首页 > 最新文献

2011 International Conference on Computational Intelligence and Communication Networks最新文献

英文 中文
Enhancing the MANET Nodes of Hierarchical Architecture for Communication between Mobile Ad Hoc Network and Internet Using Cluster Head Gateway 利用簇头网关增强移动自组网与Internet通信的分层结构MANET节点
A. Bagwari, R. Jee
As we know in Mobile Ad hoc network our Nodes are highly mobile. They move around the Network. Due to this network topology and number of neighboring nodes in each node frequently change. Movement of nodes from one to another network also affect to the communication between them. To connect the wired and wireless networks particularly the Mobile ad hoc Network is very interesting in real world situations due to its popularity and usefulness. As in our paper we given and explained a approach in which cluster head and gateway will be same and that node is known as cluster head gateway (CHG), in which all the responsibilities of cluster head and gateway will be perform by the CHG and we introduces the prediction table concepts and discusses a mechanism for selecting an alternate route in case if the CHG is unable to forward the packets to the destination, This approach providing Bi-directional connectivity between MANET and wired Nodes. In this paper we are extending the network coverage and the performance measured with other large N/w's. Finally, this paper conducts simulation experiments in the conditions where we connecting MANET nodes to the wired nodes using different networks.
正如我们所知,在移动自组织网络中,我们的节点是高度移动的。他们在网络中移动。由于这种网络拓扑结构和每个节点的相邻节点数量经常变化。节点从一个网络移动到另一个网络也会影响它们之间的通信。连接有线和无线网络,特别是移动自组织网络,由于其普及和有用性,在现实世界的情况下非常有趣。在我们的论文中,我们给出并解释了一种方法,其中簇头和网关相同,该节点被称为簇头网关(CHG),其中簇头和网关的所有职责将由CHG执行,我们介绍了预测表的概念,并讨论了在CHG无法将数据包转发到目的地时选择备用路由的机制。这种方法在MANET和有线节点之间提供双向连接。在本文中,我们扩展了网络覆盖范围,并测量了其他大信噪比的性能。最后,本文在使用不同网络将MANET节点连接到有线节点的情况下进行了仿真实验。
{"title":"Enhancing the MANET Nodes of Hierarchical Architecture for Communication between Mobile Ad Hoc Network and Internet Using Cluster Head Gateway","authors":"A. Bagwari, R. Jee","doi":"10.1109/CICN.2011.71","DOIUrl":"https://doi.org/10.1109/CICN.2011.71","url":null,"abstract":"As we know in Mobile Ad hoc network our Nodes are highly mobile. They move around the Network. Due to this network topology and number of neighboring nodes in each node frequently change. Movement of nodes from one to another network also affect to the communication between them. To connect the wired and wireless networks particularly the Mobile ad hoc Network is very interesting in real world situations due to its popularity and usefulness. As in our paper we given and explained a approach in which cluster head and gateway will be same and that node is known as cluster head gateway (CHG), in which all the responsibilities of cluster head and gateway will be perform by the CHG and we introduces the prediction table concepts and discusses a mechanism for selecting an alternate route in case if the CHG is unable to forward the packets to the destination, This approach providing Bi-directional connectivity between MANET and wired Nodes. In this paper we are extending the network coverage and the performance measured with other large N/w's. Finally, this paper conducts simulation experiments in the conditions where we connecting MANET nodes to the wired nodes using different networks.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"19 15-16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123568461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation of Face Recognition Based on DWT and DT-CWT Using Multi-matching Classifiers 基于多匹配分类器的DWT和DT-CWT人脸识别性能评价
R. K, K. Raja
Biometrics recognition tool has great emphasis in both research and practical applications. With an increasing requirement on security, automated personal identification and verification based biometrics has been receiving extensive attention over the past decade. In this paper Performance Evaluation of Face Recognition based on DWT and DT-CWT using Multi-matching Classifiers (FRMC) is proposed. The face images captured from the persons differ in size and hence image dimensions are converted into 2n * 2n dimension, for DT-CWT. The two level DWT is applied on face images to generate four sub bands. The DT-CWT is applied on only LL sub band to generate DT-CWT coefficients, which forms features for face images. The features of database and test face are compared using Euclidian Distance, Random Forest and Support Vector Machine matching algorithms. It is observed that correct recognition rate, false acceptance rate and false reject rate are better in the case of proposed method as compared to existing techniques.
