{"title":"An efficient ORR protocol for Wireless Mesh Networks","authors":"C. Reddy, H. K. Pati","doi":"10.1109/PDGC.2012.6449806","DOIUrl":"https://doi.org/10.1109/PDGC.2012.6449806","url":null,"abstract":"Routing protocols of Wireless Mesh Networks (WMNs) are mainly classified into two types proactive and reactive, which flood the packets during route discovery or dissemination and thus have limited scalability. The other routing protocols like geographic and hierarchical protocols handle the scalability at the cost of more state information maintained at each node. Orthogonal Rendezvous Routing Protocol (ORRP) is a lightweight, scalable routing protocol which maintains even distribution of state information and thus avoids from a single point of failure. The problem associated with the ORRP is the deviation of the beam of directional antenna when we cannot find path along the orthogonal directions. In this paper we propose an efficient Orthogonal Rendezvous Routing Protocol to determine when the mandatory deviation is required, and also how to avoid the unnecessary deviation at the intermediate nodes along the orthogonal path. We have carried out extensive simulation experiments. The simulation results indicate that the performance of our proposed Modified ORRP is substantially improved when compared with the basic ORRP.","PeriodicalId":166718,"journal":{"name":"2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115233881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing the low cost patient monitoring device (LCPMD) & Ubiquitous based Remote Health Monitoring and Health Management System using Tablet PC","authors":"D. Goyal, J. Bhaskar, Pardeep Singh","doi":"10.1109/PDGC.2012.6449782","DOIUrl":"https://doi.org/10.1109/PDGC.2012.6449782","url":null,"abstract":"At the current point of time, health is the important concern for all the peoples all over the world. So, it is very important aspect that how to deal with the diseases effectively and efficiently. In this paper, we provide a system that is effective in remote monitoring of the patient and full management of the medical resources like assigning duties to the doctors, nurses etc. Our aim is to design a Low cost patient monitoring device that can measure the temperature, blood pressure and pulse rate of the patients and transmit this data to the Low cost tablet PC and generate an alert message, if there is any critical condition. It can store the data in local database and if the network services are available, then the data automatically send to the central server. This new system provides the multi-level security by assigning different privileges to the different users. All the existing techniques are using expensive devices for monitoring of the patient health such as smart phone, bio-sensor nodes etc. The designed system has very low cost and it can provide proper management of the health care of the patient.","PeriodicalId":166718,"journal":{"name":"2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing","volume":"87 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121946886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new cryptology approach for image encryption","authors":"N. Sethi, D. Sharma","doi":"10.1109/PDGC.2012.6449944","DOIUrl":"https://doi.org/10.1109/PDGC.2012.6449944","url":null,"abstract":"In this paper, we propose a new method to develop secure image-encryption techniques using a logistics -based encryption algorithm. In this technique, a Haar wavelet transform was used to decompose the image and decorrelate its pixels into averaging and differencing components. [3] The logistic based encryption algorithm produces a cipher of the test image that has good diffusion and confusion properties [5]. The remaining components (the differencing components) are compressed using a wavelet transform. Many test images are used to demonstrate the validity of the proposed algorithm. The results of several experiments show that the proposed algorithm for image cryptosystems provides an efficient and secure approach to real-time image encryption and transmission. To send the keys in secure form stenography will be used. Steganography is a technique that allows one application to communicate information to another application without a third party even knowing that the communication is occurring. Many tests like NPCR, UACI, PSNR etc. have been done on the sample images to prove the results.","PeriodicalId":166718,"journal":{"name":"2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128338574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiobjective particle swarm optimization based ontology alignment","authors":"U. Marjit, M. Mandal","doi":"10.1109/PDGC.2012.6449848","DOIUrl":"https://doi.org/10.1109/PDGC.2012.6449848","url":null,"abstract":"Ontology alignment plays a vital role for interoperability among the heterogeneous semantic data sources. It is a set of correspondences between two or more ontologies. There are