2006 International Conference on Advanced Computing and Communications最新文献

筛选
英文 中文
Detection of Reticulation Events - a Character Based Method 网状事件的检测——一种基于特征的方法
2006 International Conference on Advanced Computing and Communications Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289907
K. Navada, K. Sekaran
{"title":"Detection of Reticulation Events - a Character Based Method","authors":"K. Navada, K. Sekaran","doi":"10.1109/ADCOM.2006.4289907","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289907","url":null,"abstract":"It is observed that during the evolution of species, reticulation is an important event and is very prevalent in several organisms. However, the analytical tools for the representation of these events are still under development. This is primarily because of the difficulty involved in detecting these reticulation events that have taken place during the evolution using the sequences that are currently available in some form. Since it is not possible to get each sequence starting from the root (beginning of the evolution process), inferring the history has to be based on a few assumptions, which are biologically valid. In this paper, we propose an algorithm which, we feel, is a step in this direction. The algorithm detects the sequences which require reticulation events for their formation and returns the count of such sequences.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125547375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Hybrid Group Rekey Architecture for Multicast Communication 一种用于多播通信的混合组密钥体系结构
2006 International Conference on Advanced Computing and Communications Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289881
B. Varthini, S. Valli
{"title":"A Hybrid Group Rekey Architecture for Multicast Communication","authors":"B. Varthini, S. Valli","doi":"10.1109/ADCOM.2006.4289881","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289881","url":null,"abstract":"In Multicast communication, the group rekeying protocols follow either centralized or decentralized architecture. The centralized architecture suffers from the 1 affects n phenomenon while the decentralized architecture suffers from the translation latency. This proposed work HGRA (hybrid group rekey architecture) introduces a novel rekeying architecture which provides a good tradeoff between 1 affects n phenomenon and translation latency. This hybrid architecture controls the number of subgroups in the group by calculating the rekeying costs during join/leave event. This work allows the subgroups to merge or a subgroup to divide into two subgroups by comparing the cost of translation latency due to splitting and the cost of 1 affects n phenomenon due to merging.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129665045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Active Probing Based End To End Internet Path Metrics Estimation Tool 基于主动探测的端到端互联网路径度量估计工具
2006 International Conference on Advanced Computing and Communications Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289924
V. Suryanarayana, K. Sekaran
{"title":"Active Probing Based End To End Internet Path Metrics Estimation Tool","authors":"V. Suryanarayana, K. Sekaran","doi":"10.1109/ADCOM.2006.4289924","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289924","url":null,"abstract":"This paper considers the problem of measuring the various network path metrics such as connectivity, capacity, bandwidth, available bandwidth etc. of a network path using probing-based methods. To that end, we propose a new model called an integrated metrics measurement model (IMMM) to measure all possible performance metrics. It will be designed to probe the network non-intrusively so that the measurements will not disturb the stability of the network. The experimental results of our partial implementation of the proposed model are presented.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121652490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Capacity Lossless Secure Image Steganography using Wavelets 基于小波的高容量无损安全图像隐写
2006 International Conference on Advanced Computing and Communications Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289889
K. Raja, Vikas, K. Venugopal, L. Patnaik
{"title":"High Capacity Lossless Secure Image Steganography using Wavelets","authors":"K. Raja, Vikas, K. Venugopal, L. Patnaik","doi":"10.1109/ADCOM.2006.4289889","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289889","url":null,"abstract":"The modern steganography presents a challenging task of embedding data that should be imperceptible to the human visual system (HVS) and also escape the detection of powerful machine vision of computers. In this paper we present a high capacity, lossless, secure wavelet steganographic algorithm in which payload bitstream is encrypted and embedded into the wavelet coefficients of the cover image to derive a stego-image. The payload is embedded in the approximation band of the wavelet domain that increases its robustness. It is observed through simulations that mean square error (MSE), mean absolute error (MAE), bit error rate (BER) and histogram analysis that the pay load is retrieved without any errors and its performance is better than the earlier insignificant coefficient replacement (ICR) technique.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121666003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
