首页 > 最新文献

2014 International Conference on Parallel, Distributed and Grid Computing最新文献

英文 中文
Area and power efficient 4-bit comparator design by using 1-bit full adder module 采用1位全加法器模块设计的面积和功耗高效的4位比较器
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030705
Anjali Sharma, Pranshu Sharma
In this paper an area and power efficient 56T 4-bit comparator design has been presented by using GDI technique. The proposed 4-bit comparator design consist of 28 NMOS and 28 PMOS. A GDI full adder module has been used to design this comparator which consumes less area and power at 120 nm as compared to previous full adder designs. The proposed 4-bit comparator design is based on this area and power efficient 10T full adder module. To get area and power efficiency a centralized full adder module has been used which avoid cascade implementation of XOR module to get sum and carry output. Full adder modules outputs have been used for the generation of output of 4-bit comparator designs. The proposed 4-bit GDI comparator has been designed and simulated using DSCH 3.1 and Microwind 3.1 on 120nm. For proposed design Power and current variation with respect to the supply voltage has been performed on BSIM-4 using 120nm technology. Results show that Area of proposed 4-bit comparator design is 1320.3μm2 on 120nm technology. At 1.2V input supply voltage the proposed 4-bit GDI comparator consumes 13.739μW power at BSIM-4. At 1.2V proposed GDI 4-bit comparator has shown improvement of 6.3% in terms of area and 69.42% in power as compared to the PTL 4- bit comparator.
本文采用GDI技术设计了一种面积低、功耗低的56T 4位比较器。提出的4位比较器设计由28个NMOS和28个PMOS组成。该比较器采用了GDI全加法器模块,与以前的全加法器设计相比,该比较器在120nm处消耗的面积和功率更小。提出的4位比较器设计是基于该面积和功率高效的10T全加法器模块。为了获得面积和功率效率,采用了集中式全加法器模块,避免了异或模块级联实现和进位输出。全加法器模块输出已用于生成4位比较器设计的输出。采用DSCH 3.1和Microwind 3.1在120nm上设计并仿真了所提出的4位GDI比较器。对于提议的设计,功率和电流随电源电压的变化已经在BSIM-4上使用120nm技术进行了测试。结果表明,采用120nm工艺设计的4位比较器面积为1320.3μm2。在1.2V输入电压下,该4位GDI比较器在BSIM-4上的功耗为13.739μW。在1.2V电压下,与PTL 4位比较器相比,GDI 4位比较器的面积和功耗分别提高了6.3%和69.42%。
{"title":"Area and power efficient 4-bit comparator design by using 1-bit full adder module","authors":"Anjali Sharma, Pranshu Sharma","doi":"10.1109/PDGC.2014.7030705","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030705","url":null,"abstract":"In this paper an area and power efficient 56T 4-bit comparator design has been presented by using GDI technique. The proposed 4-bit comparator design consist of 28 NMOS and 28 PMOS. A GDI full adder module has been used to design this comparator which consumes less area and power at 120 nm as compared to previous full adder designs. The proposed 4-bit comparator design is based on this area and power efficient 10T full adder module. To get area and power efficiency a centralized full adder module has been used which avoid cascade implementation of XOR module to get sum and carry output. Full adder modules outputs have been used for the generation of output of 4-bit comparator designs. The proposed 4-bit GDI comparator has been designed and simulated using DSCH 3.1 and Microwind 3.1 on 120nm. For proposed design Power and current variation with respect to the supply voltage has been performed on BSIM-4 using 120nm technology. Results show that Area of proposed 4-bit comparator design is 1320.3μm2 on 120nm technology. At 1.2V input supply voltage the proposed 4-bit GDI comparator consumes 13.739μW power at BSIM-4. At 1.2V proposed GDI 4-bit comparator has shown improvement of 6.3% in terms of area and 69.42% in power as compared to the PTL 4- bit comparator.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"352 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114615319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A credit based routing mechanism to contrast selfish nodes in Delay tolerant networks 一种基于信用的路由机制来对比延迟容忍网络中的自私节点
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030759
Atul Sharma
Delay Tolerance Networks (DTNs) are the networks in which no end to end path is present between nodes or may partially present with limited period of time. To forward a packet, DTN uses store, carry and forward mechanism. Security is one of the key issues in DTN. There are various security threats such as message modification, packet dropped, and selfish node etc. Nodes which are the part of a DTN, can behave selfishly due to the network reservation policy, especially for node energy or storage space. This paper proposes a secure credit based incentive scheme to contrast selfish behavior and stimulate bundle forwarding cooperation among DTN nodes. The contact graphs are created to distribute credits to the participating nodes. The proposed scheme can be implemented in a fully distributed manner to thwart various attacks without relying on any tamperproof hardware. The vulnerability of the above mentioned protocols is simulated using ONE simulator.
