Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416796
S. Nirmala, R. Nallusamy
The development of a reliable and energy-efficient protocol stack is important for supporting various WSNs applications. The penalty is increased complexity of the central node. This is a major problem because the central node is expected to have significantly more power and processing resources. On the distributed case, the coordinator (Distributed Coordination Function) only sends the active nodes to the sensors to keep the reliability and consumes less energy. As a result of this analysis, distributed mechanisms for QoS in WSNs built which extend wide area applications. This paper presents an energy-efficient aware of MAC application specific protocol with enhanced, integrated type in the distributed environment. Let to study the significant procedures for energy reduction compared to the available MAC protocols by cluster head election schemes as per the coverage issues. Most specifically, the cross-layer effects of routing, medium access, physical layers are considered. The proposal concentrates to point out and identifies the key problems of distributed MAC algorithm such as SLCH and MLCH election schemes focus towards the energy-efficiency designed for Wireless Sensor Networks (WSNs) with lemmas and theorems along with coverage strategies.
{"title":"“An energy-efficient and enhanced QoS aware of MAC application specific protocol in the distributed Wireless Sensor Networks”","authors":"S. Nirmala, R. Nallusamy","doi":"10.1109/ICOAC.2012.6416796","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416796","url":null,"abstract":"The development of a reliable and energy-efficient protocol stack is important for supporting various WSNs applications. The penalty is increased complexity of the central node. This is a major problem because the central node is expected to have significantly more power and processing resources. On the distributed case, the coordinator (Distributed Coordination Function) only sends the active nodes to the sensors to keep the reliability and consumes less energy. As a result of this analysis, distributed mechanisms for QoS in WSNs built which extend wide area applications. This paper presents an energy-efficient aware of MAC application specific protocol with enhanced, integrated type in the distributed environment. Let to study the significant procedures for energy reduction compared to the available MAC protocols by cluster head election schemes as per the coverage issues. Most specifically, the cross-layer effects of routing, medium access, physical layers are considered. The proposal concentrates to point out and identifies the key problems of distributed MAC algorithm such as SLCH and MLCH election schemes focus towards the energy-efficiency designed for Wireless Sensor Networks (WSNs) with lemmas and theorems along with coverage strategies.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133588750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416858
V. Nithya, B. Ramachandran, V. Bhaskar
This paper addresses the performance analysis of Zigbee transceiver using IEEE 802.15.4 standard under 2.4 GHz frequency band in terms of Energy and Error over various fading channel conditions. Energy is a critical aspect in Wireless Sensor Network (WSN) for improved network lifetime. The multipath nature of the wireless sensor network channel imposes adverse effect on the received signal characteristics. These unreliable links increases the error level to a greater extent and hence, degrades battery life. In this paper, we investigate the energy efficiency of a Zigbee transceiver using Direct Sequence Spread Spectrum- Offset Quadrature Phase Shift Keying (DSSS-OQPSK) modulation under 2.4 GHz frequency band in a WSN. The Symbol Error Rate (SER) is computed for a Zigbee transceiver, and an expression for energy efficiency measurement is obtained. Simulation results on SER are obtained for AWGN, Rayleigh and Rician fading channels and used in energy efficiency computation. It is found that the energy efficiency of Zigbee transceivers is as low as 10% for Rayleigh channels, but it is over 90% for AWGN channels, when the received SNR is 10 dB, whereas, for Rician channels, it lies in between Rayleigh and AWGN, depending upon the fading level.
