首页 > 最新文献

2012 Fourth International Conference on Advanced Computing (ICoAC)最新文献

英文 中文
A combinatorial distributed architecture for Exascale computing 用于百亿亿次计算的组合分布式架构
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416853
G. Mani, S. Berkovich, I. Mihai
Computer architectures are expected to change to support Exascale computing in the near future. As energy and cooling constraints limit increases in microprocessor clock speeds and number of cores, computer companies are turning to parallel programming. Nowadays, parallel programming is achieved by increasing the number of processing elements in processor cores, increasing the number of processor cores itself and complicated parallel programming where programmer has the responsibility of allocating memory and synchronizing the communication between the processing elements as well as processor cores. It becomes increasingly difficult and expensive to design and produce shared memory machines with ever increasing number of processors. Increase in the number of processors is a major disadvantage when it comes to energy consumption. In this work, we present a new architecture for processor design based on pairwise balanced combinatorial interconnection of processing and memory elements. The proposed processor uses two operand instructions, so that the set of executable machine instructions is partitioned by these pairs. This kind of partition allows parallel processing of data-independent instructions. Since this partition is done at the compile time, the architecture extracts the instruction level parallelism without run-time overheads. We analyze and confirm the performance improvements through simulations. The suggested combinatorial arrangement gives set of architectures with various degrees of performance enhancement.
预计在不久的将来,计算机体系结构将发生变化,以支持百亿亿次计算。由于能源和冷却限制了微处理器时钟速度和内核数量的增加,计算机公司开始转向并行编程。如今,并行编程是通过增加处理器核心中的处理元素数量,增加处理器核心本身的数量以及复杂的并行编程来实现的,其中程序员负责分配内存并同步处理元素和处理器核心之间的通信。设计和生产处理器数量不断增加的共享内存机器变得越来越困难和昂贵。处理器数量的增加是能耗方面的一个主要缺点。在这项工作中,我们提出了一种基于处理和存储元件成对平衡组合互连的处理器设计新架构。所建议的处理器使用两个操作数指令,因此可执行机器指令集由这些指令对划分。这种分区允许并行处理与数据无关的指令。由于此分区是在编译时完成的,因此该体系结构在没有运行时开销的情况下提取指令级并行性。通过仿真对改进后的性能进行了分析和验证。建议的组合安排提供了一组具有不同程度性能增强的体系结构。
{"title":"A combinatorial distributed architecture for Exascale computing","authors":"G. Mani, S. Berkovich, I. Mihai","doi":"10.1109/ICOAC.2012.6416853","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416853","url":null,"abstract":"Computer architectures are expected to change to support Exascale computing in the near future. As energy and cooling constraints limit increases in microprocessor clock speeds and number of cores, computer companies are turning to parallel programming. Nowadays, parallel programming is achieved by increasing the number of processing elements in processor cores, increasing the number of processor cores itself and complicated parallel programming where programmer has the responsibility of allocating memory and synchronizing the communication between the processing elements as well as processor cores. It becomes increasingly difficult and expensive to design and produce shared memory machines with ever increasing number of processors. Increase in the number of processors is a major disadvantage when it comes to energy consumption. In this work, we present a new architecture for processor design based on pairwise balanced combinatorial interconnection of processing and memory elements. The proposed processor uses two operand instructions, so that the set of executable machine instructions is partitioned by these pairs. This kind of partition allows parallel processing of data-independent instructions. Since this partition is done at the compile time, the architecture extracts the instruction level parallelism without run-time overheads. We analyze and confirm the performance improvements through simulations. The suggested combinatorial arrangement gives set of architectures with various degrees of performance enhancement.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127870133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Non cooperative power control game for wireless ad hoc networks 无线自组织网络的非合作功率控制博弈
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416822
S. Suman, L. Bhagyalakshmi, K. Murugan
Transmission power control is an important issue in wireless ad hoc networks due to its dependency on battery power. It is a tendency of ad hoc nodes to transmit at their maximum power level to ensure successful delivery of their packets which causes interference to other neighboring nodes. In response, the other nodes also increase their power level which creates a situation of cascading effect where all nodes drain their battery power. In this paper, the cascading effect of interference caused by neighboring nodes and its impact on battery power in wireless ad hoc networks is analyzed and a non cooperative power control game is proposed to obtain an optimum power at which the nodes can maximize their utility without compromising the quality of services. The concept of game theory is also applied to determine an optimum SNIR that is the same value for all the nodes in networks for their mutual benefit. Through the numerical examples it is shown that the proposed concept obtains the maximum utility by minimizing the transmission power.
