首页 > 最新文献

2013 3rd IEEE International Advance Computing Conference (IACC)最新文献

英文 中文
An efficient signcryption scheme based on ECC with forward secrecy and encrypted message authentication 基于前向保密和加密消息认证的高效ECC签名加密方案
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514258
M. Dutta, A. K. Singh, A. Kumar
In this paper, an efficient signcryption scheme based on elliptic curve cryptosystem is going to be proposed which can effectively combine the functionalities of digital signature and encryption and also takes a comparable amount of computational cost and communication overhead. The proposed scheme provides confidentiality, integrity, unforgeability and nonrepudiation, along with encrypted message authentication, forward secrecy of message confidentiality and public verification. By forward secrecy of message confidentiality function we mean, although the private key of the sender is divulged inattentively, it does not affect the confidentiality of the previously stored messages. By the public verification function we mean, any third party can verify directly the signature of the sender of the original message without the sender's private key when dispute occurs. It enhances the justice of judge. In addition, proposed scheme will save great amount of computational cost. The proposed scheme can be applied to the lower computational power devices, like smart card based applications, e-voting and many more, due to their lower computational cost. The Proposed Scheme is discussed in this paper and is compared with the existing schemes with respect to computational cost and the security functions it provides.
本文提出了一种基于椭圆曲线密码系统的有效的签名加密方案,该方案能有效地将数字签名和加密的功能结合起来,并且计算成本和通信开销相当。该方案具有机密性、完整性、不可伪造性和不可否认性,同时具有消息加密认证、消息机密性的前向保密和公开验证。消息保密功能的前向保密是指虽然发送方的私钥在无意中泄露,但并不影响先前存储的消息的机密性。我们所说的公开验证功能,是指当发生争议时,任何第三方都可以直接验证原始消息发送方的签名,而不需要发送方的私钥。提高了法官的公正性。此外,所提出的方案将节省大量的计算成本。由于其较低的计算成本,所提出的方案可以应用于计算能力较低的设备,如基于智能卡的应用程序、电子投票等。本文讨论了所提出的方案,并在计算成本和提供的安全功能方面与现有方案进行了比较。
{"title":"An efficient signcryption scheme based on ECC with forward secrecy and encrypted message authentication","authors":"M. Dutta, A. K. Singh, A. Kumar","doi":"10.1109/IADCC.2013.6514258","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514258","url":null,"abstract":"In this paper, an efficient signcryption scheme based on elliptic curve cryptosystem is going to be proposed which can effectively combine the functionalities of digital signature and encryption and also takes a comparable amount of computational cost and communication overhead. The proposed scheme provides confidentiality, integrity, unforgeability and nonrepudiation, along with encrypted message authentication, forward secrecy of message confidentiality and public verification. By forward secrecy of message confidentiality function we mean, although the private key of the sender is divulged inattentively, it does not affect the confidentiality of the previously stored messages. By the public verification function we mean, any third party can verify directly the signature of the sender of the original message without the sender's private key when dispute occurs. It enhances the justice of judge. In addition, proposed scheme will save great amount of computational cost. The proposed scheme can be applied to the lower computational power devices, like smart card based applications, e-voting and many more, due to their lower computational cost. The Proposed Scheme is discussed in this paper and is compared with the existing schemes with respect to computational cost and the security functions it provides.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123381640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A pole placement controller for CSC based STATCOM with genetic algorithm 一种基于遗传算法的基于CSC的STATCOM极点放置控制器
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514351
S. Gupta, R. K. Tripathi
Flexible AC Transmission Systems (FACTS) devices have been used in power systems since the 1970s for the improvement of its dynamic performance. Among these devices, Static Synchronous Compensator (STATCOM) is a shunt connected FACTS device, which is capable of providing reactive power compensation to the power system. STATCOM is a multiple input and multiple output system. In this paper, the CSC based STATCOM is controlled by the pole placement. But the best constant values for pole placement controller's parameters are laboriously obtained through trial and error, although time consuming. So the genetic algorithm (GA) is employed to find the best values for pole placement controller's parameters in a very short time. These methods are tested in MATLAB, and their results are obtained. The simulation results show an improvement in input-output response of CSC-STATCOM.
