existing approach.
基于云的多媒体应用的时代已经导致了数量的巨大增长。云上的请求。增加的no。云上请求的增加导致工作负载的增加,使工作负载平衡成为重要的QoS参数。工作负载平衡还可以明智地使用电力等资源,从而促进绿色IT的概念。提出了一种新的负载均衡资源调度算法(LBRS),该算法在均衡的旗帜下进行资源调度。仿真结果表明,LBRS算法优于现有的一种方法。
{"title":"A workload balanced approach for resource scheduling in cloud computing","authors":"R. Kapur","doi":"10.1109/IC3.2015.7346649","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346649","url":null,"abstract":"The era of cloud based multimedia applications has lead to a huge increase in the no. of requests on cloud. The increased no. of requests on cloud leads to an increased workload, making workload balancing an important QoS Parameter. Workload Balancing also leads to a judicious use of resources like electricity etc. and thus promotes the concept of Green IT. The paper presents a new Load Balanced Resource Scheduling Algorithm (LBRS) which performs the resource scheduling in a balanced banner. The simulations and results demonstrated in the paper prove that the LBRS algorithm outperforms an existing approach.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"602 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116338157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Detection of design pattern using Graph Isomorphism and Normalized Cross Correlation 基于图同构和归一化互相关的设计模式检测
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346680
P. Pradhan, A. Dwivedi, S. K. Rath
Present day software engineering concept gives emphasis on the use of design patterns for developing software which are recurring in nature. Detection of design pattern is one of the emerging field of Software Reverse Engineering. In this work, an attempt has been made to present an approach for design pattern detection with the help of Graph Isomorphism and Normalized Cross Correlation techniques. In this study, system and design pattern are presented in the form of graphs. The Graph Isomorphism technique finds the pattern subgraph in the system graph and Normalized Cross Correlation provides a way to formulate the percentage existence of the design pattern in the system. An Eclipse Plug-in i.e., ObjectAid is used to extract Unified Modeling Language (UML) class diagrams as well as eXtensible Markup Language (XML) files from the software system and design patterns. An algorithm is proposed to identify relevant information from the XML files. Then Graph Isomorphism and Normalized Cross Correlation techniques are used to find the pattern subgraph and its percentage existence in the system. This approach has been applied on four open source software tools for the evaluation of five design patterns, such as Composite, Facade, Flyweight, State, and Template Method.
当前的软件工程概念强调使用设计模式来开发本质上重复出现的软件。设计模式检测是软件逆向工程的新兴领域之一。在这项工作中,尝试提出了一种利用图同构和归一化互相关技术进行设计模式检测的方法。在本研究中,系统和设计模式以图形的形式呈现。图同构技术在系统图中找到模式子图,归一化相互关系提供了一种表述设计模式在系统中存在的百分比的方法。Eclipse插件(例如ObjectAid)用于从软件系统和设计模式中提取统一建模语言(UML)类图以及可扩展标记语言(XML)文件。提出了一种从XML文件中识别相关信息的算法。然后利用图同构和归一化互相关技术求出模式子图及其在系统中的存在率。该方法已应用于四个开源软件工具,用于评估五种设计模式,例如Composite、Facade、Flyweight、State和Template Method。
{"title":"Detection of design pattern using Graph Isomorphism and Normalized Cross Correlation","authors":"P. Pradhan, A. Dwivedi, S. K. Rath","doi":"10.1109/IC3.2015.7346680","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346680","url":null,"abstract":"Present day software engineering concept gives emphasis on the use of design patterns for developing software which are recurring in nature. Detection of design pattern is one of the emerging field of Software Reverse Engineering. In this work, an attempt has been made to present an approach for design pattern detection with the help of Graph Isomorphism and Normalized Cross Correlation techniques. In this study, system and design pattern are presented in the form of graphs. The Graph Isomorphism technique finds the pattern subgraph in the system graph and Normalized Cross Correlation provides a way to formulate the percentage existence of the design pattern in the system. An Eclipse Plug-in i.e., ObjectAid is used to extract Unified Modeling Language (UML) class diagrams as well as eXtensible Markup Language (XML) files from the software system and design patterns. An algorithm is proposed to identify relevant information from the XML files. Then Graph Isomorphism and Normalized Cross Correlation techniques are used to find the pattern subgraph and its percentage existence in the system. This approach has been applied on four open source software tools for the evaluation of five design patterns, such as Composite, Facade, Flyweight, State, and Template Method.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128337200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Modeling of DG-Tunnel FET for low power VLSI circuit design 低功耗VLSI电路设计中dg隧道场效应管的建模
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346724
Sunil Kumar, B. Raj
This paper presents the analytical potential modeling of Double Gate (DG) Tunnel Field Effect Transistor (TFET) at 50 nm channel length. In this model approach the channel potential is sum of a long channel potential and a short channel perturbation along with the whole structure rather than just the Si/SiO2 interface or the channel centre. For the validation of our analytical modeling approach we compared our result with reported data which verify our proposed design.
