首页 > 最新文献

International Journal of Communication Networks and Information Security最新文献

英文 中文
EXTRACTING ACCURATE DATA FROM MUL A FROM MULTIPLE CONFLIC TIPLE CONFLICTINGINFORMATION ON WEB SOURCES 从web资源上的多个冲突信息中提取准确的数据
Q3 Computer Science Pub Date : 2014-01-01 DOI: 10.47893/ijcns.2014.1096
Akshata B. Angadi, Karuna C. Gull, Padmashri Desai
For The World-Wide Web has become the most important information source for most of us. As different websites often provide conflicting information there is no guarantee for the correctness of the data. Among multiple conflict results, can we automatically identify which one is likely the true fact?, In this paper our experiments show that Fact finder, a supporter for user to resolve the problem, successfully finds true facts among conflicting information, and identifies Trust worthy websites better than the popular search engines. In our paper we give ratings based on two things- popularity or the hits & number of occurrences of same data. As we can’t give preference only to popularity, we have considered another rating i.e. about number of occurrences of same data in several other websites, which are less popular. This paper helps user to get resolved by conflicting facts from multiple websites on two basis. Further by considering few more relations we can develop a search engine that truly helps the user to resolve the Veracity problem.
因为万维网已经成为我们大多数人最重要的信息来源。由于不同的网站经常提供相互矛盾的信息,因此无法保证数据的正确性。在多个冲突结果中,我们能否自动识别出哪一个可能是真实的事实?在本文中,我们的实验表明,事实查找器作为用户解决问题的支持者,能够成功地在冲突的信息中找到真实的事实,并且比流行的搜索引擎更好地识别值得信赖的网站。在我们的论文中,我们基于两件事给出评级——受欢迎程度或相同数据的点击率和出现次数。由于我们不能只考虑受欢迎程度,我们考虑了另一种评级,即相同数据在其他几个不太受欢迎的网站上出现的次数。本文从两个方面帮助用户解决来自多个网站的相互矛盾的事实。此外,通过考虑更多的关系,我们可以开发一个真正帮助用户解决准确性问题的搜索引擎。
{"title":"EXTRACTING ACCURATE DATA FROM MUL A FROM MULTIPLE CONFLIC TIPLE CONFLICTING\u0000INFORMATION ON WEB SOURCES","authors":"Akshata B. Angadi, Karuna C. Gull, Padmashri Desai","doi":"10.47893/ijcns.2014.1096","DOIUrl":"https://doi.org/10.47893/ijcns.2014.1096","url":null,"abstract":"For The World-Wide Web has become the most important information source for most of us. As different websites often provide conflicting information there is no guarantee for the correctness of the data. Among multiple conflict results, can we automatically identify which one is likely the true fact?, In this paper our experiments show that Fact finder, a supporter for user to resolve the problem, successfully finds true facts among conflicting information, and identifies Trust worthy websites better than the popular search engines. In our paper we give ratings based on two things- popularity or the hits & number of occurrences of same data. As we can’t give preference only to popularity, we have considered another rating i.e. about number of occurrences of same data in several other websites, which are less popular. This paper helps user to get resolved by conflicting facts from multiple websites on two basis. Further by considering few more relations we can develop a search engine that truly helps the user to resolve the Veracity problem.","PeriodicalId":38851,"journal":{"name":"International Journal of Communication Networks and Information Security","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88429829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COLOR IMAGE QUANTIZATION USING GDBSCAN 彩色图像量化使用gdbscan
Q3 Computer Science Pub Date : 2014-01-01 DOI: 10.47893/ijcns.2014.1091
K. Rahul, S. K. Bhattacharya, Rohit Agrawal
Color image quantization is the most widely used techniques in the field of image compression. DBSCAN is a density based data clustering technique. However DBSCAN is widely used for data clustering but not very popular for color image quantization due to some of issues associated with it. One of the problems associated with DBSCAN is that it becomes expensive when used on whole image data and also the noise points been unmapped. In this paper we are proposing a new color image quantization scheme which overcomes these problems. Our proposed algorithm is GDBSCAN (Grid Based DBSCAN) where we first decompose the image data in grids and then apply DBSCAN algorithm on each grids
彩色图像量化是图像压缩领域中应用最广泛的技术。DBSCAN是一种基于密度的数据聚类技术。然而,DBSCAN被广泛用于数据聚类,但由于其相关的一些问题,在彩色图像量化方面不太流行。与DBSCAN相关的一个问题是,当对整个图像数据使用时,它会变得昂贵,而且噪声点也会被取消映射。本文提出了一种新的彩色图像量化方案,克服了这些问题。我们提出的算法是GDBSCAN (Grid Based DBSCAN),我们首先将图像数据分解成网格,然后在每个网格上应用DBSCAN算法