自20世纪70年代以来,柔性交流输电系统(FACTS)设备已被用于电力系统,以改善其动态性能。其中,静态同步补偿器(STATCOM)是一种并联的FACTS装置,能够为电力系统提供无功补偿。STATCOM是一个多输入多输出系统。在本文中,基于CSC的STATCOM是由极点位置控制的。但极点控制器参数的最佳常数值是通过反复试验得到的,且耗时长。因此,采用遗传算法(GA)在极短时间内求出极点控制器参数的最优值。在MATLAB中对这些方法进行了测试,并得到了结果。仿真结果表明CSC-STATCOM的输入输出响应得到了改善。
{"title":"A pole placement controller for CSC based STATCOM with genetic algorithm","authors":"S. Gupta, R. K. Tripathi","doi":"10.1109/IADCC.2013.6514351","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514351","url":null,"abstract":"Flexible AC Transmission Systems (FACTS) devices have been used in power systems since the 1970s for the improvement of its dynamic performance. Among these devices, Static Synchronous Compensator (STATCOM) is a shunt connected FACTS device, which is capable of providing reactive power compensation to the power system. STATCOM is a multiple input and multiple output system. In this paper, the CSC based STATCOM is controlled by the pole placement. But the best constant values for pole placement controller's parameters are laboriously obtained through trial and error, although time consuming. So the genetic algorithm (GA) is employed to find the best values for pole placement controller's parameters in a very short time. These methods are tested in MATLAB, and their results are obtained. The simulation results show an improvement in input-output response of CSC-STATCOM.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122289198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Assessment of clustering tendency through progressive random sampling and graph-based clustering results 通过渐进式随机抽样和基于图的聚类结果评估聚类倾向
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514316
K. R. Prasad, B. E. Reddy
Clustering analysis is widely used technique in many emerging applications. Assessment of clustering tendency is generally done by Visual Access Tendency (VAT) algorithm. VAT detects the clustering tendency by reordering the indices of objects from the dissimilarity matrix, according to logic of Prim's algorithm. Therefore, VAT demands high computational cost for large datasets. The contribution of proposed work is to develop best sampling technique for obtaining good representative of entire dataset in the form of sub-dissimilarity matrix in VAT, it provides accessing of prior tendency visually by detecting number of square shaped dark blocks along with diagonal in sample based VAT image. This proposed work gives same clustering tendency results when we compare with simple VAT, and it has an advantage of less processing time since it uses only sampled dissimilarity matrix. This sample based VAT (PSVAT) uses set of distinguished features for random selection of progressive sample representatives. Finally, known clustering tendency is used in graph-based clustering technique (Minimum Spanning Tree based clustering) for achieving efficient clustering results. Comparative runtime values of PSVAT and VAT on several datasets are presented in this paper for showing that PSVAT is better than VAT in respect of runtime performance and clustering validity is also tested by Dunn's Index for sampled data.
