Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753010
M. Jalasri, Dr. L. Lakshmanan
Internet of Things (IoT) and Fog Computing (FC) are rapid development in the field of wireless network. Features such as decentralization, low latency, and location awareness are not supported by IoT which is significant for some IoT applications, including smart shopping cart, smart meter, and smart home. These features are supported by the amalgamation of IoT and FC to extend services such as storage, computing, and networking resources to the network edge. This paper presents a survey of IoT and FC with security threats and also the benefits of their combination. Finally, the security challenges of IoT and FC have studied.
物联网(Internet of Things, IoT)和雾计算(Fog Computing, FC)是目前无线网络领域发展最快的技术。物联网不支持去中心化、低延迟和位置感知等功能,这对一些物联网应用很重要,包括智能购物车、智能电表和智能家居。通过物联网与FC的融合,可以将存储、计算、网络资源等业务扩展到网络边缘。本文介绍了具有安全威胁的物联网和FC的调查以及它们组合的好处。最后,研究了物联网和FC的安全挑战。
{"title":"A Survey: Integration of IoT and Fog Computing","authors":"M. Jalasri, Dr. L. Lakshmanan","doi":"10.1109/ICGCIOT.2018.8753010","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753010","url":null,"abstract":"Internet of Things (IoT) and Fog Computing (FC) are rapid development in the field of wireless network. Features such as decentralization, low latency, and location awareness are not supported by IoT which is significant for some IoT applications, including smart shopping cart, smart meter, and smart home. These features are supported by the amalgamation of IoT and FC to extend services such as storage, computing, and networking resources to the network edge. This paper presents a survey of IoT and FC with security threats and also the benefits of their combination. Finally, the security challenges of IoT and FC have studied.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133685585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753034
D. K. Chaudhary, Sandeep Srivastava, T. Choudhury
Rapid changes in the technology and the availability of the sources have resulted in large amount of useful information to be shared from one person to the other over the internet in some seconds. As the information is quiet sensitive and important it is must be kept secured and the overall privacy should be maintained. There are number of ways and techniques that could be applied on and hence worth data could be kept secured [2]. The only disadvantage can be maintaining this privacy is quite expensive. A much easier way can be using of Steganography technique to hide this useful information inside any other source and then transferring it upon the internet. The other source can be text, audio, or even images [9]. In this paper we have focused upon the use of images for the steganography technique.
{"title":"Steganography for Confidential Communication and Secret Data storage","authors":"D. K. Chaudhary, Sandeep Srivastava, T. Choudhury","doi":"10.1109/ICGCIOT.2018.8753034","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753034","url":null,"abstract":"Rapid changes in the technology and the availability of the sources have resulted in large amount of useful information to be shared from one person to the other over the internet in some seconds. As the information is quiet sensitive and important it is must be kept secured and the overall privacy should be maintained. There are number of ways and techniques that could be applied on and hence worth data could be kept secured [2]. The only disadvantage can be maintaining this privacy is quite expensive. A much easier way can be using of Steganography technique to hide this useful information inside any other source and then transferring it upon the internet. The other source can be text, audio, or even images [9]. In this paper we have focused upon the use of images for the steganography technique.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"15 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125829522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753052
R. Kodali, S. Sahu
In the concept of smart grid, the smart meter is one of the most important components. Controlling the consumption of electric power is a main aspect of smart grid technology. With the implementation of smart meters, service providers and consumers will get timely updates of the energy consumption, and this will help both the service provider and consumer control their energy consumption. This will also help in reducing irregularities during meter reading and bill generation. Consumers will have an idea of their upcoming bills as they can see their consumption details any time. It will also eliminate the need for a person to physically collect meter readings from home to home as all the readings will be available automatically on the website. In our proposed model, sensors are connected to electricity meter and to the ESP32 microcontroller. ESP32 publishes this data hourly or more frequently. This data is then subscribed by Raspberry Pi which acts as an MQTT broker here. All these consumption details along with billing details then can be seen on a website by the service provider as well as the consumer. An alert email regarding energy consumption is also sent to the consumer whenever needed.