{"title":"Energy and error analysis of IEEE 802.15.4 Zigbee RF transceiver under various fading channels in Wireless Sensor Network","authors":"V. Nithya, B. Ramachandran, V. Bhaskar","doi":"10.1109/ICOAC.2012.6416858","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416858","url":null,"abstract":"This paper addresses the performance analysis of Zigbee transceiver using IEEE 802.15.4 standard under 2.4 GHz frequency band in terms of Energy and Error over various fading channel conditions. Energy is a critical aspect in Wireless Sensor Network (WSN) for improved network lifetime. The multipath nature of the wireless sensor network channel imposes adverse effect on the received signal characteristics. These unreliable links increases the error level to a greater extent and hence, degrades battery life. In this paper, we investigate the energy efficiency of a Zigbee transceiver using Direct Sequence Spread Spectrum- Offset Quadrature Phase Shift Keying (DSSS-OQPSK) modulation under 2.4 GHz frequency band in a WSN. The Symbol Error Rate (SER) is computed for a Zigbee transceiver, and an expression for energy efficiency measurement is obtained. Simulation results on SER are obtained for AWGN, Rayleigh and Rician fading channels and used in energy efficiency computation. It is found that the energy efficiency of Zigbee transceivers is as low as 10% for Rayleigh channels, but it is over 90% for AWGN channels, when the received SNR is 10 dB, whereas, for Rician channels, it lies in between Rayleigh and AWGN, depending upon the fading level.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128777164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416836
M. L. Kantham
In order to provide the user's quality of service, the service level agreement between the customers and providers should be satisfied. However the resources available in a single datacenter are limited. Thus if a large demand is observed in a given time, a cloud provider is not able to deliver a uniform QoS. To avoid this scenario, I enable the application to scale it across multiple independent cloud datacenters by forming federated clouds. In such a case, from the customer's point of view it is always difficult to decide whose resources they should use. To handle this case a ranking mechanism is proposed which measures the quality and prioritize the cloud resources. In this work I propose a framework and mechanism for coordinator based advance reservation and ranking of cloud resources which allows the users to book resource in advance. Advance reservation provides guaranteed delivery of resources to the right customers at the right time.
{"title":"Coordinator based advanced reservation and ranking for cloud resources","authors":"M. L. Kantham","doi":"10.1109/ICOAC.2012.6416836","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416836","url":null,"abstract":"In order to provide the user's quality of service, the service level agreement between the customers and providers should be satisfied. However the resources available in a single datacenter are limited. Thus if a large demand is observed in a given time, a cloud provider is not able to deliver a uniform QoS. To avoid this scenario, I enable the application to scale it across multiple independent cloud datacenters by forming federated clouds. In such a case, from the customer's point of view it is always difficult to decide whose resources they should use. To handle this case a ranking mechanism is proposed which measures the quality and prioritize the cloud resources. In this work I propose a framework and mechanism for coordinator based advance reservation and ranking of cloud resources which allows the users to book resource in advance. Advance reservation provides guaranteed delivery of resources to the right customers at the right time.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124641485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416863
C. Arunachalaperumal, S. D. Kumar, C. Arun
Spatial modulation is a transmission technique that uses multiple antennas. It involves mapping of a block of information bits to two information carrying units, as a symbol chosen from constellation diagram and a unique transmit antenna number. The importance of Spatial modulation is that it increases overall spectral efficiency. In this paper we show the performance comparison of MIMO using Trellis Coded Spatial modulation, Space Time Block Coded Spatial modulation and New Trellis Coded Spatial modulation. And performance of each coding systems yields slightly different values. TCM concept is utilized to combat performance degradation of Spatial modulation in correlated channel conditions. Whereas the STBC-SM scheme is useful for high-rate, low complexity, emerging wireless communication systems such as LTE and WiMAX. The New SM-TC scheme offers significant error performance improvements over alternatives while having a lower decoding complexity for 2, 3, and 4 bits/s/Hz transmissions.
