首页 > 最新文献

2014 17th International Conference on Computer and Information Technology (ICCIT)最新文献

英文 中文
Estimation of Blocking Performances in Mobile WiMAX Cellular Networks 移动WiMAX蜂窝网络中阻塞性能的估计
Anindita Chhotray, H. K. Pati
In this paper, we have estimated new call block and handoff call drop performances in Cellular WiMAX. Call Admission Control (CAC) is the process of regulating voice communication, particularly in wireless mobile networks. Further it is a fundamental mechanism used for QoS provisioning in a network. It restricts the access to the network based on resource availability in order to prevent network congestion and service degradation for already supported users. CAC decides whether a new connection can be established or not. Permission is granted only when QoS requirement of the new incoming flow is met without degrading those of the existing flows. The IEEE802.16e standard support for handover (HO) and various services like with Unsolicited Grant Service (UGS), real-time Polling Service (rtPS), non-real-time Polling Service (nrtPS), Best-Effort (BE), and extended real time Polling Service (ertPS). The Quality-of-Service (QoS) parameters used are the new and handoff call blocking. In this paper we investigate the blocking performances of three channel assignment schemes in the context of Cellular WiMAX network. Numerical results are found including the performance of these schemes.
在本文中,我们估计了蜂窝WiMAX的新呼叫阻塞和切换呼叫丢失性能。呼叫接纳控制(Call Admission Control, CAC)是对语音通信进行控制的过程,特别是在无线移动网络中。此外,它是用于在网络中提供QoS的基本机制。它根据资源可用性限制对网络的访问,以防止已经支持的用户出现网络拥塞和服务降级。CAC决定是否可以建立新的连接。只有在不降低现有流的QoS要求的情况下,满足新流入流的QoS要求时才授予权限。IEEE802.16e标准支持切换(HO)和各种服务,如非请求授权服务(UGS)、实时轮询服务(rtPS)、非实时轮询服务(nrtPS)、尽力而为服务(BE)和扩展实时轮询服务(ertPS)。使用的服务质量(QoS)参数是新的和切换的呼叫阻塞。本文研究了蜂窝WiMAX网络中三种信道分配方案的阻塞性能。数值结果反映了这些方案的性能。
{"title":"Estimation of Blocking Performances in Mobile WiMAX Cellular Networks","authors":"Anindita Chhotray, H. K. Pati","doi":"10.1109/ICIT.2014.62","DOIUrl":"https://doi.org/10.1109/ICIT.2014.62","url":null,"abstract":"In this paper, we have estimated new call block and handoff call drop performances in Cellular WiMAX. Call Admission Control (CAC) is the process of regulating voice communication, particularly in wireless mobile networks. Further it is a fundamental mechanism used for QoS provisioning in a network. It restricts the access to the network based on resource availability in order to prevent network congestion and service degradation for already supported users. CAC decides whether a new connection can be established or not. Permission is granted only when QoS requirement of the new incoming flow is met without degrading those of the existing flows. The IEEE802.16e standard support for handover (HO) and various services like with Unsolicited Grant Service (UGS), real-time Polling Service (rtPS), non-real-time Polling Service (nrtPS), Best-Effort (BE), and extended real time Polling Service (ertPS). The Quality-of-Service (QoS) parameters used are the new and handoff call blocking. In this paper we investigate the blocking performances of three channel assignment schemes in the context of Cellular WiMAX network. Numerical results are found including the performance of these schemes.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"27 1","pages":"148-154"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75165464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling Semantic Heterogeneity in Dataspace: A Machine Learning Approach 数据空间语义异构建模:一种机器学习方法
Mrityunjay Singh, S. Jain, V. Panchal
A data space system facilitates a new way for sharing and integrating the information among the various distributed, autonomous and heterogeneous data sources. To provide the best effort answer of a user query, a data space system needs to resolve the semantic heterogeneity in its core. There are many solutions being proposed to address this problem widely. We are exploring the problem of semantic heterogeneity in a data space system as a part of our PhD work. In this paper, we have addressed the semantic heterogeneity in the context of a data space system, and presented an abstract framework to model the semantic heterogeneity in data space. The proposed model is based on machine learning and ontology approaches. The machine learning technique analyzes the semantically equivalent data items (or entities) in data space, and the ontology conceptualizes the structural entities in a data space. This model resolves the semantic heterogeneity of a data space system, and creates a conceptual model using "from-data-to-schema" approach. The proposed approach implicitly creates the domain ontology by finding the most similar concepts comming from different data sources and enriches the performance of the system by finding the semantic relationships among them.
