首页 > 最新文献

2012 Fourth International Conference on Advanced Computing (ICoAC)最新文献

英文 中文
An artificial intelligent controller for a Three Phase Inverter based Solar PV system using boost converter 基于升压变换器的三相逆变太阳能光伏系统的人工智能控制器
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416840
V. Subramanian, S. Murugesan
In this paper, the effectiveness of the soft switching control strategies for the Three Phase Inverter based Solar Energy Conversion system with boost converter was explained. The solar irradiation and temperature are mainly depends on the output power produced from the PV conversion process. The Boost Converter is used to obtain the maximum power and is controlled by the Fuzzy logic controller. The Sinusoidal Pulse Width Modulation (SPWM) produces the soft switching control strategy for the proposed topology. The proposed system involves a Stand-Alone Photovoltaic System, Boost converters, Fuzzy Logic Controller, Three Phase inverter and a load. The regulated voltage and current from the boost converter is fed to the inverter circuit which is connected to the load with a continuous maximum power. The fuzzy logic controller is used to improve the boost converter efficiency and the sinusoidal PWM is used to give pulses for the inverter circuit. The inverter output current for driving a load should be noted such that it does not carry the harmonic content. However since disturbed sine wave is unavoidable under various factors it is necessary to reduce the harmonic level to obtain a highly effective output. The results are generated in MATLABSIMULINK and are shown.
本文阐述了基于升压变换器的三相逆变器太阳能转换系统软开关控制策略的有效性。太阳辐照度和温度主要取决于光伏转换过程中产生的输出功率。升压变换器用于获得最大功率,并由模糊控制器控制。正弦脉宽调制(SPWM)为所提出的拓扑结构提供了软开关控制策略。提出的系统包括一个独立的光伏系统,升压变换器,模糊逻辑控制器,三相逆变器和负载。升压变换器的调节电压和电流被馈送到逆变电路,逆变电路连接到具有连续最大功率的负载。采用模糊控制器提高升压变换器的效率,采用正弦脉宽调制为逆变电路提供脉冲。用于驱动负载的逆变器输出电流应注意使其不携带谐波内容。然而,由于干扰正弦波在各种因素下是不可避免的,因此有必要降低谐波电平以获得高效输出。结果在MATLABSIMULINK中生成并显示。
{"title":"An artificial intelligent controller for a Three Phase Inverter based Solar PV system using boost converter","authors":"V. Subramanian, S. Murugesan","doi":"10.1109/ICOAC.2012.6416840","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416840","url":null,"abstract":"In this paper, the effectiveness of the soft switching control strategies for the Three Phase Inverter based Solar Energy Conversion system with boost converter was explained. The solar irradiation and temperature are mainly depends on the output power produced from the PV conversion process. The Boost Converter is used to obtain the maximum power and is controlled by the Fuzzy logic controller. The Sinusoidal Pulse Width Modulation (SPWM) produces the soft switching control strategy for the proposed topology. The proposed system involves a Stand-Alone Photovoltaic System, Boost converters, Fuzzy Logic Controller, Three Phase inverter and a load. The regulated voltage and current from the boost converter is fed to the inverter circuit which is connected to the load with a continuous maximum power. The fuzzy logic controller is used to improve the boost converter efficiency and the sinusoidal PWM is used to give pulses for the inverter circuit. The inverter output current for driving a load should be noted such that it does not carry the harmonic content. However since disturbed sine wave is unavoidable under various factors it is necessary to reduce the harmonic level to obtain a highly effective output. The results are generated in MATLABSIMULINK and are shown.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123800576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient multilingual keyword search using bloom filter for cloud computing applications 高效的多语言关键字搜索使用布隆过滤器的云计算应用程序
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416809
S. Pal, Puneet Sardana, Kamlesh Yadav
Efficient keyword search in electronic documents has been an important problem in computer science for the last many decades. With the popularity of cloud services, some applications require searching in multilingual environment. Other applications require data to be stored in the cloud in encrypted form and outsourced to a third party for processing. This paper proposes an algorithm using bloom filters to perform efficient multilingual search on data stored in the cloud in plain or encrypted form. When the user sends in a keyword to be searched, its language is first determined and its corresponding language list bloom filters are checked for presence of the keyword. To make the algorithm more efficient and accurate, we have created two categories of bloom filters namely primary and secondary bloom filter. The list of documents having the keyword is returned to the user. For secure applications, the encrypted documents and its corresponding bloom filters are stored in the server. When user wants to perform a search in stored encrypted documents it sends the keyword to the server. The server applies similar technique to return the encrypted documents having the keyword and the client uses the key to decrypt the documents if required. While searching for keywords, we test the word against the bloom filter of documents which enables these to be stored in encrypted form. Checking of a word against the bloom filter of its documents takes constant time. Experimental results show that searching for a word in encrypted documents can be performed quite efficiently using this scheme even if the environment is multilingual.
