首页 > 最新文献

2011 Third International Conference on Advanced Computing最新文献

英文 中文
Evolving effective strategies for enhancing SHG's using K-mean clustering 基于k -均值聚类的SHG增强策略演化
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165152
B. Sajeev, K. Thangavel
Fast retrieval of relevant information from the databases has always been a significant issue. Different techniques have been developed for this purpose; one of them is Data mining. Clustering analysis is a key and easy tool in data mining and pattern recognition. In this paper K-Mean clustering is used for evaluating the performance of socially and economically backward group of people, self help groups (SHG's) in Kerala state, and suggestions are made to improve socioeconomic status. The necessary information about the members of SHG has been collected from 9 districts in Kerala through structured questionnaire. The Parameters considered for the study are financial status, types of loan availed, improvement in assets before and after joining the group, effect of joining in more than one group and district wise analysis.
从数据库中快速检索相关信息一直是一个重要的问题。为此目的开发了不同的技术;其中之一就是数据挖掘。聚类分析是数据挖掘和模式识别中一个关键而简单的工具。本文采用k均值聚类方法对喀拉拉邦社会经济落后群体——自助群体(self - help groups, SHG’s)的绩效进行了评价,并提出了改善社会经济状况的建议。通过结构化问卷从喀拉拉邦的9个地区收集了关于SHG成员的必要信息。该研究考虑的参数包括财务状况、获得的贷款类型、加入集团前后的资产改善情况、加入多个集团的影响以及地区明智分析。
{"title":"Evolving effective strategies for enhancing SHG's using K-mean clustering","authors":"B. Sajeev, K. Thangavel","doi":"10.1109/ICOAC.2011.6165152","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165152","url":null,"abstract":"Fast retrieval of relevant information from the databases has always been a significant issue. Different techniques have been developed for this purpose; one of them is Data mining. Clustering analysis is a key and easy tool in data mining and pattern recognition. In this paper K-Mean clustering is used for evaluating the performance of socially and economically backward group of people, self help groups (SHG's) in Kerala state, and suggestions are made to improve socioeconomic status. The necessary information about the members of SHG has been collected from 9 districts in Kerala through structured questionnaire. The Parameters considered for the study are financial status, types of loan availed, improvement in assets before and after joining the group, effect of joining in more than one group and district wise analysis.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131804044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Plenary online I: Cloud computing for Healthcare & medical applications (online) 全体会议在线I:医疗保健和医疗应用的云计算(在线)
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165232
V. Narasimhan, Xavier N Fernando, Vivekanda Sureshkumar, Sasanka V. Prabhala, Subhashini Ganapathy
Cloud computing radically changes the way computer applications and services are constructed, delivered, and managed — particularly in Healthcare and various other medical applications. Large size of medical datasets and the data-intensive applications are performed more efficiently using cloud computing than with other forms of computing. Software services that can obtain seemingly infinite scalability and services level is now possible. Incremental growth to meet customers' varying demands is also possible. Several types of costing models, rapid provisioning and availability lead to more efficient resource utilization and reduced cost for utilization. Consequently, a good understanding of how cloud computing can be employed for medical applications is required for medical professionals, social scientists and business professionals. In this talk, I will provide cloud computing applications to several areas which include, but not limited to, medical information management, medical intelligence, value-adding thru' information extraction, medical and pharmaceutical intelligence and just-in-time management of health. Furthermore, I will allude to some examples of cloud computing to medial intelligence that possibly raises several yet-answered ethical and legal Issues. I will conclude with a list of grand challenges that cloud computing faces in the context of medical applications.