延迟容忍网络是指节点之间不存在端到端路径或部分存在有限时间的网络。为了转发数据包,DTN采用存储、携带和转发机制。安全是DTN的关键问题之一。存在各种安全威胁,如消息修改、丢包、自私节点等。作为DTN组成部分的节点,由于网络预留策略的影响,可能会表现出自私自利的行为,特别是对于节点能量或存储空间。本文提出了一种基于安全信用的激励方案,以对比DTN节点之间的自私行为,刺激DTN节点之间的束转发合作。创建联系图是为了将信用分配给参与节点。提出的方案可以以完全分布式的方式实现,以阻止各种攻击,而不依赖于任何防篡改硬件。使用ONE模拟器对上述协议的漏洞进行了模拟。
{"title":"A credit based routing mechanism to contrast selfish nodes in Delay tolerant networks","authors":"Atul Sharma","doi":"10.1109/PDGC.2014.7030759","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030759","url":null,"abstract":"Delay Tolerance Networks (DTNs) are the networks in which no end to end path is present between nodes or may partially present with limited period of time. To forward a packet, DTN uses store, carry and forward mechanism. Security is one of the key issues in DTN. There are various security threats such as message modification, packet dropped, and selfish node etc. Nodes which are the part of a DTN, can behave selfishly due to the network reservation policy, especially for node energy or storage space. This paper proposes a secure credit based incentive scheme to contrast selfish behavior and stimulate bundle forwarding cooperation among DTN nodes. The contact graphs are created to distribute credits to the participating nodes. The proposed scheme can be implemented in a fully distributed manner to thwart various attacks without relying on any tamperproof hardware. The vulnerability of the above mentioned protocols is simulated using ONE simulator.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129941169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Simulation and analysis of authentication protocols for mobile Internet of Things (MIoT) 移动物联网认证协议仿真与分析
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030783
Adarsh Kumar, K. Gopal, A. Aggarwal
Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the information. Connectivity of mobile devices helps in managing the various social activities. Security is a major concern while integrating the heterogeneous devices in these social networks. Things embedded with radio frequency based identifications are having scarcity of resources thus require lightweight cryptography aspects. This work proposes a single bar circular topology based authentication protocol for MIoT. This protocol helps in authenticating the mobile devices for constructing secure network. The proposed protocol is modeled using Alloy model. Delay analysis shows that construction of secure network is possible with maximum delay of 0.91 msec. Node can enter or leave the network with minimum of 0.13 and maximum of 0.20 msec. Further, Zone Routing Protocol (ZRP) is considered to be the best protocol for constructing a secure network.
