2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)最新文献

筛选
英文 中文
Efficient Approaches to Mitigate the Effect of Sybil Attack in MANET for High Network Lifetime: A review 针对高网络生存期的自组网中缓解Sybil攻击影响的有效方法综述
Reetu Kumari, M. Dutta
{"title":"Efficient Approaches to Mitigate the Effect of Sybil Attack in MANET for High Network Lifetime: A review","authors":"Reetu Kumari, M. Dutta","doi":"10.1109/PDGC.2018.8745749","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745749","url":null,"abstract":"MANET is known as a self configuring, dynamic infrastructure to connect mobile devices through wireless. There are several challenges which affect the MANET, such as routing, security and reliability, power consumption, inter-networking, multicast and so on. M Being in such environment, some malicious behaviour can affect the security of networking. This mystifying situation usually occurs in MANET because of the intrinsic design defects. Malicious nodes which are generated using Sybil attack intentionally drop all packets which are having destinations to the target locations by making the duplicate copy of the original nodes. Malicious nodes disturb the linking of the network. Selfish type of nodes aims to reserve their resources, and degrades the network performance. Our paper targets to explore various detection and mitigation approach of Sybil attack. This paper classifies and exhibits every mechanism as per certain perspectives.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132635999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review and Analysis of Mobile Health Applications for Alzheimer Patients and Caregivers 阿尔茨海默病患者和护理人员的移动健康应用回顾与分析
Gaurav Gupta, Ankit Gupta, V. Jaiswal, Mohd Dilshad Ansari
{"title":"A Review and Analysis of Mobile Health Applications for Alzheimer Patients and Caregivers","authors":"Gaurav Gupta, Ankit Gupta, V. Jaiswal, Mohd Dilshad Ansari","doi":"10.1109/PDGC.2018.8745995","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745995","url":null,"abstract":"Alzheimer, a common form of dementia causes deterioration of cognitive abilities of an individual which results in difficulty in carrying out their routine activities. Research suggests that there is no cure for this deadly disease. However, the progression of the disease can be slowed down by improving the patient's quality of life, providing a solution for enhancing the cognitive abilities of the patient. One of the possible solution is to motivate the use of Smartphone by the patient. Smartphones play a crucial role for the family members of the Alzheimer patients as it helps the patients in carrying out their routine activities by providing time to time notifications about them. Furthermore, the smartphone also helps in assisting the caregiver to take proper care of the patient, such as retrieving the GPS locations of the patient, using Geotagging. Photographs can be used as a source of the medium in helping patients remember their family members. They are susceptible to music; therefore, the patient brain can be stimulated by playing their beloved tones. Smartphones tend to be a one-stop shop for providing all these facilities to the patients. This motivates the need to build relatively simple cross-platform mobile applications with interactive GUIs so as to enhance their cognitive abilities.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132788033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The Implementation of Image Enhancement Techniques on Color n Gray Scale IMAGEs 彩色灰度图像图像增强技术的实现
Rati Goel, Anmol Jain
{"title":"The Implementation of Image Enhancement Techniques on Color n Gray Scale IMAGEs","authors":"Rati Goel, Anmol Jain","doi":"10.1109/PDGC.2018.8745782","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745782","url":null,"abstract":"In image(IMG) research one of the most imperative techniques is image enhancement in the area of image processing. By using image enhancement we can enhance the feature(quality) and graphic appearance of an image or to deliver a better renovate picture for upcoming computerized image processing. A lot of many images like medical images, satellite, aerial images and also real-life photographs that have poor contrast and noise. To overcome all these defects and to improve image eminence for better visibility image enhance technique is used. The improve image gave us a clear image to the eye. And also image enhance techniques are application reliant. In image enhance techniques, one of the most important stages is medical images revealing and analysis. It enhance the features of images for human seeing, eliminating blurriness and noise, growing contrast, and revealing details. All operations above are example of enhance techniques. All techniques of enhance are differs from one field to another, these all are depending on its objective. Nowadays applications require various kinds of images as sources of information for interpretation and inspection. Different techniques (histogram equalization, contrast enhanced) are applied to different images as one technique does not work for all the uses applications. Many techniques of image enhancement are applied through this paper. Using Matlab, we apply, test and verify the proposed solution of the image enhancement techniques.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133237855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Designing a Green Data Processing Device using Different Input/Output Standards on FPGA 基于FPGA不同输入输出标准的绿色数据处理器件设计
Diya Garg, K. Sharma, Anshu Singla