在过去的几十年里,电子文档中高效的关键字搜索一直是计算机科学中的一个重要问题。随着云服务的普及,一些应用程序需要在多语言环境下进行搜索。其他应用程序需要将数据以加密形式存储在云中,并外包给第三方进行处理。本文提出了一种使用bloom过滤器对存储在云中的明文或加密形式的数据进行高效多语言搜索的算法。当用户发送要搜索的关键字时,首先确定其语言,并检查其相应的语言列表bloom过滤器是否存在该关键字。为了提高算法的效率和准确性,我们创建了两类布隆过滤器,即主布隆过滤器和二级布隆过滤器。将包含该关键字的文档列表返回给用户。对于安全的应用程序,加密的文档及其相应的bloom过滤器存储在服务器中。当用户想要在存储的加密文档中执行搜索时,它将关键字发送到服务器。服务器应用类似的技术返回具有关键字的加密文档,如果需要,客户机使用密钥对文档进行解密。在搜索关键字时,我们根据文档的bloom过滤器对单词进行测试,该过滤器使这些文档能够以加密形式存储。根据文档的布隆过滤器检查单词需要恒定的时间。实验结果表明,即使在多语言环境下,该算法也能很好地完成加密文档中的单词搜索。
{"title":"Efficient multilingual keyword search using bloom filter for cloud computing applications","authors":"S. Pal, Puneet Sardana, Kamlesh Yadav","doi":"10.1109/ICOAC.2012.6416809","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416809","url":null,"abstract":"Efficient keyword search in electronic documents has been an important problem in computer science for the last many decades. With the popularity of cloud services, some applications require searching in multilingual environment. Other applications require data to be stored in the cloud in encrypted form and outsourced to a third party for processing. This paper proposes an algorithm using bloom filters to perform efficient multilingual search on data stored in the cloud in plain or encrypted form. When the user sends in a keyword to be searched, its language is first determined and its corresponding language list bloom filters are checked for presence of the keyword. To make the algorithm more efficient and accurate, we have created two categories of bloom filters namely primary and secondary bloom filter. The list of documents having the keyword is returned to the user. For secure applications, the encrypted documents and its corresponding bloom filters are stored in the server. When user wants to perform a search in stored encrypted documents it sends the keyword to the server. The server applies similar technique to return the encrypted documents having the keyword and the client uses the key to decrypt the documents if required. While searching for keywords, we test the word against the bloom filter of documents which enables these to be stored in encrypted form. Checking of a word against the bloom filter of its documents takes constant time. Experimental results show that searching for a word in encrypted documents can be performed quite efficiently using this scheme even if the environment is multilingual.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133506234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
DDDOST: Distributed detection of DOS attack using timers in wireless broadband networks DDDOST:在无线宽带网络中使用定时器分布式检测DOS攻击
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416795
I. J. Jingle, E. Rajsingh
Wireless broadband networks are most vulnerable to denial-of-service attacks where attackers can disrupt legitimate communication between hosts in a network by flooding unwanted traffic between legitimate hosts. This paper proposes DDDOST, a novel approach for filtering flooding attack, the most severe denial-of-service attack that occurs at the transport layer of the internet. Flooding attack at the transport layer affects the transmission control protocol's three-way handshake process, thereby denying the services of TCP. It also denies the services of user datagram protocol. The main objective of this approach is to install local and global monitoring agents at various points in the network in order to monitor and filter real-time TCP traffic and UDP traffic thereby allowing legitimate traffic to flow in the network during attack traffic filtration process and to avoid buffer overflow at the monitoring agents. DDDOST consists of a novel agreement mechanism and a novel detection algorithm and it works taking the clock values of each node into account for effective detection of the attack which has not been used in the existing defense mechanisms. All nodes within a network