{"title":"A comparative study of the performance of precoded MIMO using Trellis and STBC","authors":"C. Arunachalaperumal, S. D. Kumar, C. Arun","doi":"10.1109/ICOAC.2012.6416863","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416863","url":null,"abstract":"Spatial modulation is a transmission technique that uses multiple antennas. It involves mapping of a block of information bits to two information carrying units, as a symbol chosen from constellation diagram and a unique transmit antenna number. The importance of Spatial modulation is that it increases overall spectral efficiency. In this paper we show the performance comparison of MIMO using Trellis Coded Spatial modulation, Space Time Block Coded Spatial modulation and New Trellis Coded Spatial modulation. And performance of each coding systems yields slightly different values. TCM concept is utilized to combat performance degradation of Spatial modulation in correlated channel conditions. Whereas the STBC-SM scheme is useful for high-rate, low complexity, emerging wireless communication systems such as LTE and WiMAX. The New SM-TC scheme offers significant error performance improvements over alternatives while having a lower decoding complexity for 2, 3, and 4 bits/s/Hz transmissions.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123623456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416835
Shanmugam Sridevi
A novel method for managing and treating physical and psychological pain is the need of the hour. Although cybertherapy is at its development stage, a great potential can be reaped when it is moulded in the right way. Clinical virtual reality is found to be a promising way of distracting the patients from sensing the pain during medical procedures, physical rehabilitation or post-traumatic stress. There exists no single pain management methodology that is good for everyone, or even the majority of people. Research findings prove that pain has many causes and courses, and can impact individuals in a multitude of ways including the behavioral, physiological, emotional, psychological, social and spiritual levels. Though distraction through audio visual aids has a significant effect in decreasing the intensity of pain signals in the brain, the analgesic efficacy has to be well researched and improved. The perception of pain varies with factors such as age, ethnicity, sex and genetics. Increased nervousness of patients in virtual world, patients' confidentiality, subjectivity in effectiveness on individuals, array of pains to be handled with a single virtual platform and cost are the major barriers to be tackled. This paper discusses ways of providing such generic, acceptable and proven methods of cybertherapy. Such virtually painless world shall be greatly achieved only with close cooperation between technologists and medical experts.
{"title":"Immersive virtual reality for pain distraction methodologies and barriers","authors":"Shanmugam Sridevi","doi":"10.1109/ICOAC.2012.6416835","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416835","url":null,"abstract":"A novel method for managing and treating physical and psychological pain is the need of the hour. Although cybertherapy is at its development stage, a great potential can be reaped when it is moulded in the right way. Clinical virtual reality is found to be a promising way of distracting the patients from sensing the pain during medical procedures, physical rehabilitation or post-traumatic stress. There exists no single pain management methodology that is good for everyone, or even the majority of people. Research findings prove that pain has many causes and courses, and can impact individuals in a multitude of ways including the behavioral, physiological, emotional, psychological, social and spiritual levels. Though distraction through audio visual aids has a significant effect in decreasing the intensity of pain signals in the brain, the analgesic efficacy has to be well researched and improved. The perception of pain varies with factors such as age, ethnicity, sex and genetics. Increased nervousness of patients in virtual world, patients' confidentiality, subjectivity in effectiveness on individuals, array of pains to be handled with a single virtual platform and cost are the major barriers to be tackled. This paper discusses ways of providing such generic, acceptable and proven methods of cybertherapy. Such virtually painless world shall be greatly achieved only with close cooperation between technologists and medical experts.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114982279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416802
B. T. Krishna, S. S. Rao
This paper deals with the design and applications of digital differentiators. For real time applications it is mandatory that a differentiator should have as small an order as possible. Different procedures available for the design of FIR and IIR type digital differentiators are presented. The IIR Type digital differentiators are obtained by inversion and magnitude stabilization of the existing digital integrators. In some applications like controls, waveshaping, oscillators and communications require a constant 90° phase for differentiators. In this paper an attempt is made to study about the variation of phase angle of digital differentiators with the application of fractional delay. The use of digital differentiators for the detection of edges in an image, QRS detection in an ECG signal is illustrated. It has been observed that the digital differentiators have shown superior performance compared to the well known gradient method. With the proven efficiency of the differentiators in various applications, they have been implemented in hardware using Verilog.