{"title":"MQTT Based Smart Metering","authors":"R. Kodali, S. Sahu","doi":"10.1109/ICGCIOT.2018.8753052","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753052","url":null,"abstract":"In the concept of smart grid, the smart meter is one of the most important components. Controlling the consumption of electric power is a main aspect of smart grid technology. With the implementation of smart meters, service providers and consumers will get timely updates of the energy consumption, and this will help both the service provider and consumer control their energy consumption. This will also help in reducing irregularities during meter reading and bill generation. Consumers will have an idea of their upcoming bills as they can see their consumption details any time. It will also eliminate the need for a person to physically collect meter readings from home to home as all the readings will be available automatically on the website. In our proposed model, sensors are connected to electricity meter and to the ESP32 microcontroller. ESP32 publishes this data hourly or more frequently. This data is then subscribed by Raspberry Pi which acts as an MQTT broker here. All these consumption details along with billing details then can be seen on a website by the service provider as well as the consumer. An alert email regarding energy consumption is also sent to the consumer whenever needed.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125879943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753046
Thasshwin Mathanlal, J. Martín‐Torres, A. Bhardwaj, M. Z. Mier
We describe the development of a robust, self-sustainable, versatile environmental monitoring station, the S3ME2, with a multitude of sensors capable of operating in extreme environments (from cold arid sub-arctic regions to hot deserts and high-altitude mountain terrains), providing realtime quality data of critical climate and geophysical parameters for a wide field of research such as pressure, surface and subsurface temperature and humidity, magnetic field and seismic activity. The dedicated communication modem utilizes IoT technology and can deliver this data from remote regions. The S3ME2 has been designed as a low-cost instrument to facilitate the production of multiple units. During the pilot phase, it has demonstrated continuous operability for up to 6 months, including survival during extremely cold, snowy, and low insolation, and low wind periods in the Sub-Arctic region. With its robust design, S3ME2 exploits the use of renewable sources of energy such as solar and wind power to power the system. The S3ME2 has also been designed from a modular point of view with commercial off the shelf components (COTS) and open source hardware, considering long term operability of the station. The sensor modules can be easily added, replaced, or upgraded such that a stable functioning of the system is guaranteed.
{"title":"Self-Sustainable Monitoring Station for Extreme Environments (S3ME2): Design and validation","authors":"Thasshwin Mathanlal, J. Martín‐Torres, A. Bhardwaj, M. Z. Mier","doi":"10.1109/ICGCIOT.2018.8753046","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753046","url":null,"abstract":"We describe the development of a robust, self-sustainable, versatile environmental monitoring station, the S3ME2, with a multitude of sensors capable of operating in extreme environments (from cold arid sub-arctic regions to hot deserts and high-altitude mountain terrains), providing realtime quality data of critical climate and geophysical parameters for a wide field of research such as pressure, surface and subsurface temperature and humidity, magnetic field and seismic activity. The dedicated communication modem utilizes IoT technology and can deliver this data from remote regions. The S3ME2 has been designed as a low-cost instrument to facilitate the production of multiple units. During the pilot phase, it has demonstrated continuous operability for up to 6 months, including survival during extremely cold, snowy, and low insolation, and low wind periods in the Sub-Arctic region. With its robust design, S3ME2 exploits the use of renewable sources of energy such as solar and wind power to power the system. The S3ME2 has also been designed from a modular point of view with commercial off the shelf components (COTS) and open source hardware, considering long term operability of the station. The sensor modules can be easily added, replaced, or upgraded such that a stable functioning of the system is guaranteed.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123512179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753108
K. P. Kumar
Cloud computing is a virtual pool of computing resources such as software, platform, infrastructures, applications, storage and information provides to users through the internet. The computing capacity of the virtualized cloud frame is divided into several VMs with the help of virtualization methodology. In the cloud environment, load balancing is the challenging task because distribute the task equally among the VMs is a complex one. In this paper, hybrid Grey-Wolf-Optimization (GWO) algorithm and Gravitational-Emulation-Local-Search (GELS) algorithm is utilized for cloud load balancing. A GWO based optimization method is used for ranking the host resources based on their efficiency and utilization. The GELS algorithm is used for clustering the tasks based on their VM ability and cost. The proposed GWO-GELS method significantly decrease the response time and cost. An experimental analysis is demonstrated that the makespan performance of proposed method achieved 10msec lesser than existing methods. The evaluated result validated that GWO-GELS performed effectively by means of energy consumption minimization, reduction of cost, makespan and avoid Degree of Imbalance (DI). The GWO-GELS method is implemented in CloudSim.