聚类分析技术在许多新兴应用中得到了广泛的应用。聚类倾向的评价一般采用VAT (Visual Access tendency)算法。根据Prim算法的逻辑,VAT通过从不相似矩阵中重新排序对象的索引来检测聚类趋势。因此,对于大型数据集,VAT要求较高的计算成本。本文的贡献在于开发了一种最佳的采样技术,以VAT中的子不相似矩阵的形式获得整个数据集的良好代表,它通过检测基于样本的VAT图像中沿对角线的方形暗块的数量来直观地访问先验趋势。当我们与简单的VAT进行比较时,提出的工作给出了相同的聚类倾向结果,并且由于它只使用采样的不相似矩阵,因此具有较少的处理时间的优点。这种基于样本的增值税(PSVAT)使用一组显著特征来随机选择渐进样本代表。最后,将已知的聚类倾向用于基于图的聚类技术(基于最小生成树的聚类),以获得高效的聚类结果。本文给出了PSVAT和VAT在多个数据集上的运行时比较值,表明PSVAT在运行时性能上优于VAT,并通过Dunn's Index对采样数据进行了聚类有效性检验。
{"title":"Assessment of clustering tendency through progressive random sampling and graph-based clustering results","authors":"K. R. Prasad, B. E. Reddy","doi":"10.1109/IADCC.2013.6514316","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514316","url":null,"abstract":"Clustering analysis is widely used technique in many emerging applications. Assessment of clustering tendency is generally done by Visual Access Tendency (VAT) algorithm. VAT detects the clustering tendency by reordering the indices of objects from the dissimilarity matrix, according to logic of Prim's algorithm. Therefore, VAT demands high computational cost for large datasets. The contribution of proposed work is to develop best sampling technique for obtaining good representative of entire dataset in the form of sub-dissimilarity matrix in VAT, it provides accessing of prior tendency visually by detecting number of square shaped dark blocks along with diagonal in sample based VAT image. This proposed work gives same clustering tendency results when we compare with simple VAT, and it has an advantage of less processing time since it uses only sampled dissimilarity matrix. This sample based VAT (PSVAT) uses set of distinguished features for random selection of progressive sample representatives. Finally, known clustering tendency is used in graph-based clustering technique (Minimum Spanning Tree based clustering) for achieving efficient clustering results. Comparative runtime values of PSVAT and VAT on several datasets are presented in this paper for showing that PSVAT is better than VAT in respect of runtime performance and clustering validity is also tested by Dunn's Index for sampled data.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128028143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Averting man in the browser attack using user-specific personal images 避免在浏览器中使用用户特定的个人图像攻击
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514413
P. Goyal, N. Bansal, N. Gupta
In the recent years, there has been a tremendous rise in online banking transactions. Some of the major factors contributing to this growth are - easy availability of higher bandwidth internet connections at low cost and ease of online transactions compared to the traditional banking methods. Also, this field has attracted the cybercriminals to take advantage of the loopholes in the process of online transaction. One of the most advanced threats today is the Man In The Browser (MitB) attack. MitB attack deploys a Trojan in the browser of the user and then steals the credentials of the user to initiate a transaction for transferring the money in a mule account. All this happens without any notice to bank or the user. MitB attack defeats the traditional two factor authentication currently used by the banks to authenticate the identity of the user performing the transaction. This paper presents a new framework for enhancing authentication during an online transaction to tackle the problem of MitB attack.
近年来,网上银行交易有了巨大的增长。促成这一增长的一些主要因素是——与传统银行方式相比,更容易以低成本获得更高带宽的互联网连接,以及更容易进行在线交易。同时,这一领域也吸引了网络犯罪分子利用网上交易过程中的漏洞。当今最先进的威胁之一是浏览器中的人(MitB)攻击。MitB攻击在用户的浏览器中部署木马,然后窃取用户的凭据,发起交易以转移骡子账户中的资金。所有这些都是在不通知银行或用户的情况下发生的。MitB攻击破坏了银行目前用于验证执行交易的用户身份的传统双因素身份验证。为了解决MitB攻击问题,本文提出了一种新的增强在线交易过程认证的框架。
{"title":"Averting man in the browser attack using user-specific personal images","authors":"P. Goyal, N. Bansal, N. Gupta","doi":"10.1109/IADCC.2013.6514413","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514413","url":null,"abstract":"In the recent years, there has been a tremendous rise in online banking transactions. Some of the major factors contributing to this growth are - easy availability of higher bandwidth internet connections at low cost and ease of online transactions compared to the traditional banking methods. Also, this field has attracted the cybercriminals to take advantage of the loopholes in the process of online transaction. One of the most advanced threats today is the Man In The Browser (MitB) attack. MitB attack deploys a Trojan in the browser of the user and then steals the credentials of the user to initiate a transaction for transferring the money in a mule account. All this happens without any notice to bank or the user. MitB attack defeats the traditional two factor authentication currently used by the banks to authenticate the identity of the user performing the transaction. This paper presents a new framework for enhancing authentication during an online transaction to tackle the problem of MitB attack.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128221195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Comparative analysis of ad hoc routing protocols based on user's point of view 基于用户观点的自组织路由协议的比较分析
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514228
N. Bilandi, H. Verma, N. Kumar
An ad hoc network is a dynamic topology network having no centralized control or base station. In such a network, routing is a challenging task due to frequently changes in network topology and resource constraints. Many routing protocols have been proposed to overcome various challenges of routing in ad hoc networks. Each routing protocol has some advantages and disadvantages in various situations. So, it is difficult for a group of user's to choose a particular routing protocol for a particular requirement. In this performance analysis paper, we compare six existing well known routing protocols based on user's point of view. The protocols are AODV, DSR, LAR, OLSR, STAR and ZRP. This paper, presents its usefulness by providing comparative analysis of the protocols with the important routing parameters. The parameters are packet delivery ratio, throughput, end-to-end delay, battery power consumption, average hop count for a connection, packet drop due to retransmission limit and average jitter for received packets. We analyze the protocols in a most realistic ad hoc network scenario using simulation. Comparative study of the protocols using the routing parameters is useful to make a decision about a protocol by an analyzer or user that, which protocol is suitable for particular requirements.
