首页 > 最新文献

2015 Fifth International Conference on Advances in Computing and Communications (ICACC)最新文献

英文 中文
Application of Interval Valued Intuitionistic Fuzzy Soft Set in Investment Decision Making 区间值直觉模糊软集在投资决策中的应用
A. Mukherjee, A. Das
Research on soft computing techniques have been developed rapidly since it can be applied easily to several areas like artificial intelligence, computer science, medical science, machine learning, information technology, economics, environments, engineering, among others. In this study, we introduce an investment decision making procedure for solving investment decision making formed by interval valued intuitionistic fuzzy soft set after choosing certain opinion weighting vectors. The feasibility of our proposed investment decision making procedure in practical applications is shown by some numerical models.
软计算技术的研究发展迅速,因为它可以很容易地应用于人工智能、计算机科学、医学、机器学习、信息技术、经济、环境、工程等多个领域。本文引入一种投资决策程序,求解区间值直觉模糊软集在选择一定的意见权重向量后形成的投资决策。本文提出的投资决策方法在实际应用中是可行的。
{"title":"Application of Interval Valued Intuitionistic Fuzzy Soft Set in Investment Decision Making","authors":"A. Mukherjee, A. Das","doi":"10.1109/ICACC.2015.37","DOIUrl":"https://doi.org/10.1109/ICACC.2015.37","url":null,"abstract":"Research on soft computing techniques have been developed rapidly since it can be applied easily to several areas like artificial intelligence, computer science, medical science, machine learning, information technology, economics, environments, engineering, among others. In this study, we introduce an investment decision making procedure for solving investment decision making formed by interval valued intuitionistic fuzzy soft set after choosing certain opinion weighting vectors. The feasibility of our proposed investment decision making procedure in practical applications is shown by some numerical models.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129421770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Probabilistic Model for Link Duration in Vehicular Ad Hoc Networks under Rayleigh Fading Channel Conditions 瑞利衰落信道条件下车载自组网链路持续时间的概率模型
Siddharth Shelly, A. Babu
In this paper, we present an analytical model to find the probability density function of link life time in vehicular ad hoc networks, assuming Rayleigh fading channel conditions and vehicle speed to follow uniform probability distribution. We then investigate the impact of path loss exponent, transmit power, threshold SNR and velocity on the mean link life time. We perform Kolmogorov-Smirnov test and establish that the probability distribution of link duration can be approximated as exponential.
在假设瑞利衰落信道条件和车速服从均匀概率分布的情况下,提出了求解车辆自组织网络中链路寿命的概率密度函数的解析模型。然后我们研究了路径损耗指数、发射功率、阈值信噪比和速度对平均链路寿命的影响。我们进行了Kolmogorov-Smirnov检验,证明了链路持续时间的概率分布可以近似为指数分布。
{"title":"A Probabilistic Model for Link Duration in Vehicular Ad Hoc Networks under Rayleigh Fading Channel Conditions","authors":"Siddharth Shelly, A. Babu","doi":"10.1109/ICACC.2015.16","DOIUrl":"https://doi.org/10.1109/ICACC.2015.16","url":null,"abstract":"In this paper, we present an analytical model to find the probability density function of link life time in vehicular ad hoc networks, assuming Rayleigh fading channel conditions and vehicle speed to follow uniform probability distribution. We then investigate the impact of path loss exponent, transmit power, threshold SNR and velocity on the mean link life time. We perform Kolmogorov-Smirnov test and establish that the probability distribution of link duration can be approximated as exponential.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129468673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Reversible Watermarking Using Image Content Assessment and Histogram Shifting 基于图像内容评估和直方图移位的可逆水印
N. Thomas, Shiney Thomas
Reversible data hiding is a technique to embed additional message into some distortion-unacceptable cover media, such as military or medical images, in a reversible manner so that the original cover content can be perfectly restored after extraction of the hidden message. This paper presents a new method using histogram shifting that aims at reducing the embedding distortion and improving watermark payload. The embedding capacity of a histogram-based reversible data hiding technique is primarily determined by the peak height of the histogram. Recently, some studies have tried to embed data in the histogram of prediction errors by modifying the error values. Previous methods insert data only in smooth areas. But by applying the histogram modulation to the image prediction-errors and by considering their immediate pixel neighborhood, the method we propose inserts data in textured areas also. The proposed method, which can be applied to both natural and medical images, outperforms prior works in terms of payload and PSNR.
