2013 International Conference on Green High Performance Computing (ICGHPC)最新文献

筛选
英文 中文
An integrated clustering approach for high dimensional categorical data 高维分类数据的集成聚类方法
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533920
K. Kalaivani, A. Raghavendra
{"title":"An integrated clustering approach for high dimensional categorical data","authors":"K. Kalaivani, A. Raghavendra","doi":"10.1109/ICGHPC.2013.6533920","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533920","url":null,"abstract":"Clustering is an attractive and important task in data mining which is used in many applications. However earlier work on clustering focused on only categorical data which is based on attribute values for grouping similar kind of data items thus will leads to convergence problem of clustering process. This proposed work is to enhance the existing k-means clustering process based on the categorical and mixed data types in efficient manner. The goal is to use integrated clustering approach based on high dimensional categorical data that works well for data with mixed continuous and categorical features. The experimental results of the proposed method on several data sets are suggest that the link based cluster ensemble algorithm integrate with proposed k-means algorithm to produce accurate clustering results. In this proposed algorithm prove the convergence property of clustering process, thus will improve the accuracy of clustering results. The scope of this proposed work is used to provide the accurate and efficient results, whenever the user wants to access the data from the database.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122797481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing the performance in cognitive network 增强认知网络的性能
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533934
J. Bino, A. Macriga
{"title":"Enhancing the performance in cognitive network","authors":"J. Bino, A. Macriga","doi":"10.1109/ICGHPC.2013.6533934","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533934","url":null,"abstract":"In the next generation of wireless networks, the entire network operating on different radio frequencies under wireless mode will be available for communication. Cognitive Networks are an emerging new type of networking technology that can utilize both Radio Spectrum and Wireless Station. Based on the Knowledge of the availability of such resources gathered from past experience the resources can be utilized efficiently. Signaling is the major issue in Cognitive Network. Multiple Input Multiple Output (MIMO) technique is used for the transmission of signals in Cognitive Network. In this paper, the performance of MIMO in a scattered environment is analyzed and water filling algorithm is used to maximize the capacity of MIMO channels. We also propose an optimum beamforming algorithm to design beamforming vectors such that, interference caused by the primary transmitter to the cognitive receiver and the interference caused by the cognitive transmitter to the primary receiver is completely nullified while maximizing the rate of both primary and secondary links. The proposed technique does not require any changes in the existing environment between the primary and secondary user. The secondary user will be allowed to transmit concurrently to the primary user. Since the primary user is a licensed one it need not to have any knowledge about the resources utilized and performance of the secondary user and it transmits independently. Further it is also proved that the rate of Cognitive Multiple Input Multiple Output (MIMO) link implemented by the proposed beamforming algorithms is equal to interference free Multiple Input Single Output (MISO) link.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114259245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy efficient code converters using reversible logic gates 使用可逆逻辑门的节能代码转换器
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533921
Mr M Saravanan, K Suresh Manic
{"title":"Energy efficient code converters using reversible logic gates","authors":"Mr M Saravanan, K Suresh Manic","doi":"10.1109/ICGHPC.2013.6533921","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533921","url":null,"abstract":"In this technological world development in the field of nanometer technology leads to minimize the power consumption of logic circuits. Reversible logic design has been one of the promising technologies gaining greater interest due to less dissipation of heat and low power consumption. In digital systems code conversion is a widely used process for reasons such as enhancing security of data, reducing the complexity of arithmetic operations and thereby reducing the hardware required, dropping the level of switching activity leading to more speed of operation and power saving etc. This paper proposes novel Reversible logic design for code conversion such as Binary to Gray code, Gray to Binary code, BCD to Excess 3 code, Excess 3 to BCD code.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129980222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Development of high performance wireless sensor node for acoustic applications 用于声学应用的高性能无线传感器节点的开发
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533933
A. Prabahar