自组织网络是一种动态拓扑网络,没有集中控制或基站。在这样的网络中,由于网络拓扑结构的频繁变化和资源的限制,路由是一项具有挑战性的任务。为了克服ad hoc网络中路由的各种挑战,已经提出了许多路由协议。每种路由协议在不同的情况下都有一些优点和缺点。因此,一组用户很难根据特定的需求选择特定的路由协议。在本文中,我们从用户的角度比较了六种现有的路由协议的性能。协议有AODV、DSR、LAR、OLSR、STAR和ZRP。本文通过对具有重要路由参数的协议进行比较分析,说明了它的实用性。参数包括报文发送比、吞吐量、端到端延迟、电池功耗、连接的平均跳数、重传限制导致的丢包和接收到的平均抖动。我们在最现实的自组织网络场景中使用仿真分析了协议。使用路由参数对协议进行比较研究,有助于分析人员或用户决定哪种协议适合特定需求。
{"title":"Comparative analysis of ad hoc routing protocols based on user's point of view","authors":"N. Bilandi, H. Verma, N. Kumar","doi":"10.1109/IADCC.2013.6514228","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514228","url":null,"abstract":"An ad hoc network is a dynamic topology network having no centralized control or base station. In such a network, routing is a challenging task due to frequently changes in network topology and resource constraints. Many routing protocols have been proposed to overcome various challenges of routing in ad hoc networks. Each routing protocol has some advantages and disadvantages in various situations. So, it is difficult for a group of user's to choose a particular routing protocol for a particular requirement. In this performance analysis paper, we compare six existing well known routing protocols based on user's point of view. The protocols are AODV, DSR, LAR, OLSR, STAR and ZRP. This paper, presents its usefulness by providing comparative analysis of the protocols with the important routing parameters. The parameters are packet delivery ratio, throughput, end-to-end delay, battery power consumption, average hop count for a connection, packet drop due to retransmission limit and average jitter for received packets. We analyze the protocols in a most realistic ad hoc network scenario using simulation. Comparative study of the protocols using the routing parameters is useful to make a decision about a protocol by an analyzer or user that, which protocol is suitable for particular requirements.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128434201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Spectrum sharing in Cognitive Radio using game theory 基于博弈论的认知无线电频谱共享
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514449
S. Pandit, Ghanshyam Singh
Due to the fixed spectrum allocation policy, bandwidth has become one of the scarcest resources for the wireless communications. Therefore, various advanced application, which is very useful in the development of communication system, cannot be used. Currently, the wireless network systems suffer from insufficient bandwidth utilization. However, the licensed users or primary users (PUs) do not use their spectrum all the time. So, to enhance the efficiency of bandwidth usage, the concept of Cognitive Radio (CR) also called secondary user (SU) has emerged as a new design paradigm. By detecting the spectrum holes in PU band as long as they cause no intolerable interference to licensed users, we can make a new dynamic bandwidth sharing strategy between primary and secondary users based on the economic factors, so that the bandwidth utilization and users satisfaction can be enhanced dramatically. We have proposed a simulation model, which allocates free bandwidth of PUs to SUs with an aim to minimize overall bandwidth allocation cost. To share the bandwidth of the primary user with secondary user's, we have developed an algorithm to minimize the cost of the bandwidth.
