首页 > 最新文献

2014 International Conference on Parallel, Distributed and Grid Computing最新文献

英文 中文
Real-time codebook-based speech enhancement with GPUs 基于gpu的实时码本语音增强
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030761
A. S. Sai Prasanna, Iyer Chandrashekaran Gurumurthy, D. H. R. Naidu, P. K. Baruah
The advent of ubiquitous mobile communication has posed a lot of challenges, one of the prominent being suppression of background noise, especially in non-stationary noisy environments. In literature, several speech enhancement techniques have been proposed to tackle this problem of noise reduction. Codebook-based speech enhancement (CBSE) employing trained speech and noise codebooks, is one of the most effective noise reduction technique for handling non-stationary noise. However, the high compute intensive nature of this technique renders it inapplicable in real-time speech enhancement scenarios by introducing a significant delay in speech transmission. In this paper, this problem is addressed by providing an efficient, parallel CBSE algorithm. The proposed parallel CBSE algorithm achieves significant speedup and reduced execution time, resulting in a speech transmission delay which is well within the limits of realizing real-time speech enhancement. The proposed parallel CBSE algorithm is then used as a basis to provide a novel cloud based framework to achieve real-time speech enhancement in mobile communication as a proof-of-concept. The proposed parallel implementation can also be used in a variety of applications which demand real-time speech enhancement such as teleconferencing systems, digital hearing aid devices and speech recognition systems.
无处不在的移动通信带来了许多挑战,其中一个突出的挑战是背景噪声的抑制,特别是在非平稳噪声环境中。在文献中,已经提出了几种语音增强技术来解决这个降噪问题。基于码本的语音增强(CBSE)是利用经过训练的语音和噪声码本来处理非平稳噪声的一种最有效的降噪技术。然而,该技术的高计算密集型特性使得它在实时语音增强场景中不适用,因为它在语音传输中引入了显着的延迟。在本文中,通过提供一种高效的并行CBSE算法来解决这个问题。所提出的并行CBSE算法实现了显著的加速和缩短的执行时间,导致语音传输延迟完全在实现实时语音增强的范围内。然后,将提出的并行CBSE算法作为基础,提供一种新的基于云的框架,以实现移动通信中的实时语音增强,作为概念验证。所提出的并行实现也可用于各种需要实时语音增强的应用,例如电话会议系统、数字助听器设备和语音识别系统。
{"title":"Real-time codebook-based speech enhancement with GPUs","authors":"A. S. Sai Prasanna, Iyer Chandrashekaran Gurumurthy, D. H. R. Naidu, P. K. Baruah","doi":"10.1109/PDGC.2014.7030761","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030761","url":null,"abstract":"The advent of ubiquitous mobile communication has posed a lot of challenges, one of the prominent being suppression of background noise, especially in non-stationary noisy environments. In literature, several speech enhancement techniques have been proposed to tackle this problem of noise reduction. Codebook-based speech enhancement (CBSE) employing trained speech and noise codebooks, is one of the most effective noise reduction technique for handling non-stationary noise. However, the high compute intensive nature of this technique renders it inapplicable in real-time speech enhancement scenarios by introducing a significant delay in speech transmission. In this paper, this problem is addressed by providing an efficient, parallel CBSE algorithm. The proposed parallel CBSE algorithm achieves significant speedup and reduced execution time, resulting in a speech transmission delay which is well within the limits of realizing real-time speech enhancement. The proposed parallel CBSE algorithm is then used as a basis to provide a novel cloud based framework to achieve real-time speech enhancement in mobile communication as a proof-of-concept. The proposed parallel implementation can also be used in a variety of applications which demand real-time speech enhancement such as teleconferencing systems, digital hearing aid devices and speech recognition systems.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126472467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Student oriented mobile based examination process 面向学生的基于移动的考试流程
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030756
Prashant K. Gupta, M. Madan, Kajal Puri, Abhishek Gulati
The industry that has been benefitted the most by the developments in VLSI technology is that of mobile phones. Modern day mobile handsets are referred to as smartphones and have reached to the hands of every person even in the remote corners of the world. Yet another revolutionary research was the development of the Android open source mobile OS which has made the mobile phones smarter. So, we decided to develop a mobile based examination system to reach the population even at the most remote areas. An Android driven examination system that we have designed and implemented is made with an intent to serve the education industry and provide efficient and reliable result along with powerful user interface. Our system aims at making the examination system a lot more convenient for the students as well as the faculty members and reducing the manual headache required in the traditional process. Google's Android is the most popular OS globally including India [2]. Android being so popular can be considered an OS that the masses have used in their smart phones; hence our system is designed considering the convenience of the faculty and the student taking the examination. Using the impeccable UI functionalities that have been provided using the Android Development Kit we have designed and implemented our system.
