首页 > 最新文献

2011 Third International Conference on Advanced Computing最新文献

英文 中文
Network fault monitoring in Grid 网格中的网络故障监测
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165208
C. Valliyammai, S. Thamarai Selvi, M. Dinesh Kumar, C. Sakthivel, M. Sunil
Grid resources having heterogeneous architecture being geographically distributed and interconnected via unreliable network media are at the risk of failure which proves the need for an efficient fault monitoring framework. The traditional network fault monitoring systems based on the centralized client/server architecture have limited efficiency and scalability, as the complexity of the network increases, but the mobile agents with specific functions can be dispatched to network nodes and accomplish the assigned tasks. The mobile agent based model provides efficiency and flexibility in network fault monitoring, since dispatched agents avoid unnecessary traffic overheads due to frequent data transmissions between the compute nodes and the head node in a cluster and this model can be used in clusters of any size. The proposed system involves monitoring network related faults in a Grid environment. The network related faults covered in this system are link failure, network traffic overloads and resulting packet losses. Both the link failure and the packet loss due to congestions in the network, prevents the corresponding application from proceeding further which results in delay in job completion. Overload in network traffic which occurs due to congestions caused by packet flow exceeding the maximum network throughput will further result in packet losses and delays in network flow which increase the job completion time. Detecting these network failures can help in better utilization of the resources and timely notification to the user in a Grid environment.
具有异构体系结构的网格资源分布在不同的地理位置,并且通过不可靠的网络介质相互连接,存在故障风险,因此需要有效的故障监测框架。传统的基于集中式客户端/服务器架构的网络故障监测系统,随着网络复杂性的增加,其效率和可扩展性有限,而具有特定功能的移动代理可以被调度到网络节点上,完成分配的任务。基于移动代理的网络故障监测模型可用于任何规模的集群,可避免集群中计算节点和头部节点之间频繁的数据传输带来的不必要的流量开销,提高了网络故障监测的效率和灵活性。该系统涉及在网格环境下监测网络相关故障。与网络相关的故障包括链路故障、网络流量过载以及由此导致的丢包。由于网络拥塞导致的链路故障和丢包都会阻止相应的应用程序继续进行,从而导致任务完成延迟。由于数据包流超过最大网络吞吐量而引起的拥塞导致网络流量过载,会进一步导致数据包丢失和网络流延迟,从而增加作业完成时间。检测这些网络故障有助于在网格环境中更好地利用资源并及时向用户发出通知。
{"title":"Network fault monitoring in Grid","authors":"C. Valliyammai, S. Thamarai Selvi, M. Dinesh Kumar, C. Sakthivel, M. Sunil","doi":"10.1109/ICOAC.2011.6165208","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165208","url":null,"abstract":"Grid resources having heterogeneous architecture being geographically distributed and interconnected via unreliable network media are at the risk of failure which proves the need for an efficient fault monitoring framework. The traditional network fault monitoring systems based on the centralized client/server architecture have limited efficiency and scalability, as the complexity of the network increases, but the mobile agents with specific functions can be dispatched to network nodes and accomplish the assigned tasks. The mobile agent based model provides efficiency and flexibility in network fault monitoring, since dispatched agents avoid unnecessary traffic overheads due to frequent data transmissions between the compute nodes and the head node in a cluster and this model can be used in clusters of any size. The proposed system involves monitoring network related faults in a Grid environment. The network related faults covered in this system are link failure, network traffic overloads and resulting packet losses. Both the link failure and the packet loss due to congestions in the network, prevents the corresponding application from proceeding further which results in delay in job completion. Overload in network traffic which occurs due to congestions caused by packet flow exceeding the maximum network throughput will further result in packet losses and delays in network flow which increase the job completion time. Detecting these network failures can help in better utilization of the resources and timely notification to the user in a Grid environment.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131479571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized feature selection with k-means clustered triangle SVM for Intrusion Detection 基于k-均值聚类三角支持向量机的入侵检测特征选择优化
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165213
R. Ashok, A. Lakshmi, G. D. V. Rani, Madarapu Naresh Kumar
With the rapid progress in the network based applications, the threat of attackers and security threats has grown exponentially. Misleading of data shows many financial losses in all kind of network based environments. Day by day new vulnerabilities are detected in networking and computer products that lead to new emerging problems. One of the new prevention techniques for network threats is Intrusion Detection System (IDS). Feature selection is the major challenging issues in IDS in order to reduce the useless and redundant features among the attributes (e.g. attributes in KDD cup'99, an Intrusion Detection Data Set). In this paper, we aim to reduce feature vector space by calculating distance relation between features with Information Measure (IM) by evaluating the relation between feature and class to enhance the feature selection. Here we incorporate the Information Measure (IM) method with k-means Cluster Triangular Area Based Support Vector Machine (CTSVM) and SVM (Support Vector Machine) classifier to detect intrusion attacks. By dealing with both continuous and discrete attributes, our proposed method extracts best features with high Detection Rate (DR) and False Positive Rate (FPR).