由于固定的频谱分配策略,带宽已成为无线通信最稀缺的资源之一。因此,在通信系统开发中非常有用的各种高级应用程序无法使用。目前无线网络系统存在带宽利用率不足的问题。但是,授权用户或主用户(pu)并不总是使用他们的频谱。因此,为了提高带宽的使用效率,认知无线电(CR)的概念也被称为辅助用户(SU)作为一种新的设计范式出现了。通过检测PU频段的频谱漏洞,只要这些漏洞不会对授权用户造成不可容忍的干扰,我们就可以基于经济因素制定一种新的主从用户动态带宽共享策略,从而显著提高带宽利用率和用户满意度。我们提出了一个仿真模型,该模型以最小化总体带宽分配成本为目标,将pu的空闲带宽分配给su。为了实现主用户与从用户的带宽共享,我们开发了一种最小化带宽成本的算法。
{"title":"Spectrum sharing in Cognitive Radio using game theory","authors":"S. Pandit, Ghanshyam Singh","doi":"10.1109/IADCC.2013.6514449","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514449","url":null,"abstract":"Due to the fixed spectrum allocation policy, bandwidth has become one of the scarcest resources for the wireless communications. Therefore, various advanced application, which is very useful in the development of communication system, cannot be used. Currently, the wireless network systems suffer from insufficient bandwidth utilization. However, the licensed users or primary users (PUs) do not use their spectrum all the time. So, to enhance the efficiency of bandwidth usage, the concept of Cognitive Radio (CR) also called secondary user (SU) has emerged as a new design paradigm. By detecting the spectrum holes in PU band as long as they cause no intolerable interference to licensed users, we can make a new dynamic bandwidth sharing strategy between primary and secondary users based on the economic factors, so that the bandwidth utilization and users satisfaction can be enhanced dramatically. We have proposed a simulation model, which allocates free bandwidth of PUs to SUs with an aim to minimize overall bandwidth allocation cost. To share the bandwidth of the primary user with secondary user's, we have developed an algorithm to minimize the cost of the bandwidth.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128851481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
MePPM- Memory efficient prediction by partial match model for web prefetching MePPM-通过部分匹配模型预测网页预取的内存效率
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514318
C. D. Gracia, S. Sudha
The proliferation of World Wide Web and the immense growth of Internet users and services requiring high bandwidth have increased the response time of the users substantially. Thus, users often experience long latency while retrieving web objects. The popularity of web objects and web sites show a considerable spatial locality that makes it possible to predict future accesses based on the previous accessed ones. This infact has motivated the researchers to devise new prefetching techniques in web so as to reduce the user perceived latency. Most of the research works are based on the standard Prediction by Partial Match model and its derivates such as the Longest Repeating Sequence and the Popularity based model that are built into Markov predictor trees using common surfing patterns. These models require lot of memory. Hence, in this paper, memory efficient Prediction by Partial Match models based on Markov model are proposed to minimize memory usage compared to the standard Prediction models and its derivatives.