A Multi-Agent system for Distributed Dynamic Load Balancing on Cluster 基于多agent的集群分布式动态负载均衡系统
2006 International Conference on Advanced Computing and Communications Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289870
N. Nehra, R. B. Patel, V. K. Bhat
{"title":"A Multi-Agent system for Distributed Dynamic Load Balancing on Cluster","authors":"N. Nehra, R. B. Patel, V. K. Bhat","doi":"10.1109/ADCOM.2006.4289870","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289870","url":null,"abstract":"Dynamic load balancing (DLB) is an important system function destined to distribute workload among participating nodes to improve throughput and/or execution times of parallel computers. Instead of balancing the load in cluster by process migration, or by moving an entire process to a less loaded computer, we make an attempt to balance load by splitting processes into separate jobs and then balance them among nodes. In order to get target, we use mobile agent (MA) to distribute load among nodes in a cluster. In this paper, distributed dynamic load balancing using MA (DDLBMA) technique is presented. We introduce types of agents needed to meet the requirements of the proposed load balancing. Different metrics are used to compare load balancing mechanism with the existing technology. The experiment is carried out on cluster of PC's divided into multiple local area network (LAN) using mobile agent system PMADE (Platform for Mobile agent distribution and execution). Preliminary experimental results demonstrated that the proposed technique is effective.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121301430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Selective Microarchitecture-Level Scaling for Energy Savings 选择性微体系结构级别的节能扩展
2006 International Conference on Advanced Computing and Communications Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289960
M. Black, M. Franklin
{"title":"Selective Microarchitecture-Level Scaling for Energy Savings","authors":"M. Black, M. Franklin","doi":"10.1109/ADCOM.2006.4289960","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289960","url":null,"abstract":"Scaling the clock frequency and supply voltage during every cache miss has been shown to substantially reduce the energy dissipation of the processor, while incurring a modest performance penalty. However, not all cache misses have the same effect on performance. Modern superscalar processors may idle during some cache misses, but continue to execute other instructions during other cache misses. Slowing the CPU on these latter cache misses saves little energy, while adversely affecting the overall performance. In this paper we present a small, accurate table-based approach to speculatively identify those cache misses that do and do not benefit from scaling. By judiciously slowing down only those memory instructions for which the processor has a large idle time, we are able to capture most of the energy savings while avoiding much of the performance penalty. Our approach achieves an energy savings of 16% on average through frequency scaling, with a performance penalty of only 6%.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125517041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Local Cosine transform for Seismic Image Compression 自适应局部余弦变换用于地震图像压缩
2006 International Conference on Advanced Computing and Communications Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289894
A. P., Sumam David
{"title":"Adaptive Local Cosine transform for Seismic Image Compression","authors":"A. P., Sumam David","doi":"10.1109/ADCOM.2006.4289894","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289894","url":null,"abstract":"A typical seismic analysis involves collection of data by an array of seismometers, transmission over a narrow-band channel, and storage of data for analysis. Transmission and archiving of large volumes of data involves great cost. Hence there is a need to devise suitable methods for compressing the seismic data without compromising on the quality of the reconstructed signal. This paper presents our work on the seismic data compression based on adaptive local cosine transform and its associated multi-resolution and best-basis methodology and compares the results with wavelet based implementation.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121542896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and Implementation of a Process Scheduler Simulator and an Improved Process Scheduling Algorithm for Multimedia Operating Systems 多媒体操作系统进程调度模拟器的设计与实现及改进的进程调度算法
2006 International Conference on Advanced Computing and Communications Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289946
P. Saraswat, P. Gupta