随着基于网络的应用的快速发展,攻击者的威胁和安全威胁呈指数级增长。在各种基于网络的环境中,数据的误导显示了许多经济损失。每天,在网络和计算机产品中都会发现新的漏洞,从而导致新的问题出现。入侵检测系统(IDS)是一种新的网络威胁防御技术。特征选择是入侵检测中最具挑战性的问题,它可以减少属性(例如KDD cup'99,一个入侵检测数据集)中无用和冗余的特征。本文通过评价特征与类之间的关系,利用信息度量(Information Measure, IM)来计算特征之间的距离关系,从而减少特征向量空间,增强特征的选择能力。本文将信息度量(IM)方法与基于k-均值聚类三角面积的支持向量机(CTSVM)和支持向量机(SVM)分类器相结合来检测入侵攻击。该方法同时处理连续和离散属性,提取出具有较高检测率(DR)和误报率(FPR)的特征。
{"title":"Optimized feature selection with k-means clustered triangle SVM for Intrusion Detection","authors":"R. Ashok, A. Lakshmi, G. D. V. Rani, Madarapu Naresh Kumar","doi":"10.1109/ICOAC.2011.6165213","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165213","url":null,"abstract":"With the rapid progress in the network based applications, the threat of attackers and security threats has grown exponentially. Misleading of data shows many financial losses in all kind of network based environments. Day by day new vulnerabilities are detected in networking and computer products that lead to new emerging problems. One of the new prevention techniques for network threats is Intrusion Detection System (IDS). Feature selection is the major challenging issues in IDS in order to reduce the useless and redundant features among the attributes (e.g. attributes in KDD cup'99, an Intrusion Detection Data Set). In this paper, we aim to reduce feature vector space by calculating distance relation between features with Information Measure (IM) by evaluating the relation between feature and class to enhance the feature selection. Here we incorporate the Information Measure (IM) method with k-means Cluster Triangular Area Based Support Vector Machine (CTSVM) and SVM (Support Vector Machine) classifier to detect intrusion attacks. By dealing with both continuous and discrete attributes, our proposed method extracts best features with high Detection Rate (DR) and False Positive Rate (FPR).","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134349742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Challenges and recent trends in personalized Web search: A survey 个性化网络搜索的挑战和最新趋势:一项调查
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165198
K. Selvakumar, S. Sendhilkumar
The exponential growth of the Web in last decade makes the largest publically available data source in the world. It integrates text, graphics, audio, video and hypertext. Web users approaches many searching techniques to access the enormous information available on the World Wide Web (WWW). Web search is a process to find information from the pile of documents, Web pages and Web sources. Search engines are playing vital role in Web search process. But the Web users and their essential content may vary among one another. Moreover the users are struggling for obtaining the most significant information while processing their desire content. The main objective of this paper is to provide a comparative analysis of the Web search concepts using Web mining techniques. This paper also highlights the Fuzzy Neural Networks approach in the history for enhancing Web search.