云计算从根本上改变了计算机应用程序和服务的构建、交付和管理方式——特别是在医疗保健和各种其他医疗应用程序中。使用云计算可以比使用其他形式的计算更有效地执行大型医疗数据集和数据密集型应用程序。软件服务可以获得看似无限的可伸缩性和服务水平,现在是可能的。增量增长,以满足客户的不同需求也是可能的。几种类型的成本计算模型、快速供应和可用性导致更有效的资源利用和降低使用成本。因此,医疗专业人员、社会科学家和商业专业人员需要充分了解如何将云计算用于医疗应用。在这次演讲中,我将提供云计算在几个领域的应用,包括但不限于医疗信息管理、医疗智能、通过信息提取增值、医疗和制药智能以及健康的实时管理。此外,我将提到一些云计算与医疗智能的例子,这些例子可能会引发一些尚未回答的伦理和法律问题。最后,我将列出云计算在医疗应用环境中面临的重大挑战。
{"title":"Plenary online I: Cloud computing for Healthcare & medical applications (online)","authors":"V. Narasimhan, Xavier N Fernando, Vivekanda Sureshkumar, Sasanka V. Prabhala, Subhashini Ganapathy","doi":"10.1109/ICOAC.2011.6165232","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165232","url":null,"abstract":"Cloud computing radically changes the way computer applications and services are constructed, delivered, and managed — particularly in Healthcare and various other medical applications. Large size of medical datasets and the data-intensive applications are performed more efficiently using cloud computing than with other forms of computing. Software services that can obtain seemingly infinite scalability and services level is now possible. Incremental growth to meet customers' varying demands is also possible. Several types of costing models, rapid provisioning and availability lead to more efficient resource utilization and reduced cost for utilization. Consequently, a good understanding of how cloud computing can be employed for medical applications is required for medical professionals, social scientists and business professionals. In this talk, I will provide cloud computing applications to several areas which include, but not limited to, medical information management, medical intelligence, value-adding thru' information extraction, medical and pharmaceutical intelligence and just-in-time management of health. Furthermore, I will allude to some examples of cloud computing to medial intelligence that possibly raises several yet-answered ethical and legal Issues. I will conclude with a list of grand challenges that cloud computing faces in the context of medical applications.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132245671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An arbitrary encryption scheme for homomorphic data Migration 一种用于同态数据迁移的任意加密方案
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165181
T. M. Bhruguram, Jesna Jamal, M. Kurian, Chinchu Jose
A data encryption scheme which does not allows any internal data access to the third party who is responsible for processing the data which is highly confidential. This separation is a complex task and can fall in to a data violation for the intermediate processing nodes. We describe a new standard for these malleable environments which will provide good semantic level security and prevent the third party from accessing highly confidential internal data. This scheme allows the third party to execute any complex functions to the encrypted internal details but does not need any secret decryption key. But he is not permitted to peep into the data contents. We are proposing this scheme for cloud computing where more security is taking as the major factor.
一种数据加密方案,不允许负责处理高度机密数据的第三方访问任何内部数据。这种分离是一项复杂的任务,可能会导致中间处理节点的数据冲突。我们为这些可塑环境描述了一个新的标准,它将提供良好的语义级安全性,并防止第三方访问高度机密的内部数据。该方案允许第三方对加密的内部细节执行任何复杂的函数,但不需要任何秘密解密密钥。但他不允许窥视数据内容。我们为云计算提出了这个方案,在云计算中,更多的安全被视为主要因素。
{"title":"An arbitrary encryption scheme for homomorphic data Migration","authors":"T. M. Bhruguram, Jesna Jamal, M. Kurian, Chinchu Jose","doi":"10.1109/ICOAC.2011.6165181","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165181","url":null,"abstract":"A data encryption scheme which does not allows any internal data access to the third party who is responsible for processing the data which is highly confidential. This separation is a complex task and can fall in to a data violation for the intermediate processing nodes. We describe a new standard for these malleable environments which will provide good semantic level security and prevent the third party from accessing highly confidential internal data. This scheme allows the third party to execute any complex functions to the encrypted internal details but does not need any secret decryption key. But he is not permitted to peep into the data contents. We are proposing this scheme for cloud computing where more security is taking as the major factor.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123592323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal distance metric function with trigram features for case based word sense disambiguation using artificial neural network 基于三角特征的最优距离度量函数在基于实例的人工神经网络词义消歧中的应用
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165190
P. Tamilselvi, S. Srivatsa
In general, different levels of knowledge are used for disambiguation. In this paper, only three knowledge features or sources (trigram) are used to achieve the word sense disambiguation. Case based approach is applied for the disambiguation process. Cases are nothing but the refined form of words collected from Semcor, used for deriving the sense of the ambiguous input word. All possible Part of Speech (PoS) listed in Brown Corpus are collected and grouped into seventeen groups, and each group is assigned with a constant value. Trigram features of input (ambiguous words) as well as cases are represented as vector of size 1×3. Vector values for the ambiguous word and other two neighboring words are taken out from those assigned weights based on their PoS. In this paper ten different distance metric functions are empirically analyzed for improving the accuracy performance of word disambiguation with minimal knowledge sources. Neural Network is used for extracting correct sense of the ambiguous word from the selected minimal distance cases. In this paper, a long sentence is taken to project the performance of disambiguation process. From the result, it is clear that, post-trigramed Hamming function (F9) produced appreciable disambiguation accuracy 78.57% (recognized eleven ambiguous words out of fourteen).