万维网的普及和互联网用户的巨大增长以及需要高带宽的服务大大增加了用户的响应时间。因此,用户在检索web对象时经常会遇到很长的延迟。web对象和web站点的流行显示出相当大的空间局部性,这使得基于先前访问的访问来预测未来访问成为可能。这一事实促使研究人员设计新的网络预取技术,以减少用户感知的延迟。大多数研究工作都是基于标准的部分匹配预测模型及其衍生模型,如最长重复序列和基于流行度的模型,这些模型使用常见的冲浪模式构建到马尔可夫预测树中。这些模型需要大量内存。因此,本文提出了基于马尔可夫模型的部分匹配模型的内存高效预测,与标准预测模型及其衍生模型相比,可以最大限度地减少内存使用。
{"title":"MePPM- Memory efficient prediction by partial match model for web prefetching","authors":"C. D. Gracia, S. Sudha","doi":"10.1109/IADCC.2013.6514318","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514318","url":null,"abstract":"The proliferation of World Wide Web and the immense growth of Internet users and services requiring high bandwidth have increased the response time of the users substantially. Thus, users often experience long latency while retrieving web objects. The popularity of web objects and web sites show a considerable spatial locality that makes it possible to predict future accesses based on the previous accessed ones. This infact has motivated the researchers to devise new prefetching techniques in web so as to reduce the user perceived latency. Most of the research works are based on the standard Prediction by Partial Match model and its derivates such as the Longest Repeating Sequence and the Popularity based model that are built into Markov predictor trees using common surfing patterns. These models require lot of memory. Hence, in this paper, memory efficient Prediction by Partial Match models based on Markov model are proposed to minimize memory usage compared to the standard Prediction models and its derivatives.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130339979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient focused crawling based on best first search 基于最佳第一搜索的高效集中爬行
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514347
S. Rawat, D. R. Patil
The World Wide Web continues to grow at an exponential rate, so fetching information about a special-topic is gaining importance which poses exceptional scaling challenges for general-purpose crawlers and search engines. This paper describes a web crawling approach based on best first search. As the goal of a focused crawler is to selectively seek out pages that are relevant to given keywords. Rather than collecting and indexing all available web documents to be able to answer all possible queries, a focused crawler analyze its crawl boundary to hit upon the links that are likely to be most relevant for the crawl, and avoids irrelevant links of the document. This leads to significant savings in hardware as well as network resources and also helps keep the crawl more up-to-date. To accomplish such goal-directed crawling, we select top most k relevant documents for a given query and then expand the most promising link chosen according to link score, to circumvent irrelevant regions of the web.
万维网继续以指数级速度增长,因此获取特定主题的信息变得越来越重要,这对通用爬虫和搜索引擎提出了特殊的扩展挑战。本文描述了一种基于最佳优先搜索的网络爬虫方法。因为聚焦爬虫的目标是选择性地寻找与给定关键字相关的页面。而不是收集和索引所有可用的web文档,以能够回答所有可能的查询,一个集中的爬虫分析其爬行边界,以命中最相关的链接,并避免不相关的链接的文档。这大大节省了硬件和网络资源,还有助于使抓取保持最新状态。为了完成这种目标导向的爬行,我们为给定的查询选择最前面的k个相关文档,然后根据链接得分展开选择的最有希望的链接,以绕过网络的不相关区域。
{"title":"Efficient focused crawling based on best first search","authors":"S. Rawat, D. R. Patil","doi":"10.1109/IADCC.2013.6514347","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514347","url":null,"abstract":"The World Wide Web continues to grow at an exponential rate, so fetching information about a special-topic is gaining importance which poses exceptional scaling challenges for general-purpose crawlers and search engines. This paper describes a web crawling approach based on best first search. As the goal of a focused crawler is to selectively seek out pages that are relevant to given keywords. Rather than collecting and indexing all available web documents to be able to answer all possible queries, a focused crawler analyze its crawl boundary to hit upon the links that are likely to be most relevant for the crawl, and avoids irrelevant links of the document. This leads to significant savings in hardware as well as network resources and also helps keep the crawl more up-to-date. To accomplish such goal-directed crawling, we select top most k relevant documents for a given query and then expand the most promising link chosen according to link score, to circumvent irrelevant regions of the web.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130635623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A distributed dynamic grid scheduler for mixed tasks 用于混合任务的分布式动态网格调度程序
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514204
Ramanathan Mohan, Rao Kovvur, S. Ramachandram, Vijayakumar Kadappa, A. Govardhan
We consider scheduling of bag of independent mixed tasks (Hard, firm and soft) in a distributed dynamic grid environment. Recently, a general distributed scalable grid scheduler (GDS) for independent tasks was proposed to maximize successful schedule percent in an error-free grid environment. However, GDS did not consider constraint failure of task during execution due to resource overload, which leads to limited successful schedule percent. In this paper, we propose a novel distributed dynamic grid scheduler for mixed tasks (DDGS-MT), which takes into consideration the constraint failure of task during execution due to resource overload. The proposed scheduler incorporates migration and resume fault tolerant mechanisms for computational and communication intensive tasks respectively. The proposed scheduler shows improved performance in terms of successful schedule percent and makespan in comparison with GDS. The results of our exhaustive simulations experiments demonstrate the superiority of DDGS over GDS scheduler.