为了增加信息的可用性,将事物集成在一起。物联网是移动设备的连接,以扩展信息。移动设备的连接有助于管理各种社交活动。在这些社交网络中集成异构设备时,安全性是一个主要问题。嵌入基于射频识别的事物资源稀缺,因此需要轻量级加密方面。本文提出了一种基于单条圆形拓扑的MIoT认证协议。该协议有助于对移动设备进行认证,从而构建安全的网络。采用Alloy模型对协议进行建模。延迟分析表明,最大延迟为0.91 msec,可以构建安全网络。节点进入或离开网络的时间最小为0.13毫秒,最大为0.20毫秒。此外,区域路由协议(ZRP)被认为是构建安全网络的最佳协议。
{"title":"Simulation and analysis of authentication protocols for mobile Internet of Things (MIoT)","authors":"Adarsh Kumar, K. Gopal, A. Aggarwal","doi":"10.1109/PDGC.2014.7030783","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030783","url":null,"abstract":"Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the information. Connectivity of mobile devices helps in managing the various social activities. Security is a major concern while integrating the heterogeneous devices in these social networks. Things embedded with radio frequency based identifications are having scarcity of resources thus require lightweight cryptography aspects. This work proposes a single bar circular topology based authentication protocol for MIoT. This protocol helps in authenticating the mobile devices for constructing secure network. The proposed protocol is modeled using Alloy model. Delay analysis shows that construction of secure network is possible with maximum delay of 0.91 msec. Node can enter or leave the network with minimum of 0.13 and maximum of 0.20 msec. Further, Zone Routing Protocol (ZRP) is considered to be the best protocol for constructing a secure network.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133198720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
An efficient energy saving task consolidation algorithm for cloud computing systems 一种高效的云计算系统节能任务整合算法
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030753
S. K. Panda, P. K. Jana
Task consolidation is a process of maximizing resource utilization in a cloud system. However, maximum usage of resources does not necessarily imply that there will be proper use of energy as some resources which are sitting idle, also consume considerable amount of energy. Recent studies show that energy consumption due to idle resources is approximately 1 to 20%. So, the idle resources are assigned with some tasks to utilize the idle period, which in turn reduces the overall energy consumption of the resources. Note that higher resource utilization merely leads to high energy consumption. So, the tasks are likely to be assigned to all the resources for the proper use of energy. In this paper, we propose an energy saving task consolidation (ESTC) which minimizes the energy consumption by utilizing the idle period of the resources in a cloud environment. ESTC achieves it by assigning few tasks to all available resources to overcome the idleness of the resources. In addition to this, it calculates the energy consumption on arrival of a task to make the scheduling assessment. We perform extensive experiments to measure the performance of ESTC and we compare it with the recent energy-aware task consolidation (ETC) algorithm. The results show that the proposed algorithm outperforms ETC in terms of energy consumption and the total number of task completion.
任务整合是云系统中最大限度地利用资源的过程。然而,最大限度地利用资源并不一定意味着适当地利用能源,因为一些闲置的资源也消耗了相当多的能源。最近的研究表明,由于闲置资源造成的能源消耗约占1 - 20%。因此,空闲资源被分配了一些任务来利用空闲时间,从而降低了资源的总体能耗。请注意,更高的资源利用率只会导致更高的能源消耗。因此,任务很可能被分配给所有的资源,以正确使用能源。在本文中,我们提出了一种节能任务整合(ESTC),它通过利用云环境中资源的空闲期来最小化能源消耗。ESTC通过对所有可用资源分配很少的任务来克服资源的闲置性。此外,它还计算任务到达时的能耗,以进行调度评估。我们进行了大量的实验来衡量ESTC的性能,并将其与最近的能量感知任务巩固(ETC)算法进行了比较。结果表明,该算法在能耗和任务完成总数方面优于ETC算法。
{"title":"An efficient energy saving task consolidation algorithm for cloud computing systems","authors":"S. K. Panda, P. K. Jana","doi":"10.1109/PDGC.2014.7030753","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030753","url":null,"abstract":"Task consolidation is a process of maximizing resource utilization in a cloud system. However, maximum usage of resources does not necessarily imply that there will be proper use of energy as some resources which are sitting idle, also consume considerable amount of energy. Recent studies show that energy consumption due to idle resources is approximately 1 to 20%. So, the idle resources are assigned with some tasks to utilize the idle period, which in turn reduces the overall energy consumption of the resources. Note that higher resource utilization merely leads to high energy consumption. So, the tasks are likely to be assigned to all the resources for the proper use of energy. In this paper, we propose an energy saving task consolidation (ESTC) which minimizes the energy consumption by utilizing the idle period of the resources in a cloud environment. ESTC achieves it by assigning few tasks to all available resources to overcome the idleness of the resources. In addition to this, it calculates the energy consumption on arrival of a task to make the scheduling assessment. We perform extensive experiments to measure the performance of ESTC and we compare it with the recent energy-aware task consolidation (ETC) algorithm. The results show that the proposed algorithm outperforms ETC in terms of energy consumption and the total number of task completion.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130057351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Influence of link sensing mechanism of IMEP on the performance of TORA under different mobility models 不同迁移模型下IMEP链路感知机制对TORA性能的影响