在过去十年中,Web的指数级增长使其成为世界上最大的公共可用数据源。它集成了文本、图形、音频、视频和超文本。网络用户使用多种搜索技术来访问万维网(WWW)上的海量信息。网络搜索是从成堆的文档、网页和Web资源中查找信息的过程。搜索引擎在网络搜索过程中起着至关重要的作用。但是网络用户和他们的基本内容可能彼此不同。此外,用户在处理他们想要的内容时,也在努力获取最重要的信息。本文的主要目的是对使用Web挖掘技术的Web搜索概念进行比较分析。本文还重点介绍了历史上模糊神经网络方法在增强Web搜索方面的应用。
{"title":"Challenges and recent trends in personalized Web search: A survey","authors":"K. Selvakumar, S. Sendhilkumar","doi":"10.1109/ICOAC.2011.6165198","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165198","url":null,"abstract":"The exponential growth of the Web in last decade makes the largest publically available data source in the world. It integrates text, graphics, audio, video and hypertext. Web users approaches many searching techniques to access the enormous information available on the World Wide Web (WWW). Web search is a process to find information from the pile of documents, Web pages and Web sources. Search engines are playing vital role in Web search process. But the Web users and their essential content may vary among one another. Moreover the users are struggling for obtaining the most significant information while processing their desire content. The main objective of this paper is to provide a comparative analysis of the Web search concepts using Web mining techniques. This paper also highlights the Fuzzy Neural Networks approach in the history for enhancing Web search.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132880715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Keynote speaker I: Ubiquitous sensing 主讲人1:无处不在的传感
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165229
P. Balamuralidhar, Subrat Kar
Ubiquitous sensing applications often involve the sensor based data collection with a large coverage in space in and time. From a return on investment perspective the value of information needs to be attractive with the cost of infrastructure to acquire it. The role of participative sensing and human centric sensing has been widely explored for collecting and analyzing data for use in social science, environmental and health applications. The wide availability of smart phones integrated with variety of sensors is becoming platform for people to document a neighborhood, gather evidence, study behaviors and is accelerating the pace of exploration in new application areas. Many of the current applications involve the monitoring of public spaces involving the participation of citizen in general. Participative surveillance is an application that can bring substantial social benefit. There are many challenges in effectively deploying such applications. It includes the privacy issues, trustworthiness of the data, human factors that affect the quality of sensing, variability of devices, enrolling and motivating participants, and a sustainable business model. Further it should be supported with a sound framework for deployment where the participant has control over data, transparency in data handling and intuitive user interface supporting multi-modal interactions. This presentation will discuss the above aspects with a few illustrative use case scenarios.