从VLSI技术的发展中受益最大的行业是移动电话行业。现代的手机被称为智能手机,即使是在世界上偏远的角落,它也已经到达了每个人的手中。另一项革命性的研究是Android开源移动操作系统的开发,它使移动电话变得更加智能。因此,我们决定开发一种基于移动的检查系统,即使是在最偏远的地区也能接触到人口。我们设计并实现了一个Android驱动的考试系统,目的是为了服务于教育行业,提供高效可靠的结果以及强大的用户界面。我们的系统旨在使考试系统对学生和教师来说更加方便,减少在传统过程中需要手工操作的麻烦。Google的Android是包括印度在内的全球最流行的操作系统[2]。Android如此受欢迎,可以被认为是大众在智能手机上使用的操作系统;因此,我们的系统设计考虑到方便教师和学生参加考试。使用Android开发工具包提供的完美UI功能,我们设计并实现了我们的系统。
{"title":"Student oriented mobile based examination process","authors":"Prashant K. Gupta, M. Madan, Kajal Puri, Abhishek Gulati","doi":"10.1109/PDGC.2014.7030756","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030756","url":null,"abstract":"The industry that has been benefitted the most by the developments in VLSI technology is that of mobile phones. Modern day mobile handsets are referred to as smartphones and have reached to the hands of every person even in the remote corners of the world. Yet another revolutionary research was the development of the Android open source mobile OS which has made the mobile phones smarter. So, we decided to develop a mobile based examination system to reach the population even at the most remote areas. An Android driven examination system that we have designed and implemented is made with an intent to serve the education industry and provide efficient and reliable result along with powerful user interface. Our system aims at making the examination system a lot more convenient for the students as well as the faculty members and reducing the manual headache required in the traditional process. Google's Android is the most popular OS globally including India [2]. Android being so popular can be considered an OS that the masses have used in their smart phones; hence our system is designed considering the convenience of the faculty and the student taking the examination. Using the impeccable UI functionalities that have been provided using the Android Development Kit we have designed and implemented our system.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124461863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
VLKM: Virtual location-based key management scheme for Wireless Sensor Networks VLKM:基于虚拟位置的无线传感器网络密钥管理方案
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030715
R. Vaid, V. Katiyar
Designing an energy efficient key management scheme to secure Wireless Sensor Networks is a challenging task because sensor nodes in the network are resource constrained. If an initial key is used in the network lifetime, a key stolen by an unauthorized node will results in data compromised that is generated in the network. So a re-keying is necessary after a specified number of rounds to avoid the side effect of stale key in the network. In clustering environment, a number of keys are needed for every sensor. If the role of sensor is cluster head, then one key is required to collect data from all cluster members. This key is shared between the cluster head sensor and all the sensors which are members of that cluster. The different key is required to transfer the aggregated data to base station this key is only shared between the sensor node which is cluster head and the base station. But if the role of cluster head is changed from one sensor to different sensor randomly, a new key will be require that is share between sensor node and new cluster head and also a new key will be required that is shared between this new cluster head and the base station. If the scheme is followed then re-keying after every round is a bottleneck of the network as more than one re-keying is require for every sensor. In this paper, we have presented a new virtual location based key management scheme (VLKM). This scheme used virtual location to generate a round key for every sensor. Simulation results show that proposed scheme performs better than other comparable schemes in the literature without increasing the communication overheads.