{"title":"Development of high performance wireless sensor node for acoustic applications","authors":"A. Prabahar","doi":"10.1109/ICGHPC.2013.6533933","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533933","url":null,"abstract":"This paper describes a design of wireless sensor network node (WSN node) for the purpose of voice based applications. For implementing voice based WSN, wireless sensor nodes should be capable of capturing voice, processing it and transmitting it over RF (Radio Frequency) channel. Common WSN applications handle few bytes of data over wireless network. Acoustic WSN applications deal with high data rate voice. Acoustic WSN applications require high performance WSN nodes to accomplish capturing and processing voice. This paper explains how to make high performance WSN nodes by incorporating Digital Signal Processing (DSP) chip with the WSN node and how to implement suitable speech processing algorithm on it. The bottle neck arisen due to usage of DSP chip on WSN node is high power consumption. The techniques which are adopted to reduce the power consumption of DSP chip are described in this paper. The design of hardware is based on ultra low power DSP chip to improve the battery operating time of the WSN node.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134015192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data confidentiality and integrity verification using user authenticator scheme in cloud 云环境下基于用户身份验证方案的数据保密性和完整性验证
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533902
V. Nirmala, R. K. Sivanandhan, R. S. Lakshmi
{"title":"Data confidentiality and integrity verification using user authenticator scheme in cloud","authors":"V. Nirmala, R. K. Sivanandhan, R. S. Lakshmi","doi":"10.1109/ICGHPC.2013.6533902","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533902","url":null,"abstract":"Cloud computing is the one which offers infrastructure to the client on a pay as you use model by leveraging on the Internet technology. As this model depicts the electricity billing it is often termed as utility computing. It offers various services to the client based on the need. The need of the resources can be scaled up or down on the basis of the requirement. The IT sectors started using cloud service models. As the use of cloud increases day by day the concerns of cloud also gets increased. There are number of data breaches that are happening day by day that affect the cloud growth. The major concern in adapting cloud is its security. The companies have lot of data that gets increased each day enlarges the complication of data privacy and security. The data that we talk can be classified as either stagnant data i.e., for simple storage as offered by Amazon's Simple Storage Service (S3) or it can be vibrant that changes often. The solution available to protect the stagnant data will be to simply encrypt the data before it gets stored in the server. In order to solve the issues of vibrant data the techniques are being proposed to work out on the encrypted. This paper is a survey of different security issues that affects the cloud environment and related work that are carried out in the area of integrity. The technique proposed combines the encrypting mechanism along with the data integrity check mechanism. The data are double wrapped to ensure no data leakage happens at the server side. The data are also shared with users with proper access mechanism.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117116352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
UOSPR: UnObservable secure proactive routing protocol for fast and secure transmission using B.A.T.M.A.N UOSPR:使用B.A.T.M.A.N实现快速安全传输的不可观察安全主动路由协议
2013 International Conference on Green High Performance Computing (ICGHPC) Pub Date : 2013-03-14 DOI: 10.1109/ICGHPC.2013.6533931
S. Balaji, M. Prabha
{"title":"UOSPR: UnObservable secure proactive routing protocol for fast and secure transmission using B.A.T.M.A.N","authors":"S. Balaji, M. Prabha","doi":"10.1109/ICGHPC.2013.6533931","DOIUrl":"https://doi.org/10.1109/ICGHPC.2013.6533931","url":null,"abstract":"USOR deals with the concept of unlinkability, unobservability and anonymity by combining group signature and ID-based encryption for route discovery. Apart from the security, there is another requirement in transmission is effective and efficient delivery of data. USOR uses ordinary distance calculations to get the knowledge about neighbour nodes. At the same time we can't incorporate the entire information about the network into single node or every node. We know that nodes in ad-hoc network have limited storage and battery power. Already half of the power vested in security, remaining power has to be used for calculating routes and data transmission. For that we are merging the above USOR with Better Approach To Mobile Ad-hoc Networking, or B.A.T.M.A.N. which is a routing protocol that has the knowledge of its best route alone - no single node has all the data. This technique eliminates extending the information to the concerning network changes to every node in the network. Each node only maintains the best hop details not the entire network topology. From this we are achieving fast transmission of data in a secure way with minimum node failure rate.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"59 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123939075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信