可逆数据隐藏是一种将附加信息以可逆的方式嵌入到某些不可失真的掩体(如军事或医学图像)中,从而在提取隐藏信息后完全恢复原始掩体内容的技术。本文提出了一种利用直方图移位的新方法,以减少嵌入失真,提高水印有效载荷。基于直方图的可逆数据隐藏技术的嵌入容量主要由直方图的峰值高度决定。近年来,一些研究尝试通过修改误差值,将数据嵌入到预测误差直方图中。以前的方法只在平滑区域插入数据。但是,通过对图像预测误差进行直方图调制并考虑其直接像素邻域,我们提出的方法也可以在纹理区域插入数据。该方法既适用于自然图像,也适用于医学图像,在有效载荷和PSNR方面优于先前的工作。
{"title":"Reversible Watermarking Using Image Content Assessment and Histogram Shifting","authors":"N. Thomas, Shiney Thomas","doi":"10.1109/ICACC.2015.18","DOIUrl":"https://doi.org/10.1109/ICACC.2015.18","url":null,"abstract":"Reversible data hiding is a technique to embed additional message into some distortion-unacceptable cover media, such as military or medical images, in a reversible manner so that the original cover content can be perfectly restored after extraction of the hidden message. This paper presents a new method using histogram shifting that aims at reducing the embedding distortion and improving watermark payload. The embedding capacity of a histogram-based reversible data hiding technique is primarily determined by the peak height of the histogram. Recently, some studies have tried to embed data in the histogram of prediction errors by modifying the error values. Previous methods insert data only in smooth areas. But by applying the histogram modulation to the image prediction-errors and by considering their immediate pixel neighborhood, the method we propose inserts data in textured areas also. The proposed method, which can be applied to both natural and medical images, outperforms prior works in terms of payload and PSNR.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132778359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CS Based Acoustic Source Localization and Sparse Reconstruction Using Greedy Algorithms 基于CS的声源定位及贪婪算法稀疏重建
Jinu Joseph, N. S. Kumar, Devi M. Rema, K. P. Krishna
In this paper, the problem of direction of arrival estimation of unknown sources in under water scenario, with minimum data acquisition is investigated. The scheme is based on Compressive Sampling, an emerging technique in signal processing, which asserts that data acquisition and signal reconstruction is possible with much less number of measurements. The sparse nature of the angle spectrum is effectively utilized. The target data as received by a linear array of acoustic sensors is simulated and compressed sensing is employed prior to processing. For reconstruction of compressively sampled signals, greedy algorithms like orthogonal matching pursuit, matching pursuit and weak matching pursuit are employed. The performance of these algorithms are assessed and results are compared with conventional MUSIC algorithm.
本文研究了水下最小数据采集条件下未知源的到达方向估计问题。该方案基于压缩采样,这是一种新兴的信号处理技术,它声称数据采集和信号重建可以用更少的测量次数。有效地利用了角谱的稀疏特性。模拟由声传感器线性阵列接收到的目标数据,并在处理前采用压缩感知。对于压缩采样信号的重构,采用了正交匹配跟踪、匹配跟踪和弱匹配跟踪等贪婪算法。对这些算法的性能进行了评估,并与传统的MUSIC算法进行了比较。
{"title":"CS Based Acoustic Source Localization and Sparse Reconstruction Using Greedy Algorithms","authors":"Jinu Joseph, N. S. Kumar, Devi M. Rema, K. P. Krishna","doi":"10.1109/ICACC.2015.22","DOIUrl":"https://doi.org/10.1109/ICACC.2015.22","url":null,"abstract":"In this paper, the problem of direction of arrival estimation of unknown sources in under water scenario, with minimum data acquisition is investigated. The scheme is based on Compressive Sampling, an emerging technique in signal processing, which asserts that data acquisition and signal reconstruction is possible with much less number of measurements. The sparse nature of the angle spectrum is effectively utilized. The target data as received by a linear array of acoustic sensors is simulated and compressed sensing is employed prior to processing. For reconstruction of compressively sampled signals, greedy algorithms like orthogonal matching pursuit, matching pursuit and weak matching pursuit are employed. The performance of these algorithms are assessed and results are compared with conventional MUSIC algorithm.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133131699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enhancing the Accuracy of Movie Recommendation System Based on Probabilistic Data Structure and Graph Database 基于概率数据结构和图数据库提高电影推荐系统的准确率
Ashish Sharma, Shalini Batra
User-based Collaborative-filtering (CF) which uses the matrix to store the ratings of the user, is the most frequently used recommender technique, widely used because of its simplicity and efficient performance. Although it is extensively used, one of its major problems is that its performance decreases when the user-item matrix becomes sparse. This paper provides a novel technique to overcome sparsity by the usage of combination of graph data base and with Locality Sensitive Hashing (LSH). Graph database provide the flexibility to developer to design database without performing any normalization and LSH provide the faster way to find the nearest neighbor for the recommendation to user. Paper concludes with comparison of traditional approach with the proposed approach.