由于网络中的传感器节点资源有限,设计一种节能的密钥管理方案来保护无线传感器网络是一项具有挑战性的任务。如果在网络生命周期内使用初始密钥,则未经授权的节点窃取密钥将导致网络中生成的数据泄露。因此,在指定的轮数之后重新密钥是必要的,以避免网络中密钥陈旧的副作用。在集群环境中,每个传感器都需要若干个键。如果传感器的角色是集群头,则需要一个键来收集所有集群成员的数据。该密钥在簇头传感器和属于该簇的所有传感器之间共享。将聚合数据传输到基站需要不同的密钥,该密钥仅在作为簇头的传感器节点和基站之间共享。但是,如果簇头的角色从一个传感器随机地改变为不同的传感器,则需要在传感器节点和新的簇头之间共享一个新密钥,也需要在新的簇头和基站之间共享一个新密钥。如果遵循该方案,那么在每轮之后重新密钥是网络的瓶颈,因为每个传感器需要多次重新密钥。本文提出了一种新的基于虚拟位置的密钥管理方案(VLKM)。该方案利用虚拟位置为每个传感器生成一个圆密钥。仿真结果表明,该方案在不增加通信开销的情况下,性能优于文献中其他方案。
{"title":"VLKM: Virtual location-based key management scheme for Wireless Sensor Networks","authors":"R. Vaid, V. Katiyar","doi":"10.1109/PDGC.2014.7030715","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030715","url":null,"abstract":"Designing an energy efficient key management scheme to secure Wireless Sensor Networks is a challenging task because sensor nodes in the network are resource constrained. If an initial key is used in the network lifetime, a key stolen by an unauthorized node will results in data compromised that is generated in the network. So a re-keying is necessary after a specified number of rounds to avoid the side effect of stale key in the network. In clustering environment, a number of keys are needed for every sensor. If the role of sensor is cluster head, then one key is required to collect data from all cluster members. This key is shared between the cluster head sensor and all the sensors which are members of that cluster. The different key is required to transfer the aggregated data to base station this key is only shared between the sensor node which is cluster head and the base station. But if the role of cluster head is changed from one sensor to different sensor randomly, a new key will be require that is share between sensor node and new cluster head and also a new key will be required that is shared between this new cluster head and the base station. If the scheme is followed then re-keying after every round is a bottleneck of the network as more than one re-keying is require for every sensor. In this paper, we have presented a new virtual location based key management scheme (VLKM). This scheme used virtual location to generate a round key for every sensor. Simulation results show that proposed scheme performs better than other comparable schemes in the literature without increasing the communication overheads.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"51 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122422351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance enhancement of distributed network system by phase-wise dynamic task allocation 基于分阶段动态任务分配的分布式网络系统性能增强
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030775
Faizul Navi Khan, K. Govil, A. Agarwal
A Distributed NetworkSystem (DNS) is a set of application and system programs, and data exchanges across a number of independent personal computers connected by a communication network. Task allocation in distributed network system is always a challenging task and also very helpful in order to enhance the performance of DNS. Although there are two types of approaches for task allocation and these are dynamic and static. Dynamic approach of task allocation is much appropriate manner and it also makes the best use of available computational power in DNS. Task allocation problem can be explained as `m' number tasks are required to execute on `n' number of processors where number tasks (m) is always greater than number of processors (n) (m>n). This research paper proposed a dynamic task allocation model to allocate the `m' number of tasks on `n' number of processors in distributed network system and execution completes in k number of phases. Proposed dynamic model will help to reduce the cost of task allocation. Phase wise execution cost, inter task communication cost, residing cost of each task on different processors, and reallocation cost for each task also have taken into the consideration to design a dynamic task allocation model.