研究了分布式动态网格环境下独立混合任务包(硬、硬、软)的调度问题。为了在无差错的网格环境中最大限度地提高独立任务的调度成功率,最近提出了一种通用的分布式可伸缩网格调度程序。然而,GDS没有考虑任务在执行过程中由于资源过载而导致的约束失败,导致调度成功率有限。本文提出了一种新的混合任务分布式动态网格调度程序(DDGS-MT),该调度程序考虑了任务在执行过程中由于资源过载而导致的约束失效。该调度器分别为计算密集型任务和通信密集型任务集成了迁移和恢复容错机制。与GDS相比,所建议的调度器在成功调度百分比和完工时间方面表现出更高的性能。详尽的仿真实验结果表明,DDGS调度程序优于GDS调度程序。
{"title":"A distributed dynamic grid scheduler for mixed tasks","authors":"Ramanathan Mohan, Rao Kovvur, S. Ramachandram, Vijayakumar Kadappa, A. Govardhan","doi":"10.1109/IADCC.2013.6514204","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514204","url":null,"abstract":"We consider scheduling of bag of independent mixed tasks (Hard, firm and soft) in a distributed dynamic grid environment. Recently, a general distributed scalable grid scheduler (GDS) for independent tasks was proposed to maximize successful schedule percent in an error-free grid environment. However, GDS did not consider constraint failure of task during execution due to resource overload, which leads to limited successful schedule percent. In this paper, we propose a novel distributed dynamic grid scheduler for mixed tasks (DDGS-MT), which takes into consideration the constraint failure of task during execution due to resource overload. The proposed scheduler incorporates migration and resume fault tolerant mechanisms for computational and communication intensive tasks respectively. The proposed scheduler shows improved performance in terms of successful schedule percent and makespan in comparison with GDS. The results of our exhaustive simulations experiments demonstrate the superiority of DDGS over GDS scheduler.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129680448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Novel intrusion detection system integrating layered framework with neural network 将分层框架与神经网络相结合的入侵检测系统
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514309
N. Srivastav, R. Challa
The threat from spammers, attackers and criminal enterprises has grown with the expansion of Internet, thus, intrusion detection systems (IDS)have become a core component of computer network due to prevalence of such threats. In this paper, we present layered framework integrated with neural network to build an effective intrusion detection system. This system has experimented with Knowledge Discovery & Data Mining(KDD) 1999 dataset. The systems are compared with existing approaches of intrusion detection which either uses neural network or based on layered framework. The results show that the proposed system has high attack detection accuracy and less false alarm rate.
随着互联网的发展,来自垃圾邮件发送者、攻击者和犯罪企业的威胁越来越大,入侵检测系统(IDS)也因此成为计算机网络的核心组成部分。本文提出了结合神经网络的分层框架来构建有效的入侵检测系统。该系统以知识发现与数据挖掘(KDD) 1999数据集为实验对象。将该系统与现有的基于神经网络和分层框架的入侵检测方法进行了比较。结果表明,该系统具有较高的攻击检测准确率和较低的虚警率。
{"title":"Novel intrusion detection system integrating layered framework with neural network","authors":"N. Srivastav, R. Challa","doi":"10.1109/IADCC.2013.6514309","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514309","url":null,"abstract":"The threat from spammers, attackers and criminal enterprises has grown with the expansion of Internet, thus, intrusion detection systems (IDS)have become a core component of computer network due to prevalence of such threats. In this paper, we present layered framework integrated with neural network to build an effective intrusion detection system. This system has experimented with Knowledge Discovery & Data Mining(KDD) 1999 dataset. The systems are compared with existing approaches of intrusion detection which either uses neural network or based on layered framework. The results show that the proposed system has high attack detection accuracy and less false alarm rate.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130182283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
2013 3rd IEEE International Advance Computing Conference (IACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1