本文提出了双栅(DG)隧道场效应晶体管(ttfet)在50 nm通道长度下的解析电势模型。在该模型中,通道电位是整个结构的长通道电位和短通道摄动的总和,而不仅仅是Si/SiO2界面或通道中心。为了验证我们的分析建模方法,我们将结果与验证我们提出的设计的报告数据进行了比较。
{"title":"Modeling of DG-Tunnel FET for low power VLSI circuit design","authors":"Sunil Kumar, B. Raj","doi":"10.1109/IC3.2015.7346724","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346724","url":null,"abstract":"This paper presents the analytical potential modeling of Double Gate (DG) Tunnel Field Effect Transistor (TFET) at 50 nm channel length. In this model approach the channel potential is sum of a long channel potential and a short channel perturbation along with the whole structure rather than just the Si/SiO2 interface or the channel centre. For the validation of our analytical modeling approach we compared our result with reported data which verify our proposed design.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133737484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Highly advanced cloudlet scheduling algorithm based on Particle Swarm Optimization 基于粒子群优化的先进云调度算法
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346663
D. Saxena, Shilpi Saxena
Cloud computing has become buzzword today. Here, dynamically scalable services and virtualized resources are provided over the internet. Cloud provides following types of services: Software-as-a-Service(SaaS), Platform-as-a-Service(PaaS) and Infrastructure-as-a-service(IaaS). This paper has prime focus on IaaS clouds which offer virtual pool of infinite, heterogeneous resources to users, that can be access on demand. The very objective of this paper is to dynamically optimize task scheduling at system level as well as user level. This paper relates advanced heuristic optimization technique i.e. Particle Swarm Optimization (PSO) which performs better computational over other evolutionary algorithm and optimization technique. In proposed algorithm, group of tasks are represented as particles, where each particle tries to reach its best position in the swarm (collection of all groups of task available for scheduling). Direction and magnitude of velocity can be performed in either of two ways: deadline based or cost based velocity updation, which altogether contributes the particle to reach its local maxima, finally reach its global maxima. This means all the available tasks are efficiently scheduled to the very best of its optimization. We recompile the cloudsim and simulate the proposed algorithm and results of this algorithm are compared with sequential task scheduling. The experimental results indicates that proposed algorithm has higher accuracy in terms of least execution time and at task execution at lower cost that considers heterogeneous resources and elasticity of IaaS clouds that can be dynamically acquired on pay-per-use basis. This algorithm is not only beneficial to user and service provider, but also provides better efficiency i.e. benefit at system level.