{"title":"Gravitational Emulation-Grey Wolf Optimization technique for Load balancing in Cloud Computing","authors":"K. P. Kumar","doi":"10.1109/ICGCIOT.2018.8753108","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753108","url":null,"abstract":"Cloud computing is a virtual pool of computing resources such as software, platform, infrastructures, applications, storage and information provides to users through the internet. The computing capacity of the virtualized cloud frame is divided into several VMs with the help of virtualization methodology. In the cloud environment, load balancing is the challenging task because distribute the task equally among the VMs is a complex one. In this paper, hybrid Grey-Wolf-Optimization (GWO) algorithm and Gravitational-Emulation-Local-Search (GELS) algorithm is utilized for cloud load balancing. A GWO based optimization method is used for ranking the host resources based on their efficiency and utilization. The GELS algorithm is used for clustering the tasks based on their VM ability and cost. The proposed GWO-GELS method significantly decrease the response time and cost. An experimental analysis is demonstrated that the makespan performance of proposed method achieved 10msec lesser than existing methods. The evaluated result validated that GWO-GELS performed effectively by means of energy consumption minimization, reduction of cost, makespan and avoid Degree of Imbalance (DI). The GWO-GELS method is implemented in CloudSim.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121861102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8752994
Pritom Das R, Rakshitha G, I. Juvanna, D. Venkat Subramanian
Developing countries have limited access to low cost retinal images which hinders the progress in preventing needless blindness. Portable advancements are opening new doors to human services. Handheld ophthalmoscopes and smartphone fundus photography solutions are already providing promising solutions to low cost and portability. In this paper, we have discussed a new way to retinal fundus photography based on a Head Mounted Device(HMD) concept. HMDs will allow to obtain automated retinal images from patients. These images acts as biomarkers and helps in detection of chronic and long term diseases. Deep learning techniques are utilised to automate disease detection and patients are given corrective suggestions through their smartphones. We are translating technology into clinical care in the dawn of smart healthcare.
{"title":"Retinal based Automated Healthcare Framework via Deep Learning","authors":"Pritom Das R, Rakshitha G, I. Juvanna, D. Venkat Subramanian","doi":"10.1109/ICGCIOT.2018.8752994","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8752994","url":null,"abstract":"Developing countries have limited access to low cost retinal images which hinders the progress in preventing needless blindness. Portable advancements are opening new doors to human services. Handheld ophthalmoscopes and smartphone fundus photography solutions are already providing promising solutions to low cost and portability. In this paper, we have discussed a new way to retinal fundus photography based on a Head Mounted Device(HMD) concept. HMDs will allow to obtain automated retinal images from patients. These images acts as biomarkers and helps in detection of chronic and long term diseases. Deep learning techniques are utilised to automate disease detection and patients are given corrective suggestions through their smartphones. We are translating technology into clinical care in the dawn of smart healthcare.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125134093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753000
H. Singh
Consuming news via social media is an integral part of our lives. Various news agencies use social media as a medium to spread their content. Popularity prediction of news before publication is a challenging task because it depends on a very large user base. Popularity of news on social platform can be represented using number of likes, shares. We have used number of likes as a popularity measure. In this paper, we first find out features on social platform which can affect popularity of an article. These features and content metadata are fed to various machine learning models. These models are used to predict whether an article is going to be popular or not. Tree based models achieve best results for prediction. These models also show that hashtags, usermentions and other social features are important factors which affect popularity of news.
{"title":"Predicting the Popularity of Online News using Social Features","authors":"H. Singh","doi":"10.1109/ICGCIOT.2018.8753000","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753000","url":null,"abstract":"Consuming news via social media is an integral part of our lives. Various news agencies use social media as a medium to spread their content. Popularity prediction of news before publication is a challenging task because it depends on a very large user base. Popularity of news on social platform can be represented using number of likes, shares. We have used number of likes as a popularity measure. In this paper, we first find out features on social platform which can affect popularity of an article. These features and content metadata are fed to various machine learning models. These models are used to predict whether an article is going to be popular or not. Tree based models achieve best results for prediction. These models also show that hashtags, usermentions and other social features are important factors which affect popularity of news.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127082365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753099
G. Raj, Siddhant Sharma, T. Choudhury
The advent of internet has led to the formation of a totally digitized environment, where each and everything is constantly in connection & can be easily accessed from anywhere. Traditional IP networks are difficult to understand and manage. Configuring the networks as per the already defined policies & making changes to it to react to issues faced has become difficult. The vertical integration of current networks adds to the difficulties. Software-Defined Network (SDN) is a new paradigm that promises to change and solve the problem. SDN breaks network into traceable pieces, thus making it less demanding to make & present new changes in networking, making network management & network evolution simpler. In SDN, load balancing is a brilliant technology as it can save power & improve the utilization of resources. This research focuses on analyzing the load and data in SDN for various distributed network topologies. Various network emulator and packet tracker tools have been used in the paper for generating statics.