{"title":"Designing a Green Data Processing Device using Different Input/Output Standards on FPGA","authors":"Diya Garg, K. Sharma, Anshu Singla","doi":"10.1109/PDGC.2018.8745716","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745716","url":null,"abstract":"An effective way to save power is utilization of suitable Input/output (IO) standard with Data Processing Devices (DPDs) implemented on Field Programmable Gate Arrays (FPGAs) at data centers. In this work, a power efficient Floating Point Unit (FPU) as a DPD has been designed in 65nm process technology using Virtex 5 FPGA and its impact on the power consumption of FPU with different IO standards is presented. The performance was analyzed at 1.9 GHz frequency which is operating frequency of AMD X2150 using Verilog as hardware descriptive language (HDL) in Xilinx 14.1 ISE platform. Among all the reported IO standards used with FPU at 1.9 GHz, the results obtained with Low-Voltage Digitally Controlled Impedance_15 (LVDCI_15) shows power consumption of 2.169W only. Using LVDCI_15 instead of Stub-Series Terminated Logic_I (SSTL_I), saves 39.44% of total power at operating frequency of 1.9 GHz. LVDCI15 is best suitable with Virtex 5 FPGA at 1.9 GHz for implementation of DPDs.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115234059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internet of Things — based Smart Classroom Environment 基于物联网的智能课堂环境
Vishnu Priya Reddy Enugala, S. Vuppala
{"title":"Internet of Things — based Smart Classroom Environment","authors":"Vishnu Priya Reddy Enugala, S. Vuppala","doi":"10.1109/PDGC.2018.8745883","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745883","url":null,"abstract":"In modern world, interlinking technologies are playing major role in smart world with smart devices and has impact on computer science. In this Internet of Things (IoT) is defined as the uniquely identifiable objects and their virtual representation is internet like structure, that is gaining ground in the Computer Science field. IoT is making our lives easier with the advent of smart thermostats, medical wearable devices, connected vending machines and others. In IoT important research area is Resource Management Systems (RMS). The valuable proportion is to treat physical chairs as “smart” devices, which can report their occupancy, user information, and duration of presence of the student to the cloud and mobile application. The smart chairs is made of interconnected smart devices consisting of reflection sensors, RFID readers, wireless communication capabilities, and useful mobile application serve as a powerful tool for instructors and other stakeholders. In this research paper we implement a complete smart classroom system consisting of smart chairs, cloud storage with smart attendance recording system of the students.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114683924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Secure Framework for Patient Data Transmission on Mobile-Cloud Platform 移动云平台上患者数据传输的安全框架
Ifrah Afzal, S. A. Parah
{"title":"Secure Framework for Patient Data Transmission on Mobile-Cloud Platform","authors":"Ifrah Afzal, S. A. Parah","doi":"10.1109/PDGC.2018.8745929","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745929","url":null,"abstract":"In this paper we have addressed the authentication as well as payload problem of medical image that is sent to the Cloud by resource constrained devices (like mobile phones) for selective encryption. Firstly, the given medical image is segmented into two distinct regions based on diagnostic importance i.e., non region of importance (NRoI) and region of importance (RoI) using Otsu thresholding technique. RoI obtained is then divided into four blocks and among those four blocks any two blocks are randomly embedded into two separate cover-images. In order to ensure authenticity of image carrying selective-data to be encrypted, fragile watermark is inserted in same cover-image. On reducing the selective-data payload will decrease which will effectively decrease time taken by Cloud for encryption (as Cloud has to encrypt RoI block only rather than encrypting the whole stego-image) which is a must criterion for real time applications. The Cloud looks out for embedded watermark once it receives stego-image from client to ensure authenticity of the stego-image. Embedded data in stego-image is extracted by Cloud and performs the encryption of RoI block only. Selectively encrypted image is sent back to client. Client then extracts encrypted RoI blocks from encrypted stego-images and combines the four RoI blocks (two encrypted and two unencrypted) to obtain the encrypted RoI. Finally encrypted RoI and NRoI are combined to obtain full medical image. The final medical image is then forwarded to medical centers, experts etc. for analysis plus diagnosis purposes. The proposed framework reduces payload which in turn reduces the size of image which needs encryption, thus saving Cloud resources. Authenticity of stego-image that is sent to Cloud is also ensured.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114958678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Connectivity Using Differential Priority Assignments in Military Network 在军事网络中使用差分优先级分配改进连通性
Sunita Katre, A. Goswami, Prashant Mishra, Jyotsna L. Bapat, D. Das