泛在传感应用通常涉及基于传感器的数据采集,在空间、时间和时间上具有较大的覆盖范围。从投资回报的角度来看,信息的价值需要与获取信息的基础设施成本相匹配。参与式感知和以人为中心的感知在收集和分析用于社会科学、环境和健康应用的数据方面的作用已被广泛探索。集成了各种传感器的智能手机的广泛可用性正在成为人们记录邻里关系、收集证据、研究行为的平台,并加速了新应用领域的探索步伐。目前的许多应用都涉及到公众参与的公共空间的监控。参与式监测是一种能够带来可观社会效益的应用。有效地部署这样的应用程序有许多挑战。它包括隐私问题、数据的可信度、影响传感质量的人为因素、设备的可变性、参与者的招募和激励,以及可持续的商业模式。此外,它应该得到一个健全的部署框架的支持,其中参与者可以控制数据,数据处理的透明度和支持多模态交互的直观用户界面。本演示将通过几个说明性用例场景讨论上述方面。
{"title":"Keynote speaker I: Ubiquitous sensing","authors":"P. Balamuralidhar, Subrat Kar","doi":"10.1109/ICOAC.2011.6165229","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165229","url":null,"abstract":"Ubiquitous sensing applications often involve the sensor based data collection with a large coverage in space in and time. From a return on investment perspective the value of information needs to be attractive with the cost of infrastructure to acquire it. The role of participative sensing and human centric sensing has been widely explored for collecting and analyzing data for use in social science, environmental and health applications. The wide availability of smart phones integrated with variety of sensors is becoming platform for people to document a neighborhood, gather evidence, study behaviors and is accelerating the pace of exploration in new application areas. Many of the current applications involve the monitoring of public spaces involving the participation of citizen in general. Participative surveillance is an application that can bring substantial social benefit. There are many challenges in effectively deploying such applications. It includes the privacy issues, trustworthiness of the data, human factors that affect the quality of sensing, variability of devices, enrolling and motivating participants, and a sustainable business model. Further it should be supported with a sound framework for deployment where the participant has control over data, transparency in data handling and intuitive user interface supporting multi-modal interactions. This presentation will discuss the above aspects with a few illustrative use case scenarios.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114042597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing multicore ECU architecture in vehicle networks using AUTOSAR 基于AUTOSAR的汽车网络多核ECU架构设计
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165187
K. Senthilkumar, R. Ramadoss
The number of electronic control units (ECUs) in modern vehicles has continuously increased in last few decades. In addition, advanced functionalities antilock braking systems, adaptive cruise control and climate control put higher computational demand on ECUs, which further increases the design complexity of automotive control systems. Multicore processors having multiple processing units are integrated on a single chip, have emerged to be the main computing controllers not only for high-end servers but also for embedded control systems. Using multicore processors, more centralized architecture designs can be adopted for automotive control systems. The recent initiative on AUTOmotive Open System ARchitecture (AUTOSAR) has established several standards for automotive software and hardware designs, which include guidelines for designing centralized architecture with multicore ECUs for automotive control systems. With AUTOSAR, it is expected that computational control tasks of different functions can share one ECU or run on any ECU connected with in-vehicle network like CAN and FlexRay. Also, In this paper, we describe some key analytical components that together characterize the hierarchical bus structures composed of FlexRay, CANbus and LINbus. Our analysis shows that the practical constraints imposed by standards such as AUTOSAR can lead to higher levels of schedulable resource utilization. This reduces both the overall component count and cost, while facilitating easy enhancements.
在过去的几十年里,现代车辆中的电子控制单元(ecu)的数量不断增加。此外,防抱死制动系统、自适应巡航控制和气候控制等先进功能对ecu提出了更高的计算要求,这进一步增加了汽车控制系统的设计复杂性。多核处理器将多个处理单元集成在一个芯片上,不仅是高端服务器的主要计算控制器,也是嵌入式控制系统的主要计算控制器。使用多核处理器,汽车控制系统可以采用更集中的架构设计。最近,汽车开放系统架构(AUTOSAR)倡议为汽车软件和硬件设计建立了几个标准,其中包括为汽车控制系统设计多核ecu集中式架构的指南。借助AUTOSAR,不同功能的计算控制任务可以共享一个ECU,也可以运行在连接了can和FlexRay等车载网络的任何ECU上。在本文中,我们描述了一些关键的分析组件,它们共同表征了由FlexRay、CANbus和LINbus组成的分层总线结构。我们的分析表明,AUTOSAR等标准所施加的实际约束可以导致更高级别的可调度资源利用率。这减少了总体组件数量和成本,同时促进了简单的增强。