lots of methods to measure the semantic similarity between entities from several ontologies. To acquire the comprehensive and precise results, all the similarity measures are integrated. Therefore, integrating different similarity measures into a single similarity metric pose a challenging problem. In general, weights corresponding to various similarity measures are assigned manually or through some method. The problem is that it suffers from lack of optimality. There are many evolutionary based approaches to find the optimal solution but they optimize a single objective function. In this article, a multiobjective particle swarm optimization algorithm is proposed for achieving various weights correspond to different similarity measures. Then subsequently similarity aggregation function is calculated for identifying the optimal alignment. Here, two objectives precision and recall are simultaneously optimized and a optimal alignment is produced for which f-measure is very high.","PeriodicalId":166718,"journal":{"name":"2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128659844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asynchronous message logging based rollback recovery in MANETs","authors":"P. Jaggi, A. K. Singh","doi":"10.1109/PDGC.2012.6449881","DOIUrl":"https://doi.org/10.1109/PDGC.2012.6449881","url":null,"abstract":"The nodes in mobile ad hoc networks (MANETs) are susceptible to various types of failures and therefore the protocols designed for these networks are required to be fault tolerant. Checkpointing and rollback recovery is a well explored fault tolerance technique for the static and cellular mobile distributed systems. However, it is not trivially applicable to MANETs due to their dynamic topology and constraints of limited resources such as wireless bandwidth and stable storage. The paper combines asynchronous message logging with independent checkpointing for a successful rollback recovery procedure adapted to the ad hoc environment. Logging the messages asynchronously significantly reduces the number of accesses to stable storage. The recovery procedure involves only those processes whose state depends on the state of the failed process. The presented scheme requires a low number of control messages, reduces the size of control information carried by application messages and can also handle the movement of nodes across the network.","PeriodicalId":166718,"journal":{"name":"2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131659045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Rajan, B. K. Joshi, A. Rawat, R. Jha, K. Bhachavat
{"title":"Analysis of process distribution in HPC cluster using HPL","authors":"A. Rajan, B. K. Joshi, A. Rawat, R. Jha, K. Bhachavat","doi":"10.1109/PDGC.2012.6449796","DOIUrl":"https://doi.org/10.1109/PDGC.2012.6449796","url":null,"abstract":"Computing using parallel programming techniques running on High Performance Computing Clusters (HPCC) has become very popular for scientific applications. Evaluation of cluster performance is carried out in many different ways. Memory, interconnect bandwidth, number of cores per processor/ node and job complexity are the major parameters which affect and govern the peak computing power delivered by HPCC. In this paper we carried out experiments using High Performance Linpack (HPL) to analyze effect of job distribution among cores on same processor and among cores on distributed processors. Certain runs of HPL have also been carried out to understand effect of interconnect used for building the cluster. The distributed nature of the HPC cluster using InfiniBand interconnect has been analyzed. Results are represented in form of graphs and corresponding analysis is also included in the paper.","PeriodicalId":166718,"journal":{"name":"2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125452255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design flow of reconfigurable embedded system architecture using LUTs/PLAs","authors":"S. Singh, R. Singh, M. Bhatia","doi":"10.1109/PDGC.2012.6449851","DOIUrl":"https://doi.org/10.1109/PDGC.2012.6449851","url":null,"abstract":"Hardware acceleration and optimization remarkably increases the performance of embedded systems built with reconfigurable computing devices. Reconfigurable computing perform with the help of Reconfigurable devices like FPGA which offer a technique for satisfying performance and flexibility simultaneously with the existing hardware resources for various computations. In this paper, hybrid architecture for reconfigurable embedded system (RES) is proposed which comprised of programmable logic arrays (PLAs) and Look up tables (LUTs) structures. Hybrid (LUTs/PLAs) structure for RES is recognised as Hybrid Reconfigurable Computing Architectures (HRCA). HRCA distributes the implemented digital circuit between LUT and PLA structures because some parts of digital circuit are well matched to implement through LUTs and some other parts are more