分布式网络系统(DNS)是一组应用程序和系统程序,以及通过通信网络连接的许多独立个人计算机之间的数据交换。分布式网络系统中的任务分配一直是一项具有挑战性的任务,也是提高DNS性能的重要手段。尽管有两种类型的任务分配方法,它们是动态的和静态的。动态分配任务的方法是一种非常合适的方法,并且可以最大限度地利用DNS的可用计算能力。任务分配问题可以解释为需要在n个处理器上执行m个任务,其中任务数(m)总是大于处理器数(n) (m>n)。本文提出了一种动态任务分配模型,在分布式网络系统的n个处理器上分配m个任务,并在k个阶段完成任务的执行。提出的动态模型有助于降低任务分配的成本。同时考虑了分阶段执行成本、任务间通信成本、每个任务在不同处理器上的驻留成本以及每个任务的再分配成本,设计了动态任务分配模型。
{"title":"Performance enhancement of distributed network system by phase-wise dynamic task allocation","authors":"Faizul Navi Khan, K. Govil, A. Agarwal","doi":"10.1109/PDGC.2014.7030775","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030775","url":null,"abstract":"A Distributed NetworkSystem (DNS) is a set of application and system programs, and data exchanges across a number of independent personal computers connected by a communication network. Task allocation in distributed network system is always a challenging task and also very helpful in order to enhance the performance of DNS. Although there are two types of approaches for task allocation and these are dynamic and static. Dynamic approach of task allocation is much appropriate manner and it also makes the best use of available computational power in DNS. Task allocation problem can be explained as `m' number tasks are required to execute on `n' number of processors where number tasks (m) is always greater than number of processors (n) (m>n). This research paper proposed a dynamic task allocation model to allocate the `m' number of tasks on `n' number of processors in distributed network system and execution completes in k number of phases. Proposed dynamic model will help to reduce the cost of task allocation. Phase wise execution cost, inter task communication cost, residing cost of each task on different processors, and reallocation cost for each task also have taken into the consideration to design a dynamic task allocation model.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122772140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Combinational feature selection approach for network intrusion detection system 网络入侵检测系统的组合特征选择方法
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030720
Tanya Garg, Y. Kumar
In the era of digital world, the computer networks are receiving multidimensional advancements. Due to these advancements more and more services are available for malicious exploitation. New vulnerabilities are found from common programs and even on vulnerability in a single computer might compromise the network of an entire company. There are two parallel ways to address this threat. The first way is to ensure that a computer doesn't have any known security vulnerabilities, before allowing it to the network it has access rights. The other way, is to use an Intrusion Detection System. IDSs concentrate on detecting malicious network traffic, such as packets that would exploit known security vulnerability. Generally the intrusions are detected by analyzing 41 attributes from the intrusion detection dataset. In this work we tried to reduce the number of attributes by using various ranking based feature selection techniques and evaluation has been done using ten classification algorithms that I have evaluated most important. So that the intrusions can be detected accurately in short period of time. Then the combinations of the six reduced feature sets have been made using Boolean AND operator. Then their performance has been analyzed using 10 classification algorithms. Finally the top ten combinations of feature selection have been evaluated among 1585 unique combinations. Combination of Symmetric and Gain Ratio while considering top 15 attributes has highest performance.
在数字时代,计算机网络得到了多维度的发展。由于这些进步,越来越多的服务可供恶意利用。从常见的程序中发现新的漏洞,甚至单个计算机上的漏洞都可能危及整个公司的网络。应对这一威胁有两种并行的方法。第一种方法是确保计算机没有任何已知的安全漏洞,然后才允许它进入具有访问权限的网络。另一种方法是使用入侵检测系统。ids专注于检测恶意网络流量,例如利用已知安全漏洞的数据包。通常通过分析入侵检测数据集中的41个属性来检测入侵。在这项工作中,我们试图通过使用各种基于排名的特征选择技术来减少属性的数量,并使用我评估过的最重要的十种分类算法进行了评估。从而在短时间内准确检测出入侵。然后用布尔与算子对六个约简特征集进行组合。然后用10种分类算法对其性能进行了分析。最后在1585个独特组合中对特征选择的前10个组合进行了评价。在考虑前15个属性的同时,对称和增益比的组合具有最高性能。
{"title":"Combinational feature selection approach for network intrusion detection system","authors":"Tanya Garg, Y. Kumar","doi":"10.1109/PDGC.2014.7030720","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030720","url":null,"abstract":"In the era of digital world, the computer networks are receiving multidimensional advancements. Due to these advancements more and more services are available for malicious exploitation. New vulnerabilities are found from common programs and even on vulnerability in a single computer might compromise the network of an entire company. There are two parallel ways to address this threat. The first way is to ensure that a computer doesn't have any known security vulnerabilities, before allowing it to the network it has access rights. The other way, is to use an Intrusion Detection System. IDSs concentrate on detecting malicious network traffic, such as packets that would exploit known security vulnerability. Generally the intrusions are detected by analyzing 41 attributes from the intrusion detection dataset. In this work we tried to reduce the number of attributes by using various ranking based feature selection techniques and evaluation has been done using ten classification algorithms that I have evaluated most important. So that the intrusions can be detected accurately in short period of time. Then the combinations of the six reduced feature sets have been made using Boolean AND operator. Then their performance has been analyzed using 10 classification algorithms. Finally the top ten combinations of feature selection have been evaluated among 1585 unique combinations. Combination of Symmetric and Gain Ratio while considering top 15 attributes has highest performance.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122814385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Utilizing materialized views to formulate business intelligence 利用物化视图来制定商业智能
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030709
Anil Sharma, M. Sood
To gain the competitive advantage, valid and timely information is the key. Information is produced and consumed at a very fast rate in today's era. This is the impact of data integration technologies which has acknowledged an unpredictable growth in the last few years. For the reason that of technological advancement, data analysis systems and techniques are developed which get into the data and find the unseen information which further can be used as Business Intelligence (BI). BI systems and technologies help the business managers to come across the historical data to analyze and forecast the future trends based on it. BI systems and technologies are essentially designed in context to Data Warehouse because of the density in the decision making process which desires to analyze a huge historical data. BI can broadly be categorized into Business Reporting and Data Mining. This paper focuses on the first category i.e. Business Reports and the authors suggest the utilization of Materialized Views to generate fast and relevant business reports to formulate the Business Intelligence.