{"title":"Designing multicore ECU architecture in vehicle networks using AUTOSAR","authors":"K. Senthilkumar, R. Ramadoss","doi":"10.1109/ICOAC.2011.6165187","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165187","url":null,"abstract":"The number of electronic control units (ECUs) in modern vehicles has continuously increased in last few decades. In addition, advanced functionalities antilock braking systems, adaptive cruise control and climate control put higher computational demand on ECUs, which further increases the design complexity of automotive control systems. Multicore processors having multiple processing units are integrated on a single chip, have emerged to be the main computing controllers not only for high-end servers but also for embedded control systems. Using multicore processors, more centralized architecture designs can be adopted for automotive control systems. The recent initiative on AUTOmotive Open System ARchitecture (AUTOSAR) has established several standards for automotive software and hardware designs, which include guidelines for designing centralized architecture with multicore ECUs for automotive control systems. With AUTOSAR, it is expected that computational control tasks of different functions can share one ECU or run on any ECU connected with in-vehicle network like CAN and FlexRay. Also, In this paper, we describe some key analytical components that together characterize the hierarchical bus structures composed of FlexRay, CANbus and LINbus. Our analysis shows that the practical constraints imposed by standards such as AUTOSAR can lead to higher levels of schedulable resource utilization. This reduces both the overall component count and cost, while facilitating easy enhancements.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"488 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123561259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Design and analysis of multimedia communication system 多媒体通信系统的设计与分析
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165174
P. Telagarapu, B. Biswal, Vijaya Santhi Guntuku
In this paper, we propose an efficient compression/decompression technology and encryption/decryption technology for a multimedia communication system. In order to reduce the volume of multimedia data over wireless channels, data compression techniques are widely used. Discrete cosine transform (DCT) is one of the major compression Scheme. Hence, we present Dynamic bit-width adaptation scheme in discrete cosine transform (DCT) as an efficient compression technique. We select the appropriate operand bit widths that achieve significant reduction of power consumption. It is essential to protect the confidential image data from unauthorized access for multimedia applications. Hence, in this paper, we present a modification to the Advanced Encryption Standard (MAES) to reflect a high level security and better image encryption. The modification is done by adjusting the Shift Row Transformation.
本文提出了一种适用于多媒体通信系统的高效压缩/解压缩技术和加密/解密技术。为了减少无线信道中的多媒体数据量,数据压缩技术得到了广泛的应用。离散余弦变换(DCT)是一种主要的压缩方案。因此,我们提出了离散余弦变换(DCT)中的动态位宽自适应方案作为一种有效的压缩技术。我们选择适当的操作数位宽度,实现显著降低功耗。对于多媒体应用程序来说,保护机密图像数据不受未经授权的访问是至关重要的。因此,在本文中,我们提出了对高级加密标准(MAES)的修改,以反映更高级别的安全性和更好的图像加密。修改是通过调整移位行变换来完成的。
{"title":"Design and analysis of multimedia communication system","authors":"P. Telagarapu, B. Biswal, Vijaya Santhi Guntuku","doi":"10.1109/ICOAC.2011.6165174","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165174","url":null,"abstract":"In this paper, we propose an efficient compression/decompression technology and encryption/decryption technology for a multimedia communication system. In order to reduce the volume of multimedia data over wireless channels, data compression techniques are widely used. Discrete cosine transform (DCT) is one of the major compression Scheme. Hence, we present Dynamic bit-width adaptation scheme in discrete cosine transform (DCT) as an efficient compression technique. We select the appropriate operand bit widths that achieve significant reduction of power consumption. It is essential to protect the confidential image data from unauthorized access for multimedia applications. Hence, in this paper, we present a modification to the Advanced Encryption Standard (MAES) to reflect a high level security and better image encryption. The modification is done by adjusting the Shift Row Transformation.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120981277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cluster-based mobility management for target tracking in mobile sensor networks 基于集群的移动传感器网络目标跟踪管理
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165175
Prabhavathi M, Rajeshwari R
Target tracking being an important application of Wireless Sensor Networks (WSN), engrossed lot of research across the world among WSN researchers. Node mobility in mobile sensor networks is a challenge that affects several other factors like energy consumption, coverage and connectivity changes etc., asking for a well managed node mobility scheme, balancing the associated trade-offs. In spite of the amount of research that goes in to this field there is a demanding need for works which concentrate on both the tracking quality as well as routing efficiency. The work presents a completely distributed efficient localized target tracking algorithm in a mobile sensor network. This work implements location based clustering and combines the concepts of cluster scheduling and intra cluster node scheduling to achieve reduction in energy consumption and efficiency in tracking. It proposes a new application specific deployment for efficient target detection.
