2006 Annual IEEE India Conference最新文献

筛选
英文 中文
Status Monitoring of Jobs in Heterogeneous Grid Environments 异构网格环境下作业状态监控
2006 Annual IEEE India Conference Pub Date : 2006-09-01 DOI: 10.1109/INDCON.2006.302837
G. Sumathi, N. Gopalan
{"title":"Status Monitoring of Jobs in Heterogeneous Grid Environments","authors":"G. Sumathi, N. Gopalan","doi":"10.1109/INDCON.2006.302837","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302837","url":null,"abstract":"Computational grids are emerging as a computing paradigm for solving challenging applications in science, engineering and economics. Since the grid is a vast array of resources, monitoring of the grid is essential to improve debugging facilities and performance enhancement. Monitoring system must be able to provide information about the current state of various grid entities such as grid resources and running jobs as well as to provide notifications when certain important events occur. In this paper we provide a status monitoring system, which keeps track of the percentage of the job completed. It uses computational complexity and level of parallelism based algorithm for global scheduling and bottoms up heuristic for local scheduling the jobs. This heuristic technique efficiently maps tasks to resources so as to minimize the computing power consumed due to communication and computation","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133603434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shared Based Rate Limiting: An ISP level Solution to Deal DDoS Attacks 基于共享的限速:一种ISP级的DDoS攻击解决方案
2006 Annual IEEE India Conference Pub Date : 2006-09-01 DOI: 10.1109/INDCON.2006.302831
R. Sharma, Krishan Kumar, Kuldip Singh, R. Joshi
{"title":"Shared Based Rate Limiting: An ISP level Solution to Deal DDoS Attacks","authors":"R. Sharma, Krishan Kumar, Kuldip Singh, R. Joshi","doi":"10.1109/INDCON.2006.302831","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302831","url":null,"abstract":"Today distributed denial of service (DDoS) attacks is a major problem to the availability of Internet services. Several schemes have been proposed for countering DDoS attacks directed at an Internet server, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. In this paper we propose a dynamic rate throttling technique that will greatly minimize the impact of attack. The basic mechanism is to have monitoring, rate limiting and filtering routers at various levels of ISPs. The participating routers, start there function after getting a signal from a server under attack. Our scheme is invoked only during attack times, and is able to mitigate attack traffic through dynamic filtering. Server tells edge routers to rate limit the traffic according to the share of traffic which is being passed through particular routers. The solution proposed is an ISP level solution which is practical enough to be implemented. We simulate the scheme in NS-2 in Linux system. We use an Internet type topology to test our scheme and web traffic was generated to evaluate the effectiveness of scheme. Our scheme shows good improvement over static router throttling techniques which were proposed earlier. Hence we believe that the scheme proposed in this paper seems to be a promising approach to prevent DDoS attacks","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"abs/2304.00450 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132927865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Neuro-Genetic based Speech Processing for Promoting Global Cyber Security using Steganography technique 利用隐写技术促进全球网络安全的神经遗传语音处理
2006 Annual IEEE India Conference Pub Date : 2006-09-01 DOI: 10.1109/INDCON.2006.302799
T. S. Sinha, G. Sanyal
{"title":"Neuro-Genetic based Speech Processing for Promoting Global Cyber Security using Steganography technique","authors":"T. S. Sinha, G. Sanyal","doi":"10.1109/INDCON.2006.302799","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302799","url":null,"abstract":"The goal of cryptography is to provide confidentiality and privacy by encrypting the information. If any unauthorized human body does cryptanalysis then this goal may be defeated. In this paper the authors have attempted an algorithm called STEG_NGBSP (steganography/neuro-genetic based speech processing) using a technique called steganography that inherits some features of cryptography in such a way, that the information is encrypted as well as hidden. The methodology adopted here is the concept of null ciphers, which are extracted from the speech signal of a Bengali speaker using neuro-genetic approach. The speech signal is processed and then veiled with an image. Every image is encapsulated with some information, which may be decrypted at the receivers end using the master image-voiced frame, in which the speech data is covered by another image. The proposed algorithm is unique in handling the security measures from steganalysis, thus promoting global cyber security and bridging the gap between the computer and the user with more security through natural language processing","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of Integer Wavelet Transform on Software Configurable Processor 整数小波变换在软件可配置处理器上的实现
2006 Annual IEEE India Conference Pub Date : 2006-09-01 DOI: 10.1109/INDCON.2006.302815
S. Pandey, U. Niranjan