are permitted to have a synchronized clock value. In the agreement mechanism, the IP address spoofing is prevented which forms the gateway for flooding attacks and once IP spoofing is prevented, the detection mechanism is carried out in detecting and filtering flooding attacks. This distributed defense mechanism reduces the burden on a single global monitoring agent thereby introducing local monitoring agents at various points in the network. The performance results show that this approach effectively and accurately detects and filters DOS attacks within a short period. The performance of this proposed mechanism has been measured in terms of time delay and false positive ratio and it is compared with existing defense mechanisms and it is found to be effective over existing defense mechanisms.
无线宽带网络最容易受到拒绝服务攻击,攻击者可以通过在合法主机之间大量发送不需要的通信来破坏网络中主机之间的合法通信。针对互联网传输层中最严重的拒绝服务攻击——洪水攻击,本文提出了一种新的DDDOST过滤方法。传输层的泛洪攻击会影响传输控制协议的三次握手过程,从而阻断TCP的服务。它还拒绝用户数据报协议的服务。这种方法的主要目的是在网络的各个点安装本地和全局监控代理,以便监控和过滤实时TCP流量和UDP流量,从而在攻击流量过滤过程中允许合法流量在网络中流动,并避免监控代理的缓冲区溢出。DDDOST由一种新的协议机制和一种新的检测算法组成,它考虑了每个节点的时钟值,从而有效地检测到现有防御机制中没有使用的攻击。一个网络中的所有节点都允许拥有一个同步的时钟值。在协议机制中,防止IP地址欺骗成为泛洪攻击的网关,防止IP地址欺骗后,进行泛洪攻击的检测和过滤。这种分布式防御机制减少了单个全局监视代理的负担,从而在网络中的不同点引入了本地监视代理。性能测试结果表明,该方法能在短时间内有效、准确地检测和过滤DOS攻击。通过时间延迟和误报率对该机制的性能进行了测量,并与现有的防御机制进行了比较,发现该机制比现有的防御机制更有效。
{"title":"DDDOST: Distributed detection of DOS attack using timers in wireless broadband networks","authors":"I. J. Jingle, E. Rajsingh","doi":"10.1109/ICOAC.2012.6416795","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416795","url":null,"abstract":"Wireless broadband networks are most vulnerable to denial-of-service attacks where attackers can disrupt legitimate communication between hosts in a network by flooding unwanted traffic between legitimate hosts. This paper proposes DDDOST, a novel approach for filtering flooding attack, the most severe denial-of-service attack that occurs at the transport layer of the internet. Flooding attack at the transport layer affects the transmission control protocol's three-way handshake process, thereby denying the services of TCP. It also denies the services of user datagram protocol. The main objective of this approach is to install local and global monitoring agents at various points in the network in order to monitor and filter real-time TCP traffic and UDP traffic thereby allowing legitimate traffic to flow in the network during attack traffic filtration process and to avoid buffer overflow at the monitoring agents. DDDOST consists of a novel agreement mechanism and a novel detection algorithm and it works taking the clock values of each node into account for effective detection of the attack which has not been used in the existing defense mechanisms. All nodes within a network are permitted to have a synchronized clock value. In the agreement mechanism, the IP address spoofing is prevented which forms the gateway for flooding attacks and once IP spoofing is prevented, the detection mechanism is carried out in detecting and filtering flooding attacks. This distributed defense mechanism reduces the burden on a single global monitoring agent thereby introducing local monitoring agents at various points in the network. The performance results show that this approach effectively and accurately detects and filters DOS attacks within a short period. The performance of this proposed mechanism has been measured in terms of time delay and false positive ratio and it is compared with existing defense mechanisms and it is found to be effective over existing defense mechanisms.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133921884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Personalized RAODV algorithm for reduce link break in mobile ad hoc networks 减少移动自组织网络中链路中断的个性化RAODV算法
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416818
R. Kumar, P. Kamalakkannan