基于用户的协同过滤(CF)是最常用的推荐技术,它使用矩阵来存储用户的评分,由于其简单和高效的性能而被广泛使用。虽然它被广泛使用,但它的一个主要问题是当用户项矩阵变得稀疏时,它的性能会下降。本文提出了一种将图数据库与局部敏感哈希(Locality Sensitive hash, LSH)相结合的方法来克服稀疏性的新方法。图数据库为开发人员设计数据库提供了灵活性,无需执行任何规范化,而LSH提供了更快的方法来找到最近的邻居并向用户推荐。论文最后对传统方法和本文提出的方法进行了比较。
{"title":"Enhancing the Accuracy of Movie Recommendation System Based on Probabilistic Data Structure and Graph Database","authors":"Ashish Sharma, Shalini Batra","doi":"10.1109/ICACC.2015.14","DOIUrl":"https://doi.org/10.1109/ICACC.2015.14","url":null,"abstract":"User-based Collaborative-filtering (CF) which uses the matrix to store the ratings of the user, is the most frequently used recommender technique, widely used because of its simplicity and efficient performance. Although it is extensively used, one of its major problems is that its performance decreases when the user-item matrix becomes sparse. This paper provides a novel technique to overcome sparsity by the usage of combination of graph data base and with Locality Sensitive Hashing (LSH). Graph database provide the flexibility to developer to design database without performing any normalization and LSH provide the faster way to find the nearest neighbor for the recommendation to user. Paper concludes with comparison of traditional approach with the proposed approach.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114931914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SDFS: Secured Data Forwarding with Minimum Selfishness and Message Overhead in Mobile Wireless Network SDFS:移动无线网络中具有最小自私自利和消息开销的安全数据转发
Bency Wilson, K. Preetha
MANET (Mobile Ad Hoc Network) consists of mobile nodes having no fixed infrastructure. These networks have dynamic topology and all the nodes are in general autonomous. Normally network comprises of selfish individuals that are not willing to forward the packets but wants to forward their own messages. In ad hoc network throughput increases when all available nodes are used for routing and forwarding. So instead of avoiding selfish nodes from the routing path the network can effectively utilize all the existing nodes. In this research, selfishness of the nodes is studied and better security methods are proposed to ensure reliable delivery of messages. Simulation results shows that the proposed system ensures less message overhead, memory and time. Also it tries to improve the packet delivery ratio.