目标跟踪是无线传感器网络(WSN)的一项重要应用,受到了国内外研究人员的广泛关注。移动传感器网络中的节点移动性是一个挑战,它会影响到其他几个因素,如能耗、覆盖范围和连接变化等,需要一个管理良好的节点移动性方案,平衡相关的权衡。尽管在这一领域进行了大量的研究,但迫切需要同时关注跟踪质量和路由效率的工作。提出了一种移动传感器网络中完全分布式、高效的局部目标跟踪算法。该工作实现了基于位置的聚类,并将集群调度和集群内节点调度的概念相结合,以达到降低能耗和提高跟踪效率的目的。提出了一种针对特定应用的高效目标检测部署方法。
{"title":"Cluster-based mobility management for target tracking in mobile sensor networks","authors":"Prabhavathi M, Rajeshwari R","doi":"10.1109/ICOAC.2011.6165175","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165175","url":null,"abstract":"Target tracking being an important application of Wireless Sensor Networks (WSN), engrossed lot of research across the world among WSN researchers. Node mobility in mobile sensor networks is a challenge that affects several other factors like energy consumption, coverage and connectivity changes etc., asking for a well managed node mobility scheme, balancing the associated trade-offs. In spite of the amount of research that goes in to this field there is a demanding need for works which concentrate on both the tracking quality as well as routing efficiency. The work presents a completely distributed efficient localized target tracking algorithm in a mobile sensor network. This work implements location based clustering and combines the concepts of cluster scheduling and intra cluster node scheduling to achieve reduction in energy consumption and efficiency in tracking. It proposes a new application specific deployment for efficient target detection.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122676719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A MAHO based prioritized handoff queueing scheme in cellular networks 蜂窝网络中基于MAHO的优先切换排队方案
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165184
V. Goswami, P. K. Swain
The forced termination probability is an important measure in the performance evaluation of wireless communication networks. This paper proposes a new handoff queueing scheme that handles the channels reserved for handoff calls depending on the current status of the queue. This mechanism of queuing handoff priority scheme effectively reduces forced termination, at the expense of increased new call blocking probability. An analytical Markov model for the proposed scheme is developed and analyzed. We find that giving priority to handoff calls over new calls would improve the forced termination probability of the system without degrading the number of failed new call attempts. Various performance measures of the proposed scheme such as new call blocking probability, forced termination probability, handoff failure probability, the average waiting times of the queued handoff calls, etc. are described and evaluated. Computational experiences in the form of graphs of the proposed scheme and comparisons with conventional channel reservation schemes are presented.