如今,云计算已经成为一个流行词。在这里,通过internet提供动态可伸缩的服务和虚拟化资源。云提供以下类型的服务:软件即服务(SaaS)、平台即服务(PaaS)和基础设施即服务(IaaS)。本文主要关注IaaS云,它为用户提供无限的虚拟池,异构资源,可以按需访问。本文的主要目标是在系统级和用户级对任务调度进行动态优化。本文介绍了一种先进的启发式优化技术,即粒子群优化(PSO),它比其他进化算法和优化技术具有更好的计算性能。在该算法中,任务组被表示为粒子,其中每个粒子试图到达其在群(所有可调度任务组的集合)中的最佳位置。速度的方向和大小可以通过两种方式进行:基于截止日期或基于成本的速度更新,这两种方式都有助于粒子达到其局部最大值,最终达到其全局最大值。这意味着所有可用的任务都被有效地调度到最佳优化状态。我们重新编译了cloudsim并对该算法进行了仿真,并将该算法的结果与顺序任务调度进行了比较。实验结果表明,该算法考虑了IaaS云的异构资源和可按使用付费动态获取的弹性,在最短的执行时间和较低的任务执行成本方面具有较高的准确性。该算法不仅对用户和服务提供商有利,而且在系统层面提供了更高的效率,即效益。
{"title":"Highly advanced cloudlet scheduling algorithm based on Particle Swarm Optimization","authors":"D. Saxena, Shilpi Saxena","doi":"10.1109/IC3.2015.7346663","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346663","url":null,"abstract":"Cloud computing has become buzzword today. Here, dynamically scalable services and virtualized resources are provided over the internet. Cloud provides following types of services: Software-as-a-Service(SaaS), Platform-as-a-Service(PaaS) and Infrastructure-as-a-service(IaaS). This paper has prime focus on IaaS clouds which offer virtual pool of infinite, heterogeneous resources to users, that can be access on demand. The very objective of this paper is to dynamically optimize task scheduling at system level as well as user level. This paper relates advanced heuristic optimization technique i.e. Particle Swarm Optimization (PSO) which performs better computational over other evolutionary algorithm and optimization technique. In proposed algorithm, group of tasks are represented as particles, where each particle tries to reach its best position in the swarm (collection of all groups of task available for scheduling). Direction and magnitude of velocity can be performed in either of two ways: deadline based or cost based velocity updation, which altogether contributes the particle to reach its local maxima, finally reach its global maxima. This means all the available tasks are efficiently scheduled to the very best of its optimization. We recompile the cloudsim and simulate the proposed algorithm and results of this algorithm are compared with sequential task scheduling. The experimental results indicates that proposed algorithm has higher accuracy in terms of least execution time and at task execution at lower cost that considers heterogeneous resources and elasticity of IaaS clouds that can be dynamically acquired on pay-per-use basis. This algorithm is not only beneficial to user and service provider, but also provides better efficiency i.e. benefit at system level.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133831494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A GPU based implementation of Needleman-Wunsch algorithm using skewing transformation 基于GPU的利用倾斜变换实现Needleman-Wunsch算法
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346733
Anuj Chaudhary, Deepkumar Kagathara, Vibha Patel
We present a new parallel approach of Needleman-Wunsch algorithm for global sequence alignment. This approach uses skewing transformation for traversal and calculation of the dynamic programming matrix. We compare the execution time of sequential CPU based implementation with two parallel GPU based implementations: Single-kernel invocation with lock-free block synchronization and multi-kernel invocation at block-synchronization points. Both the GPU based implementations gave upto 6 times performance improvement over the sequential CPU based implementation.
提出了一种新的全局序列比对的并行Needleman-Wunsch算法。该方法利用倾斜变换对动态规划矩阵进行遍历和计算。我们比较了基于顺序CPU的实现与两种基于并行GPU的实现的执行时间:无锁块同步的单内核调用和块同步点的多内核调用。两种基于GPU的实现都比基于顺序CPU的实现提供了高达6倍的性能改进。
{"title":"A GPU based implementation of Needleman-Wunsch algorithm using skewing transformation","authors":"Anuj Chaudhary, Deepkumar Kagathara, Vibha Patel","doi":"10.1109/IC3.2015.7346733","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346733","url":null,"abstract":"We present a new parallel approach of Needleman-Wunsch algorithm for global sequence alignment. This approach uses skewing transformation for traversal and calculation of the dynamic programming matrix. We compare the execution time of sequential CPU based implementation with two parallel GPU based implementations: Single-kernel invocation with lock-free block synchronization and multi-kernel invocation at block-synchronization points. Both the GPU based implementations gave upto 6 times performance improvement over the sequential CPU based implementation.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129363450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Geometric shape drawing using a 3 link planar manipulator 利用三连杆平面机械手绘制几何图形
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346715
Anil Kumar, R. Kala
Using manipulators to draw artistic figures is a benchmark problem in robotics. In this paper we describe a 3-link planar manipulator which draws artistic shapes or geometric shapes on a canvas. We first take a snapshot of the shape to draw from the camera and process it for finding the outer boundary or edges. The edges are mapped onto the drawing canvas. The edges are converted from Cartesian coordinate space to the configuration space of the manipulator. The joint trajectories so generated are passed to the controller as a trajectory input, which draws the shape using the end-effector or a marker in our case. Our manipulator is able to draw many shapes with high precision and speed.