MANET(移动自组网)由没有固定基础设施的移动节点组成。这些网络具有动态拓扑结构,所有节点总体上是自治的。通常,网络由自私的个体组成,他们不愿意转发数据包,而是希望转发自己的消息。在ad hoc网络中,当所有可用节点都用于路由和转发时,吞吐量会增加。因此,网络可以有效地利用现有的所有节点,而不是避免路由路径上的自私节点。在本研究中,研究了节点的自私自利,并提出了更好的安全方法来保证消息的可靠传递。仿真结果表明,该系统保证了较小的消息开销、内存和时间。此外,它还试图提高数据包的传送率。
{"title":"SDFS: Secured Data Forwarding with Minimum Selfishness and Message Overhead in Mobile Wireless Network","authors":"Bency Wilson, K. Preetha","doi":"10.1109/ICACC.2015.41","DOIUrl":"https://doi.org/10.1109/ICACC.2015.41","url":null,"abstract":"MANET (Mobile Ad Hoc Network) consists of mobile nodes having no fixed infrastructure. These networks have dynamic topology and all the nodes are in general autonomous. Normally network comprises of selfish individuals that are not willing to forward the packets but wants to forward their own messages. In ad hoc network throughput increases when all available nodes are used for routing and forwarding. So instead of avoiding selfish nodes from the routing path the network can effectively utilize all the existing nodes. In this research, selfishness of the nodes is studied and better security methods are proposed to ensure reliable delivery of messages. Simulation results shows that the proposed system ensures less message overhead, memory and time. Also it tries to improve the packet delivery ratio.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132846375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multi-illumination Multi-frequency Approach for Early Detection of Breast Tumor by Mode-Matching Method 多光照多频模式匹配法早期检测乳腺肿瘤
A. Athira, T. Anjit, P. Mythili
Microwave imaging is the technique used to analyze hidden objects in a structure using microwaves. The significant contrast in dielectric properties between the malignant tumors and normal fatty tissue at microwave frequencies is the driving force in the application of microwave imaging for breast tumor detection. In this paper breast is modelled as a hemisphere and spherical tumors are embedded in the breast, which is divided into different layers. Multiple receivers are placed around the composite structure for each layer and measurements are carried out at different microwave frequencies. Hence a multi-illumination and multi-frequency approach is employed for collecting scattered field, which helps in reconstruction of entire permittivity profile. The scattered field from the breast tumor model were computed by using a boundary value mode-matching (MM) approach. Then the intensity of field inside the composite structure for each layer is reconstructed from the scattered field by mode-matching Bessel function method, which is used to analyze hidden or embedded tumor. It is identified that microwave frequency range used for imaging has dependence on the permittivity of normal tissue. A new algorithm is proposed to identify the exact permittivity of the normal tissue. Further the optimum frequency range has been identified corresponding to each permittivity value. An attempt has been made to identify the minimum number of receivers required for efficient reconstruction of permittivity profile.
微波成像是一种利用微波分析结构中隐藏物体的技术。恶性肿瘤与正常脂肪组织在微波频率下介电特性的显著差异是微波成像应用于乳腺肿瘤检测的动力。本文将乳房建模为一个半球,将球形肿瘤嵌入乳腺,并将其分成不同的层。在每一层的复合结构周围放置多个接收器,并在不同的微波频率下进行测量。因此,采用多照度、多频率的方法采集散射场,有助于重建整个介电常数剖面。采用边界值模式匹配(MM)方法计算乳腺肿瘤模型散射场。然后利用模式匹配贝塞尔函数法从散射场重构复合结构内部每层的场强,用于分析隐藏或嵌入的肿瘤。研究发现,用于成像的微波频率范围与正常组织的介电常数有关。提出了一种准确识别正常组织介电常数的新算法。此外,还确定了与每个介电常数值相对应的最佳频率范围。试图确定有效地重建介电常数剖面所需的最小接收器数量。
{"title":"A Multi-illumination Multi-frequency Approach for Early Detection of Breast Tumor by Mode-Matching Method","authors":"A. Athira, T. Anjit, P. Mythili","doi":"10.1109/ICACC.2015.78","DOIUrl":"https://doi.org/10.1109/ICACC.2015.78","url":null,"abstract":"Microwave imaging is the technique used to analyze hidden objects in a structure using microwaves. The significant contrast in dielectric properties between the malignant tumors and normal fatty tissue at microwave frequencies is the driving force in the application of microwave imaging for breast tumor detection. In this paper breast is modelled as a hemisphere and spherical tumors are embedded in the breast, which is divided into different layers. Multiple receivers are placed around the composite structure for each layer and measurements are carried out at different microwave frequencies. Hence a multi-illumination and multi-frequency approach is employed for collecting scattered field, which helps in reconstruction of entire permittivity profile. The scattered field from the breast tumor model were computed by using a boundary value mode-matching (MM) approach. Then the intensity of field inside the composite structure for each layer is reconstructed from the scattered field by mode-matching Bessel function method, which is used to analyze hidden or embedded tumor. It is identified that microwave frequency range used for imaging has dependence on the permittivity of normal tissue. A new algorithm is proposed to identify the exact permittivity of the normal tissue. Further the optimum frequency range has been identified corresponding to each permittivity value. An attempt has been made to identify the minimum number of receivers required for efficient reconstruction of permittivity profile.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132441778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
HiPAD: High Performance Adaptive Deflection Router for On-Chip Mesh Networks 用于片上网状网络的高性能自适应偏转路由器
Simi Zerine Sleeba, John Jose, M. G. Mini
The efficiency of a router in a Network on Chip (NoC) is characterised by good performance, minimum packet latency, area and power. In this paper, we propose an adaptive deflection router for mesh NoC which offers higher speed of operation by reducing the router critical path latency. We propose a single cycle router that uses an intelligent decision making logic to store deflected flits in minimum number of side buffers. Synthesis results of the design show an overall reduction in timing latency compared to a conventional minimally buffered router with two cycle latency. Network simulation of the proposed architecture using synthetic and real application traffic reports that the average flit latency and deflection rate reduces significantly in our design compared to the state-of-the-art single cycle deflection routers.