{"title":"COLOR IMAGE QUANTIZATION USING GDBSCAN","authors":"K. Rahul, S. K. Bhattacharya, Rohit Agrawal","doi":"10.47893/ijcns.2014.1091","DOIUrl":"https://doi.org/10.47893/ijcns.2014.1091","url":null,"abstract":"Color image quantization is the most widely used techniques in the field of image compression. DBSCAN is a density based data clustering technique. However DBSCAN is widely used for data clustering but not very popular for color image quantization due to some of issues associated with it. One of the problems associated with DBSCAN is that it becomes expensive when used on whole image data and also the noise points been unmapped. In this paper we are proposing a new color image quantization scheme which overcomes these problems. Our proposed algorithm is GDBSCAN (Grid Based DBSCAN) where we first decompose the image data in grids and then apply DBSCAN algorithm on each grids","PeriodicalId":38851,"journal":{"name":"International Journal of Communication Networks and Information Security","volume":"2013 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86276417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMPROVED KERNEL FUZZY ADAPTIVE THRESHOLD ALGORITHM ON LEVEL SET METHOD FOR IMAGE SEGMENTATION 基于水平集法的改进核模糊自适应阈值算法用于图像分割
Q3 Computer Science Pub Date : 2014-01-01 DOI: 10.47893/ijcns.2014.1088
T. Saikumar, S. Amit, Y. Dinesh
Using thresholding method to segment an image, a fixed threshold is not suitable if the background is rough Here, we propose a new adaptive thresholding method using level set theory. The method requires only one parameter to be selected and the adaptive threshold surface can be found automatically from the original image. An adaptive thresholding scheme using adaptive tracking and morphological filtering. The Improved Kernel fuzzy c-means (IKFCM) was used to generate an initial contour curve which overcomes leaking at the boundary during the curve propagation. IKFCM algorithm computes the fuzzy membership values for each pixel. On the basis of IKFCM the edge indicator function was redefined. Using the edge indicator function of a image was performed to extract the boundaries of objects on the basis of the presegmentation. Therefore, the proposed method is computationally efficient. Our method is good for detecting large and small images concurrently. It is also efficient to denoise and enhance the responses of images with low local contrast can be detected. The efficiency and accuracy of the algorithm is demonstrated by the experiments on the images. The above process of segmentation showed a considerable improvement in the evolution of the level set function.
采用阈值分割法分割图像时,由于背景粗糙,固定阈值是不合适的,本文提出了一种基于水平集理论的自适应阈值分割方法。该方法只需要选择一个参数,就可以从原始图像中自动找到自适应阈值曲面。一种采用自适应跟踪和形态滤波的自适应阈值方案。采用改进的核模糊c均值(IKFCM)算法生成初始轮廓曲线,克服了曲线传播过程中边界处的泄漏问题。IKFCM算法计算每个像素的模糊隶属度值。在IKFCM的基础上,重新定义了边缘指示函数。在预分割的基础上,利用图像的边缘指示函数提取目标的边界。因此,该方法具有较高的计算效率。该方法可以很好地同时检测大小图像。对于局部对比度较低的图像,也能有效地去噪和增强响应。通过图像实验验证了该算法的有效性和准确性。上述分割过程在水平集函数的演化上有了较大的改进。
{"title":"IMPROVED KERNEL FUZZY ADAPTIVE THRESHOLD ALGORITHM ON LEVEL SET METHOD FOR IMAGE SEGMENTATION","authors":"T. Saikumar, S. Amit, Y. Dinesh","doi":"10.47893/ijcns.2014.1088","DOIUrl":"https://doi.org/10.47893/ijcns.2014.1088","url":null,"abstract":"Using thresholding method to segment an image, a fixed threshold is not suitable if the background is rough Here, we propose a new adaptive thresholding method using level set theory. The method requires only one parameter to be selected and the adaptive threshold surface can be found automatically from the original image. An adaptive thresholding scheme using adaptive tracking and morphological filtering. The Improved Kernel fuzzy c-means (IKFCM) was used to generate an initial contour curve which overcomes leaking at the boundary during the curve propagation. IKFCM algorithm computes the fuzzy membership values for each pixel. On the basis of IKFCM the edge indicator function was redefined. Using the edge indicator function of a image was performed to extract the boundaries of objects on the basis of the presegmentation. Therefore, the proposed method is computationally efficient. Our method is good for detecting large and small images concurrently. It is also efficient to denoise and enhance the responses of images with low local contrast can be detected. The efficiency and accuracy of the algorithm is demonstrated by the experiments on the images. The above process of segmentation showed a considerable improvement in the evolution of the level set function.","PeriodicalId":38851,"journal":{"name":"International Journal of Communication Networks and Information Security","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86567270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