benefited from product term like structure (PLAs). For several classes of high performance applications, HRCA offers significant savings in total computational delay and logic area comparison with a symmetrical FPGA which contain only LUTs. To address the performance of HRCA, a design flow concept is proposed and various design steps are defined and applied to perform experiments. Initially, results indicate that notable saving in computational delay and logic area of HRCA over symmetrical FPGA. Experiments are performed through MCNC benchmark circuit.","PeriodicalId":166718,"journal":{"name":"2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126389695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vikas Kumar, Sandip Chakraborty, F. Barbhuiya, Sukumar Nandi
{"title":"Detection of stealth Man-in-the-Middle attack in wireless LAN","authors":"Vikas Kumar, Sandip Chakraborty, F. Barbhuiya, Sukumar Nandi","doi":"10.1109/PDGC.2012.6449834","DOIUrl":"https://doi.org/10.1109/PDGC.2012.6449834","url":null,"abstract":"Wireless Local Area Networks (WLANs) are acquiring their hold in all the verticals of life. WLANs have gone through rapid changes with respect to their security standards in near time. Man-in-the-Middle (MITM) attack is one of the most catastrophic attacks in WLAN. Stealth MITM (SMITM) attack is a new way of doing MITM based on Address Resolution Protocol (ARP) poisoning. In this attack, ARP poisoning is done directly to the victim by forging the frame ARP response protocol structure and exploiting WPA2 key management. In this paper we propose a Wireless Intrusion Detection System (WIDS) for SMITM attack. The proposed WIDS successfully detects the SMITM attack and other similar attacks like MITM (using ARP poisoning) and IP Spoofing. The proposed WIDS system is simulated in NS-3 network simulator and the scheme is found to work correctly when the attacker is static and is under the coverage of a single sensor during the complete period of attack.","PeriodicalId":166718,"journal":{"name":"2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125635283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cluster and super cluster based intrusion detection and prevention techniques for JellyFish Reorder Attack","authors":"M. Wazid, Avita Katal, R. Goudar","doi":"10.1109/PDGC.2012.6449860","DOIUrl":"https://doi.org/10.1109/PDGC.2012.6449860","url":null,"abstract":"Denial of service (DoS) is malignant attack in MANET which is difficult to detect and defend. Jellyfish is a new DoS attack which is categorized as JF Reorder Attack, JF Periodic Dropping Attack, JF Delay Variance Attack. Out of these three, JF Reorder is the most effective one. It disrupts the whole functionality of TCP and further produces zero goodput. So its detection and prevention becomes very crucial. In this paper we have proposed two novel JF Reorder attack detection techniques i.e. Cluster Based Intrusion Detection and Prevention Technique (CBIDPT) and Super Cluster Based Intrusion Detection and Prevention Technique (SCBIDPT) and also calculated the improvement done by these techniques on the performance of the network. These techniques improve the goodput of the network while introducing some delay.","PeriodicalId":166718,"journal":{"name":"2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131260713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of phylogenetic tree based on Kimura's Method","authors":"P. Bhambri, O. Gupta","doi":"10.1109/PDGC.2012.6449910","DOIUrl":"https://doi.org/10.1109/PDGC.2012.6449910","url":null,"abstract":"The research in bioinformatics has accumulated large amount of data. The biological data is available in different formats and is comparatively more complex. The term bioinformatics is related to study of bio-molecules information. The informatics techniques are applied to understand and organize the information associated with these molecules. Substitutional of an alignment is one of the applications of the bioinformatics. Multiple Sequence Alignment is used to align the biological sequences along a column. As the process generates distances of multiple alignments among the pairs of different species, phylogenetic tree is being formulated. Multiple sequence alignment arranges the sequences in such a way that evolutionarily equivalent positions across all sequences are matched. Alignment of Substitutions made into two categories: Jukes Cantor Method and Kimura's Method. The Tree is being formulated from different tree building methods so as to retrieve an optimal tree. These tree building methods are divided into two categories: UPGMA method and NJ method. Web based format such as FASTA is used to organize the sequences of data and using these sequences, distances are obtained and these distances are helpful to construct an optimal tree.","PeriodicalId":166718,"journal":{"name":"2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121790397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}