Mobile ad hoc networks is a self organizing wireless networks for mobile devices. It does not require any fixed infrastructure due to no wired backbone. It is suitable to use in environment that have a need of on the fly set-up. Every host is a router and packet forwarder. Each node may be mobile, and topology changes frequently and unpredictably due to the arbitrary mobility of mobile nodes. This aspect leads to frequent path failure and route rebuilding. Routing protocol development depends on mobility management, efficient bandwidth and power usage which are critical in ad hoc networks. In this paper, personalized Ad hoc On demand Distance Vector (RAODV) algorithm to reduce the link break scheme for mobile ad hoc networks. This present approach reduces packet loss and finds optimized route by taking into consideration of bandwidth, delay which results by improvement of quality of service. The performance analysis and simulation are carried out to evaluate network performance using network simulator NS-2 based on the quantitative basic parameters like throughput, delay in term of number of nodes and various mobility rates. A simulation result was during the comparison of AODV protocol with RAODV the probability of link break has been decreases in RAODV considering when various pause times and increases number of nodes.
移动自组织网络是一种针对移动设备的自组织无线网络。由于没有有线主干,它不需要任何固定的基础设施。适用于需要动态设置的环境。每个主机都是路由器和数据包转发器。每个节点可能都是移动的,由于移动节点的任意移动,拓扑结构会发生频繁且不可预测的变化。这方面导致频繁的路径故障和路由重建。路由协议的开发依赖于移动性管理、有效的带宽和功率使用,这在自组织网络中是至关重要的。本文提出了一种个性化的自组织按需距离矢量(RAODV)算法来减少移动自组织网络的链路中断方案。该方法充分考虑了服务质量提高所带来的带宽、时延,减少了丢包,找到了最优路由。利用网络模拟器NS-2,基于吞吐量、节点数时延、各种移动速率等定量基本参数,对网络性能进行了性能分析和仿真。仿真结果表明,在AODV协议与RAODV协议的比较中,考虑到不同暂停时间和节点数量的增加,RAODV协议的链路中断概率有所降低。
{"title":"Personalized RAODV algorithm for reduce link break in mobile ad hoc networks","authors":"R. Kumar, P. Kamalakkannan","doi":"10.1109/ICOAC.2012.6416818","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416818","url":null,"abstract":"Mobile ad hoc networks is a self organizing wireless networks for mobile devices. It does not require any fixed infrastructure due to no wired backbone. It is suitable to use in environment that have a need of on the fly set-up. Every host is a router and packet forwarder. Each node may be mobile, and topology changes frequently and unpredictably due to the arbitrary mobility of mobile nodes. This aspect leads to frequent path failure and route rebuilding. Routing protocol development depends on mobility management, efficient bandwidth and power usage which are critical in ad hoc networks. In this paper, personalized Ad hoc On demand Distance Vector (RAODV) algorithm to reduce the link break scheme for mobile ad hoc networks. This present approach reduces packet loss and finds optimized route by taking into consideration of bandwidth, delay which results by improvement of quality of service. The performance analysis and simulation are carried out to evaluate network performance using network simulator NS-2 based on the quantitative basic parameters like throughput, delay in term of number of nodes and various mobility rates. A simulation result was during the comparison of AODV protocol with RAODV the probability of link break has been decreases in RAODV considering when various pause times and increases number of nodes.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"349 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133141126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
ESAR: An energy saving ad hoc routing algorithm for MANET ESAR:一种面向MANET的节能自组织路由算法
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416838
Utkarsh, Mukesh Mishra, S. Chinara