{"title":"Design and Implementation of a Process Scheduler Simulator and an Improved Process Scheduling Algorithm for Multimedia Operating Systems","authors":"P. Saraswat, P. Gupta","doi":"10.1109/ADCOM.2006.4289946","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289946","url":null,"abstract":"The design and evaluation results of a multimedia operating system scheduler simulator are described. The simulator focuses on evaluating the suitability of various Process scheduling algorithms for a Multimedia Operating System. The simulator has been designed such that various generic scheduling algorithms can be plugged into the existing code easily with a little knowledge about the various structures involved in the design. Five standard scheduling algorithms viz. Round Robin, First Come First Serve (FCFS), Multi Level Feedback (MLFS), Shortest Job First (SJF), and Earliest Deadline First (EDF) have been implemented with the simulator. A new process-scheduling algorithm is designed and implemented to improve the performance of an MMOS in case of mixed task traffic i.e. Multimedia and Non Multimedia (Batch Tasks). The simulated evaluation is done by taking 20 different mixed task traffic samples and running all aforementioned algorithms on them, and calculating various performance metrics. The proposed algorithm fares better on most of the evaluated performance metrics in comparison with aforementioned standard algorithms.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127501315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Neuro-genetic ensemble Short Term Forecasting Framework for Anomaly Intrusion Prediction 异常入侵预测的神经遗传集成短期预测框架
2006 International Conference on Advanced Computing and Communications Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289880
S. Sindhu, S. Geetha, S.S. Sivanath, A. Kannan
{"title":"A Neuro-genetic ensemble Short Term Forecasting Framework for Anomaly Intrusion Prediction","authors":"S. Sindhu, S. Geetha, S.S. Sivanath, A. Kannan","doi":"10.1109/ADCOM.2006.4289880","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289880","url":null,"abstract":"Information systems are one of the most rapidly changing and vulnerable systems, where security is a major issue. The number of security-breaking attempts originated inside the organizations is increasing steadily. Attacks made in this way, usually done by \"authorized\" users of the system, cannot be immediately traced. As the idea of filtering the traffic at the entrance door, by using firewalls and the like, is not completely successful, the use of intrusion detection systems should be considered to increase the defense capacity of an information system. This paper presents a framework for a statistical anomaly prediction system using a neuro-genetic forecasting model, which predicts unauthorized invasions of user, based on previous observations and takes further action before intrusion occurs. We propose an evolutionary time-series model for adaptive network intrusion forecasting where the ANN (Artificial Neural Network) is trained using genetic algorithm. The learning of the ANN is formulated as a weight optimization problem. The experimental results show that the combination strategy (neuro-genetic) can quicken the learning speed of the network and improve the predicting precision compared to the traditional ANN (Back Propagation Network). A comparative evaluation of the proposed neuro-genetic model with the traditional back-propagation, on audit data set provided by MIT Lincoln labs, has been presented and a better prediction accuracy has been observed.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131984356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Web Document Clustering Using Document Index Graph 使用文档索引图的Web文档聚类
2006 International Conference on Advanced Computing and Communications Pub Date : 2006-12-01 DOI: 10.1109/ADCOM.2006.4289851
B. Momin, P. Kulkarni, A. Chaudhari
{"title":"Web Document Clustering Using Document Index Graph","authors":"B. Momin, P. Kulkarni, A. Chaudhari","doi":"10.1109/ADCOM.2006.4289851","DOIUrl":"https://doi.org/10.1109/ADCOM.2006.4289851","url":null,"abstract":"Document Clustering is an important tool for many Information Retrieval (IR) tasks. The huge increase in amount of information present on Web poses new challenges in clustering regarding to underlying data model and nature of clustering algorithm. Document clustering techniques mostly rely on single term analysis of document data set. To achieve more accurate document clustering, more informative feature such as phrases are important in this scenario. Hence first part of the paper presents phrase-based model, Document Index Graph (DIG), which allows incremental phrase-based encoding of documents and efficient phrase matching. It emphasizes on effectiveness of phrase-based similarity measure over traditional single term based similarities. In the second part, a Document Index Graph based Clustering (DIGBC) algorithm is proposed to enhance the DIG model for incremental and soft clustering. This algorithm incrementally clusters documents based on proposed cluster-document similarity measure. It allows assignment of a document to more than one cluster. The DIGBC algorithm is more efficient as compared to existing clustering algorithms such as single pass, K-NN and Hierarchical Agglomerative Clustering (HAC) algorithm.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134498926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信