在片上网络(NoC)中,路由器的效率具有良好的性能、最小的数据包延迟、面积和功耗。在本文中,我们提出了一种自适应偏转路由器,该路由器通过减少路由器关键路径延迟来提供更高的运行速度。我们提出了一种单周期路由器,它使用智能决策逻辑将偏转的飞行存储在最小数量的侧缓冲区中。该设计的综合结果显示,与具有两个周期延迟的传统最小缓冲路由器相比,定时延迟总体上减少了。使用合成和真实应用流量的网络模拟表明,与最先进的单周期偏转路由器相比,我们的设计中的平均飞行延迟和偏转率显着降低。
{"title":"HiPAD: High Performance Adaptive Deflection Router for On-Chip Mesh Networks","authors":"Simi Zerine Sleeba, John Jose, M. G. Mini","doi":"10.1109/ICACC.2015.105","DOIUrl":"https://doi.org/10.1109/ICACC.2015.105","url":null,"abstract":"The efficiency of a router in a Network on Chip (NoC) is characterised by good performance, minimum packet latency, area and power. In this paper, we propose an adaptive deflection router for mesh NoC which offers higher speed of operation by reducing the router critical path latency. We propose a single cycle router that uses an intelligent decision making logic to store deflected flits in minimum number of side buffers. Synthesis results of the design show an overall reduction in timing latency compared to a conventional minimally buffered router with two cycle latency. Network simulation of the proposed architecture using synthetic and real application traffic reports that the average flit latency and deflection rate reduces significantly in our design compared to the state-of-the-art single cycle deflection routers.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"305 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121824196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scalable Ethernet Architecture Using SDN by Suppressing Broadcast Traffic 通过抑制广播流量使用SDN的可扩展以太网架构
Naseela Jehan, A. M. Haneef
The simplicity and high performance-to-cost ratio make Ethernet, the most dominant and widely deployed LAN technology. But, a single Ethernet network cannot scale to large networks such as enterprise, campus, data center and wide area networks because of broadcast based services like Address Resolution Protocol (ARP) and Dynamic Host Configuration Protocol (DHCP). The Software-Defined Networking (SDN) based scheme SEASDN is proposed here to effectively enhance the scalability of Ethernet by suppressing broadcast traffic. In this scheme, DHCP and ARP broadcast messages are relayed through SDN controller to the destination and thus eliminating the need for broadcasting. The proposed scheme can eliminate flooding without any change to the existing hardware, software and protocols of hosts and also can detect ARP spoofing attack. The simulation results show that SEASDN is very much effective in ARP and DHCP broadcast suppression than the current SDN broadcast handling methods while reducing control plane overhead and data plane traffic significantly.