{"title":"Implementation of Integer Wavelet Transform on Software Configurable Processor","authors":"S. Pandey, U. Niranjan","doi":"10.1109/INDCON.2006.302815","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302815","url":null,"abstract":"Imaging in medicine has become so common that it is necessary that we have an image compression standard for the medical images. The JPEG 2000 standard is the latest from the JPEG group. The JPEG 2000 is more computationally intensive than the JPEG. In this work we propose a faster implementation of the integer wavelet transform used in the JPEG 2000 standard. We have implemented the integer wavelet transform on the Stretch's software configurable processor (SCP). A comparison of a Pentium based implementation and the SCP based implementation was done. In our work we have found that the wavelet transform calculations took nearly 35 times less number of clock cycles on the SCP when compared to one with the Pentium implementation","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115493682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role of Weighting on TDM in Improvising Performance of LSA on Text Data TDM加权对文本数据上LSA性能的影响
2006 Annual IEEE India Conference Pub Date : 2006-09-01 DOI: 10.1109/INDCON.2006.302788
S. Sudarsun, G. Venkatesh Prabhu, V. Sathish Kumar
{"title":"Role of Weighting on TDM in Improvising Performance of LSA on Text Data","authors":"S. Sudarsun, G. Venkatesh Prabhu, V. Sathish Kumar","doi":"10.1109/INDCON.2006.302788","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302788","url":null,"abstract":"In this paper, we show that the efficiency of LSA is significantly controlled by the choice of weighting algorithm applied. These weighting algorithms allocate relative importance to the document attributes (e.g. keywords) based on their occurrences in the corpus. Effects of different weighting algorithms are the central point of this paper. We experimented with various weighting algorithms to evaluate and study their effects as measured by precision and recall values. Our experiments include weighting function application on TDM (pre-weighting) in order to increase or decrease the relative importance of words based on their occurrence. We also evaluated the application of weighting functions on the projected query (post-weighting). Post-weighted keyword queries were projected on an LSA model built on pre-weighted TDM to obtain closely correlated keywords or a document (keyword collection). We have developed a prototype IR query projection tool which projects keyword queries on the LSA model to retrieve relevant keywords with a floating-point score","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132517303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Perfect Reconstruction in Non-biorthonormal Filter Banks using Vector Space Approach 基于向量空间方法的非双正交滤波器组完美重构
2006 Annual IEEE India Conference Pub Date : 2006-09-01 DOI: 10.1109/INDCON.2006.302755
S. Nalbalwar, S. Joshi, R. Patney
{"title":"Perfect Reconstruction in Non-biorthonormal Filter Banks using Vector Space Approach","authors":"S. Nalbalwar, S. Joshi, R. Patney","doi":"10.1109/INDCON.2006.302755","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302755","url":null,"abstract":"A formulation is proposed for construction of PRFB from a given non-PRFB and is described using vector space framework for filter banks. To construct PRFB, a transmultiplexer (TMUX) structure is inserted into the subband such that the synthesis and analysis parts of the TMUX are biorthonormal to analysis and synthesis bank of the given filter bank. The TMUX is a represented by transformation matrix. In addition to PR, in this paper, another objective is to study and exploit the properties of transformation matrix corresponding to non-PR TMUX. The transformation matrix is portioned into distinct subblocks. In case of uniform filter bank (UFB) it is shown that each subblock of transformation matrix has convolution matrix structure. Whereas in case of nonuniform filter bank (NUFB) it is shown that each of these subblock has a structure consisting of interspersed convolution matrices. Implementation of these matrices using discrete time FIR or IIR filters are also shown in this paper. It is also shown that implementation of convolution matrices involve linear time invariant filters whereas interspersed convolution matrices involve the time varying filters. During the implementation of transformation matrix it is also found that some of the blocks can be derived by using implemented blocks. By inserting one or more TMUXs in the subbands and merging with subchannels of UFB we can obtained NUFB from given UFB. There are various application of NUFB over UFB such as speech and audio signal processing where nonuniform division of bands is important","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131456404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Analysis, Design and Optimization of On-Chip Spiral Inductor for Si based RFIC's 硅基RFIC片上螺旋电感的系统分析、设计与优化
2006 Annual IEEE India Conference Pub Date : 2006-09-01 DOI: 10.1109/INDCON.2006.302818
G. Haobijam, R. Paily