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030708
A. Kaur, Meenakshi Mittal
The performance evaluation of Mobile Ad Hoc Network (MANET) routing protocols is an important as well as open area of research worldwide. Temporally Ordered Routing Algorithm (TORA) is an adaptable and distributed MANET routing protocol which is dependent on the services of Internet MANET Encapsulation Protocol (IMEP) for its various necessary functions like link status detection. The incorrect link failure detection by IMEP leads to creation of congested network and initiation of avoidable route maintenance in TORA. Thus changes need to be introduced in the link sensing mechanism provided by IMEP to improve the detection of links in TORA. According to previously available research, if the maximum number of OBM retransmissions is increased, significant improvement in the performance of TORA is noticed. This modification has been implemented in this paper and performance of Enhanced TORA is evaluated under Random-Waypoint model, Manhattan-Grid mobility model and Random-Direction model using FTP traffic with 10 connections. The results are then compared with those of original TORA using various performance metrics like Packet Delivery Ratio, Average End to End Delay and Routing Overhead.
移动自组网(MANET)路由协议的性能评估是一个重要且开放的研究领域。时序路由算法(TORA)是一种适应性强的分布式MANET路由协议,它依赖于Internet MANET封装协议(IMEP)的服务来实现链路状态检测等各种必要功能。IMEP错误的链路故障检测会导致网络拥塞,引发TORA中可避免的路由维护。因此,需要对IMEP提供的链路感知机制进行修改,以改进TORA中链路的检测。根据先前的研究,如果增加OBM重传的最大次数,可以注意到TORA性能的显着改善。本文实现了这一改进,并在随机路径点模型、曼哈顿网格移动模型和随机方向模型下,使用10个连接的FTP流量对增强的TORA性能进行了评估。然后,使用各种性能指标(如数据包传送率,平均端到端延迟和路由开销)将结果与原始TORA进行比较。
{"title":"Influence of link sensing mechanism of IMEP on the performance of TORA under different mobility models","authors":"A. Kaur, Meenakshi Mittal","doi":"10.1109/PDGC.2014.7030708","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030708","url":null,"abstract":"The performance evaluation of Mobile Ad Hoc Network (MANET) routing protocols is an important as well as open area of research worldwide. Temporally Ordered Routing Algorithm (TORA) is an adaptable and distributed MANET routing protocol which is dependent on the services of Internet MANET Encapsulation Protocol (IMEP) for its various necessary functions like link status detection. The incorrect link failure detection by IMEP leads to creation of congested network and initiation of avoidable route maintenance in TORA. Thus changes need to be introduced in the link sensing mechanism provided by IMEP to improve the detection of links in TORA. According to previously available research, if the maximum number of OBM retransmissions is increased, significant improvement in the performance of TORA is noticed. This modification has been implemented in this paper and performance of Enhanced TORA is evaluated under Random-Waypoint model, Manhattan-Grid mobility model and Random-Direction model using FTP traffic with 10 connections. The results are then compared with those of original TORA using various performance metrics like Packet Delivery Ratio, Average End to End Delay and Routing Overhead.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"735 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114066061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Super-fast parallel eigenface implementation on GPU for face recognition 基于GPU的人脸识别超快速并行特征脸实现
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030729
Urvesh Devani, V. Nikam, B. Meshram