获取有效、及时的信息是获得竞争优势的关键。在当今时代,信息的产生和消费速度非常快。这是数据集成技术的影响,在过去几年中,数据集成技术的增长是不可预测的。由于技术的进步,数据分析系统和技术得到了发展,这些系统和技术可以进入数据,发现不可见的信息,这些信息可以进一步用作商业智能(BI)。BI系统和技术可以帮助业务经理浏览历史数据,并在此基础上分析和预测未来趋势。BI系统和技术本质上是在数据仓库的背景下设计的,因为决策过程中的密度需要分析大量的历史数据。BI可以大致分为业务报告和数据挖掘。本文重点讨论了第一类业务报告,作者建议利用物化视图生成快速且相关的业务报告,从而实现商业智能。
{"title":"Utilizing materialized views to formulate business intelligence","authors":"Anil Sharma, M. Sood","doi":"10.1109/PDGC.2014.7030709","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030709","url":null,"abstract":"To gain the competitive advantage, valid and timely information is the key. Information is produced and consumed at a very fast rate in today's era. This is the impact of data integration technologies which has acknowledged an unpredictable growth in the last few years. For the reason that of technological advancement, data analysis systems and techniques are developed which get into the data and find the unseen information which further can be used as Business Intelligence (BI). BI systems and technologies help the business managers to come across the historical data to analyze and forecast the future trends based on it. BI systems and technologies are essentially designed in context to Data Warehouse because of the density in the decision making process which desires to analyze a huge historical data. BI can broadly be categorized into Business Reporting and Data Mining. This paper focuses on the first category i.e. Business Reports and the authors suggest the utilization of Materialized Views to generate fast and relevant business reports to formulate the Business Intelligence.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115381418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software defined network — Architectures 软件定义的网络。体系结构
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030788
Nishtha, M. Sood
Software Defined Network (SDN) is the latest network architecture in which the data and control planes do not reside on the same networking element. The control of packet forwarding in this architecture is taken out and is carried out by a programmable software component, the controller, whereas the forwarding elements are only used as packet moving devices that are driven by the controller. SDN architecture also provides Open APIs from both control and data planes. In order to provide communication between the controller and the forwarding hardware among many available protocols, OpenFlow (OF), is generally regarded as a standardized protocol for SDN. Open APIs for communication between the controller and applications enable development of network management applications easy. Therefore, SDN makes it possible to program the network thus provide numerous benefits. As a result, various vendors have developed SDN architectures. This paper summarizes as well as compares most of the common SDN architectures available till date.