数据空间系统为各种分布式、自治和异构数据源之间的信息共享和集成提供了一种新的方式。为了提供用户查询的最佳答案,数据空间系统需要解决其核心的语义异构问题。为了广泛解决这个问题,人们提出了许多解决方案。我们正在探索数据空间系统中的语义异构问题,作为我们博士工作的一部分。本文讨论了数据空间系统中的语义异构问题,并提出了一个抽象框架来对数据空间中的语义异构进行建模。该模型基于机器学习和本体方法。机器学习技术对数据空间中语义等价的数据项(或实体)进行分析,本体对数据空间中的结构实体进行概念化。该模型解决了数据空间系统的语义异构问题,并使用“从数据到模式”的方法创建了概念模型。该方法通过寻找来自不同数据源的最相似的概念来隐式地创建领域本体,并通过寻找它们之间的语义关系来丰富系统的性能。
{"title":"Modeling Semantic Heterogeneity in Dataspace: A Machine Learning Approach","authors":"Mrityunjay Singh, S. Jain, V. Panchal","doi":"10.1109/ICIT.2014.24","DOIUrl":"https://doi.org/10.1109/ICIT.2014.24","url":null,"abstract":"A data space system facilitates a new way for sharing and integrating the information among the various distributed, autonomous and heterogeneous data sources. To provide the best effort answer of a user query, a data space system needs to resolve the semantic heterogeneity in its core. There are many solutions being proposed to address this problem widely. We are exploring the problem of semantic heterogeneity in a data space system as a part of our PhD work. In this paper, we have addressed the semantic heterogeneity in the context of a data space system, and presented an abstract framework to model the semantic heterogeneity in data space. The proposed model is based on machine learning and ontology approaches. The machine learning technique analyzes the semantically equivalent data items (or entities) in data space, and the ontology conceptualizes the structural entities in a data space. This model resolves the semantic heterogeneity of a data space system, and creates a conceptual model using \"from-data-to-schema\" approach. The proposed approach implicitly creates the domain ontology by finding the most similar concepts comming from different data sources and enriches the performance of the system by finding the semantic relationships among them.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"48 1","pages":"275-280"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79088836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Time Varying vs. Fixed Acceleration Coefficient PSO Driven Exploration during High Level Synthesis: Performance and Quality Assessment 在高层次综合中,时变与固定加速度系数的粒子群驱动勘探:性能和质量评估
A. Sengupta, V. Mishra
The performance of particle swarm optimization (PSO) greatly depends upon the effective selection of vital tuning metric known as acceleration coefficients (especially when applied to design space exploration (DSE) problem) which incorporates ability to clinically balance between exploration and exploitation during searching. The major contributions of the paper are as follows: a) A novel analysis of two variants of acceleration coefficient (hierarchical time varying acceleration coefficient vs. Constant acceleration coefficient) in PSO and their impact on convergence time and exploration time in context of multi objective (MO) DSE in HLS. The analysis assists the designer in pre-tuning the acceleration coefficient to an optimal value for achieving better convergence and exploration time before DSE initiation, b) A novel performance comparison of PSO driven DSE (PSO-DSE) with previous works based on quality metrics for MO evolutionary algorithms such as generational distance, maximum pareto-optimal front error, spacing, spreading and weighted metric. When two variants of acceleration coefficients (constant and time varying) were compared, it was revealed from the results that the PSO-DSE has on average 9.5% better exploration speed with constant acceleration coefficient as compared to hierarchical time varying acceleration coefficient. Further, with setting of constant acceleration coefficient, the PSO-DSE produces results with efficient generational distance, maximum pareto-optimal front error, spacing, spreading and weighted metric as compared to previous approaches.