{"title":"On design and applications of digital differentiators","authors":"B. T. Krishna, S. S. Rao","doi":"10.1109/ICOAC.2012.6416802","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416802","url":null,"abstract":"This paper deals with the design and applications of digital differentiators. For real time applications it is mandatory that a differentiator should have as small an order as possible. Different procedures available for the design of FIR and IIR type digital differentiators are presented. The IIR Type digital differentiators are obtained by inversion and magnitude stabilization of the existing digital integrators. In some applications like controls, waveshaping, oscillators and communications require a constant 90° phase for differentiators. In this paper an attempt is made to study about the variation of phase angle of digital differentiators with the application of fractional delay. The use of digital differentiators for the detection of edges in an image, QRS detection in an ECG signal is illustrated. It has been observed that the digital differentiators have shown superior performance compared to the well known gradient method. With the proven efficiency of the differentiators in various applications, they have been implemented in hardware using Verilog.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125398681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416823
P. Vijayalakshmi, M. Sumathi
Design of an algorithm for vehicle identification by recognizing the number plate is presented. This new vehicle identification technique consists of vehicle detection, plate localization and character recognition. Here, Genetic algorithm (GA) is employed at two levels: for detecting vehicle from traffic image and recognizing character from the number plate. Detection is based on contour and shape information. GA controls the window size to capture each vehicle in a separate widow. Connectivity and adjacency concepts are used to locate and extract number plate and its characters. A digital board (DB) with window panes is introduced to recognize each character uniquely. GA is adopted at the second level to map character pixels into the window panes as lines. For each character in the number plate, distinct feature vector is computed. Finally, a feature based matching is adopted for character recognition. Experiments have been conducted with images taken from various scenes and conditions and the detection rate is found to be 92.5 %. Experiments have conducted for recognition with LPR images taken at different conditions and the recognition rate is found to be 91 %. Detection time is linear function of number of objects in the input image. Potential applications include provisioning of vehicle parking facilities and campus security system for permitting authorized vehicles into the premises.
{"title":"Design of algorithm for vehicle identification by number plate recognition","authors":"P. Vijayalakshmi, M. Sumathi","doi":"10.1109/ICOAC.2012.6416823","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416823","url":null,"abstract":"Design of an algorithm for vehicle identification by recognizing the number plate is presented. This new vehicle identification technique consists of vehicle detection, plate localization and character recognition. Here, Genetic algorithm (GA) is employed at two levels: for detecting vehicle from traffic image and recognizing character from the number plate. Detection is based on contour and shape information. GA controls the window size to capture each vehicle in a separate widow. Connectivity and adjacency concepts are used to locate and extract number plate and its characters. A digital board (DB) with window panes is introduced to recognize each character uniquely. GA is adopted at the second level to map character pixels into the window panes as lines. For each character in the number plate, distinct feature vector is computed. Finally, a feature based matching is adopted for character recognition. Experiments have been conducted with images taken from various scenes and conditions and the detection rate is found to be 92.5 %. Experiments have conducted for recognition with LPR images taken at different conditions and the recognition rate is found to be 91 %. Detection time is linear function of number of objects in the input image. Potential applications include provisioning of vehicle parking facilities and campus security system for permitting authorized vehicles into the premises.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129459387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416837
A. Pravin, S. Srinivasan
The larger size and complexity of software source code builds many challenges in bug detection. Data mining based bug detection methods eliminate the bugs present in software source code effectively. Rule violation and copy paste related defects are the most concerns for bug detection system. Traditional data mining approaches such as frequent Itemset mining and frequent sequence mining are relatively good but they are lacking in accuracy and pattern recognition. Neural networks have emerged as advanced data mining tools in cases where other techniques may not produce satisfactory predictive models. The neural network is trained for possible set of errors that could be present in software source code. From the training data the neural network learns how to predict the correct output. The processing elements of neural networks are associated with weights which are adjusted during the training period.
{"title":"An efficient programming rule extraction and detection of violations in software source code using neural networks","authors":"A. Pravin, S. Srinivasan","doi":"10.1109/ICOAC.2012.6416837","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416837","url":null,"abstract":"The larger size and complexity of software source code builds many challenges in bug detection. Data mining based bug detection methods eliminate the bugs present in software source code effectively. Rule violation and copy paste related defects are the most concerns for bug detection system. Traditional data mining approaches such as frequent Itemset mining and frequent sequence mining are relatively good but they are lacking in accuracy and pattern recognition. Neural networks have emerged as advanced data mining tools in cases where other techniques may not produce satisfactory predictive models. The neural network is trained for possible set of errors that could be present in software source code. From the training data the neural network learns how to predict the correct output. The processing elements of neural networks are associated with weights which are adjusted during the training period.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133350654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416853
G. Mani, S. Berkovich, I. Mihai
Computer architectures are expected to change to support Exascale computing in the near future. As energy and cooling constraints limit increases in microprocessor clock speeds and number of cores, computer companies are turning to parallel programming. Nowadays, parallel programming is achieved by increasing the number of processing elements in processor cores, increasing the number of processor cores itself and complicated parallel programming where programmer has the responsibility of allocating memory and synchronizing the communication between the processing elements as well as processor cores. It becomes increasingly difficult and expensive to design and produce shared memory machines with ever increasing number of processors. Increase in the number of processors is a major disadvantage when it comes to energy consumption. In this work, we present a new architecture for processor design based on pairwise balanced combinatorial interconnection of processing and memory elements. The proposed processor uses two operand instructions, so that the set of executable machine instructions is partitioned by these pairs. This kind of partition allows parallel processing of data-independent instructions. Since this partition is done at the compile time, the architecture extracts the instruction level parallelism without run-time overheads. We analyze and confirm the performance improvements through simulations. The suggested combinatorial arrangement gives set of architectures with various degrees of performance enhancement.