利用机械手绘制艺术图形是机器人技术中的一个基准问题。本文描述了一种在画布上绘制艺术形状或几何形状的三连杆平面机械手。我们首先从相机中提取形状的快照,并对其进行处理以找到外部边界或边缘。边缘被映射到绘图画布上。将这些边从笛卡尔坐标空间转换为机械臂的位形空间。生成的关节轨迹作为轨迹输入传递给控制器,控制器使用末端执行器或在我们的例子中使用标记来绘制形状。我们的机械手能够绘制许多形状,精度高,速度快。
{"title":"Geometric shape drawing using a 3 link planar manipulator","authors":"Anil Kumar, R. Kala","doi":"10.1109/IC3.2015.7346715","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346715","url":null,"abstract":"Using manipulators to draw artistic figures is a benchmark problem in robotics. In this paper we describe a 3-link planar manipulator which draws artistic shapes or geometric shapes on a canvas. We first take a snapshot of the shape to draw from the camera and process it for finding the outer boundary or edges. The edges are mapped onto the drawing canvas. The edges are converted from Cartesian coordinate space to the configuration space of the manipulator. The joint trajectories so generated are passed to the controller as a trajectory input, which draws the shape using the end-effector or a marker in our case. Our manipulator is able to draw many shapes with high precision and speed.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116090369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis and algebraic construction of S-Box for AES algorithm using irreducible polynomials 基于不可约多项式的AES算法S-Box的分析与代数构造
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346738
Bhoopal Rao Gangadari, S. Ahamed
Substitution Boxes play a vital role in the Rijndael algorithm of modern block ciphers. The security and efficiency of these ciphers mainly depend upon the algebraic construction of their Substitution Boxes. In this paper, the algebraic construction of the Substitution Boxes for the AES algorithm is analyzed with different irreducible polynomials. This paper emphasizes on the study of the ways of constructing the Substitution Boxes and the other important feature of a Substitution Box is how secure it is cryptographically. The cryptographic properties namely correlation immunity bias, strict avalanche criteria, non-linearity and entropy are used to evaluate the level of security for Substitution Boxes. The results show that the other irreducible polynomial equation offer better level of security compared to that of standard polynomial equation used in Advanced Encryption Standard algorithm. Moreover, the Substitution Box used in AES can be constructed with different irreducible polynomial equations.
替换盒在现代分组密码的Rijndael算法中起着至关重要的作用。这些密码的安全性和有效性主要取决于其代换盒的代数构造。本文用不同的不可约多项式分析了AES算法的代换盒的代数构造。本文重点研究了替换盒的构造方法,替换盒的另一个重要特征是它的加密安全性。利用相关免疫偏置、严格雪崩准则、非线性和熵等密码学特性来评价替代盒的安全等级。结果表明,与高级加密标准算法中使用的标准多项式方程相比,其他不可约多项式方程提供了更好的安全性。此外,AES中使用的替换盒可以由不同的不可约多项式方程构成。
{"title":"Analysis and algebraic construction of S-Box for AES algorithm using irreducible polynomials","authors":"Bhoopal Rao Gangadari, S. Ahamed","doi":"10.1109/IC3.2015.7346738","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346738","url":null,"abstract":"Substitution Boxes play a vital role in the Rijndael algorithm of modern block ciphers. The security and efficiency of these ciphers mainly depend upon the algebraic construction of their Substitution Boxes. In this paper, the algebraic construction of the Substitution Boxes for the AES algorithm is analyzed with different irreducible polynomials. This paper emphasizes on the study of the ways of constructing the Substitution Boxes and the other important feature of a Substitution Box is how secure it is cryptographically. The cryptographic properties namely correlation immunity bias, strict avalanche criteria, non-linearity and entropy are used to evaluate the level of security for Substitution Boxes. The results show that the other irreducible polynomial equation offer better level of security compared to that of standard polynomial equation used in Advanced Encryption Standard algorithm. Moreover, the Substitution Box used in AES can be constructed with different irreducible polynomial equations.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122166050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2015 Eighth International Conference on Contemporary Computing (IC3)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1