粒子群优化算法(PSO)的性能在很大程度上取决于加速系数这一重要调节指标的有效选择(特别是在设计空间探索(DSE)问题中),该指标在搜索过程中包含了在探索和利用之间进行临床平衡的能力。本文的主要贡献如下:a)新颖地分析了PSO中两种加速度系数(分层时变加速度系数和恒定加速度系数)的变化及其对HLS多目标DSE下收敛时间和探索时间的影响。该分析有助于设计者在DSE启动前将加速系数预先调整到最优值,以实现更好的收敛和探索时间。b)基于代距、最大帕累托最优前误差、间隔、扩散和加权度量等MO进化算法的质量指标,将PSO驱动的DSE (PSO-DSE)与先前的研究进行了新的性能比较。将两种加速度系数(恒定和时变)进行比较,结果表明,恒定加速度系数下的PSO-DSE比分层时变加速度系数下的平均勘探速度高9.5%。此外,在恒定加速度系数的条件下,PSO-DSE算法的代距、最大帕累托最优前误差、间隔、扩展和加权度量均优于以往的方法。
{"title":"Time Varying vs. Fixed Acceleration Coefficient PSO Driven Exploration during High Level Synthesis: Performance and Quality Assessment","authors":"A. Sengupta, V. Mishra","doi":"10.1109/ICIT.2014.16","DOIUrl":"https://doi.org/10.1109/ICIT.2014.16","url":null,"abstract":"The performance of particle swarm optimization (PSO) greatly depends upon the effective selection of vital tuning metric known as acceleration coefficients (especially when applied to design space exploration (DSE) problem) which incorporates ability to clinically balance between exploration and exploitation during searching. The major contributions of the paper are as follows: a) A novel analysis of two variants of acceleration coefficient (hierarchical time varying acceleration coefficient vs. Constant acceleration coefficient) in PSO and their impact on convergence time and exploration time in context of multi objective (MO) DSE in HLS. The analysis assists the designer in pre-tuning the acceleration coefficient to an optimal value for achieving better convergence and exploration time before DSE initiation, b) A novel performance comparison of PSO driven DSE (PSO-DSE) with previous works based on quality metrics for MO evolutionary algorithms such as generational distance, maximum pareto-optimal front error, spacing, spreading and weighted metric. When two variants of acceleration coefficients (constant and time varying) were compared, it was revealed from the results that the PSO-DSE has on average 9.5% better exploration speed with constant acceleration coefficient as compared to hierarchical time varying acceleration coefficient. Further, with setting of constant acceleration coefficient, the PSO-DSE produces results with efficient generational distance, maximum pareto-optimal front error, spacing, spreading and weighted metric as compared to previous approaches.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"281-286"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79416477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Comparative Performance Analysis of AESCRT Using NS2 采用NS2的AESCRT性能比较分析
Ditipriya Sinha, R. Chaki
MANETs are normally used in applications which are highly confidential in nature, such as defense, disaster management, etc. Secure data transmission is one of the challenging issues in MANET. Secret sharing has been one of the popular techniques for implementing security in MANETs. The existing logics for securing the packet delivery seem to involve too many control signal interchanges. This paper discusses the performance of a multiple agent based secured routing scheme to detect secure routes with minimum load on the network. The Chinese remainder theorem is used in generating the secure key by the source node. Source node shares the secure key among all probable routes using multiple agents. The three phased approach is aimed to increase the overall performance in the network. Performance metrics which are used to evaluate the performance of AESCRT are delivery rate, load, malicious nodes and packet dropped. Simulation analysis shows that performance of AESCRT give better result compared to other existing routing protocols.