传输功率控制是无线自组织网络中一个重要的问题,因为它依赖于电池功率。自组织节点倾向于在其最大功率水平上传输,以确保其数据包的成功传递,这对其他邻近节点造成干扰。作为回应,其他节点也会增加它们的功率水平,从而产生级联效应,所有节点都会耗尽电池电量。本文分析了无线自组织网络中相邻节点干扰的级联效应及其对电池电量的影响,并提出了一种非合作功率控制策略,以获得节点在不影响服务质量的情况下其效用最大化的最优功率。博弈论的概念也适用于确定一个最优的信噪比,即网络中所有节点的共同利益相同的值。通过数值算例表明,该方法在使传输功率最小的情况下获得了最大的效用。
{"title":"Non cooperative power control game for wireless ad hoc networks","authors":"S. Suman, L. Bhagyalakshmi, K. Murugan","doi":"10.1109/ICOAC.2012.6416822","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416822","url":null,"abstract":"Transmission power control is an important issue in wireless ad hoc networks due to its dependency on battery power. It is a tendency of ad hoc nodes to transmit at their maximum power level to ensure successful delivery of their packets which causes interference to other neighboring nodes. In response, the other nodes also increase their power level which creates a situation of cascading effect where all nodes drain their battery power. In this paper, the cascading effect of interference caused by neighboring nodes and its impact on battery power in wireless ad hoc networks is analyzed and a non cooperative power control game is proposed to obtain an optimum power at which the nodes can maximize their utility without compromising the quality of services. The concept of game theory is also applied to determine an optimum SNIR that is the same value for all the nodes in networks for their mutual benefit. Through the numerical examples it is shown that the proposed concept obtains the maximum utility by minimizing the transmission power.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131110153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Application of Fast Fourier Transform (FFT) in Laser Speckle Image Pattern Correlation technique for the metrological measurement 快速傅立叶变换(FFT)在激光散斑图像模式相关技术中的应用
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416803
B. Rajamanickam, M. Shanmugam
This paper describes Laser Speckle Image Pattern Correlation (LSIPC) technique, a nondestructive method for the measurement of deformation/displacement of the specimen in metrology using Fast Fourier Transform. A diffuse object is illuminated with laser light, a random interference effect known as `speckle pattern' is produced. If there is movement in the object, the speckle patterns fluctuate in intensity. These fluctuations can be used to provide information about the movement. The experimental arrangement is based on the Michelson Interferometer method. The object is a thin steel plate fastened by means of screws at four points. A screw set into the center of the plate and inducing flexure of the plate is used to produce deformation of the plate. Illumination of the plate and photography were performed along directions close to the normal. The principle of this technique is capturing of two speckle patterns of a specimen, one before deformation (Reference image) and the other after deformation/displacement (Deformed image) by a CCD camera and registered by a frame grabber. The above deterministic increment in the phase difference of the two interfering fields is displayed in the difference pattern of intensities. Small sub images are obtained by segmenting process and analyzed point wise. An algorithm has been written using Fast Fourier Transform to obtain the information about the deformation. This method consists of simple and robust optical setup to perform non invasive measurement to the sub micron level for the measurement of deformation.