{"title":"A combinatorial distributed architecture for Exascale computing","authors":"G. Mani, S. Berkovich, I. Mihai","doi":"10.1109/ICOAC.2012.6416853","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416853","url":null,"abstract":"Computer architectures are expected to change to support Exascale computing in the near future. As energy and cooling constraints limit increases in microprocessor clock speeds and number of cores, computer companies are turning to parallel programming. Nowadays, parallel programming is achieved by increasing the number of processing elements in processor cores, increasing the number of processor cores itself and complicated parallel programming where programmer has the responsibility of allocating memory and synchronizing the communication between the processing elements as well as processor cores. It becomes increasingly difficult and expensive to design and produce shared memory machines with ever increasing number of processors. Increase in the number of processors is a major disadvantage when it comes to energy consumption. In this work, we present a new architecture for processor design based on pairwise balanced combinatorial interconnection of processing and memory elements. The proposed processor uses two operand instructions, so that the set of executable machine instructions is partitioned by these pairs. This kind of partition allows parallel processing of data-independent instructions. Since this partition is done at the compile time, the architecture extracts the instruction level parallelism without run-time overheads. We analyze and confirm the performance improvements through simulations. The suggested combinatorial arrangement gives set of architectures with various degrees of performance enhancement.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127870133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1109/ICOAC.2012.6416865
T. Somasundaram, V. Prabha, M. Arumugam
The following topics are dealt with: ad hoc & sensor networks; agent based systems; autonomous computing; body area network; cloud computing; cluster computing; compiler optimizations; data mining; digital image computing; distributed databases; e-learning; e-commerce; e-governance; green IT; grid computing; image processing; intelligent agents; knowledge management; theoretical computer science; virtualization; machine learning; mobile computing; multicore architecture; multimedia streaming; natural language processing; network security; network management; neural networks; parallel computing; pattern recognition; pervasive computing; power aware computing; semantic Web; service oriented architecture; soft computing; software architecture; social computing; storage management; ubiquitous computing; and Web intelligence.
处理以下主题:ad hoc &传感器网络;基于代理的系统;自主计算;体域网络;云计算;集群计算;编译器优化;数据挖掘;数字图像计算;分布式数据库;在线学习;电子商务;电子政务;绿色;网格计算;图像处理;智能代理;知识管理;理论计算机科学;虚拟化;机器学习;移动计算;多核架构;多媒体流;自然语言处理;网络安全;网络管理;神经网络;并行计算;模式识别;普适计算;功率感知计算;语义网;面向服务的体系结构;软计算;软件架构;社会计算;存储管理;无处不在的计算;以及网络智能。
{"title":"Scalability issues in cloud computing","authors":"T. Somasundaram, V. Prabha, M. Arumugam","doi":"10.1109/ICOAC.2012.6416865","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416865","url":null,"abstract":"The following topics are dealt with: ad hoc & sensor networks; agent based systems; autonomous computing; body area network; cloud computing; cluster computing; compiler optimizations; data mining; digital image computing; distributed databases; e-learning; e-commerce; e-governance; green IT; grid computing; image processing; intelligent agents; knowledge management; theoretical computer science; virtualization; machine learning; mobile computing; multicore architecture; multimedia streaming; natural language processing; network security; network management; neural networks; parallel computing; pattern recognition; pervasive computing; power aware computing; semantic Web; service oriented architecture; soft computing; software architecture; social computing; storage management; ubiquitous computing; and Web intelligence.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127557307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}