一般来说,不同层次的知识被用于消歧。本文仅使用三个知识特征或来源(三元组)来实现词义消歧。在消歧过程中采用了基于实例的方法。case只是从Semcor中收集的单词的精炼形式,用于派生歧义输入单词的意思。收集Brown语料库中所有可能的词类,并将其分为17组,每组赋一个常数。输入(歧义词)的三元组特征以及大小写表示为大小为1×3的向量。根据歧义词和相邻两个词的词序权重,提取歧义词和相邻两个词的向量值。本文对十种不同的距离度量函数进行了实证分析,以期在最少的知识来源下提高词消歧义的准确性。利用神经网络从选取的最小距离情况中提取歧义词的正确意义。本文以一个长句为例,对消歧过程的性能进行了评价。从结果可以清楚地看出,后三格汉明函数(F9)产生了可观的消歧准确率78.57%(识别出14个歧义词中的11个)。
{"title":"Optimal distance metric function with trigram features for case based word sense disambiguation using artificial neural network","authors":"P. Tamilselvi, S. Srivatsa","doi":"10.1109/ICOAC.2011.6165190","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165190","url":null,"abstract":"In general, different levels of knowledge are used for disambiguation. In this paper, only three knowledge features or sources (trigram) are used to achieve the word sense disambiguation. Case based approach is applied for the disambiguation process. Cases are nothing but the refined form of words collected from Semcor, used for deriving the sense of the ambiguous input word. All possible Part of Speech (PoS) listed in Brown Corpus are collected and grouped into seventeen groups, and each group is assigned with a constant value. Trigram features of input (ambiguous words) as well as cases are represented as vector of size 1×3. Vector values for the ambiguous word and other two neighboring words are taken out from those assigned weights based on their PoS. In this paper ten different distance metric functions are empirically analyzed for improving the accuracy performance of word disambiguation with minimal knowledge sources. Neural Network is used for extracting correct sense of the ambiguous word from the selected minimal distance cases. In this paper, a long sentence is taken to project the performance of disambiguation process. From the result, it is clear that, post-trigramed Hamming function (F9) produced appreciable disambiguation accuracy 78.57% (recognized eleven ambiguous words out of fourteen).","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115501840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Single System Image clustering using Kerrighed 使用Kerrighed的单系统图像聚类
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165185
K. Sandhya, G. Raju
In a compute cluster, the nodes may be distributed and heterogeneous in nature. It may be difficult to administer and interface with such a system. It will be better if all the users get an interface with same look and feel rather to have a different view in each node of the cluster. Thus Single System Image(SSI) is a major design goal of cluster based systems. The services that SSI clusters offer are single user interface, single process space, single memory space, single file hierarchy and single control point. Kerrighed is an SSI Operating System which provides the services mentioned above. This paper gives the details about how to set up a Kerrighed cluster, how to use a kerrighed cluster for running MPI programs, and shows how a cluster can improve the performance of an MPI program when it is run on a cluster of machines. The paper also gives an idea about how Kerrighed helps programmers to easily add new scheduling algorithms for cluster with the help of Scheduler API and a design for adding a proposed algorithm into Kerrighed.