本文介绍了激光散斑图像模式相关(LSIPC)技术,一种基于快速傅立叶变换的无损测量测量试样变形/位移的方法。漫射物体被激光照射后,会产生一种被称为“散斑图案”的随机干涉效应。如果物体中有运动,散斑图案的强度会波动。这些波动可以用来提供有关运动的信息。实验安排基于迈克尔逊干涉仪方法。这个物体是一块薄钢板,用螺丝在四个点上固定住。设置在板的中心并引起板的弯曲的螺钉用于产生板的变形。沿着接近法线的方向对底片进行照明和照相。该技术的原理是通过CCD相机捕获试样变形前(参考图像)和变形/位移后(变形图像)的两种散斑模式,并通过帧捕捉器进行配准。上述两干涉场相位差的确定性增量表现为强度差图。通过分割得到小的子图像,并进行逐点分析。利用快速傅立叶变换编写了一种算法来获取变形信息。该方法采用简单、可靠的光学装置,可实现亚微米级形变的非侵入性测量。
{"title":"Application of Fast Fourier Transform (FFT) in Laser Speckle Image Pattern Correlation technique for the metrological measurement","authors":"B. Rajamanickam, M. Shanmugam","doi":"10.1109/ICOAC.2012.6416803","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416803","url":null,"abstract":"This paper describes Laser Speckle Image Pattern Correlation (LSIPC) technique, a nondestructive method for the measurement of deformation/displacement of the specimen in metrology using Fast Fourier Transform. A diffuse object is illuminated with laser light, a random interference effect known as `speckle pattern' is produced. If there is movement in the object, the speckle patterns fluctuate in intensity. These fluctuations can be used to provide information about the movement. The experimental arrangement is based on the Michelson Interferometer method. The object is a thin steel plate fastened by means of screws at four points. A screw set into the center of the plate and inducing flexure of the plate is used to produce deformation of the plate. Illumination of the plate and photography were performed along directions close to the normal. The principle of this technique is capturing of two speckle patterns of a specimen, one before deformation (Reference image) and the other after deformation/displacement (Deformed image) by a CCD camera and registered by a frame grabber. The above deterministic increment in the phase difference of the two interfering fields is displayed in the difference pattern of intensities. Small sub images are obtained by segmenting process and analyzed point wise. An algorithm has been written using Fast Fourier Transform to obtain the information about the deformation. This method consists of simple and robust optical setup to perform non invasive measurement to the sub micron level for the measurement of deformation.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131346594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Kernel methods based approaches to image classification and retrieval 基于核方法的图像分类与检索方法
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416867
C. Sekhar, S. Kumar, M. Subhas, R. Buyya
Support vector machine (SVM) is a pattern classification model suitable for classification and annotation of images using non-vectorial type representations of images. Varying length patterns extracted from image data correspond to sets of local feature vectors. Kernels designed for varying length patterns are called as dynamic kernels. The talk presents the issues in designing the dynamic kernel based SVMS for classification and annotation of images. Different methods for designing the dynamic kernels are presented. An intermediate matching kernel (IMK) for a pair of varying length patterns is constructed by matching the pairs of local feature vectors selected using a set of virtual feature vectors. For patterns corresponding to sets of feature vectors, a Gaussian mixture model (GMM) is used as the set of virtual feature vectors. The GMM-based IMK is considered for image processing tasks such as image classification, matching and annotation in content-based image retrieval. The talk presents results of experimental studies on image classification, annotation and retrieval of images using the kernel methods.
支持向量机(SVM)是一种模式分类模型,适用于使用图像的非向量表示对图像进行分类和标注。从图像数据中提取的不同长度的模式对应于一组局部特征向量。为变化长度模式设计的核称为动态核。讨论了基于动态核的支持向量机图像分类与标注的设计问题。给出了设计动态核的不同方法。利用一组虚拟特征向量对选择的局部特征向量对进行匹配,构建了对变长模式的中间匹配核(IMK)。对于特征向量集合对应的模式,使用高斯混合模型(GMM)作为虚拟特征向量集合。在基于内容的图像检索中,基于gmm的IMK被考虑用于图像分类、匹配和标注等图像处理任务。介绍了基于核方法的图像分类、标注和检索的实验研究结果。
{"title":"Kernel methods based approaches to image classification and retrieval","authors":"C. Sekhar, S. Kumar, M. Subhas, R. Buyya","doi":"10.1109/ICOAC.2012.6416867","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416867","url":null,"abstract":"Support vector machine (SVM) is a pattern classification model suitable for classification and annotation of images using non-vectorial type representations of images. Varying length patterns extracted from image data correspond to sets of local feature vectors. Kernels designed for varying length patterns are called as dynamic kernels. The talk presents the issues in designing the dynamic kernel based SVMS for classification and annotation of images. Different methods for designing the dynamic kernels are presented. An intermediate matching kernel (IMK) for a pair of varying length patterns is constructed by matching the pairs of local feature vectors selected using a set of virtual feature vectors. For patterns corresponding to sets of feature vectors, a Gaussian mixture model (GMM) is used as the set of virtual feature vectors. The GMM-based IMK is considered for image processing tasks such as image classification, matching and annotation in content-based image retrieval. The talk presents results of experimental studies on image classification, annotation and retrieval of images using the kernel methods.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114875226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
License Plate Recognition: A review 车牌识别:综述
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416843
P. Kulkarni, A. Khandebharad, D. Khope, P. Chavan
The License Plate Recognition (LPR) system is one of the most important criterions of mass surveillance method. LPR systems are generally Composed of three steps namely, 1] plate extraction, 2] character Segmentation and 3] Recognition. License Plate Recognition is a crucial task due to the non-uniformity in license plates and the illumination conditions. Most of the developed techniques work under specific conditions such as image capturing angle, illumination, stationary background. All the given LPR techniques vary on the basis of processing time, required computational power and accuracy. Since the absence of any standard, these techniques are incomparable but an efficient path for specified requirements can be judged. Hence we are proposing a Novel idea of Arduino based License Plate Recognition.