Eigenface is one of the most common appearance based approaches for face recognition. Eigenfaces are the principal components which represent the training faces. Using Principal Component Analysis, each face is represented by very few parameters called weight vectors or feature vectors. While this makes testing process easy, it also includes cumbersome process of generating eigenspace and projecting every training image onto it to extract weight vectors. This approach works well with small set of images. As number of images to train increases, time taken for generating eigenspace and weight vectors also increases rapidly and it will not be feasible to recognize face in big data or perform real time video analysis. In this paper, we propose a super-fast parallel solution which harnesses the power of GPU and utilizes benefits of the thousands of cores to compute accurate match in fraction of second. We have implemented Parallel Eigenface, the first complete super-fast Parallel Eigenface implementation for face recognition, using CUDA on NVIDIA K20 GPU. Focus of the research has been to gain maximum performance by implementing highly optimized kernels for complete approach and utilizing available fastest library functions. We have used dataset of different size for training and noted very high increase in speedup. We are able to achieve highest 460X speed up for weight vectors generation of 1000 training images. We also get 73X speedup for overall training process on the same dataset. Speedup tends to increase with respect to training data, proving the scalability of solution. Results prove that our parallel implementation is best fit for various video analytics applications and real time face recognition. It also shows strong promise for excessive use of GPUs in face recognition systems.
特征脸是人脸识别中最常见的基于外观的方法之一。特征面是代表训练面的主成分。使用主成分分析,每个人脸由称为权重向量或特征向量的很少几个参数表示。虽然这使得测试过程变得简单,但它也包含了生成特征空间并将每个训练图像投影到特征空间以提取权重向量的繁琐过程。这种方法适用于小图像集。随着待训练图像数量的增加,生成特征空间和权向量所需的时间也在迅速增加,在大数据中进行人脸识别或实时视频分析将不可行。在本文中,我们提出了一种超高速并行解决方案,该方案利用GPU的强大功能和数千核的优势,在几分之一秒内计算出精确的匹配。我们在NVIDIA K20 GPU上使用CUDA实现了并行特征脸,这是第一个完整的超快速并行特征脸人脸识别实现。研究的重点是通过为完整的方法实现高度优化的内核和利用可用的最快的库函数来获得最大的性能。我们使用不同大小的数据集进行训练,并注意到加速的提高非常高。对于1000张训练图像的权重向量生成,我们能够达到最高460X的速度。在相同的数据集上,我们也获得了73X的整体训练过程加速。相对于训练数据,加速倾向于增加,证明了解决方案的可扩展性。结果表明,我们的并行实现最适合各种视频分析应用和实时人脸识别。它还显示了在人脸识别系统中过度使用gpu的强大前景。
{"title":"Super-fast parallel eigenface implementation on GPU for face recognition","authors":"Urvesh Devani, V. Nikam, B. Meshram","doi":"10.1109/PDGC.2014.7030729","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030729","url":null,"abstract":"Eigenface is one of the most common appearance based approaches for face recognition. Eigenfaces are the principal components which represent the training faces. Using Principal Component Analysis, each face is represented by very few parameters called weight vectors or feature vectors. While this makes testing process easy, it also includes cumbersome process of generating eigenspace and projecting every training image onto it to extract weight vectors. This approach works well with small set of images. As number of images to train increases, time taken for generating eigenspace and weight vectors also increases rapidly and it will not be feasible to recognize face in big data or perform real time video analysis. In this paper, we propose a super-fast parallel solution which harnesses the power of GPU and utilizes benefits of the thousands of cores to compute accurate match in fraction of second. We have implemented Parallel Eigenface, the first complete super-fast Parallel Eigenface implementation for face recognition, using CUDA on NVIDIA K20 GPU. Focus of the research has been to gain maximum performance by implementing highly optimized kernels for complete approach and utilizing available fastest library functions. We have used dataset of different size for training and noted very high increase in speedup. We are able to achieve highest 460X speed up for weight vectors generation of 1000 training images. We also get 73X speedup for overall training process on the same dataset. Speedup tends to increase with respect to training data, proving the scalability of solution. Results prove that our parallel implementation is best fit for various video analytics applications and real time face recognition. It also shows strong promise for excessive use of GPUs in face recognition systems.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116694899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Effective asthma disease prediction using naive Bayes — Neural network fusion technique 应用朴素贝叶斯-神经网络融合技术对哮喘疾病进行有效预测
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030730
Saloni Aneja, Sangeeta Lal
Asthma is a lung disease caused by the inflammation and narrowing of the airways that causes recurrent attacks of breathlessness and wheezing, and often can be life-threatening. Around 15-20 million people are suffering from asthma in India[1]. This paper aims at analyzing various data mining techniques for the prediction of asthma. The observations show that the fusion approach of naive bayes and neural network proved to be the best among classification algorithms in the diagnosis of asthma. This methodology is evaluated using 1024 raw data obtained from a city hospital. The proposed approach helps patients in their diagnosis of asthma.