Mobile ad hoc networks (MANET) support multi hop routing in the absence of central base station. The change in network topology due to the node movement associated with the link failure and creation, scarce in radio resources and bandwidth, limited battery power and computing capability pose challenges in packet routing in MANET. The proposed Energy Saving Ad hoc Routing (ESAR) algorithm targets to achieve better energy efficient with a longer network life time. The algorithm selects a path for routing by considering the actual distance between the source and destination along with the minimum available energy of a node in the path. This selected path is chosen as the best path for packet transmission till any node in the path exhausts battery power beyond a threshold value. At this point of time, a backup path is selected as an alternate path for packet transmission. The process is repeated till all the paths from the same source to destination are exhausted with their battery power. The simulation result of the proposed algorithm ESAR indicates that the network life time is improved upon the existing routing algorithms.
移动自组织网络(MANET)在没有中心基站的情况下支持多跳路由。由于节点移动导致的网络拓扑结构的变化、无线资源和带宽的稀缺、有限的电池电量和计算能力等,都给MANET中的分组路由带来了挑战。提出的ESAR (Energy Saving Ad hoc Routing)算法的目标是在更长的网络寿命下实现更高的能源效率。该算法通过考虑源和目的之间的实际距离以及路径上节点的最小可用能量来选择路由路径。选择该路径作为数据包传输的最佳路径,直到路径上任何节点的电池电量耗尽超过阈值。此时,选择一条备份路径作为分组传输的备选路径。这个过程不断重复,直到从同一源到目的地的所有路径都耗尽了电池电量。ESAR算法的仿真结果表明,与现有的路由算法相比,该算法的网络生存时间得到了改善。
{"title":"ESAR: An energy saving ad hoc routing algorithm for MANET","authors":"Utkarsh, Mukesh Mishra, S. Chinara","doi":"10.1109/ICOAC.2012.6416838","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416838","url":null,"abstract":"Mobile ad hoc networks (MANET) support multi hop routing in the absence of central base station. The change in network topology due to the node movement associated with the link failure and creation, scarce in radio resources and bandwidth, limited battery power and computing capability pose challenges in packet routing in MANET. The proposed Energy Saving Ad hoc Routing (ESAR) algorithm targets to achieve better energy efficient with a longer network life time. The algorithm selects a path for routing by considering the actual distance between the source and destination along with the minimum available energy of a node in the path. This selected path is chosen as the best path for packet transmission till any node in the path exhausts battery power beyond a threshold value. At this point of time, a backup path is selected as an alternate path for packet transmission. The process is repeated till all the paths from the same source to destination are exhausted with their battery power. The simulation result of the proposed algorithm ESAR indicates that the network life time is improved upon the existing routing algorithms.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133891493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A constraint based relay node deployment in heterogeneous wireless sensor networks for lifetime maximization 基于约束的异构无线传感器网络中继节点部署方法
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416826
K. Suganthi, Vinayaga B. Sundaram
One of the major issue in wireless sensor network in recent years is how to maximize the network life time and fault tolerant capabilities. Sensors used in wide range of applications such as area monitoring, environmental sensing, industrial monitoring, etc. tend to be heterogeneous and requires a fault tolerant network to minimize connectivity failure. In this paper, we address a suitable solution for maximizing lifetime by the optimal placement and usage of minimal relay nodes. Energy consumption intensity of relay nodes is used and the algorithm proposed ensures a fault tolerant network by developing a k-connected graph. Minimal numbers of relay and sensor nodes are used by scheduling them appropriately. A local search procedure is used for scheduling sensors and sinks separately to avoid redundancy and ensure optimal usage covering the entire target area without any coverage hole. Thus we minimize the overall deployment cost and enhance the network lifetime.