REAL-TIME MULTI-PATIENT MONITORING SYSTEM USING ARM AND WIRELESS SENSOR NETWORK 采用手臂和无线传感器网络的实时多病人监护系统
Q3 Computer Science Pub Date : 2014-01-01 DOI: 10.47893/ijcns.2014.1089
B. Sirisha, T. Sraddha, K. Vijayanand
Mobile Multi patient monitoring device has become increasingly important in Hospital wards to record real-time data during normal activity for better treatment. However, the current quality and reliability have not been satisfactory due to the size, weight, distance of coverage and also high power consumption. This paper provides a solution for enhancing the reliability, flexibility by improving the performance and power management of the real-time multi-patient monitoring system (MPMS). In the current proposed system the patient health is continuously monitored by the MPMS and the acquired data is transmitted to a centralized ARM server using Wireless Sensor Networks. A ZigBee node is connected to every patient monitor system which will send the patient's vital information .Upon system boot up, the mobile patient monitor system will continuously monitor the patients vital parameters like Heart Beat, body temperature etc and will periodically send those parameters to a centralized server using ZigBee node configured as co-coordinator. If a particular patient’s health parameter falls below the threshold value, a buzzer alert is triggered by the ARM server. Along with a buzzer an automated SMS is posted to the pre-configured Doctors mobile number using a standard GSM module interfaced to the ARM server. The Doctor is continuously connected to the ARM server using GSM Module and he/she can get a record of a particular patient’s information by just posting a SMS message to the centralized ARM server. This will reduce treatment time, cost and power consumption to a greater extent. At the same time, the efficiency of examining ward will be improved by making the system more real-time and robust.
移动多病人监护设备在医院病房中变得越来越重要,可以记录正常活动期间的实时数据,以便更好地治疗。然而,由于尺寸、重量、覆盖距离和高功耗,目前的质量和可靠性并不令人满意。本文提出了一种通过改进多病人实时监护系统(MPMS)的性能和电源管理来提高其可靠性和灵活性的解决方案。在目前提出的系统中,MPMS对患者的健康状况进行持续监测,采集到的数据通过无线传感器网络传输到集中的ARM服务器。每个患者监护系统都连接一个ZigBee节点,该节点将发送患者的生命信息。在系统启动后,移动患者监护系统将持续监测患者的生命参数,如心跳、体温等,并定期将这些参数发送到使用ZigBee节点配置为协同协调器的集中服务器。如果特定患者的健康参数低于阈值,则ARM服务器会触发蜂鸣器警报。与蜂鸣器一起,一条自动短信通过与ARM服务器接口的标准GSM模块发布到预先配置的医生手机号码上。医生通过GSM模块与ARM服务器持续连接,只需向集中的ARM服务器发送一条短信,即可获得特定患者的信息记录。这将在更大程度上减少处理时间、成本和功耗。同时,通过提高系统的实时性和鲁棒性,可以提高检查室的工作效率。
{"title":"REAL-TIME MULTI-PATIENT MONITORING SYSTEM USING ARM AND WIRELESS SENSOR NETWORK","authors":"B. Sirisha, T. Sraddha, K. Vijayanand","doi":"10.47893/ijcns.2014.1089","DOIUrl":"https://doi.org/10.47893/ijcns.2014.1089","url":null,"abstract":"Mobile Multi patient monitoring device has become increasingly important in Hospital wards to record real-time data during normal activity for better treatment. However, the current quality and reliability have not been satisfactory due to the size, weight, distance of coverage and also high power consumption. This paper provides a solution for enhancing the reliability, flexibility by improving the performance and power management of the real-time multi-patient monitoring system (MPMS). In the current proposed system the patient health is continuously monitored by the MPMS and the acquired data is transmitted to a centralized ARM server using Wireless Sensor Networks. A ZigBee node is connected to every patient monitor system which will send the patient's vital information .Upon system boot up, the mobile patient monitor system will continuously monitor the patients vital parameters like Heart Beat, body temperature etc and will periodically send those parameters to a centralized server using ZigBee node configured as co-coordinator. If a particular patient’s health parameter falls below the threshold value, a buzzer alert is triggered by the ARM server. Along with a buzzer an automated SMS is posted to the pre-configured Doctors mobile number using a standard GSM module interfaced to the ARM server. The Doctor is continuously connected to the ARM server using GSM Module and he/she can get a record of a particular patient’s information by just posting a SMS message to the centralized ARM server. This will reduce treatment time, cost and power consumption to a greater extent. At the same time, the efficiency of examining ward will be improved by making the system more real-time and robust.","PeriodicalId":38851,"journal":{"name":"International Journal of Communication Networks and Information Security","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82455877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