生物特征识别工具在研究和实际应用中都得到了极大的重视。随着人们对安全的要求越来越高,基于生物识别技术的个人自动识别和验证在过去的十年中受到了广泛的关注。提出了基于多匹配分类器(FRMC)的小波变换和DT-CWT人脸识别性能评价方法。从人身上捕获的人脸图像大小不同,因此将图像尺寸转换为2n * 2n维,用于DT-CWT。将二级小波变换应用于人脸图像,生成4个子带。仅在LL子带上应用DT-CWT来生成DT-CWT系数,这些系数形成人脸图像的特征。利用欧几里得距离、随机森林和支持向量机匹配算法对数据库和测试人脸的特征进行比较。结果表明,该方法的正确识别率、错误接受率和错误拒绝率均优于现有方法。
{"title":"Performance Evaluation of Face Recognition Based on DWT and DT-CWT Using Multi-matching Classifiers","authors":"R. K, K. Raja","doi":"10.1109/CICN.2011.130","DOIUrl":"https://doi.org/10.1109/CICN.2011.130","url":null,"abstract":"Biometrics recognition tool has great emphasis in both research and practical applications. With an increasing requirement on security, automated personal identification and verification based biometrics has been receiving extensive attention over the past decade. In this paper Performance Evaluation of Face Recognition based on DWT and DT-CWT using Multi-matching Classifiers (FRMC) is proposed. The face images captured from the persons differ in size and hence image dimensions are converted into 2n * 2n dimension, for DT-CWT. The two level DWT is applied on face images to generate four sub bands. The DT-CWT is applied on only LL sub band to generate DT-CWT coefficients, which forms features for face images. The features of database and test face are compared using Euclidian Distance, Random Forest and Support Vector Machine matching algorithms. It is observed that correct recognition rate, false acceptance rate and false reject rate are better in the case of proposed method as compared to existing techniques.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124609317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Comparison of 2D Moment Based Description Techniques for Classification of Bamboo Plant 基于二维矩的竹植物分类描述技术比较
Krishnavir Singh, I. Gupta, Sangeeta Gupta
Generic Fourier descriptor yield spectral features and have better retrieval performance due to multi-resolution analysis in both radial and circular directions of the shape. In the proposed work, an automated bamboo species recognition system based on shape features of bamboo culm sheath has been developed using Generic Fourier Moment and compare the result with Hu moment. The performance of the classifier is compared based on the classifier accuracy and conclude that the Fourier moment have significantly good results compare to Hu moment. The results obtained shows considerable recognition accuracy proving that the techniques used is suitable to be implemented for commercial purposes.
通用傅里叶描述子可以在形状的径向和圆形方向上进行多分辨率分析,从而产生光谱特征并具有更好的检索性能。本文提出了一种基于竹鞘形状特征的基于通用傅里叶矩的竹种自动识别系统,并与胡矩进行了比较。根据分类器的精度对分类器的性能进行了比较,得出傅里叶矩与胡矩相比有明显好的结果。结果表明,该方法具有较高的识别精度,适用于商业应用。
{"title":"A Comparison of 2D Moment Based Description Techniques for Classification of Bamboo Plant","authors":"Krishnavir Singh, I. Gupta, Sangeeta Gupta","doi":"10.1109/CICN.2011.4","DOIUrl":"https://doi.org/10.1109/CICN.2011.4","url":null,"abstract":"Generic Fourier descriptor yield spectral features and have better retrieval performance due to multi-resolution analysis in both radial and circular directions of the shape. In the proposed work, an automated bamboo species recognition system based on shape features of bamboo culm sheath has been developed using Generic Fourier Moment and compare the result with Hu moment. The performance of the classifier is compared based on the classifier accuracy and conclude that the Fourier moment have significantly good results compare to Hu moment. The results obtained shows considerable recognition accuracy proving that the techniques used is suitable to be implemented for commercial purposes.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130229039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Symmetric key management and distribution techniques in wireless ad hoc networks 无线自组织网络中的对称密钥管理和分发技术
M. Krishna, M. Doja
In secure ad hoc network authorized nodes access the network based on network initialization, authentication and secure communication. Authentication forms the core in security, where nodes exchange data based on key management. Trusted Third Party (TPP) or Certificate Authority (CA) function as trust infrastructure and enable the nodes to access or leave the network. The main feature of security protocols is key management, which includes key distribution and key update. This article gives analysis of various key management and symmetric key distribution techniques in wireless ad hoc network. Master key, pair wise key and random key pre-distribution techniques are used in key management. Analytical methods confirm that for a less dense network master key is used and for a large dense network random key is used. In order to minimize the key management complexity in security protocols, symmetric key distribution is used. Key distribution techniques are classified based node attributes as local area, wide area and threshold area conditions. Analysis of various key distribution method concludes that (i) if keys are compromised in a local area, self-healing key management technique is used (ii) if keys are compromised in wide area, distributed Diffie Hellman is used and (iii) if keys are compromised in threshold area conditions, then subset of m keys are distributed in m different locations.