如何使无线传感器网络的寿命和容错能力最大化是近年来无线传感器网络研究的主要问题之一。用于广泛应用的传感器,如区域监测、环境传感、工业监测等,往往是异构的,需要容错网络来最大限度地减少连接故障。在本文中,我们提出了一个合适的解决方案,以最大限度地延长寿命的最佳布局和使用的最小中继节点。该算法利用中继节点的能量消耗强度,通过建立k连通图来保证网络的容错。通过对继电器和传感器节点进行适当的调度,使用了最小数量的继电器和传感器节点。采用局部搜索方法对传感器和接收器分别进行调度,避免了冗余,保证了覆盖整个目标区域的最优利用率。因此,我们最大限度地降低了总体部署成本,并提高了网络生命周期。
{"title":"A constraint based relay node deployment in heterogeneous wireless sensor networks for lifetime maximization","authors":"K. Suganthi, Vinayaga B. Sundaram","doi":"10.1109/ICOAC.2012.6416826","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416826","url":null,"abstract":"One of the major issue in wireless sensor network in recent years is how to maximize the network life time and fault tolerant capabilities. Sensors used in wide range of applications such as area monitoring, environmental sensing, industrial monitoring, etc. tend to be heterogeneous and requires a fault tolerant network to minimize connectivity failure. In this paper, we address a suitable solution for maximizing lifetime by the optimal placement and usage of minimal relay nodes. Energy consumption intensity of relay nodes is used and the algorithm proposed ensures a fault tolerant network by developing a k-connected graph. Minimal numbers of relay and sensor nodes are used by scheduling them appropriately. A local search procedure is used for scheduling sensors and sinks separately to avoid redundancy and ensure optimal usage covering the entire target area without any coverage hole. Thus we minimize the overall deployment cost and enhance the network lifetime.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115081949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Realization of gateway relocation using admission control algorithm in mobile WiMAX networks 移动WiMAX网络中使用准入控制算法实现网关重新定位
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416831
K. Sujatha, M. E. Student, M. Kumarasamy, Mr C M E Nandagopal
The WiMAX Forum has defined a two-tiered mobility management to minimize handover delay and packet loss. In the existing solution they have used the admission control algorithm which incorporates both admission control and the wiener process based prediction algorithm to carry out the performance of Access service network gateway relocation. This algorithm improves the performance in terms of blocking probability, dropping probability, average serving rate, and average signaling overhead. In the proposed system we have increased the capacity and threshold value so that more number of packets can be accommodated in the network without the blocking and dropping of packets. Hence we compared the performance of the proposed and existing systems.