manet通常用于高度机密的应用,如国防、灾害管理等。安全的数据传输是MANET中最具挑战性的问题之一。秘密共享已成为实现无线网络安全的常用技术之一。现有的保护数据包传输的逻辑似乎涉及太多的控制信号交换。本文讨论了一种基于多代理的安全路由方案的性能,以检测网络上最小负载的安全路由。在源节点生成安全密钥时,采用了中国剩余定理。源节点使用多个代理在所有可能的路由之间共享安全密钥。分三个阶段的方法旨在提高网络的整体性能。用于评估AESCRT性能的性能指标有传输速率、负载、恶意节点和丢包。仿真分析表明,与现有的路由协议相比,AESCRT具有更好的性能。
{"title":"Comparative Performance Analysis of AESCRT Using NS2","authors":"Ditipriya Sinha, R. Chaki","doi":"10.1109/ICIT.2014.42","DOIUrl":"https://doi.org/10.1109/ICIT.2014.42","url":null,"abstract":"MANETs are normally used in applications which are highly confidential in nature, such as defense, disaster management, etc. Secure data transmission is one of the challenging issues in MANET. Secret sharing has been one of the popular techniques for implementing security in MANETs. The existing logics for securing the packet delivery seem to involve too many control signal interchanges. This paper discusses the performance of a multiple agent based secured routing scheme to detect secure routes with minimum load on the network. The Chinese remainder theorem is used in generating the secure key by the source node. Source node shares the secure key among all probable routes using multiple agents. The three phased approach is aimed to increase the overall performance in the network. Performance metrics which are used to evaluate the performance of AESCRT are delivery rate, load, malicious nodes and packet dropped. Simulation analysis shows that performance of AESCRT give better result compared to other existing routing protocols.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"47 1","pages":"35-40"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76168938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Technique Based on Ant Colony Optimization for Load Balancing in Cloud Data Center 一种基于蚁群优化的云数据中心负载均衡技术
Ekta Gupta, Vidya Deshpande
As a large number of requests are submitted to the data center, load balancing is one of the main challenges in Cloud Data Center. Existing load Balancing techniques mainly focus on improving the quality of services, providing the expected output on time etc. Therefore, there is a need to develop load balancing technique that can improve the performance of cloud computing along with optimal resource utilization. The proposed technique of load balancing is based on Ant Colony Optimization which detects overloaded and under loaded servers and thereby performs load balancing operations between identified servers of Data Center. The proposed technique ensures availability, achieves efficient resource utilization, maximizes number of requests handled by cloud and minimizes time required to serve multiple requests. The complexity of proposed algorithm depends on datacenter network architecture.
由于大量的请求被提交到数据中心,负载均衡是云数据中心面临的主要挑战之一。现有的负载均衡技术主要集中在提高服务质量、按时提供预期输出等方面。因此,有必要开发负载平衡技术,以提高云计算的性能,同时实现最佳的资源利用率。所提出的负载均衡技术基于蚁群优化算法,通过检测服务器的过载和负载不足,从而在识别出的数据中心服务器之间进行负载均衡操作。所建议的技术确保了可用性,实现了有效的资源利用,最大限度地增加了云处理的请求数量,并最大限度地减少了服务多个请求所需的时间。算法的复杂度取决于数据中心的网络结构。
{"title":"A Technique Based on Ant Colony Optimization for Load Balancing in Cloud Data Center","authors":"Ekta Gupta, Vidya Deshpande","doi":"10.1109/ICIT.2014.54","DOIUrl":"https://doi.org/10.1109/ICIT.2014.54","url":null,"abstract":"As a large number of requests are submitted to the data center, load balancing is one of the main challenges in Cloud Data Center. Existing load Balancing techniques mainly focus on improving the quality of services, providing the expected output on time etc. Therefore, there is a need to develop load balancing technique that can improve the performance of cloud computing along with optimal resource utilization. The proposed technique of load balancing is based on Ant Colony Optimization which detects overloaded and under loaded servers and thereby performs load balancing operations between identified servers of Data Center. The proposed technique ensures availability, achieves efficient resource utilization, maximizes number of requests handled by cloud and minimizes time required to serve multiple requests. The complexity of proposed algorithm depends on datacenter network architecture.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"107 1","pages":"12-17"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85912687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Smart Meeting System: An Approach to Recognize Patterns Using Tree Based Mining 智能会议系统:基于树挖掘的模式识别方法
Puja R. Kose, P. K. Bharne
Mining Human Interaction in Meetings is useful to identify how a person reacts in different situations. Behavior represents the nature of the person and mining helps to analyze, how the person express their opinion in meeting. For this, study of semantic knowledge is important. Human interactions in meeting are categorized as propose, comment, acknowledgement, ask opinion, positive opinion and negative opinion. The sequence of human interactions is represented as a Tree. Tree structure is used to represent the Human Interaction flow in meeting. Interaction flow helps to assure the probability of another type of interaction. Tree pattern mining and sub tree pattern mining algorithms are automated to analyze the structure of the tree and to extract interaction flow patterns. The extracted patterns are interpreted from human interactions. The frequent patterns are used as an indexing tool to access a particular semantics, and that patterns are clustered to determine the behavior of the person.