在安全自组织网络中,授权节点通过网络初始化、认证和安全通信来访问网络。身份验证是安全性的核心,节点根据密钥管理交换数据。可信第三方(TPP)或证书颁发机构(CA)作为信任基础设施,使节点能够访问或离开网络。安全协议的主要特性是密钥管理,包括密钥分发和密钥更新。本文分析了无线自组织网络中的各种密钥管理和对称密钥分发技术。密钥管理采用了主密钥、对密钥和随机密钥预分发技术。分析方法证实,对于密度较小的网络使用主密钥,对于密度较大的网络使用随机密钥。为了降低安全协议中密钥管理的复杂性,采用了对称密钥分发。密钥分发技术根据节点属性分为局部、广域和阈值区域条件。通过对各种密钥分发方法的分析得出:(i)如果密钥在局部区域被泄露,则使用自修复密钥管理技术;(ii)如果密钥在广域区域被泄露,则使用分布式Diffie Hellman; (iii)如果密钥在阈值区域条件下被泄露,则m个密钥的子集分布在m个不同的位置。
{"title":"Symmetric key management and distribution techniques in wireless ad hoc networks","authors":"M. Krishna, M. Doja","doi":"10.1109/CICN.2011.158","DOIUrl":"https://doi.org/10.1109/CICN.2011.158","url":null,"abstract":"In secure ad hoc network authorized nodes access the network based on network initialization, authentication and secure communication. Authentication forms the core in security, where nodes exchange data based on key management. Trusted Third Party (TPP) or Certificate Authority (CA) function as trust infrastructure and enable the nodes to access or leave the network. The main feature of security protocols is key management, which includes key distribution and key update. This article gives analysis of various key management and symmetric key distribution techniques in wireless ad hoc network. Master key, pair wise key and random key pre-distribution techniques are used in key management. Analytical methods confirm that for a less dense network master key is used and for a large dense network random key is used. In order to minimize the key management complexity in security protocols, symmetric key distribution is used. Key distribution techniques are classified based node attributes as local area, wide area and threshold area conditions. Analysis of various key distribution method concludes that (i) if keys are compromised in a local area, self-healing key management technique is used (ii) if keys are compromised in wide area, distributed Diffie Hellman is used and (iii) if keys are compromised in threshold area conditions, then subset of m keys are distributed in m different locations.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122008223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Analysis of Deformities in Lung Using Short Time Fourier Transform Spectrogram Analysis on Lung Sound 利用短时间傅里叶变换频谱分析肺声的肺部畸形
A. Parkhi, M. Pawar
The lung itself cannot generate sound if there is no airflow, pressure differences between structures within the thorax. Listening and interpreting lung sounds by a stethoscope had been an important component of screening and diagnosing lung diseases. However this practice has always been vulnerable to poor audibility, inter-observer variations (between different physicians) and poor reproducibility. Lung sound consists of two main types of sound Basic Lung sound and adventitious sound. The timing, repeatability, and shape of crackles are important parameters for diagnosis. In this paper we aim at automatic analysis of lung sounds for wheeze and crackle detection and classification.