车牌识别(LPR)系统是大规模监控方法的重要标准之一。LPR系统一般由三个步骤组成:1]车牌提取,2]字符分割,3]识别。由于车牌的非均匀性和光照条件,车牌识别是一项至关重要的任务。大多数已开发的技术在特定条件下工作,如图像捕获角度,照明,固定背景。所有给定的LPR技术都根据处理时间、所需的计算能力和准确性而有所不同。由于没有任何标准,这些技术是无法比较的,但是可以判断出特定需求的有效路径。因此,我们提出了一种基于Arduino的车牌识别的新思路。
{"title":"License Plate Recognition: A review","authors":"P. Kulkarni, A. Khandebharad, D. Khope, P. Chavan","doi":"10.1109/ICOAC.2012.6416843","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416843","url":null,"abstract":"The License Plate Recognition (LPR) system is one of the most important criterions of mass surveillance method. LPR systems are generally Composed of three steps namely, 1] plate extraction, 2] character Segmentation and 3] Recognition. License Plate Recognition is a crucial task due to the non-uniformity in license plates and the illumination conditions. Most of the developed techniques work under specific conditions such as image capturing angle, illumination, stationary background. All the given LPR techniques vary on the basis of processing time, required computational power and accuracy. Since the absence of any standard, these techniques are incomparable but an efficient path for specified requirements can be judged. Hence we are proposing a Novel idea of Arduino based License Plate Recognition.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123936918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An extensibility of THEMIS billing system for the cloud computing environment THEMIS计费系统在云计算环境下的可扩展性
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416819
T. J. Singh, R. Sugumar
With the advent and acceptance of cloud computing the ability to record and account for the usage of cloud resources in a convincing and capricious way has become critical for cloud service providers and users alike. The billing process involves receiving billing records from various networks, determining the billing rates associated with the billing records, calculate the cost for each billing record, aggregating this records periodically to generate invoices, sending invoices to the customer, and collecting payments received from the customer. Traditional billing systems are not enough in terms of security capabilities or computational overhead. In this paper, we propose a secure and no obstructive billing system called THEMIS as a remedy for these limitations. The system uses a novel concept of a cloud notary authority for the supervision of billing. Moreover, to provide a falsification-resistive SLA monitoring mechanism, we devised a SLA monitoring module enhanced with a trusted platform module (TPM), called S-Mon. From the perspective of extensibility, THEMIS is moreover applicable to various target services as well to improve the accountability of each service by applying more monitoring techniques to S-Mon. The overall latency of these systems is shorter and the throughput much higher than the Public key Infrastructure.