WiMAX论坛定义了两层移动管理,以最大限度地减少切换延迟和数据包丢失。在现有的解决方案中,他们采用了融合了接纳控制和基于维纳过程的预测算法的接纳控制算法来实现接入网网关迁移的性能。该算法在阻塞概率、丢弃概率、平均服务率和平均信令开销方面提高了性能。在提出的系统中,我们增加了容量和阈值,以便在不阻塞和丢弃数据包的情况下,在网络中容纳更多的数据包。因此,我们比较了所提出的系统和现有系统的性能。
{"title":"Realization of gateway relocation using admission control algorithm in mobile WiMAX networks","authors":"K. Sujatha, M. E. Student, M. Kumarasamy, Mr C M E Nandagopal","doi":"10.1109/ICOAC.2012.6416831","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416831","url":null,"abstract":"The WiMAX Forum has defined a two-tiered mobility management to minimize handover delay and packet loss. In the existing solution they have used the admission control algorithm which incorporates both admission control and the wiener process based prediction algorithm to carry out the performance of Access service network gateway relocation. This algorithm improves the performance in terms of blocking probability, dropping probability, average serving rate, and average signaling overhead. In the proposed system we have increased the capacity and threshold value so that more number of packets can be accommodated in the network without the blocking and dropping of packets. Hence we compared the performance of the proposed and existing systems.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114112017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
REAQ-AODV: Route stability and energy aware QoS routing in mobile Ad Hoc networks REAQ-AODV:移动Ad Hoc网络中的路由稳定性和能量感知QoS路由
Pub Date : 2012-12-01 DOI: 10.1109/ICoAC.2012.6416845
P. Srinivasan, P. Kamalakkannan
Providing quality-of-service (QoS) support for Ad Hoc networks is a challenging task due to dynamicity, lack of centralized control, constrained resources and unreliable nature of radio channels and in Mobile Ad hoc networks. Finding a path that remains valid for sufficiently longer period is also a critical task in MANET. In this paper, we propose a novel, stability and energy based QoS routing protocol which is an extension of our route stability and energy based routing (RSEA), to support applications with throughput and delay constraints. In this model, we compute the reliability factor based on the route stability and the residual energy of the intermediate nodes satisfying the admission control. The route with the highest reliability factor is selected for data transfer from source to destination among all the feasible routes. The proposed model has shown better results in terms of packet delivery ratio, control overhead and end-to-end delay in comparison with RSQR, LEAR.
由于无线信道和移动自组织网络的动态性、缺乏集中控制、资源受限以及不可靠的特性,为自组织网络提供服务质量(QoS)支持是一项具有挑战性的任务。寻找在足够长的时间内保持有效的路径也是MANET的关键任务。在本文中,我们提出了一种新的、基于稳定性和能量的QoS路由协议,它是路由稳定性和能量路由(RSEA)的扩展,以支持具有吞吐量和延迟约束的应用。在该模型中,我们基于路由稳定性和满足接纳控制的中间节点的剩余能量来计算可靠性因子。在所有可行的路由中选择可靠性系数最高的路由进行数据从源到目的的传输。与RSQR、LEAR相比,该模型在分组传送率、控制开销和端到端延迟方面都取得了更好的结果。
{"title":"REAQ-AODV: Route stability and energy aware QoS routing in mobile Ad Hoc networks","authors":"P. Srinivasan, P. Kamalakkannan","doi":"10.1109/ICoAC.2012.6416845","DOIUrl":"https://doi.org/10.1109/ICoAC.2012.6416845","url":null,"abstract":"Providing quality-of-service (QoS) support for Ad Hoc networks is a challenging task due to dynamicity, lack of centralized control, constrained resources and unreliable nature of radio channels and in Mobile Ad hoc networks. Finding a path that remains valid for sufficiently longer period is also a critical task in MANET. In this paper, we propose a novel, stability and energy based QoS routing protocol which is an extension of our route stability and energy based routing (RSEA), to support applications with throughput and delay constraints. In this model, we compute the reliability factor based on the route stability and the residual energy of the intermediate nodes satisfying the admission control. The route with the highest reliability factor is selected for data transfer from source to destination among all the feasible routes. The proposed model has shown better results in terms of packet delivery ratio, control overhead and end-to-end delay in comparison with RSQR, LEAR.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"s1-10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127191752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Hardware implementation of voice operated robot using Support Vector Machine classifier 基于支持向量机分类器的语音操作机器人硬件实现
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416833
J. Manikandan, B. Venkataramani
Many consumer and industrial applications require fast and lightweight real-time speech recognition systems with limited vocabulary, such as hands-free control for portable music players, car audio systems, cordless phones, wheel chairs, washing machines, micro-wave ovens, air conditioners and domestic appliances. In this paper, design and development of a Texas Instruments TMS320C6713 DSP based real-time voice operated robot using Support Vector Machine (SVM) classifier is proposed. Details about different ways to reduce the execution time of the prototype are reported in this paper. The proposed system as well as approaches can be easily employed by designers for various other SVM based multi-class pattern recognition applications.