在计算集群中,节点可能是分布式的、异构的。管理和使用这样的系统可能比较困难。如果所有用户都获得具有相同外观的界面,而不是在集群的每个节点中拥有不同的视图,那将会更好。因此,单系统映像(SSI)是基于集群的系统的主要设计目标。SSI集群提供的服务是单一用户界面、单一进程空间、单一内存空间、单一文件层次结构和单一控制点。Kerrighed是一个提供上述服务的SSI操作系统。本文详细介绍了如何设置Kerrighed集群,如何使用Kerrighed集群运行MPI程序,以及集群如何在机器集群上运行MPI程序时提高MPI程序的性能。本文还介绍了Kerrighed如何借助Scheduler API帮助程序员轻松地为集群添加新的调度算法,并设计了将所提出的算法添加到Kerrighed中的方法。
{"title":"Single System Image clustering using Kerrighed","authors":"K. Sandhya, G. Raju","doi":"10.1109/ICOAC.2011.6165185","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165185","url":null,"abstract":"In a compute cluster, the nodes may be distributed and heterogeneous in nature. It may be difficult to administer and interface with such a system. It will be better if all the users get an interface with same look and feel rather to have a different view in each node of the cluster. Thus Single System Image(SSI) is a major design goal of cluster based systems. The services that SSI clusters offer are single user interface, single process space, single memory space, single file hierarchy and single control point. Kerrighed is an SSI Operating System which provides the services mentioned above. This paper gives the details about how to set up a Kerrighed cluster, how to use a kerrighed cluster for running MPI programs, and shows how a cluster can improve the performance of an MPI program when it is run on a cluster of machines. The paper also gives an idea about how Kerrighed helps programmers to easily add new scheduling algorithms for cluster with the help of Scheduler API and a design for adding a proposed algorithm into Kerrighed.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128374555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and implementation of real time car theft detection in FPGA 基于FPGA的汽车盗窃实时检测系统的设计与实现
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165201
A. Ahilan, Esther Annlin, Kala James
Face detection is a technique that determines the locations and sizes of human face images. It detects facial features and ignores anything else, such as buildings, trees and bodies. Face-detection algorithms focused on the detection of frontal human faces, whereas newer algorithms attempt to solve the more general and difficult problem of multi-view face detection. This paper presents a hardware architecture for face detection system based on Viola Jones algorithm using Haar features. The proposed algorithm is used in real time car theft detection. The architecture for face detection is designed using Verilog HDL and implemented in Xilinx Virtex-5 ML505 FPGA. Its performance has been measured and compared with an equivalent software implementation.
人脸检测是一种确定人脸图像位置和大小的技术。它检测面部特征,而忽略其他任何东西,如建筑物、树木和身体。人脸检测算法侧重于检测正面人脸,而较新的算法试图解决更普遍和更困难的多视图人脸检测问题。本文提出了一种基于Haar特征的Viola Jones算法的人脸检测系统的硬件结构。该算法已应用于汽车盗窃实时检测中。采用Verilog HDL语言设计了人脸检测体系结构,并在Xilinx Virtex-5 ML505 FPGA上实现。对其性能进行了测量,并与等效的软件实现进行了比较。
{"title":"Design and implementation of real time car theft detection in FPGA","authors":"A. Ahilan, Esther Annlin, Kala James","doi":"10.1109/ICOAC.2011.6165201","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165201","url":null,"abstract":"Face detection is a technique that determines the locations and sizes of human face images. It detects facial features and ignores anything else, such as buildings, trees and bodies. Face-detection algorithms focused on the detection of frontal human faces, whereas newer algorithms attempt to solve the more general and difficult problem of multi-view face detection. This paper presents a hardware architecture for face detection system based on Viola Jones algorithm using Haar features. The proposed algorithm is used in real time car theft detection. The architecture for face detection is designed using Verilog HDL and implemented in Xilinx Virtex-5 ML505 FPGA. Its performance has been measured and compared with an equivalent software implementation.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128985560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Analysis of optical modulation formats for DWDM system DWDM系统光调制格式分析
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165151
T. Sabapathi, S. Sundaravadivelu, A. Vairamuthu