如果没有气流,胸腔内部结构之间的压力差,肺本身就不能发声。听诊器听和解释肺音一直是筛查和诊断肺部疾病的重要组成部分。然而,这种做法总是容易受到可听性差、观察者之间(不同医生之间)的差异和可重复性差的影响。肺音主要有两种类型:基本肺音和外来音。裂纹产生的时间、可重复性和形状是诊断的重要参数。本文的目的是对肺音进行自动分析,以进行喘息和噼啪声的检测和分类。
{"title":"Analysis of Deformities in Lung Using Short Time Fourier Transform Spectrogram Analysis on Lung Sound","authors":"A. Parkhi, M. Pawar","doi":"10.1109/CICN.2011.35","DOIUrl":"https://doi.org/10.1109/CICN.2011.35","url":null,"abstract":"The lung itself cannot generate sound if there is no airflow, pressure differences between structures within the thorax. Listening and interpreting lung sounds by a stethoscope had been an important component of screening and diagnosing lung diseases. However this practice has always been vulnerable to poor audibility, inter-observer variations (between different physicians) and poor reproducibility. Lung sound consists of two main types of sound Basic Lung sound and adventitious sound. The timing, repeatability, and shape of crackles are important parameters for diagnosis. In this paper we aim at automatic analysis of lung sounds for wheeze and crackle detection and classification.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122052160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Add-On to the ETS Algorithm to Improve Its Efficiency in Special Cases Such as a Crown Graph 附加到ETS算法,以提高其在特殊情况下的效率,如冠图
P. Jain, S. Mathur, P. Bhatt
The ETS (Edge Table Scanning) algorithm for graph coloring problem colors almost any graph with minimum number of colors, but still, it has a limitation. This paper explains that limitation and also introduces an approach to resolve the limitation. We here-after call that approach as the "sequencing" algorithm.
边缘表扫描(Edge Table Scanning, ETS)算法用于图的着色问题,几乎可以用最小的颜色数对任何图进行着色,但它仍然有局限性。本文阐述了这一局限性,并介绍了解决这一局限性的方法。我们将这种方法称为“排序”算法。
{"title":"Add-On to the ETS Algorithm to Improve Its Efficiency in Special Cases Such as a Crown Graph","authors":"P. Jain, S. Mathur, P. Bhatt","doi":"10.1109/CICN.2011.22","DOIUrl":"https://doi.org/10.1109/CICN.2011.22","url":null,"abstract":"The ETS (Edge Table Scanning) algorithm for graph coloring problem colors almost any graph with minimum number of colors, but still, it has a limitation. This paper explains that limitation and also introduces an approach to resolve the limitation. We here-after call that approach as the \"sequencing\" algorithm.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116117603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling of Sigma-Delta Modulator Non-idealities with Two Step Quantization in MATLAB/SIMULINK 基于MATLAB/SIMULINK的二步量化Sigma-Delta调制器非理想性建模
S. Jaykar, P. Palsodkar, P. Dakhole
An architecture to simplify the circuit implementation of analog-to-digital (A/D) converter in a sigma-delta (S?) modulator is proposed. The two-step quantization technique is utilized to design architecture of S? modulator. The architecture is based on dividing the A/D conversion into two time steps for achieving resolution improvement without decreasing speed. The novel architecture is designed to obtain high dynamic range of input signal, high signal-to-noise ratio and high reliability. Switched capacitor (SC) modulator performance is prone to various nonidealities, which affects overall circuit performance. In this paper a set of models are proposed which takes into account SC S? modulator nonidealities, such as sampling jitter, kT/C noise, and operational amplifier parameters (noise, finite dc gain, finite bandwidth, slew-rate and saturation voltages). Each nonidealities are modelled mathematically and their behaviour is verified using different analysis in MATLAB Simulink. Simulation results on a second-order SC S? modulator with two step quantization demonstrate the validity of the models proposed.