软件定义网络(SDN)是一种最新的网络架构,其中数据平面和控制平面不在同一网元上。在这种体系结构中,数据包转发的控制被取出并由可编程软件组件(控制器)执行,而转发元素仅用作由控制器驱动的数据包移动设备。SDN架构还提供了来自控制平面和数据平面的Open api。为了在众多可用的协议中提供控制器和转发硬件之间的通信,OpenFlow (OF)被普遍认为是SDN的一种标准化协议。用于控制器和应用程序之间通信的开放api使网络管理应用程序的开发变得容易。因此,SDN使得对网络进行编程成为可能,从而提供了许多好处。因此,各种供应商开发了SDN架构。本文总结和比较了目前大多数常见的SDN架构。
{"title":"Software defined network — Architectures","authors":"Nishtha, M. Sood","doi":"10.1109/PDGC.2014.7030788","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030788","url":null,"abstract":"Software Defined Network (SDN) is the latest network architecture in which the data and control planes do not reside on the same networking element. The control of packet forwarding in this architecture is taken out and is carried out by a programmable software component, the controller, whereas the forwarding elements are only used as packet moving devices that are driven by the controller. SDN architecture also provides Open APIs from both control and data planes. In order to provide communication between the controller and the forwarding hardware among many available protocols, OpenFlow (OF), is generally regarded as a standardized protocol for SDN. Open APIs for communication between the controller and applications enable development of network management applications easy. Therefore, SDN makes it possible to program the network thus provide numerous benefits. As a result, various vendors have developed SDN architectures. This paper summarizes as well as compares most of the common SDN architectures available till date.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131389440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Heavy weight ontology learning using text documents 利用文本文档进行重型本体学习
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030725
Vikas Kumar, S. Chaudhary
Ontology plays an important role not only for data processing in knowledge based systems but also, provide interoperability in heterogeneous environment and is a cornerstone of semantic web technology. The required technology is used for knowledge representation in OWL/RDF format and facilitate faster access of concepts in domain of interest. Development of ontology is a tedious job and requires a lot of man power in terms of experts' time and knowledge. Although there are various tools and techniques for light weight ontology learning; yet full automation of heavy weight ontology learning from text documents is a distant dream. In this paper we have proposed a framework for learning heavy weight ontology, using text documents written in English language. Initial experimental results are shown for demonstration of our on going research.
本体不仅在知识系统的数据处理中发挥着重要作用,而且还提供了异构环境中的互操作性,是语义网技术的基石。所需的技术用于以 OWL/RDF 格式表示知识,便于更快地访问相关领域的概念。开发本体是一项繁琐的工作,需要专家花费大量的时间和知识。虽然有各种轻量级本体学习的工具和技术,但从文本文档中全自动学习重量级本体还是一个遥不可及的梦想。在本文中,我们提出了一个利用英文文本文档学习重型本体的框架。本文展示了初步的实验结果,以证明我们正在进行的研究。
{"title":"Heavy weight ontology learning using text documents","authors":"Vikas Kumar, S. Chaudhary","doi":"10.1109/PDGC.2014.7030725","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030725","url":null,"abstract":"Ontology plays an important role not only for data processing in knowledge based systems but also, provide interoperability in heterogeneous environment and is a cornerstone of semantic web technology. The required technology is used for knowledge representation in OWL/RDF format and facilitate faster access of concepts in domain of interest. Development of ontology is a tedious job and requires a lot of man power in terms of experts' time and knowledge. Although there are various tools and techniques for light weight ontology learning; yet full automation of heavy weight ontology learning from text documents is a distant dream. In this paper we have proposed a framework for learning heavy weight ontology, using text documents written in English language. Initial experimental results are shown for demonstration of our on going research.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131124656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced 2ACK scheme for reducing routing overhead in MANETs 增强的2ACK方案,减少了在manet中的路由开销
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030727
Deepika Dhiman, N. Sood
An autonomous collection of the mobile nodes communicating with each other with the help of wireless links either in a direct or indirect manner or rely on other mobile nodes is referred as MANET. The routing protocols in MANET are designed on the basis of the assumption that all the participating nodes co-operate with each other. Due to certain issues like open structure and limited energy supply, the nodes sometimes misbehave and act in a selfish manner. 2ACK scheme used as an add-on technique on few routing protocols (e.g. DSR) to detect such misbehaviour for mitigating their adverse effect. The major limitation of this 2ACK scheme is additional routing overhead due to authenticated 2ACK packets. Thus, this research work focuses on reducing the end-to-end delay and routing overhead by modifying the authentication mechanism in 2ACK scheme. The simulation results have been presented for evaluating the performance of the work done.