许多消费和工业应用需要词汇量有限的快速轻量级实时语音识别系统,例如便携式音乐播放器、汽车音响系统、无绳电话、轮椅、洗衣机、微波炉、空调和家用电器的免提控制。本文提出了一种基于德州仪器TMS320C6713 DSP的基于支持向量机(SVM)分类器的实时语音操作机器人的设计与开发。本文详细介绍了减少原型执行时间的不同方法。所提出的系统和方法可以很容易地被设计人员用于各种其他基于支持向量机的多类模式识别应用。
{"title":"Hardware implementation of voice operated robot using Support Vector Machine classifier","authors":"J. Manikandan, B. Venkataramani","doi":"10.1109/ICOAC.2012.6416833","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416833","url":null,"abstract":"Many consumer and industrial applications require fast and lightweight real-time speech recognition systems with limited vocabulary, such as hands-free control for portable music players, car audio systems, cordless phones, wheel chairs, washing machines, micro-wave ovens, air conditioners and domestic appliances. In this paper, design and development of a Texas Instruments TMS320C6713 DSP based real-time voice operated robot using Support Vector Machine (SVM) classifier is proposed. Details about different ways to reduce the execution time of the prototype are reported in this paper. The proposed system as well as approaches can be easily employed by designers for various other SVM based multi-class pattern recognition applications.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125727821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Recommendation framework for Service-Oriented Grid 面向服务网格的推荐框架
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416842
N. Nagarathna, M. Indiramma
Grid computing systems provide a virtual framework for sharing resources across organizational boundaries. The merging of Service Oriented Architecture (SOA) with the original Grid technology has resulted in the emergence of the Service Oriented Grid (SOG). The resources from various virtual organizations (VO) are packaged as “services” and offered to users in the form of Grid services. With the increasing use of SOG, service user is in a fix when having to make a choice from a set of services offering the same functionality. Hence service selection is one of the challenges to be addressed in Service Oriented Grid. In this paper we propose a framework for a recommendation system based on trust, reputation and QoS for the SOG with multi-VOs. This novel approach uses computation of trustworthiness of services by the mechanism of taking feedback directly from the service consumers and recommendations from other service providers.
网格计算系统为跨组织边界共享资源提供了一个虚拟框架。面向服务的体系结构(SOA)与原始网格技术的融合导致了面向服务的网格(SOG)的出现。来自各种虚拟组织(VO)的资源被打包为“服务”,并以网格服务的形式提供给用户。随着SOG使用的增加,当服务用户必须从一组提供相同功能的服务中做出选择时,就会陷入困境。因此,服务选择是面向服务网格中需要解决的挑战之一。本文提出了一种基于信任、声誉和QoS的多vos SOG推荐系统框架。这种新方法通过直接从服务消费者处获取反馈和从其他服务提供者处获取建议的机制来计算服务的可信度。
{"title":"Recommendation framework for Service-Oriented Grid","authors":"N. Nagarathna, M. Indiramma","doi":"10.1109/ICOAC.2012.6416842","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416842","url":null,"abstract":"Grid computing systems provide a virtual framework for sharing resources across organizational boundaries. The merging of Service Oriented Architecture (SOA) with the original Grid technology has resulted in the emergence of the Service Oriented Grid (SOG). The resources from various virtual organizations (VO) are packaged as “services” and offered to users in the form of Grid services. With the increasing use of SOG, service user is in a fix when having to make a choice from a set of services offering the same functionality. Hence service selection is one of the challenges to be addressed in Service Oriented Grid. In this paper we propose a framework for a recommendation system based on trust, reputation and QoS for the SOG with multi-VOs. This novel approach uses computation of trustworthiness of services by the mechanism of taking feedback directly from the service consumers and recommendations from other service providers.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131337047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2012 Fourth International Conference on Advanced Computing (ICoAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1