哮喘是一种由炎症和气道狭窄引起的肺部疾病,会导致反复发作的呼吸困难和喘息,通常会危及生命。印度大约有1500万到2000万人患有哮喘。本文旨在分析用于哮喘预测的各种数据挖掘技术。结果表明,朴素贝叶斯与神经网络的融合方法是哮喘诊断的最佳分类算法。使用从一家城市医院获得的1024份原始数据对该方法进行了评估。提出的方法有助于患者对哮喘的诊断。
{"title":"Effective asthma disease prediction using naive Bayes — Neural network fusion technique","authors":"Saloni Aneja, Sangeeta Lal","doi":"10.1109/PDGC.2014.7030730","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030730","url":null,"abstract":"Asthma is a lung disease caused by the inflammation and narrowing of the airways that causes recurrent attacks of breathlessness and wheezing, and often can be life-threatening. Around 15-20 million people are suffering from asthma in India[1]. This paper aims at analyzing various data mining techniques for the prediction of asthma. The observations show that the fusion approach of naive bayes and neural network proved to be the best among classification algorithms in the diagnosis of asthma. This methodology is evaluated using 1024 raw data obtained from a city hospital. The proposed approach helps patients in their diagnosis of asthma.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132829569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Modeling and analysis of RFID authentication protocols for supply chain management 供应链管理RFID认证协议的建模与分析
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030752
Adarsh Kumar, K. Gopal, A. Aggarwal
A secure interconnection of objects through RFID technology extends the range of information availability. Security in this integration is achievable through proper identification, authentication, grouping / yoking, distance bounding, and tag and ownership transfer protocols. This work analyzes the computational and communicational cost of group and authentication protocols. Further, these protocols are modeled and analyzed using alloy model. Results show that a network of 255 nodes can be constructed with delays of 9.6 msec and 7.6 msec using peer to peer and centralized connectivity respectively.