随着云计算的出现和被接受,以一种令人信服和反复无常的方式记录和说明云资源使用情况的能力对云服务提供商和用户来说都变得至关重要。计费流程包括从各种网络接收计费记录,确定与计费记录相关的计费费率,计算每个计费记录的成本,定期汇总这些记录以生成发票,向客户发送发票,以及收集从客户收到的付款。传统的计费系统在安全功能或计算开销方面是不够的。在本文中,我们提出了一种称为THEMIS的安全且无阻碍的计费系统作为这些限制的补救措施。该系统使用云公证机构的新概念来监督计费。此外,为了提供防篡改的SLA监控机制,我们设计了一个使用可信平台模块(TPM)增强的SLA监控模块,称为S-Mon。从可扩展性的角度来看,THEMIS还适用于各种目标服务,并通过向S-Mon应用更多的监视技术来提高每个服务的可问责性。这些系统的总体延迟较短,吞吐量远高于公钥基础设施。
{"title":"An extensibility of THEMIS billing system for the cloud computing environment","authors":"T. J. Singh, R. Sugumar","doi":"10.1109/ICOAC.2012.6416819","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416819","url":null,"abstract":"With the advent and acceptance of cloud computing the ability to record and account for the usage of cloud resources in a convincing and capricious way has become critical for cloud service providers and users alike. The billing process involves receiving billing records from various networks, determining the billing rates associated with the billing records, calculate the cost for each billing record, aggregating this records periodically to generate invoices, sending invoices to the customer, and collecting payments received from the customer. Traditional billing systems are not enough in terms of security capabilities or computational overhead. In this paper, we propose a secure and no obstructive billing system called THEMIS as a remedy for these limitations. The system uses a novel concept of a cloud notary authority for the supervision of billing. Moreover, to provide a falsification-resistive SLA monitoring mechanism, we devised a SLA monitoring module enhanced with a trusted platform module (TPM), called S-Mon. From the perspective of extensibility, THEMIS is moreover applicable to various target services as well to improve the accountability of each service by applying more monitoring techniques to S-Mon. The overall latency of these systems is shorter and the throughput much higher than the Public key Infrastructure.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132371961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RDBMS for service repository and composition RDBMS用于服务存储库和组合
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416810
H. Lakshmi, H. Mohanty
Relational Database for its huge success in data management has been used here as a scalable repository for storing webservices in UDDI framework. The operator `join' has been used to derive service composition by matching inputs of a service to outputs of another. Adopting three modes of composability for a desired service, the possibility of having different kinds of compositions is demonstrated in form of a Composition Search Tree.
关系数据库在数据管理方面取得了巨大成功,因此这里将其用作可伸缩的存储库,用于在UDDI框架中存储web服务。通过将一个服务的输入与另一个服务的输出进行匹配,操作符“join”被用于派生服务组合。对期望的服务采用三种可组合模式,以组合搜索树的形式展示了具有不同类型组合的可能性。
{"title":"RDBMS for service repository and composition","authors":"H. Lakshmi, H. Mohanty","doi":"10.1109/ICOAC.2012.6416810","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416810","url":null,"abstract":"Relational Database for its huge success in data management has been used here as a scalable repository for storing webservices in UDDI framework. The operator `join' has been used to derive service composition by matching inputs of a service to outputs of another. Adopting three modes of composability for a desired service, the possibility of having different kinds of compositions is demonstrated in form of a Composition Search Tree.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125407539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A survey on routing methodologies for ICMANET ICMANET路由方法综述
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416801
S. Ramesh, R. Praveen, R. Indira, P. G. Kumar
Mobile Ad hoc Networks were well - thought - out as the independent deployment of mobile nodes. It is eminently said that MANET is a self configuring infra - structure less network that do not count on centralized and organized connectivity of mobile nodes. Military networks, Disaster relief efforts are some common instance of Mobile Ad hoc Networks. MANET showed the way for a new form of network namely Intermittently Connected Mobile Ad hoc Network (ICMANET) which is prominently a Delay Tolerant Network. MANET leads to ICMANET due to sparse or high mobility in the networks. The significance of such networks is that they don't ever hold a complete end-to-end connectivity between nodes. Exemplary examples of intermittent network includes Wildlife Management, Military Surveillance etc. Enormous research works attest massive possible methodologies for efficiently forwarding packets between nodes. The routing methodologies indict mostly the traditional routing protocols akin to AODV, DSR. The exigent factor of ICMANET is to route packets where such traditional protocols do not overlay a resourceful forwarding of data packets. In this paper, we put forward a survey of prevailing routing paradigms that explore techniques for routing along with virtues and shortcomings.