在无线链路的帮助下以直接或间接的方式或依赖其他移动节点相互通信的移动节点的自治集合称为MANET。MANET中的路由协议是在所有参与节点相互协作的假设基础上设计的。由于开放的结构和有限的能量供应等问题,节点有时会表现出不端的行为和自私的行为。2ACK方案用作少数路由协议(如DSR)的附加技术,用于检测此类错误行为以减轻其不利影响。这种2ACK方案的主要限制是由于经过身份验证的2ACK数据包造成的额外路由开销。因此,本研究的重点是通过修改2ACK方案中的认证机制来减少端到端延迟和路由开销。最后给出了仿真结果,以评价所做工作的性能。
{"title":"Enhanced 2ACK scheme for reducing routing overhead in MANETs","authors":"Deepika Dhiman, N. Sood","doi":"10.1109/PDGC.2014.7030727","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030727","url":null,"abstract":"An autonomous collection of the mobile nodes communicating with each other with the help of wireless links either in a direct or indirect manner or rely on other mobile nodes is referred as MANET. The routing protocols in MANET are designed on the basis of the assumption that all the participating nodes co-operate with each other. Due to certain issues like open structure and limited energy supply, the nodes sometimes misbehave and act in a selfish manner. 2ACK scheme used as an add-on technique on few routing protocols (e.g. DSR) to detect such misbehaviour for mitigating their adverse effect. The major limitation of this 2ACK scheme is additional routing overhead due to authenticated 2ACK packets. Thus, this research work focuses on reducing the end-to-end delay and routing overhead by modifying the authentication mechanism in 2ACK scheme. The simulation results have been presented for evaluating the performance of the work done.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116088501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An efficient permission-cum-cluster based distributed mutual exclusion algorithm for mobile adhoc networks 一种高效的基于权限和集群的移动自组网分布式互斥算法
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030731
Anchal, P. Saini, C. Krishna
Mutual exclusion (Mutex) is a major coordination problem in distributed systems. To handle Mutex, the corresponding solutions are mainly classified into permission-based, token-based and quorum-based protocols. Mobile Ad-hoc Networks referred as MANETs introduce new obstacles for designing algorithms that help in solving distributed mutual exclusion problem. To our knowledge, few algorithms have been proposed in the literature which follows token-based or permission-based approach. In this paper, we propose an efficient permission-cum-cluster based distributed mutual exclusion algorithm for mobile adhoc networks. The significant motivation for our algorithm is to ensure that every node should transmit the lowest number of effective messages in the underlying network. Moreover, it will lead to reduced communication delay in order to retrieve the required permissions. We observed that the proposed algorithm outperforms the Mobile_RA algorithm in performance parameters such as synchronization delay, response time as well as message complexity. The results have been substantiated by simulation experiments.
互斥(Mutex)是分布式系统中一个主要的协调问题。对于Mutex的处理,相应的解决方案主要分为基于权限的协议、基于令牌的协议和基于仲裁的协议。移动自组织网络(manet)为设计有助于解决分布式互斥问题的算法引入了新的障碍。据我们所知,文献中很少提出基于令牌或基于许可的方法的算法。本文提出了一种高效的基于权限和集群的移动自组网分布式互斥算法。我们的算法的重要动机是确保每个节点都应该在底层网络中传输最少数量的有效消息。此外,它将减少通信延迟,以便检索所需的权限。我们观察到,该算法在同步延迟、响应时间和消息复杂度等性能参数上优于Mobile_RA算法。仿真实验证实了上述结果。
{"title":"An efficient permission-cum-cluster based distributed mutual exclusion algorithm for mobile adhoc networks","authors":"Anchal, P. Saini, C. Krishna","doi":"10.1109/PDGC.2014.7030731","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030731","url":null,"abstract":"Mutual exclusion (Mutex) is a major coordination problem in distributed systems. To handle Mutex, the corresponding solutions are mainly classified into permission-based, token-based and quorum-based protocols. Mobile Ad-hoc Networks referred as MANETs introduce new obstacles for designing algorithms that help in solving distributed mutual exclusion problem. To our knowledge, few algorithms have been proposed in the literature which follows token-based or permission-based approach. In this paper, we propose an efficient permission-cum-cluster based distributed mutual exclusion algorithm for mobile adhoc networks. The significant motivation for our algorithm is to ensure that every node should transmit the lowest number of effective messages in the underlying network. Moreover, it will lead to reduced communication delay in order to retrieve the required permissions. We observed that the proposed algorithm outperforms the Mobile_RA algorithm in performance parameters such as synchronization delay, response time as well as message complexity. The results have been substantiated by simulation experiments.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124362152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 International Conference on Parallel, Distributed and Grid Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1