挖掘会议中的人际互动有助于确定一个人在不同情况下的反应。行为代表了一个人的本性,挖掘有助于分析这个人在会议上如何表达自己的意见。为此,语义知识的研究就显得尤为重要。会议中的人际互动分为提议、评论、确认、询问意见、积极意见和消极意见。人类互动的序列被表示为一个树。采用树形结构表示会议中的人机交互流程。交互流有助于确保另一种类型交互的可能性。树模式挖掘和子树模式挖掘算法自动分析树的结构并提取交互流模式。提取的模式是从人类互动中解释的。频繁模式被用作访问特定语义的索引工具,并且该模式被聚类以确定该人的行为。
{"title":"Smart Meeting System: An Approach to Recognize Patterns Using Tree Based Mining","authors":"Puja R. Kose, P. K. Bharne","doi":"10.1109/ICIT.2014.45","DOIUrl":"https://doi.org/10.1109/ICIT.2014.45","url":null,"abstract":"Mining Human Interaction in Meetings is useful to identify how a person reacts in different situations. Behavior represents the nature of the person and mining helps to analyze, how the person express their opinion in meeting. For this, study of semantic knowledge is important. Human interactions in meeting are categorized as propose, comment, acknowledgement, ask opinion, positive opinion and negative opinion. The sequence of human interactions is represented as a Tree. Tree structure is used to represent the Human Interaction flow in meeting. Interaction flow helps to assure the probability of another type of interaction. Tree pattern mining and sub tree pattern mining algorithms are automated to analyze the structure of the tree and to extract interaction flow patterns. The extracted patterns are interpreted from human interactions. The frequent patterns are used as an indexing tool to access a particular semantics, and that patterns are clustered to determine the behavior of the person.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"10 1","pages":"206-208"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82790806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Multifunctional DR Gate and Its Application in ALU Design 多功能DR门的设计及其在ALU设计中的应用
A. G. Rao, A. K. D. Dwivedi
Reversible Logic Technology has emerged as potential logic design style for implementation in Low Power VLSI Design, Quantum Computing and Dissipation less Computing. Based on this technology, a 6×6 Multifunctional Dwivedi - Rao (DR) Gate has been designed for implementation of logical and arithmetical functions. DR gate has been applied for designing of 1-bit ALU to perform NOT, 2 no's NOR, COPIER, ADD, COUT logical and arithmetical operations in one clock cycle. Comparison of various results shows that proposed DR gate and its application in ALU design is better than its counterpart [16] in terms of Quantum Cost, Logical Operations, Worst Case Delay, Garbage output, Total Boolean function performed etc. Proposed gate has been simulated on VHDL and improvement of 72, 40, 24 logical operations on 4, 3, 2 control input signals respectively, without any garbage output.
可逆逻辑技术已成为低功耗VLSI设计、量子计算和无耗散计算中潜在的逻辑设计方式。基于该技术,设计了一个6×6多功能Dwivedi - Rao (DR)门,实现了逻辑和算术功能。DR门被应用于1位ALU的设计,在一个时钟周期内完成非、2位非、copy、ADD、COUT和算术运算。各种结果的比较表明,本文提出的DR门及其在ALU设计中的应用在量子成本、逻辑运算、最坏情况延迟、垃圾输出、执行布尔函数总量等方面优于同类[16]。所提出的门在VHDL上进行了仿真,并分别对4、3、2个控制输入信号进行了72、40、24个逻辑运算的改进,没有任何垃圾输出。
{"title":"Design of Multifunctional DR Gate and Its Application in ALU Design","authors":"A. G. Rao, A. K. D. Dwivedi","doi":"10.1109/ICIT.2014.49","DOIUrl":"https://doi.org/10.1109/ICIT.2014.49","url":null,"abstract":"Reversible Logic Technology has emerged as potential logic design style for implementation in Low Power VLSI Design, Quantum Computing and Dissipation less Computing. Based on this technology, a 6×6 Multifunctional Dwivedi - Rao (DR) Gate has been designed for implementation of logical and arithmetical functions. DR gate has been applied for designing of 1-bit ALU to perform NOT, 2 no's NOR, COPIER, ADD, COUT logical and arithmetical operations in one clock cycle. Comparison of various results shows that proposed DR gate and its application in ALU design is better than its counterpart [16] in terms of Quantum Cost, Logical Operations, Worst Case Delay, Garbage output, Total Boolean function performed etc. Proposed gate has been simulated on VHDL and improvement of 72, 40, 24 logical operations on 4, 3, 2 control input signals respectively, without any garbage output.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"14 1","pages":"339-344"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88039843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Service Oriented Layered Approach for E-Governance System Implementation 面向服务的分层电子政务系统实现方法
R. Das, Sujata Patnaik, A. K. Padhy, C. Mohini
Service Oriented design and software development has gained much importance in the area of e-Governance applications. The main focus is to design and implement web services for efficient realisation of service interoperability and reuse. In this paper, we have proposed a layered service oriented design approach with government department wise abstraction levels for uniform service specification and composition mechanism. For our case study we have considered seven web services of different departments, which are interdependent. The service identification, service composition and service interaction pattern of all these services are done as per the principles of service oriented design. A generalised framework is also proposed to develop any complex web service, which can use and reuse services of multiple departments seamlessly. It provides flexible and dependable solution for developing agile e-Governance applications as the complexity of web services increases.