移动自组织网络被认为是移动节点的独立部署。众所周知,MANET是一种自配置的无基础设施网络,不依赖于移动节点的集中和有组织的连接。军事网络、救灾工作是移动自组织网络的一些常见实例。MANET展示了一种新的网络形式,即间歇连接移动自组网(ICMANET),它是一个显著的延迟容忍网络。由于网络的稀疏或高移动性,MANET导致了ICMANET。这种网络的重要之处在于,它们在节点之间没有完整的端到端连接。间歇性网络的典型例子包括野生动物管理、军事监视等。大量的研究工作证明了在节点之间有效转发数据包的大量可能的方法。路由方法主要是指传统的路由协议,如AODV、DSR。ICMANET的紧急因素是路由数据包,而这些传统协议没有覆盖数据包的资源转发。在本文中,我们概述了当前的路由范式,探讨了路由技术及其优点和缺点。
{"title":"A survey on routing methodologies for ICMANET","authors":"S. Ramesh, R. Praveen, R. Indira, P. G. Kumar","doi":"10.1109/ICOAC.2012.6416801","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416801","url":null,"abstract":"Mobile Ad hoc Networks were well - thought - out as the independent deployment of mobile nodes. It is eminently said that MANET is a self configuring infra - structure less network that do not count on centralized and organized connectivity of mobile nodes. Military networks, Disaster relief efforts are some common instance of Mobile Ad hoc Networks. MANET showed the way for a new form of network namely Intermittently Connected Mobile Ad hoc Network (ICMANET) which is prominently a Delay Tolerant Network. MANET leads to ICMANET due to sparse or high mobility in the networks. The significance of such networks is that they don't ever hold a complete end-to-end connectivity between nodes. Exemplary examples of intermittent network includes Wildlife Management, Military Surveillance etc. Enormous research works attest massive possible methodologies for efficiently forwarding packets between nodes. The routing methodologies indict mostly the traditional routing protocols akin to AODV, DSR. The exigent factor of ICMANET is to route packets where such traditional protocols do not overlay a resourceful forwarding of data packets. In this paper, we put forward a survey of prevailing routing paradigms that explore techniques for routing along with virtues and shortcomings.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129290764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Ascertaining the More Knowledgeable Other among peers in collaborative e-learning environment 协作式电子学习环境中同伴中更有知识的他者的确定
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416852
A. Safia, T. Mala
Collaborative E-Learning is an environment where in learners learn through interaction among peer group mates using computers. Evaluating learners in terms of collaboration capabilities in a collaborative e-learning session can be quantified based on several parameters. These parameters include learner's contribution in the collaborative e-learning sessions; collaboration history of a learner in collaborative e-learning sessions and the level of knowledge of the learner in the group in which he participates. In respect to this finding the More Knowledgeable Other (MKO) person refers to someone who has a better understanding and higher ability level than other learners, with respect to a particular task, process, or concept. He can make others learn effectively. By finding out the MKO it is possible to form effective and efficient group where in learner's learning capabilities in a group can be enhanced so that the peers in the group participate to maximum extent and there is an increase in knowledge level. In this paper, a fuzzy model is introduced to find out an MKO using an intelligent inference system to improve learner's learning capabilities in terms of a proposed metric called fuzzy associative matrix. This matrix can be utilized to guide the collaborative e-learning system for finding out the MKO as the best choice for very effective collaborative e-learning. Simulation study using NetLogo has been carried out to evaluate the performance of the proposed strategy. Simulation results show that the proposed strategy provides an optimal solution in ascertaining an MKO among peers in collaborative E-learning environments.