提出了一种简化sigma-delta (S?)调制器中模数(A/D)转换器电路实现的结构。采用两步量化技术设计了S?调制器。该架构基于将A/D转换分为两个时间步,以在不降低速度的情况下实现分辨率的提高。该结构具有输入信号高动态范围、高信噪比和高可靠性的特点。开关电容(SC)调制器的性能容易出现各种非理想性,从而影响电路的整体性能。本文提出了一套考虑SC - S?调制器的非理想性,如采样抖动、kT/C噪声和运算放大器参数(噪声、有限直流增益、有限带宽、慢速和饱和电压)。对各非理想性进行了数学建模,并在MATLAB Simulink中通过不同的分析对其行为进行了验证。二阶SC的仿真结果两步量化调制器验证了所提模型的有效性。
{"title":"Modeling of Sigma-Delta Modulator Non-idealities with Two Step Quantization in MATLAB/SIMULINK","authors":"S. Jaykar, P. Palsodkar, P. Dakhole","doi":"10.1109/CICN.2011.114","DOIUrl":"https://doi.org/10.1109/CICN.2011.114","url":null,"abstract":"An architecture to simplify the circuit implementation of analog-to-digital (A/D) converter in a sigma-delta (S?) modulator is proposed. The two-step quantization technique is utilized to design architecture of S? modulator. The architecture is based on dividing the A/D conversion into two time steps for achieving resolution improvement without decreasing speed. The novel architecture is designed to obtain high dynamic range of input signal, high signal-to-noise ratio and high reliability. Switched capacitor (SC) modulator performance is prone to various nonidealities, which affects overall circuit performance. In this paper a set of models are proposed which takes into account SC S? modulator nonidealities, such as sampling jitter, kT/C noise, and operational amplifier parameters (noise, finite dc gain, finite bandwidth, slew-rate and saturation voltages). Each nonidealities are modelled mathematically and their behaviour is verified using different analysis in MATLAB Simulink. Simulation results on a second-order SC S? modulator with two step quantization demonstrate the validity of the models proposed.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120936107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
P2PCS - A Pure Peer-to-Peer Computing System for Large Scale Computation Problems P2PCS -一个用于大规模计算问题的纯点对点计算系统
Jigyasu Dubey, V. Tokekar
Complex and large scale scientific computation problems require high computing machines to process data or jobs which are expensive in terms of money. One most successful and low cost mechanism for acquiring the necessary computation power for such type of application is the Peer-to-Peer computing paradigm, which makes use of the computational power of personal computers. The peer-to-peer (P2P) systems represent the applications that allow direct communication between peers and resource harvesting. In this paper we propose a generic Peer-to-Peer computing system (P2PCS) to process complex and large scale scientific computation problems. The system utilizes the CPU cycles of desktop PCs which are connected to the network to perform the computations. We are implementing this system in JAVA technology by using Sun's JXTA --JXSE 2.5 libraries.
复杂和大规模的科学计算问题需要高计算机器来处理数据或工作,这在金钱方面是昂贵的。获得此类应用程序所需的计算能力的最成功且成本最低的机制是点对点计算范式,它利用了个人计算机的计算能力。点对点(P2P)系统代表了允许点之间直接通信和资源收集的应用程序。本文提出了一种通用的点对点计算系统(P2PCS)来处理复杂和大规模的科学计算问题。该系统利用连接到网络的台式电脑的CPU周期来执行计算。我们通过使用Sun的JXTA—JXSE 2.5库,在JAVA技术中实现了这个系统。
{"title":"P2PCS - A Pure Peer-to-Peer Computing System for Large Scale Computation Problems","authors":"Jigyasu Dubey, V. Tokekar","doi":"10.1109/CICN.2011.126","DOIUrl":"https://doi.org/10.1109/CICN.2011.126","url":null,"abstract":"Complex and large scale scientific computation problems require high computing machines to process data or jobs which are expensive in terms of money. One most successful and low cost mechanism for acquiring the necessary computation power for such type of application is the Peer-to-Peer computing paradigm, which makes use of the computational power of personal computers. The peer-to-peer (P2P) systems represent the applications that allow direct communication between peers and resource harvesting. In this paper we propose a generic Peer-to-Peer computing system (P2PCS) to process complex and large scale scientific computation problems. The system utilizes the CPU cycles of desktop PCs which are connected to the network to perform the computations. We are implementing this system in JAVA technology by using Sun's JXTA --JXSE 2.5 libraries.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121381198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dual Wideband Stacked Patch Antenna for WiMax and WLAN Applications 用于WiMax和WLAN应用的双宽带堆叠贴片天线
V. Singh, Z. Ali, Ashutosh Kumar Singh
This paper presents dual wideband microstrip antenna which is designed using stacking configuration to give a better bandwidth as compared to single layer substrate design. The designed slotted stacked patch antenna can operate in the Wimax, (2.2-3.4 GHz) WLAN (2.40--2.48GHz), and UMTS II (2.50--2.69GHz) frequency band giving a maximum bandwidth of 37.95%. The air is used as a dielectric between the two stacks and a height of 10 mm is kept between the two stacks. The feeding technique used in the design is the coaxial probe feed and the impedance matching and radiation characteristics of the structure are investigated using MOM based IE3D. The simulation result shows that the proposed antenna can offer excellent performance for Wi Max and WLAN application.