{"title":"Load Analysis In SDN For Distributed Topologies","authors":"G. Raj, Siddhant Sharma, T. Choudhury","doi":"10.1109/ICGCIOT.2018.8753099","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753099","url":null,"abstract":"The advent of internet has led to the formation of a totally digitized environment, where each and everything is constantly in connection & can be easily accessed from anywhere. Traditional IP networks are difficult to understand and manage. Configuring the networks as per the already defined policies & making changes to it to react to issues faced has become difficult. The vertical integration of current networks adds to the difficulties. Software-Defined Network (SDN) is a new paradigm that promises to change and solve the problem. SDN breaks network into traceable pieces, thus making it less demanding to make & present new changes in networking, making network management & network evolution simpler. In SDN, load balancing is a brilliant technology as it can save power & improve the utilization of resources. This research focuses on analyzing the load and data in SDN for various distributed network topologies. Various network emulator and packet tracker tools have been used in the paper for generating statics.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131621349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753069
Prahlad, N. Sanil, Pasumarthy Ankith Naga Venkat, Mohammed Riyaz Ahmed
The proliferation of IoT can be owed to the capability of a device to identify itself wirelessly using electromagnetic waves. The ease of tracking and monitoring, data capturing, data collection with object identification can be done through the RFID system. In the RFID system, passive linearly polarised tag antenna will sense the RF power from the reader and advertise its unique code which has to be sensed by the circularly polarised active reader antenna. Design of antenna, especially for RFID systems is an art in itself. In this work, a U shaped slotted microstrip patch antenna for RFID reader intended for microwave applications is proposed. The proposed antenna is designed by using the substrate Rogers R04350 which provides a return loss of 190MHz (2.39GHz- 2.58GHz) with the gain of 4.32dB, VSWR of 0.6157 and directivity of 4.67dB. The proposed antenna is designed and simulated using Ansoft HFSS.
{"title":"Design of an U shaped slotted patch antenna for RFID Vehicle Identification","authors":"Prahlad, N. Sanil, Pasumarthy Ankith Naga Venkat, Mohammed Riyaz Ahmed","doi":"10.1109/ICGCIOT.2018.8753069","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753069","url":null,"abstract":"The proliferation of IoT can be owed to the capability of a device to identify itself wirelessly using electromagnetic waves. The ease of tracking and monitoring, data capturing, data collection with object identification can be done through the RFID system. In the RFID system, passive linearly polarised tag antenna will sense the RF power from the reader and advertise its unique code which has to be sensed by the circularly polarised active reader antenna. Design of antenna, especially for RFID systems is an art in itself. In this work, a U shaped slotted microstrip patch antenna for RFID reader intended for microwave applications is proposed. The proposed antenna is designed by using the substrate Rogers R04350 which provides a return loss of 190MHz (2.39GHz- 2.58GHz) with the gain of 4.32dB, VSWR of 0.6157 and directivity of 4.67dB. The proposed antenna is designed and simulated using Ansoft HFSS.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131261644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICGCIOT.2018.8753061
Pratyashi Satapathy, Richismita Rout
List accessing problem is the problem of efficiently reorganizing and accessing the element of the list for obtaining optimal cost. So in list accessing problem a sorted list and an unsorted request sequence is given as input and the mainobjective is to reduce access cost of the elements. In this paper, characterizing the request sequences based on locality of references and look ahead property. Also characterization is done based on size of list, size of request sequences, ordering of elements, frequencies occurrence of elements and sequence of elements of the list. Based on our characterization a new cost model is developed for different inputs by using Move-To-Front list accessing algorithm. Till now Move-To-Front algorithm has been proved as best performing algorithm where the elements are moving towards front of list after accessing.
{"title":"Characterization and Performance Evaluation of Request Sequence for Move-To-Front Algorithm","authors":"Pratyashi Satapathy, Richismita Rout","doi":"10.1109/ICGCIOT.2018.8753061","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2018.8753061","url":null,"abstract":"List accessing problem is the problem of efficiently reorganizing and accessing the element of the list for obtaining optimal cost. So in list accessing problem a sorted list and an unsorted request sequence is given as input and the mainobjective is to reduce access cost of the elements. In this paper, characterizing the request sequences based on locality of references and look ahead property. Also characterization is done based on size of list, size of request sequences, ordering of elements, frequencies occurrence of elements and sequence of elements of the list. Based on our characterization a new cost model is developed for different inputs by using Move-To-Front list accessing algorithm. Till now Move-To-Front algorithm has been proved as best performing algorithm where the elements are moving towards front of list after accessing.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126936331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}