协作式电子学习是一种学习者通过使用计算机与同伴群体成员进行互动来学习的环境。根据协作电子学习会话中的协作能力来评估学习者,可以基于几个参数进行量化。这些参数包括学习者在协作电子学习会议中的贡献;学习者在协作式电子学习会话中的协作历史以及学习者在其参与的组中的知识水平。就这一发现而言,更有知识的人(MKO)是指在特定任务、过程或概念方面比其他学习者有更好的理解和更高的能力水平的人。他能使别人有效地学习。通过找出MKO,可以形成有效和高效的小组,从而提高学习者在小组中的学习能力,使小组中的同伴最大限度地参与,提高知识水平。在本文中,我们引入了一个模糊模型,利用一个智能推理系统来寻找MKO,并根据一个被称为模糊关联矩阵的度量来提高学习者的学习能力。利用该矩阵可以指导协同电子学习系统找出最优的MKO,从而实现高效的协同电子学习。利用NetLogo进行了仿真研究,以评估所提出策略的性能。仿真结果表明,该策略为协作电子学习环境中同伴间MKO的确定提供了最优解。
{"title":"Ascertaining the More Knowledgeable Other among peers in collaborative e-learning environment","authors":"A. Safia, T. Mala","doi":"10.1109/ICOAC.2012.6416852","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416852","url":null,"abstract":"Collaborative E-Learning is an environment where in learners learn through interaction among peer group mates using computers. Evaluating learners in terms of collaboration capabilities in a collaborative e-learning session can be quantified based on several parameters. These parameters include learner's contribution in the collaborative e-learning sessions; collaboration history of a learner in collaborative e-learning sessions and the level of knowledge of the learner in the group in which he participates. In respect to this finding the More Knowledgeable Other (MKO) person refers to someone who has a better understanding and higher ability level than other learners, with respect to a particular task, process, or concept. He can make others learn effectively. By finding out the MKO it is possible to form effective and efficient group where in learner's learning capabilities in a group can be enhanced so that the peers in the group participate to maximum extent and there is an increase in knowledge level. In this paper, a fuzzy model is introduced to find out an MKO using an intelligent inference system to improve learner's learning capabilities in terms of a proposed metric called fuzzy associative matrix. This matrix can be utilized to guide the collaborative e-learning system for finding out the MKO as the best choice for very effective collaborative e-learning. Simulation study using NetLogo has been carried out to evaluate the performance of the proposed strategy. Simulation results show that the proposed strategy provides an optimal solution in ascertaining an MKO among peers in collaborative E-learning environments.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125866438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A novel approach for personalizing the web using user profiling ontologies 一种使用用户分析本体来个性化web的新方法
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416815
S. Vigneshwari, M. Aramudhan
Web personalization has become the recent trend in the internet era. There are various means for web personalization. On such approach is by creating ontologies and personalizing the web. Ontologies play an important role in the creation of the semantic web. In this paper a novel approach has been proposed for creation of user profiling ontologies(UPO) which is useful for personalizing the web. In this approach a cross ontology mechanism has been applied. The user queries are continuously monitored. Then the stemming process takes place and important keywords are extracted and the frequently visited web pages are ranked. Based on this UPO is automatically generated. Here ontology mapping mechanism is followed for mapping the UPO with that of the global ontology and thus the web pages are personalized which are compatible to user queries. Data samples are collected and the results show a good improvement using this approach.
网络个性化已成为互联网时代的最新趋势。网页个性化有多种方式。这种方法是通过创建本体和个性化网络。本体在语义网的创建中起着重要的作用。本文提出了一种新的用户剖析本体(UPO)创建方法,该方法可用于个性化web。该方法采用了一种跨本体机制。持续监控用户查询。然后进行词干提取,提取出重要的关键词,并对频繁访问的网页进行排序。在此基础上自动生成UPO。这里遵循本体映射机制,将UPO与全局本体进行映射,从而使网页个性化,并与用户查询兼容。数据样本的收集和结果表明,使用这种方法有很好的改进。
{"title":"A novel approach for personalizing the web using user profiling ontologies","authors":"S. Vigneshwari, M. Aramudhan","doi":"10.1109/ICOAC.2012.6416815","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416815","url":null,"abstract":"Web personalization has become the recent trend in the internet era. There are various means for web personalization. On such approach is by creating ontologies and personalizing the web. Ontologies play an important role in the creation of the semantic web. In this paper a novel approach has been proposed for creation of user profiling ontologies(UPO) which is useful for personalizing the web. In this approach a cross ontology mechanism has been applied. The user queries are continuously monitored. Then the stemming process takes place and important keywords are extracted and the frequently visited web pages are ranked. Based on this UPO is automatically generated. Here ontology mapping mechanism is followed for mapping the UPO with that of the global ontology and thus the web pages are personalized which are compatible to user queries. Data samples are collected and the results show a good improvement using this approach.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115011694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2012 Fourth International Conference on Advanced Computing (ICoAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1