强制终止概率是无线通信网络性能评估中的一个重要指标。本文提出了一种新的切换队列方案,该方案根据队列的当前状态来处理为切换呼叫保留的通道。这种排队切换优先方案的机制以增加新呼叫阻塞概率为代价,有效地减少了强制终止。建立并分析了该方案的解析马尔可夫模型。我们发现,在不降低新呼叫失败次数的情况下,将切换呼叫优先于新呼叫可以提高系统的强制终止概率。描述并评估了该方案的各种性能度量,如新呼叫阻塞概率、强制终止概率、切换失败概率、排队切换呼叫的平均等待时间等。本文以图的形式给出了该方案的计算经验,并与传统的信道保留方案进行了比较。
{"title":"A MAHO based prioritized handoff queueing scheme in cellular networks","authors":"V. Goswami, P. K. Swain","doi":"10.1109/ICOAC.2011.6165184","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165184","url":null,"abstract":"The forced termination probability is an important measure in the performance evaluation of wireless communication networks. This paper proposes a new handoff queueing scheme that handles the channels reserved for handoff calls depending on the current status of the queue. This mechanism of queuing handoff priority scheme effectively reduces forced termination, at the expense of increased new call blocking probability. An analytical Markov model for the proposed scheme is developed and analyzed. We find that giving priority to handoff calls over new calls would improve the forced termination probability of the system without degrading the number of failed new call attempts. Various performance measures of the proposed scheme such as new call blocking probability, forced termination probability, handoff failure probability, the average waiting times of the queued handoff calls, etc. are described and evaluated. Computational experiences in the form of graphs of the proposed scheme and comparisons with conventional channel reservation schemes are presented.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127431040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A zero-knowledge authentication for Wireless Sensor Networks based on congruence 基于同余的无线传感器网络零知识认证
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165155
B. Vijayalakshmi
The three critical resources in any cluster based Wireless Sensor Networks (WSN) are Sensor Nodes (SN), Cluster Head (CH) and Base Station (BS). The main job of Cluster Head is to send all the aggregated data collected from multiple sensor Nodes to the Base Station. But before sending the data, the Cluster Head must be perfectly sure about the actual identity of Base Station. If any intruder acts as Base Station and receives the aggregated data the entire security of the network is spoiled. To avoid this, the authenticity of the base station needs to be checked by cluster head before sending any data. Many asymmetric authentication techniques like digital signatures are difficult to implement in resource constraint sensor Nodes. A zero-knowledge proof protocol is a powerful cryptographic system that can be applied in many cryptographic applications and operations such as identification, authentication, key exchange and others, but many of the existing zero knowledge proof of identity involves exponential calculations which are not suitable for WSN. To overcome the limitations of the existing techniques, the proposed protocol provides Zero knowledge proof identity using congruence equations. Here, Triplet simultaneous linear congruence equations are used to subdivide a whole secret into three shares. A part of a secret is used as identity of the base station and stored in it. The Base Station won't reveal the part of secret stored in it to the Cluster Head but the Cluster Head confirms the true identity without getting the actual secret from Base Station. In this scheme, the Cluster Heads need to solve only congruence equations which need only limited computation and memory. When the proposed protocol is compared with existing protocols it shows that it provide instant authentication, with minimum memory utilization and withstand many attacks.
在任何基于集群的无线传感器网络(WSN)中,三个关键资源是传感器节点(SN)、簇头(CH)和基站(BS)。簇头的主要工作是将从多个传感器节点收集的所有聚合数据发送到基站。但是在发送数据之前,簇头必须完全确定基站的实际身份。如果任何入侵者充当基站并接收聚合数据,整个网络的安全性就会被破坏。为了避免这种情况,集群头需要在发送任何数据之前检查基站的真实性。在资源约束传感器节点中,数字签名等非对称身份验证技术难以实现。零知识证明协议是一种功能强大的密码系统,可用于身份识别、认证、密钥交换等多种密码应用和操作,但现有的许多零知识身份证明涉及指数计算,不适合无线传感器网络。为了克服现有技术的局限性,提出的协议使用同余方程提供零知识证明身份。在这里,使用三重联立线性同余方程将整个秘密细分为三个部分。密码的一部分用作基站的标识并存储在其中。基站不会将存储在其中的部分秘密透露给簇头,但簇头在没有从基站获得实际秘密的情况下确认了真实身份。在该方案中,簇头只需要求解同余方程,只需要有限的计算量和内存。将该协议与现有协议进行比较,结果表明该协议具有快速认证、内存利用率低、抗攻击能力强等优点。