“FAME”: FSPYING & SOLVING FIREWALL ANOMALIES “名气”:监视和解决防火墙异常
Q3 Computer Science Pub Date : 2014-01-01 DOI: 10.47893/ijcns.2014.1098
B. Lakshimibhargavi, V. MARUTI PRASAD
Advent of many emerging computing technologies became very catchy to users. So, usage of technology increasing very rapidly day by day. Security became major issue. People who are working through the internet suffer from unintended security leakages by unauthorised actions in an organization and also problems created by hackers through the malicious codes. To overcomethe security issues we have a concept called “firewall” .Network fire alls guard an internal computer network (home, school, businessintranet) against malicious access from the outside. Network firewalls may also be configured to limit access to the outside from internal users. In this paper, we elaborate FAME(firewall anomaly management environment) and we will have a glance on firewall anomalies and resolving techniques. In addition we are going explain few concepts practically and also representing diagrammatically.
许多新兴计算技术的出现对用户来说非常吸引人。因此,技术的使用日益迅速。安全成为主要问题。在互联网上工作的人会因组织中未经授权的行为而遭受意外的安全漏洞,也会因黑客通过恶意代码而产生问题。为了克服安全问题,我们有一个叫做“防火墙”的概念。网络防火保护内部计算机网络(家庭、学校、企业内部网),防止来自外部的恶意访问。网络防火墙也可以配置为限制内部用户对外部的访问。本文详细介绍了防火墙异常管理环境(FAME),并对防火墙异常及其解决技术进行了概述。此外,我们将实际解释一些概念,并图解地表示。
{"title":"“FAME”: FSPYING & SOLVING FIREWALL ANOMALIES","authors":"B. Lakshimibhargavi, V. MARUTI PRASAD","doi":"10.47893/ijcns.2014.1098","DOIUrl":"https://doi.org/10.47893/ijcns.2014.1098","url":null,"abstract":"Advent of many emerging computing technologies became very catchy to users. So, usage of technology increasing very rapidly day by day. Security became major issue. People who are working through the internet suffer from unintended security leakages by unauthorised actions in an organization and also problems created by hackers through the malicious codes. To overcome\u0000the security issues we have a concept called “firewall” .Network fire alls guard an internal computer network (home, school, business\u0000intranet) against malicious access from the outside. Network firewalls may also be configured to limit access to the outside from internal users. In this paper, we elaborate FAME(firewall anomaly management environment) and we will have a glance on firewall anomalies and resolving techniques. In addition we are going explain few concepts practically and also representing diagrammatically.","PeriodicalId":38851,"journal":{"name":"International Journal of Communication Networks and Information Security","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75045247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FACE RECOGNITION BY LINEAR DISCRIMINANT ANALYSIS 基于线性判别分析的人脸识别
Q3 Computer Science Pub Date : 2014-01-01 DOI: 10.47893/ijcns.2014.1087
Suman Kumar Bhattacharyya, K. Rahul
Linear Discriminant Analysis (LDA) has been successfully applied to face recognition which is based on a linear projection from the image space to a low dimensional space by maximizing the between class scatter and minimizing the within-class scatter. LDA allows objective evaluation of the significance of visual information in different features of the face for identifying the human face. The LDA also provides us with a small set of features that carry the most relevant information for classification purposes. LDA method overcomes the limitation of Principle Component Analysis method by applying the linear discriminant criterion. This criterion tries to maximize the ratio of determinant of the between-class scatter matrix of the projected samples to the determinant of the within-class scatter matrix of the projected samples. Linear discriminant groups the images of the same class and separate images of different classes. Here to identify an input test image, the projected test image is compared to each projected training, and the test image is identified as the closest training image. The experiments in this paper we present to use LDA for face recognition. The experiments in this paper are performed with the ORL face database. The experimental results show that the correct recognition rate of this method is higher than that of previous techniques.