To meet the growing data traffic demands in the telecommunication applications, the number of wavelengths is to be increased in a fiber-optic backbone of the telecommunication network. The exponential growth of internet services, transmission capacity is a tremendous challenge to networks. Nowadays, 100 Gb/s transmission systems are being used for commercial applications. At the same time, the non-linear effects such as FWM, SRS, XPM, SPM, and Dispersion are also increased, when the number of wavelengths passing through the single fiber is increased. The analysis of efficient modulation formats for DWDM system and long-haul transmission system, we go for various modulations for DWDM system. The maximum data rate for NRZ-OOK modulation format is 100 Gb/s. For RZ-OOK the maximum rate is 50 Gb/s. Since RZ-OOK modulation uses twice the band width when compared to NRZ-OOK modulation. The modulation format is partially upgraded from OOK to PSK, the influence of OOK signals on the updated PSK signals must be considered when using multi-channel wavelength conversion. The PSK modulation is also analyzed.
为了满足电信应用中日益增长的数据流量需求,电信网络的光纤骨干网需要增加波长数。互联网服务呈指数级增长,传输能力对网络构成巨大挑战。目前,100gb /s传输系统正被用于商业应用。同时,随着通过光纤的波长数的增加,光纤的FWM、SRS、XPM、SPM、色散等非线性效应也随之增加。分析了DWDM系统和长途传输系统的有效调制格式,探讨了DWDM系统的各种调制方式。NRZ-OOK调制格式的最大数据速率为100gb /s。对于RZ-OOK,最大速率为50gb /s。由于RZ-OOK调制使用的带宽是NRZ-OOK调制的两倍。调制格式由OOK部分升级为PSK,使用多通道波长转换时必须考虑OOK信号对更新后的PSK信号的影响。对PSK调制进行了分析。
{"title":"Analysis of optical modulation formats for DWDM system","authors":"T. Sabapathi, S. Sundaravadivelu, A. Vairamuthu","doi":"10.1109/ICOAC.2011.6165151","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165151","url":null,"abstract":"To meet the growing data traffic demands in the telecommunication applications, the number of wavelengths is to be increased in a fiber-optic backbone of the telecommunication network. The exponential growth of internet services, transmission capacity is a tremendous challenge to networks. Nowadays, 100 Gb/s transmission systems are being used for commercial applications. At the same time, the non-linear effects such as FWM, SRS, XPM, SPM, and Dispersion are also increased, when the number of wavelengths passing through the single fiber is increased. The analysis of efficient modulation formats for DWDM system and long-haul transmission system, we go for various modulations for DWDM system. The maximum data rate for NRZ-OOK modulation format is 100 Gb/s. For RZ-OOK the maximum rate is 50 Gb/s. Since RZ-OOK modulation uses twice the band width when compared to NRZ-OOK modulation. The modulation format is partially upgraded from OOK to PSK, the influence of OOK signals on the updated PSK signals must be considered when using multi-channel wavelength conversion. The PSK modulation is also analyzed.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122153688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel approach for run time web service exception handling 一种用于运行时web服务异常处理的新方法
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165154
M. Thirumaran, P. Dhavachelvan, K. Seenuvasan, G. Aranganayagi
Currently web services are being widely and extensively used in the business world mainly because they offer reusable application-components and due to their support in solving the interoperability problem by providing different applications a way to link their data. The current consumer needs are mainly converged towards leveraging an efficient method of determining if the exceptions occurring during the runtime execution of the web services can be handled. Moreover, the identification of manageable exceptions also comes into picture when consideri ng the manageability aspect of a web service stimulating an increased value of reliability of the service. In this paper, we propose an innovative model for focusing upon and verifying the manageability of a web service. Runtime management has been given utmost significance as a potential strategy to handle runtime exceptions increases the adaptability of services to exceptional circumstances. Thus a novel architecture for exception handling has been proposed which affords facilities for explicit reference to the cause, location, priority and dependency of the various runtime exceptions in contrast to the traditional pattern of throwing only the exception message.