通过RFID技术实现对象的安全互连,扩展了信息可用性的范围。这种集成中的安全性可以通过适当的标识、身份验证、分组/绑定、距离边界以及标记和所有权转移协议来实现。本文分析了组协议和认证协议的计算成本和通信成本。此外,还利用合金模型对这些协议进行了建模和分析。结果表明,采用点对点连接和集中式连接可构建255个节点的网络,时延分别为9.6 msec和7.6 msec。
{"title":"Modeling and analysis of RFID authentication protocols for supply chain management","authors":"Adarsh Kumar, K. Gopal, A. Aggarwal","doi":"10.1109/PDGC.2014.7030752","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030752","url":null,"abstract":"A secure interconnection of objects through RFID technology extends the range of information availability. Security in this integration is achievable through proper identification, authentication, grouping / yoking, distance bounding, and tag and ownership transfer protocols. This work analyzes the computational and communicational cost of group and authentication protocols. Further, these protocols are modeled and analyzed using alloy model. Results show that a network of 255 nodes can be constructed with delays of 9.6 msec and 7.6 msec using peer to peer and centralized connectivity respectively.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122036563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data agglomeration in wireless sensor networks 无线传感器网络中的数据聚集
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030757
Jasminder Kaur Sandhu, S. Saxena
The nodes which can conjointly send anticipated data to base terminal is called sensor networks. The critical coercion is consumption of power for sensors. The sensors can transmit inapplicable power origins which are confined. When the sensors are dispersed in any circumstances it is quite possible that these are placed farther from the terminal and in actual the sensors are in actual are at some distant from each other. The sensors are operable through battery therefore it can utilize power systematically for tapering data traffic and thus boosting the life span of the network. The wireless sensor networks have these sensors which are used for gathering and agglomerating data competently. We have discussed few aspects of wireless sensors associated with data agglomeration. As the wireless sensors have networks which are used for various applications like observing habitation, administering calamity, military and security, etc, its limited operational functionality and limited battery made a bigger issue in today's scenario. Thus data agglomeration techniques are being used for discarding similar data in order for saving energy and battery. In this paper, we focused on various approaches which are useful in data agglomeration efficiently in WSN.
能够将预期的数据联合发送到基础终端的节点称为传感器网络。关键的强制是传感器的功率消耗。传感器可以传输受限的不适用电源。当传感器分散在任何情况下,很有可能这些传感器被放置在离终端更远的地方,而实际上传感器实际上彼此之间有一定距离。传感器可通过电池操作,因此它可以系统地利用电力来减少数据流量,从而提高网络的寿命。无线传感器网络中有这些传感器,它们可以胜任数据的采集和聚合。我们已经讨论了与数据聚集相关的无线传感器的几个方面。由于无线传感器具有用于观测居住,灾害管理,军事和安全等各种应用的网络,其有限的操作功能和有限的电池在当今的场景中成为更大的问题。因此,为了节省能源和电池,正在使用数据聚合技术来丢弃类似的数据。本文重点研究了在无线传感器网络中有效实现数据聚合的各种方法。
{"title":"Data agglomeration in wireless sensor networks","authors":"Jasminder Kaur Sandhu, S. Saxena","doi":"10.1109/PDGC.2014.7030757","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030757","url":null,"abstract":"The nodes which can conjointly send anticipated data to base terminal is called sensor networks. The critical coercion is consumption of power for sensors. The sensors can transmit inapplicable power origins which are confined. When the sensors are dispersed in any circumstances it is quite possible that these are placed farther from the terminal and in actual the sensors are in actual are at some distant from each other. The sensors are operable through battery therefore it can utilize power systematically for tapering data traffic and thus boosting the life span of the network. The wireless sensor networks have these sensors which are used for gathering and agglomerating data competently. We have discussed few aspects of wireless sensors associated with data agglomeration. As the wireless sensors have networks which are used for various applications like observing habitation, administering calamity, military and security, etc, its limited operational functionality and limited battery made a bigger issue in today's scenario. Thus data agglomeration techniques are being used for discarding similar data in order for saving energy and battery. In this paper, we focused on various approaches which are useful in data agglomeration efficiently in WSN.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122123937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance analysis of middleware distributed and clustered systems (PAMS) concept in mobile communication devices using Android operating system 基于Android操作系统的移动通信设备中中间件分布式集群系统(PAMS)概念的性能分析
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030768
V. Singh, A. Aggarwal
Recent advances in computational power, memory, display etc. have propelled mobile and hand held devices as a platform to display and execute a variety of applications. Popular platform vendors like Nokia S60, iPhone, Samsung and Android offer extensive middleware support which helps in developers' port and in packaging of different application modules in a suitable format. These devices have several features like processing power, memory, energy, which exhibit the ability of these devices for performing complex tasks. Nowadays multi core processor architecture like Quad-Core Processor up to 3.0 GHz and Java enabled Android operating systems mobile devices are coming into the market which have potential for support and enhancements for an enterprise. In a complex and critical real time production support enterprise environment, a middleware production support analyst is primarily responsible to access, analyze the performance and control the middleware production application servers in a faster and precise manner. Production support analyst may or may not be available to Unix Production servers at all times due to many reasons. In this work a novel approach, Performance Analysis of Middleware distributed and clustered Systems (PAMS), is proposed using Android application by which a production support analyst can still support all critical real time web based application servers while he is away from the Unix based Middleware application server and can ensure that the same is available and accessible to their customers. An Android based application is proposed which will communicate to higher production layers installed in secure network of an organization and gather the data for performance monitoring and analysis. With the proposed concept production support analyst can easily login and open the console of middleware application servers using VPN (Virtual Private Network) and take immediate necessary actions so that business flow should not be impacted and enterprise web applications are available to end users all the time.