面向服务的设计和软件开发在电子政务应用领域变得越来越重要。主要焦点是设计和实现web服务,以便有效地实现服务互操作性和重用。在本文中,我们提出了一种分层的面向服务的设计方法,该方法具有政府部门明智的抽象层次,以实现统一的服务规范和组合机制。对于我们的案例研究,我们考虑了不同部门的7个web服务,它们是相互依赖的。所有这些服务的服务标识、服务组合和服务交互模式都是按照面向服务的设计原则完成的。提出了一个通用的框架来开发复杂的web服务,该框架可以无缝地使用和重用多个部门的服务。随着web服务复杂性的增加,它为开发敏捷的电子政务应用程序提供了灵活可靠的解决方案。
{"title":"Service Oriented Layered Approach for E-Governance System Implementation","authors":"R. Das, Sujata Patnaik, A. K. Padhy, C. Mohini","doi":"10.1109/ICIT.2014.38","DOIUrl":"https://doi.org/10.1109/ICIT.2014.38","url":null,"abstract":"Service Oriented design and software development has gained much importance in the area of e-Governance applications. The main focus is to design and implement web services for efficient realisation of service interoperability and reuse. In this paper, we have proposed a layered service oriented design approach with government department wise abstraction levels for uniform service specification and composition mechanism. For our case study we have considered seven web services of different departments, which are interdependent. The service identification, service composition and service interaction pattern of all these services are done as per the principles of service oriented design. A generalised framework is also proposed to develop any complex web service, which can use and reuse services of multiple departments seamlessly. It provides flexible and dependable solution for developing agile e-Governance applications as the complexity of web services increases.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"74 1","pages":"293-298"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85404358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-party Key-Exchange with Perfect Forward Secrecy 具有完美前向保密的多方密钥交换
Susmita Mandal, S. Mohanty
The paper proposes a multi-party key exchange scheme with Perfect Forward Secrecy (PFS) which ensures that a session key derived from a set of long-term public and private keys used in the protocol to authenticate, does not compromise the secrecy of session key. In this protocol, each group establishes connection by communicating through a trusted third party. The trusted party acts as a group controller generates a public key and broadcasts it among the groups. Each group generate their public keys and send to trusted party. After receiving all the keys the group controller shares it among all the parties to generate the session key. Similarly, each group manager of individual group communicates with the members of the corresponding group. The security of the proposed scheme is analysed rigorously and proved to be resistant against non-repudiation attack, replay attack, chosen cipher attack, man-in-the middle attack. The scheme has wider applications such as, sending encrypted e-mail in a military environment to multiple users, securing submitted bids information in online tender, contract signing by many organizations, etc.