{"title":"Systematic Analysis, Design and Optimization of On-Chip Spiral Inductor for Si based RFIC's","authors":"G. Haobijam, R. Paily","doi":"10.1109/INDCON.2006.302818","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302818","url":null,"abstract":"The figure of merit of an on-chip spiral inductor is given by its quality factor (g), self resonance frequency (fres) and optimum frequency (fmax). This paper presents a systematic analysis of the tradeoffs of the figure of merits with the layout parameters associated with the spiral inductor. The width of the metal trace of the spiral must be decided based on the desired operating frequency and the number of turns must be chosen considering the trade off between the quality factor and the area to minimize the cost. An efficient method to determine the optimum layout parameters for any inductance value that results the highest quality factor possible in a given technology is proposed. The proposed method solves the design complexity by deciding these performance controlling parameters based on a lumped physical model","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130944370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Modified Photonic Switch Architecture based on Fiber Loop Memory 一种基于光纤环路存储器的改进光子开关结构
2006 Annual IEEE India Conference Pub Date : 2006-09-01 DOI: 10.1109/INDCON.2006.302784
R. Srivastava, V. Mangal, R.K. Singh, Y. N. Singh
{"title":"A Modified Photonic Switch Architecture based on Fiber Loop Memory","authors":"R. Srivastava, V. Mangal, R.K. Singh, Y. N. Singh","doi":"10.1109/INDCON.2006.302784","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302784","url":null,"abstract":"In this paper we have proposed design modifications in fiber optic loop buffer switch. This paper discusses an automatic gain controlling (AGC) scheme for the loop buffer. We have shown that by changing the position of EDFA automatic gain controlling scheme will not be required. We have utilized the availability of filter in tunable wavelength converter (TWC) to reduce number of components in the buffer. Finally we replaced the combination of splitter and filter as in existing architecture by array waveguide grating (AWG) demultiplexer, which reduces the loss in the architecture. The performance evaluation of the switch is done in terms of packet loss probability and delay","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116058838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
StegoBreaker: Audio Steganalysis using Ensemble Autonomous Multi-Agent and Genetic Algorithm 使用集成自治多智能体和遗传算法的音频隐写分析
2006 Annual IEEE India Conference Pub Date : 2006-09-01 DOI: 10.1109/INDCON.2006.302771
S. Geetha, S.S. Sivatha Sindhu, A. Kannan
{"title":"StegoBreaker: Audio Steganalysis using Ensemble Autonomous Multi-Agent and Genetic Algorithm","authors":"S. Geetha, S.S. Sivatha Sindhu, A. Kannan","doi":"10.1109/INDCON.2006.302771","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302771","url":null,"abstract":"The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message in multi-medium. This creates a potential problem when this technology is misused for planning criminal activities. Differentiating anomalous audio document (stego audio) from pure audio document (cover audio) is difficult and tedious. Steganalytic techniques strive to detect whether an audio contains a hidden message or not. This paper investigates the use of genetic algorithm (GA) to aid autonomous intelligent software agents capable of detecting any hidden information in audio files, automatically. This agent would make up the detection agent in an architecture comprising of several different agents that collaborate together to detect the hidden information. The basic idea is that, the various audio quality metrics (AQMs) calculated on cover audio signals and on stego-audio signals vis-a-vis their denoised versions, are statistically different. GA employs these AQMs to steganalyse the audio data. The overall agent architecture will operate as an automatic target detection (ATD) system. The architecture of ATD system is presented in this paper and it is shown how the detection agent fits into the overall system. The design of ATD based audio steganalyzer relies on the choice of these audio quality measures and the construction of a GA based rule generator, which spawns a set of rules that discriminates between the adulterated and the untouched audio samples. Experimental results show that the proposed technique provides promising detection rates","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124381447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Significance of Software Metrics in ERP Projects 软件度量在ERP项目中的意义
2006 Annual IEEE India Conference Pub Date : 2006-09-01 DOI: 10.1109/INDCON.2006.302776
S. Parthasarathy, N. Anbazhagan
{"title":"Significance of Software Metrics in ERP Projects","authors":"S. Parthasarathy, N. Anbazhagan","doi":"10.1109/INDCON.2006.302776","DOIUrl":"https://doi.org/10.1109/INDCON.2006.302776","url":null,"abstract":"Software engineering metrics are units of measurement that are used to characterize the software engineering products and processes. Enterprise resource planning (ERP) is a generic term for integrated systems. ERP projects are a subclass of software projects often accompanied by large-scale organizational changes. One of the major reasons found in the literature for the failure of ERP projects is the poor management of software processes. In this paper, we propose a software metrics plan (SMP) containing different software metrics to manage software processes during ERP implementation. Two hypotheses have been formulated and tested using statistical techniques to validate the SMP. The statistical analysis of the collected data from an ERP project supports the two hypotheses, leading to the conclusion that the software metrics are momentous in ERP projects","PeriodicalId":122715,"journal":{"name":"2006 Annual IEEE India Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117238791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信