线性判别分析(LDA)是基于从图像空间到低维空间的线性投影,通过最大化类间散点和最小化类内散点,成功地应用于人脸识别。LDA允许对人脸不同特征中视觉信息的重要性进行客观评价,以识别人脸。LDA还为我们提供了一小部分特征,这些特征携带了用于分类目的的最相关信息。LDA方法采用线性判别判据,克服了主成分分析法的局限性。该准则试图最大化投影样本的类间散点矩阵的行列式与投影样本的类内散点矩阵的行列式之比。线性判别法将同一类别的图像和不同类别的独立图像进行分组。这里要识别输入的测试图像,将投影的测试图像与每个投影的训练图像进行比较,并将测试图像识别为最接近的训练图像。本文介绍了利用LDA进行人脸识别的实验。本文的实验是在ORL人脸数据库上进行的。实验结果表明,该方法的正确识别率高于以往的方法。
{"title":"FACE RECOGNITION BY LINEAR DISCRIMINANT ANALYSIS","authors":"Suman Kumar Bhattacharyya, K. Rahul","doi":"10.47893/ijcns.2014.1087","DOIUrl":"https://doi.org/10.47893/ijcns.2014.1087","url":null,"abstract":"Linear Discriminant Analysis (LDA) has been successfully applied to face recognition which is based on a linear projection from the image space to a low dimensional space by maximizing the between class scatter and minimizing the within-class scatter. LDA allows objective evaluation of the significance of visual information in different features of the face for identifying the human face. The LDA also provides us with a small set of features that carry the most relevant information for classification purposes. LDA method overcomes the limitation of Principle Component Analysis method by applying the linear discriminant criterion. This criterion tries to maximize the ratio of determinant of the between-class scatter matrix of the projected samples to the determinant of the within-class scatter matrix of the projected samples. Linear discriminant groups the images of the same class and separate images of different classes. Here to identify an input test image, the projected test image is compared to each projected training, and the test image is identified as the closest training image. The experiments in this paper we present to use LDA for face recognition. The experiments in this paper are performed with the ORL face database. The experimental results show that the correct recognition rate of this method is higher than that of previous techniques.","PeriodicalId":38851,"journal":{"name":"International Journal of Communication Networks and Information Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76717595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
AN INTELLIGENT OPTIMIZATION TECHNIQUE FOR MANET USING GENETIC ALGORITHM 基于遗传算法的马奈智能优化技术
Q3 Computer Science Pub Date : 2014-01-01 DOI: 10.47893/ijcns.2014.1090
S. More, Umarfarooque Jahagirdar
In wireless communication, Mobile Ad Hoc network (MANET) is a group of mobile nodes that are dynamically and randomly located in such a way that the wireless link among nodes are often change due to MANET dynamic features. In this MANET environment, if a device wants to connect to Internet, it must establish a communication with an Internet Gateway. The performance of system is evaluated using simulation. In this paper we propose approximated solutions and new algorithm that helps in QoS routing which can be adaptive, flexible, and intelligent.