{"title":"A zero-knowledge authentication for Wireless Sensor Networks based on congruence","authors":"B. Vijayalakshmi","doi":"10.1109/ICOAC.2011.6165155","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165155","url":null,"abstract":"The three critical resources in any cluster based Wireless Sensor Networks (WSN) are Sensor Nodes (SN), Cluster Head (CH) and Base Station (BS). The main job of Cluster Head is to send all the aggregated data collected from multiple sensor Nodes to the Base Station. But before sending the data, the Cluster Head must be perfectly sure about the actual identity of Base Station. If any intruder acts as Base Station and receives the aggregated data the entire security of the network is spoiled. To avoid this, the authenticity of the base station needs to be checked by cluster head before sending any data. Many asymmetric authentication techniques like digital signatures are difficult to implement in resource constraint sensor Nodes. A zero-knowledge proof protocol is a powerful cryptographic system that can be applied in many cryptographic applications and operations such as identification, authentication, key exchange and others, but many of the existing zero knowledge proof of identity involves exponential calculations which are not suitable for WSN. To overcome the limitations of the existing techniques, the proposed protocol provides Zero knowledge proof identity using congruence equations. Here, Triplet simultaneous linear congruence equations are used to subdivide a whole secret into three shares. A part of a secret is used as identity of the base station and stored in it. The Base Station won't reveal the part of secret stored in it to the Cluster Head but the Cluster Head confirms the true identity without getting the actual secret from Base Station. In this scheme, the Cluster Heads need to solve only congruence equations which need only limited computation and memory. When the proposed protocol is compared with existing protocols it shows that it provide instant authentication, with minimum memory utilization and withstand many attacks.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"88 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Learner centered Adaptive and Intelligent E-Portfolio Architecture for Learning (AIEPAL) 以学习者为中心的自适应智能学习电子投资组合架构(AIEPAL)
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165158
D. E. Dekson, E. Suresh
This work presents the architecture of an adaptive learning environment to take care of the personal learning needs of the learners. The adaptive content delivery is based on the learning styles of the learners. The system uses the VARK(Visual-Auditory-Reading-Kinesthetic) learning style model. Based on the learning style model different forms of content are delivered to the learners to keep them in the active stage of learning. Apart from this the system also implements an innovative feature called the mind map feature, where learners can represent their own way of learning and remembering concepts and ideas generated during the learning process. As a whole the system takes care of all the personal learning needs of the learner. This system is named as the AIEPAL (Adaptive and Intelligent E-Portfolio Architecture for Learning).
这项工作提出了一个自适应学习环境的架构,以照顾学习者的个人学习需求。自适应的内容传递基于学习者的学习风格。该系统采用VARK(视觉-听觉-阅读-动觉)学习模式。在学习风格模型的基础上,将不同形式的内容传递给学习者,使其处于学习的主动阶段。除此之外,该系统还实现了一个名为思维导图的创新功能,学习者可以在其中表示自己的学习方式和记忆在学习过程中产生的概念和想法。作为一个整体,该系统照顾到学习者的所有个人学习需求。该系统被命名为AIEPAL (Adaptive and Intelligent E-Portfolio Architecture for Learning)。
{"title":"Learner centered Adaptive and Intelligent E-Portfolio Architecture for Learning (AIEPAL)","authors":"D. E. Dekson, E. Suresh","doi":"10.1109/ICOAC.2011.6165158","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165158","url":null,"abstract":"This work presents the architecture of an adaptive learning environment to take care of the personal learning needs of the learners. The adaptive content delivery is based on the learning styles of the learners. The system uses the VARK(Visual-Auditory-Reading-Kinesthetic) learning style model. Based on the learning style model different forms of content are delivered to the learners to keep them in the active stage of learning. Apart from this the system also implements an innovative feature called the mind map feature, where learners can represent their own way of learning and remembering concepts and ideas generated during the learning process. As a whole the system takes care of all the personal learning needs of the learner. This system is named as the AIEPAL (Adaptive and Intelligent E-Portfolio Architecture for Learning).","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116673648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2011 Third International Conference on Advanced Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1