目前,web服务在商业领域得到了广泛的应用,这主要是因为它们提供了可重用的应用程序组件,并通过为不同的应用程序提供一种连接它们的数据的方法来解决互操作性问题。当前的消费者需求主要集中在利用一种有效的方法来确定是否可以处理web服务运行时执行期间发生的异常。此外,在考虑web服务的可管理性方面会提高服务的可靠性时,还需要识别可管理的异常。在本文中,我们提出了一个创新的模型,用于关注和验证web服务的可管理性。运行时管理被赋予了极大的意义,因为处理运行时异常的潜在策略增加了服务对异常情况的适应性。因此,提出了一种新的异常处理体系结构,它提供了显式引用各种运行时异常的原因、位置、优先级和依赖关系的便利,而不是只抛出异常消息的传统模式。
{"title":"A novel approach for run time web service exception handling","authors":"M. Thirumaran, P. Dhavachelvan, K. Seenuvasan, G. Aranganayagi","doi":"10.1109/ICOAC.2011.6165154","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165154","url":null,"abstract":"Currently web services are being widely and extensively used in the business world mainly because they offer reusable application-components and due to their support in solving the interoperability problem by providing different applications a way to link their data. The current consumer needs are mainly converged towards leveraging an efficient method of determining if the exceptions occurring during the runtime execution of the web services can be handled. Moreover, the identification of manageable exceptions also comes into picture when consideri ng the manageability aspect of a web service stimulating an increased value of reliability of the service. In this paper, we propose an innovative model for focusing upon and verifying the manageability of a web service. Runtime management has been given utmost significance as a potential strategy to handle runtime exceptions increases the adaptability of services to exceptional circumstances. Thus a novel architecture for exception handling has been proposed which affords facilities for explicit reference to the cause, location, priority and dependency of the various runtime exceptions in contrast to the traditional pattern of throwing only the exception message.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124294130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive load balancing handoff scheme for heterogeneous wireless network 异构无线网络的自适应负载均衡切换方案
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165197
A. Selvakumar, V. Vaidehi, T. G. Palanivelu
Recent day development of wireless technology integrates to communicate with each other. A handoff scheme is essential to continue connections whenever a mobile node moves from one coverage area of network to another. The handoff management issues consist of finding the appropriate time to perform the handoff, velocity, channel conditions, cost, bandwidth and RSS etc., In this paper, we propose a vertical handoff decision algorithm for heterogeneous wireless network based on the Velocity of mobile node and the Adaptive traffic load balanced handoff management scheme which adaptively control the handoff time according to the load status of cells. The algorithm considers the number of handoff when the velocity increases with effective reduction of probability of handoff and efficiently manages further overloaded traffic in the system. Simulation result shows that the effectiveness of the proposed algorithm during handover between different wireless networks.