在无线通信中,移动自组网(MANET)是一组动态随机分布的移动节点,由于MANET的动态特性,节点之间的无线链路经常发生变化。在这种MANET环境中,如果一个设备想要连接到Internet,它必须与Internet网关建立通信。通过仿真对系统的性能进行了评价。本文提出了一种近似解和新算法,有助于实现自适应、灵活和智能的QoS路由。
{"title":"AN INTELLIGENT OPTIMIZATION TECHNIQUE FOR MANET USING GENETIC ALGORITHM","authors":"S. More, Umarfarooque Jahagirdar","doi":"10.47893/ijcns.2014.1090","DOIUrl":"https://doi.org/10.47893/ijcns.2014.1090","url":null,"abstract":"In wireless communication, Mobile Ad Hoc network (MANET) is a group of mobile nodes that are dynamically and randomly located in such a way that the wireless link among nodes are often change due to MANET dynamic features. In this MANET environment, if a device wants to connect to Internet, it must establish a communication with an Internet Gateway. The performance of system is evaluated using simulation. In this paper we propose approximated solutions and new algorithm that helps in QoS routing which can be adaptive, flexible, and intelligent.","PeriodicalId":38851,"journal":{"name":"International Journal of Communication Networks and Information Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83628221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
COMPARATIVE ANALYSIS OF PVM AND MPI FOR THE DEVELOPMENT OF PHYSICAL APPLICATIONS IN PARALLEL AND DISTRIBUTED SYSTEMS PVM和mpi在并行和分布式系统中开发物理应用的比较分析
Q3 Computer Science Pub Date : 2014-01-01 DOI: 10.47893/ijcns.2014.1097
Srikanth Bethu
This research is aimed to explore each of these two Parallel Virtual Machine (PVM) and Message Passing Interface(MPI) vehicles for DPP (Distributed Parallel Processing) considering capability, ease of use, and availability, and compares their distinguishing features and also explores programmer interface and their utilization for solving real world parallel processing applications. This work recommends a potential research issue, that is, to study the feasibility of creating a programming environment that allows access to the virtual machine features of PVM and the message passing features of MPI. PVM and MPI, two systems for programming clusters, are often compared. Each system has its unique strengths and this will remain so in to the foreseeable future. The comparisons usually start with the unspoken assumption that PVM and MPI represent different solutions to the same problem. In this paper we show that, in fact, the two systems often are solving different problems. In cases where the problems do match but the solutions chosen by PVM and MPI are different, we explain the reasons for the differences. Usually such differences can be traced to explicit differences in the goals of the two systems, their origins, or the relationship between their specifications and their implementations. This paper also compares PVM and MPI features, pointing out the situations where one may be favored over the other; it explains the deference’s between these systems and the reasons for such deference’s.
本研究旨在探讨这两种并行虚拟机(PVM)和消息传递接口(MPI)工具在DPP(分布式并行处理)中的能力、易用性和可用性,并比较它们的区别特征,同时探索程序员接口及其在解决现实世界并行处理应用中的应用。这项工作提出了一个潜在的研究问题,即研究创建一个允许访问PVM的虚拟机特性和MPI的消息传递特性的编程环境的可行性。PVM和MPI这两种用于编程集群的系统经常被比较。每种系统都有其独特的优势,在可预见的未来仍将如此。比较通常从一个不言而喻的假设开始,即PVM和MPI代表同一问题的不同解决方案。在本文中,我们表明,事实上,这两个系统往往是解决不同的问题。如果问题确实匹配,但PVM和MPI选择的解决方案不同,我们将解释差异的原因。通常,这些差异可以追溯到两个系统的目标、它们的起源,或者它们的规范和实现之间的关系的显式差异。本文还比较了PVM和MPI的特性,指出了其中一种可能优于另一种的情况;解释了这些制度之间的差异,以及产生差异的原因。
{"title":"COMPARATIVE ANALYSIS OF PVM AND MPI FOR THE DEVELOPMENT OF PHYSICAL APPLICATIONS IN PARALLEL AND DISTRIBUTED SYSTEMS","authors":"Srikanth Bethu","doi":"10.47893/ijcns.2014.1097","DOIUrl":"https://doi.org/10.47893/ijcns.2014.1097","url":null,"abstract":"This research is aimed to explore each of these two Parallel Virtual Machine (PVM) and Message Passing Interface(MPI) vehicles for DPP (Distributed Parallel Processing) considering capability, ease of use, and availability, and compares their distinguishing features and also explores programmer interface and their utilization for solving real world parallel processing applications. This work recommends a potential research issue, that is, to study the feasibility of creating a programming environment that allows access to the virtual machine features of PVM and the message passing features of MPI. PVM and MPI, two systems for programming clusters, are often compared. Each system has its unique strengths and this will remain so in to the foreseeable future. The comparisons usually start with the unspoken assumption that PVM and MPI represent different solutions to the same problem. In this paper we show that, in fact, the two systems often are solving different problems. In cases where the problems do match but the solutions chosen by PVM and MPI are different, we explain the reasons for the differences. Usually such differences can be traced to explicit differences in the goals of the two systems, their origins, or the relationship between their specifications and their implementations. This paper also compares PVM and MPI features, pointing out the situations where one may be favored over the other; it explains the deference’s between these systems and the reasons for such deference’s.","PeriodicalId":38851,"journal":{"name":"International Journal of Communication Networks and Information Security","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76815677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Communication Networks and Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1