本文提出了一种具有完全前向保密(PFS)的多方密钥交换方案,该方案可以保证从协议中用于身份验证的一组长期公钥和私钥中获得的会话密钥不会泄露会话密钥的保密性。在该协议中,每个组通过受信任的第三方进行通信来建立连接。受信任方作为组控制器生成公钥并在组之间广播。每个组生成自己的公钥并发送给可信方。在接收到所有密钥后,组控制器在所有各方之间共享以生成会话密钥。同样,每个组的组经理与相应组的成员进行通信。对该方案的安全性进行了严格的分析,证明了该方案能够抵抗不可否认攻击、重放攻击、选择密码攻击和中间人攻击。该方案具有更广泛的应用,例如,在军事环境中向多个用户发送加密电子邮件,在在线投标中保护提交的投标信息,由多个组织签署合同等。
{"title":"Multi-party Key-Exchange with Perfect Forward Secrecy","authors":"Susmita Mandal, S. Mohanty","doi":"10.1109/ICIT.2014.30","DOIUrl":"https://doi.org/10.1109/ICIT.2014.30","url":null,"abstract":"The paper proposes a multi-party key exchange scheme with Perfect Forward Secrecy (PFS) which ensures that a session key derived from a set of long-term public and private keys used in the protocol to authenticate, does not compromise the secrecy of session key. In this protocol, each group establishes connection by communicating through a trusted third party. The trusted party acts as a group controller generates a public key and broadcasts it among the groups. Each group generate their public keys and send to trusted party. After receiving all the keys the group controller shares it among all the parties to generate the session key. Similarly, each group manager of individual group communicates with the members of the corresponding group. The security of the proposed scheme is analysed rigorously and proved to be resistant against non-repudiation attack, replay attack, chosen cipher attack, man-in-the middle attack. The scheme has wider applications such as, sending encrypted e-mail in a military environment to multiple users, securing submitted bids information in online tender, contract signing by many organizations, etc.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"362-367"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88964053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Framework for Multiple Parallel Task Graphs (PTG) Scheduler 多并行任务图(PTG)调度的框架
U. Boregowda, Venugopal R. Chakravarthy
Many applications in scientific computations exhibit both data and task parallelism. Several studies have proved that designing parallel applications using both task and data parallelism is an effective approach than pure data or pure task parallel models. This mixed parallelism achieves both higher scalability and performance. Mixed parallel applications are represented as Parallel Task Graph (PTG), a graph of data parallel tasks. Scheduling such a mixed-parallel application is NP-complete even on a single homogeneous cluster. To maximize resource utilizations and to increase cluster throughput, multiple applications are scheduled concurrently on a cluster. Scheduling multiple applications is challenging as different applications compete for the shared resources and also fairness must be ensured. A new method to perform concurrent schedule of multiple PTGs on a cluster is proposed in this work. Further a complete framework to schedule PTGs submitted at different instants of time and to vary processor allotment for each application during their depending on processor availability is proposed. From simulation experiments, it is observed that the proposed method to schedule multiple PTGs performs better than other methods found in the literature. The suggested scheduler framework to handle online submission of PTGs is proved to be a promising one.
科学计算中的许多应用都表现出数据和任务并行性。一些研究已经证明,使用任务和数据并行设计并行应用程序比使用纯数据或纯任务并行模型更有效。这种混合并行性实现了更高的可伸缩性和性能。混合并行应用程序表示为并行任务图(PTG),一种数据并行任务图。即使在单个同构集群上调度这样的混合并行应用程序也是np完全的。为了最大限度地利用资源并提高集群吞吐量,可以在一个集群上并发地调度多个应用程序。调度多个应用程序是具有挑战性的,因为不同的应用程序争夺共享资源,而且必须确保公平性。提出了一种实现集群上多个ptg并行调度的新方法。此外,提出了一个完整的框架来调度在不同时刻提交的ptg,并根据处理器可用性在每个应用程序期间改变处理器分配。仿真实验表明,本文提出的调度多个ptg的方法优于文献中其他方法。所建议的调度框架处理在线提交PTGs被证明是一个有前途的。
{"title":"A Framework for Multiple Parallel Task Graphs (PTG) Scheduler","authors":"U. Boregowda, Venugopal R. Chakravarthy","doi":"10.1109/ICIT.2014.34","DOIUrl":"https://doi.org/10.1109/ICIT.2014.34","url":null,"abstract":"Many applications in scientific computations exhibit both data and task parallelism. Several studies have proved that designing parallel applications using both task and data parallelism is an effective approach than pure data or pure task parallel models. This mixed parallelism achieves both higher scalability and performance. Mixed parallel applications are represented as Parallel Task Graph (PTG), a graph of data parallel tasks. Scheduling such a mixed-parallel application is NP-complete even on a single homogeneous cluster. To maximize resource utilizations and to increase cluster throughput, multiple applications are scheduled concurrently on a cluster. Scheduling multiple applications is challenging as different applications compete for the shared resources and also fairness must be ensured. A new method to perform concurrent schedule of multiple PTGs on a cluster is proposed in this work. Further a complete framework to schedule PTGs submitted at different instants of time and to vary processor allotment for each application during their depending on processor availability is proposed. From simulation experiments, it is observed that the proposed method to schedule multiple PTGs performs better than other methods found in the literature. The suggested scheduler framework to handle online submission of PTGs is proved to be a promising one.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"15 1","pages":"6-11"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79776418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 17th International Conference on Computer and Information Technology (ICCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1