近年来发展的无线技术集成了相互通信。当移动节点从一个网络覆盖区域移动到另一个网络覆盖区域时,切换方案对于继续连接至关重要。切换管理问题包括寻找合适的切换时间、速度、信道条件、成本、带宽和RSS等。本文提出了一种基于移动节点速度的异构无线网络垂直切换决策算法和根据小区负载状态自适应控制切换时间的自适应流量负载均衡切换管理方案。该算法考虑了速度增加时的切换次数,有效地降低了切换的概率,有效地管理了系统中进一步过载的流量。仿真结果表明了该算法在不同无线网络间切换时的有效性。
{"title":"Adaptive load balancing handoff scheme for heterogeneous wireless network","authors":"A. Selvakumar, V. Vaidehi, T. G. Palanivelu","doi":"10.1109/ICOAC.2011.6165197","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165197","url":null,"abstract":"Recent day development of wireless technology integrates to communicate with each other. A handoff scheme is essential to continue connections whenever a mobile node moves from one coverage area of network to another. The handoff management issues consist of finding the appropriate time to perform the handoff, velocity, channel conditions, cost, bandwidth and RSS etc., In this paper, we propose a vertical handoff decision algorithm for heterogeneous wireless network based on the Velocity of mobile node and the Adaptive traffic load balanced handoff management scheme which adaptively control the handoff time according to the load status of cells. The algorithm considers the number of handoff when the velocity increases with effective reduction of probability of handoff and efficiently manages further overloaded traffic in the system. Simulation result shows that the effectiveness of the proposed algorithm during handover between different wireless networks.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121401696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Re-Pro Routing Protocol with trust based security for Broadcasting in Mobile Ad hoc Network 基于信任安全的移动Ad hoc网络广播Re-Pro路由协议
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165163
R. Mariappan, S. Mohan
In this paper, we present new protocol design scenario like Re-Pro Routing Protocol (RPRP) for Broadcasting in wireless mobile Ad-hoc Network and a comparative performance for Mobile Ad hoc Networks protocols like as Ad-hoc On-Demand Distance Vector Routing protocol focusing on the effects of changes such as the increasing number of receivers or sources and increasing the number of nodes. Although some simulation results of MANET protocols have been published before, these protocols have not been compared in isolation. A systematic performance evaluation of these protocols is done by performing certain simulations and the trust methods are one of the security methods in mobile Ad-Hoc networks and this methods are prone to security risks but have found their acceptance due to efficiency over computationally expensive and time consuming cryptographic methods. The major problem with the trust methods is the period during which trust is growing and is yet to reach the requisite threshold. This paper also proposes security mechanism dependent upon Electronic Code (EC) combined with permutation functions. The proposed mechanism has low time complexity, is easier to implement, computationally inexpensive and has very high brute force search value.
在本文中,我们提出了新的协议设计方案,如无线移动自组织网络广播的Re-Pro路由协议(RPRP),以及移动自组织网络协议的比较性能,如自组织按需距离矢量路由协议,重点关注诸如增加接收器或源数量以及增加节点数量等变化的影响。虽然之前已经发表了一些MANET协议的仿真结果,但这些协议并没有单独进行比较。通过模拟对这些协议进行了系统的性能评估,信任方法是移动Ad-Hoc网络中的一种安全方法,这种方法容易存在安全风险,但由于其效率高于计算昂贵且耗时的加密方法,因此已被人们所接受。信任方法的主要问题是信任正在成长,尚未达到必要的阈值。并结合排列函数提出了基于电子码(EC)的安全机制。该机制时间复杂度低,易于实现,计算成本低,具有很高的蛮力搜索价值。
{"title":"Re-Pro Routing Protocol with trust based security for Broadcasting in Mobile Ad hoc Network","authors":"R. Mariappan, S. Mohan","doi":"10.1109/ICOAC.2011.6165163","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165163","url":null,"abstract":"In this paper, we present new protocol design scenario like Re-Pro Routing Protocol (RPRP) for Broadcasting in wireless mobile Ad-hoc Network and a comparative performance for Mobile Ad hoc Networks protocols like as Ad-hoc On-Demand Distance Vector Routing protocol focusing on the effects of changes such as the increasing number of receivers or sources and increasing the number of nodes. Although some simulation results of MANET protocols have been published before, these protocols have not been compared in isolation. A systematic performance evaluation of these protocols is done by performing certain simulations and the trust methods are one of the security methods in mobile Ad-Hoc networks and this methods are prone to security risks but have found their acceptance due to efficiency over computationally expensive and time consuming cryptographic methods. The major problem with the trust methods is the period during which trust is growing and is yet to reach the requisite threshold. This paper also proposes security mechanism dependent upon Electronic Code (EC) combined with permutation functions. The proposed mechanism has low time complexity, is easier to implement, computationally inexpensive and has very high brute force search value.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132185496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 Third International Conference on Advanced Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1