最近在计算能力、内存、显示等方面的进步推动了移动和手持设备作为显示和执行各种应用程序的平台。诺基亚S60、iPhone、三星和Android等流行平台供应商提供了广泛的中间件支持,这有助于开发者将不同的应用模块以合适的格式进行移植和打包。这些设备具有处理能力、内存、能量等特点,显示出这些设备执行复杂任务的能力。如今,多核处理器架构,如高达3.0 GHz的四核处理器和支持Java的Android操作系统移动设备正在进入市场,它们有潜力为企业提供支持和增强。在复杂和关键的实时生产支持企业环境中,中间件生产支持分析师主要负责以更快、更精确的方式访问、分析性能并控制中间件生产应用服务器。由于许多原因,生产支持分析师可能随时对Unix生产服务器可用,也可能不可用。在这项工作中,提出了一种新颖的方法,中间件分布式和集群系统的性能分析(PAMS),该方法使用Android应用程序,通过该方法,生产支持分析师可以在离开基于Unix的中间件应用服务器时仍然支持所有关键的实时基于web的应用服务器,并可以确保相同的可用性并可供客户访问。提出了一种基于Android的应用程序,该应用程序可以与安装在组织安全网络中的更高生产层通信,并收集数据进行性能监控和分析。根据提出的概念,生产支持分析师可以使用VPN(虚拟专用网)轻松登录和打开中间件应用服务器的控制台,并立即采取必要的行动,这样业务流就不会受到影响,最终用户可以随时使用企业web应用程序。
{"title":"Performance analysis of middleware distributed and clustered systems (PAMS) concept in mobile communication devices using Android operating system","authors":"V. Singh, A. Aggarwal","doi":"10.1109/PDGC.2014.7030768","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030768","url":null,"abstract":"Recent advances in computational power, memory, display etc. have propelled mobile and hand held devices as a platform to display and execute a variety of applications. Popular platform vendors like Nokia S60, iPhone, Samsung and Android offer extensive middleware support which helps in developers' port and in packaging of different application modules in a suitable format. These devices have several features like processing power, memory, energy, which exhibit the ability of these devices for performing complex tasks. Nowadays multi core processor architecture like Quad-Core Processor up to 3.0 GHz and Java enabled Android operating systems mobile devices are coming into the market which have potential for support and enhancements for an enterprise. In a complex and critical real time production support enterprise environment, a middleware production support analyst is primarily responsible to access, analyze the performance and control the middleware production application servers in a faster and precise manner. Production support analyst may or may not be available to Unix Production servers at all times due to many reasons. In this work a novel approach, Performance Analysis of Middleware distributed and clustered Systems (PAMS), is proposed using Android application by which a production support analyst can still support all critical real time web based application servers while he is away from the Unix based Middleware application server and can ensure that the same is available and accessible to their customers. An Android based application is proposed which will communicate to higher production layers installed in secure network of an organization and gather the data for performance monitoring and analysis. With the proposed concept production support analyst can easily login and open the console of middleware application servers using VPN (Virtual Private Network) and take immediate necessary actions so that business flow should not be impacted and enterprise web applications are available to end users all the time.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125036550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 International Conference on Parallel, Distributed and Grid Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1