以太网的简单性和高性价比使其成为最主要和最广泛部署的局域网技术。但是,由于地址解析协议(ARP)和动态主机配置协议(DHCP)等基于广播的服务,单个以太网无法扩展到企业、校园、数据中心和广域网等大型网络。本文提出了基于软件定义网络(SDN)的软件定义网络(SEASDN)方案,通过抑制广播流量来有效增强以太网的可扩展性。在该方案中,DHCP和ARP广播消息通过SDN控制器转发到目的地址,从而消除了广播的需要。该方案可以在不改变主机现有硬件、软件和协议的情况下消除泛洪,并且可以检测ARP欺骗攻击。仿真结果表明,与现有的SDN广播处理方法相比,该方法在抑制ARP和DHCP广播方面非常有效,同时显著降低了控制平面开销和数据平面流量。
{"title":"Scalable Ethernet Architecture Using SDN by Suppressing Broadcast Traffic","authors":"Naseela Jehan, A. M. Haneef","doi":"10.1109/ICACC.2015.66","DOIUrl":"https://doi.org/10.1109/ICACC.2015.66","url":null,"abstract":"The simplicity and high performance-to-cost ratio make Ethernet, the most dominant and widely deployed LAN technology. But, a single Ethernet network cannot scale to large networks such as enterprise, campus, data center and wide area networks because of broadcast based services like Address Resolution Protocol (ARP) and Dynamic Host Configuration Protocol (DHCP). The Software-Defined Networking (SDN) based scheme SEASDN is proposed here to effectively enhance the scalability of Ethernet by suppressing broadcast traffic. In this scheme, DHCP and ARP broadcast messages are relayed through SDN controller to the destination and thus eliminating the need for broadcasting. The proposed scheme can eliminate flooding without any change to the existing hardware, software and protocols of hosts and also can detect ARP spoofing attack. The simulation results show that SEASDN is very much effective in ARP and DHCP broadcast suppression than the current SDN broadcast handling methods while reducing control plane overhead and data plane traffic significantly.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124859490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Load Balancing of Tasks in Cloud Computing Environment Based on Bee Colony Algorithm 基于蜂群算法的云计算环境下任务负载均衡
K. R. R. Babu, Amaya Anna Joy, P. Samuel
Cloud computing is an emerging computing paradigm in which shared resources are provided according to the customer request at specific time. Load balancing is the process of distributing workload among various nodes of the computing system. The load can be CPU load, memory capacity, or network load. An efficient load balancing avoids a situation where some of the nodes are heavily loaded while other nodes are idle or doing very little work. When Virtual Machine (VM) is overloaded with multiple tasks, these tasks are removed and migrated to the under loaded VMs of the same or different datacenter. This paper proposes a bee colony based algorithm for efficient load balancing, which is based on the foraging behavior of honey bees to balance load across VMs. In the proposed method, tasks removed from over loaded VMs are treated as honey bees and under loaded VMs are the food sources. The proposed method also considers the priorities of tasks in the waiting queues of VMs and tries to achieve minimum response time and reduced number of task migrations. The experimental result shows that there is significant improvement in the Quality of Service (QoS).
云计算是一种新兴的计算范式,其中根据客户在特定时间的请求提供共享资源。负载均衡是指在计算系统的各个节点之间分配工作负载的过程。负载可以是CPU负载、内存容量或网络负载。有效的负载平衡可以避免某些节点负载过重而其他节点空闲或工作很少的情况。当虚拟机负载过重时,系统会将负载过重的虚拟机迁移到负载较轻的同一或不同数据中心的虚拟机上。本文提出了一种基于蜂群的高效负载均衡算法,该算法基于蜜蜂的觅食行为来平衡虚拟机之间的负载。在该方法中,从负载过重的虚拟机中移除的任务被视为蜜蜂,负载不足的虚拟机被视为食物来源。该方法还考虑了虚拟机等待队列中任务的优先级,并试图实现最小的响应时间和减少任务迁移次数。实验结果表明,该方法在服务质量(QoS)方面有显著提高。
{"title":"Load Balancing of Tasks in Cloud Computing Environment Based on Bee Colony Algorithm","authors":"K. R. R. Babu, Amaya Anna Joy, P. Samuel","doi":"10.1109/ICACC.2015.47","DOIUrl":"https://doi.org/10.1109/ICACC.2015.47","url":null,"abstract":"Cloud computing is an emerging computing paradigm in which shared resources are provided according to the customer request at specific time. Load balancing is the process of distributing workload among various nodes of the computing system. The load can be CPU load, memory capacity, or network load. An efficient load balancing avoids a situation where some of the nodes are heavily loaded while other nodes are idle or doing very little work. When Virtual Machine (VM) is overloaded with multiple tasks, these tasks are removed and migrated to the under loaded VMs of the same or different datacenter. This paper proposes a bee colony based algorithm for efficient load balancing, which is based on the foraging behavior of honey bees to balance load across VMs. In the proposed method, tasks removed from over loaded VMs are treated as honey bees and under loaded VMs are the food sources. The proposed method also considers the priorities of tasks in the waiting queues of VMs and tries to achieve minimum response time and reduced number of task migrations. The experimental result shows that there is significant improvement in the Quality of Service (QoS).","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125180617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
期刊
2015 Fifth International Conference on Advances in Computing and Communications (ICACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1