本文提出了一种双宽带微带天线,该天线采用叠加结构设计,与单层衬底设计相比,具有更好的带宽。所设计的开槽堆叠贴片天线可以在Wimax (2.2-3.4 GHz)、WLAN (2.40- 2.48GHz)和UMTS II (2.50- 2.69GHz)频段工作,最大带宽为37.95%。空气用作两层之间的电介质,两层之间保持10mm的高度。设计中采用的馈电技术为同轴探头馈电,并利用基于MOM的IE3D对结构的阻抗匹配和辐射特性进行了研究。仿真结果表明,该天线在Wi - Max和WLAN应用中具有良好的性能。
{"title":"Dual Wideband Stacked Patch Antenna for WiMax and WLAN Applications","authors":"V. Singh, Z. Ali, Ashutosh Kumar Singh","doi":"10.1109/CICN.2011.66","DOIUrl":"https://doi.org/10.1109/CICN.2011.66","url":null,"abstract":"This paper presents dual wideband microstrip antenna which is designed using stacking configuration to give a better bandwidth as compared to single layer substrate design. The designed slotted stacked patch antenna can operate in the Wimax, (2.2-3.4 GHz) WLAN (2.40--2.48GHz), and UMTS II (2.50--2.69GHz) frequency band giving a maximum bandwidth of 37.95%. The air is used as a dielectric between the two stacks and a height of 10 mm is kept between the two stacks. The feeding technique used in the design is the coaxial probe feed and the impedance matching and radiation characteristics of the structure are investigated using MOM based IE3D. The simulation result shows that the proposed antenna can offer excellent performance for Wi Max and WLAN application.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126843400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Generalized Grid Quorum Consensus for Replica Control Protocol 副本控制协议的广义网格仲裁一致性
Vinit Kumar, A. Agarwal
In distributed systems it is often necessary to provide coordination among the multiple concurrent processes to tolerate the contention, periods of asynchrony and a number of failures. Quorum systems provide a decentralized approach for such coordination. In this paper, we propose a replica control protocol by using a Generalized-grid quorum consensus, which is the generalization of a Read-one-write-all (ROWA), Grid quorum consensus, D-Space quorum consensus and Multi-dimensional-grid quorum consensus protocols. This protocol provides a very high read availability and read capacity while maintaining the reconfigurable levels of write availability and fault tolerance.
在分布式系统中,通常需要在多个并发进程之间提供协调,以容忍争用、异步周期和大量故障。仲裁制度为这种协调提供了一种分散的方法。本文提出了一种基于广义网格仲裁共识的副本控制协议,该协议是对ROWA (Read-one-write-all)、网格仲裁共识、D-Space仲裁共识和多维网格仲裁共识协议的推广。该协议提供了非常高的读可用性和读容量,同时保持了可重构的写可用性和容错级别。
{"title":"Generalized Grid Quorum Consensus for Replica Control Protocol","authors":"Vinit Kumar, A. Agarwal","doi":"10.1109/CICN.2011.83","DOIUrl":"https://doi.org/10.1109/CICN.2011.83","url":null,"abstract":"In distributed systems it is often necessary to provide coordination among the multiple concurrent processes to tolerate the contention, periods of asynchrony and a number of failures. Quorum systems provide a decentralized approach for such coordination. In this paper, we propose a replica control protocol by using a Generalized-grid quorum consensus, which is the generalization of a Read-one-write-all (ROWA), Grid quorum consensus, D-Space quorum consensus and Multi-dimensional-grid quorum consensus protocols. This protocol provides a very high read availability and read capacity while maintaining the reconfigurable levels of write availability and fault tolerance.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126819161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2011 International Conference on Computational Intelligence and Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1