{"title":"Improved Connectivity Using Differential Priority Assignments in Military Network","authors":"Sunita Katre, A. Goswami, Prashant Mishra, Jyotsna L. Bapat, D. Das","doi":"10.1109/PDGC.2018.8745890","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745890","url":null,"abstract":"Considerable amount of work has been done on provisioning quality of service (QoS) over Internet protocol (IP) based networks, while challenges exist in implementing QoS over military IP networks. There is a need to provide improved connectivity for high priority voice calls even when the network is degraded. TDM based networks inherently permitted implementation of assured call completion using priority and preemption stacks, which is not natively supported in IP networks. The paper proposes that providing Differentiated priority to limited number of endpoints (nodes) may help to achieve improved call completion rate. This can be dynamically applied to users who are operating in relatively high active zones or hot war engagements. Most of earlier approaches use static configurations and require network wide reconfiguration and unacceptable downtime to implement changes. Under hot war scenarios, network resources are at a premium and network wide reconfiguration may not be possible. Differential Priority algorithm proposed in this paper can be implemented with minimum impact on network infrastructure to enhance the call completion rate and overall reliability of network. Findings in this paper are based on multiple simulation scenarios of voice calls carried over a typical military network topology.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123675275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cognitive Radio With Internet-of-Things: A New Revolution 认知无线电与物联网:新的革命
Palak Thakur, P. Thakur, Payal Patial
{"title":"Cognitive Radio With Internet-of-Things: A New Revolution","authors":"Palak Thakur, P. Thakur, Payal Patial","doi":"10.1109/PDGC.2018.8745918","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745918","url":null,"abstract":"In the area of Internet-of-Things, devices are supposed to collect or exchange the data by using limited number of resources in which spectrum utilization is one of the most essential factor. This paper presents the overview, applications, characteristics of Internet-of-Things & Cognitive radio as well as the combination of both for better spectrum utilization. In today's scenario, IoT is becoming the hot topic in communication world because everyday devices are being combined with internet connectivity. Numbers of devices are connecting in this network so a lot of spectrum is needed. Since the spectrum is finite resource therefore we introduced the idea of Cognitive radio networks (CRNs) in Internet-of-Things for providing the better and efficient way of utilizing spectrum in communication world.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"465 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125827861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey on Stock Market Prediction 关于股票市场预测的调查
Mohit Iyer, Ritika Mehra
{"title":"A Survey on Stock Market Prediction","authors":"Mohit Iyer, Ritika Mehra","doi":"10.1109/PDGC.2018.8745715","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745715","url":null,"abstract":"It is complicated to estimate the stock market where relations between input and output are random in nature. Predicting the cost of the share market is the most complex job of the financial time series. Forecasting of the stock should be possible by utilizing the present and past information available on the market. The execution measurements that should be achieved if there should be an occurrence of the stock forecast are exactness, adaptability and less time utilization. There are numerous sorts of research done as such far with the end goal to predict the stock market to complete the characterized measurements. Several techniques have been accessible in data mining for forecasting the stock market, for example, Fuzzy systems, Artificial Neural Network (ANN), if-then-else rules, Bayesian algorithm et cetera. In this paper, the different strategies are available and used for forecasting the stock markets are talked about. This review knows which method is the finest to use for predicting the stock market. The most important application of market share is to predict market trends. Likewise, the market shows the performance of the future, which constantly encourages financial experts to understand when and what shares can be purchased to improve their risk. For this reason, a large number of research has been prepared so far to analyze the stock market by means of mining of the data.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124682301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Interactive Thyroid Disease Prediction System Using Machine Learning Technique 基于机器学习技术的交互式甲状腺疾病预测系统
A. Tyagi, Ritika Mehra, Aditya Saxena
{"title":"Interactive Thyroid Disease Prediction System Using Machine Learning Technique","authors":"A. Tyagi, Ritika Mehra, Aditya Saxena","doi":"10.1109/PDGC.2018.8745910","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745910","url":null,"abstract":"Thyroid disease is a major cause of formation in medical diagnosis and in theprediction, onset to which it is a difficult axiomin the medical research. Thyroid gland is one of the most important organs in our body. The secretions of thyroid hormones are culpable in controlling the metabolism. Hyperthyroidism and hypothyroidism are one of the two common diseases of the thyroid that releases thyroid hormones in regulating the rate of body's metabolism. Data cleansing techniques were applied to make the data primitive enough for performing analytics to show the risk of patients obtaining thyroid. The machine learning plays a decisive role in the process of disease prediction and this paper handles the analysis andclassificationmodels that are being used in the thyroid disease based on the information gathered from the dataset taken from UCI machine learning repository. It is important to ensure a decent knowledge base that can be entrenched and used as a hybrid model in solving complex learning task, such as in medical diagnosis and prognostic tasks. In this paper, we also proposed different machine learning techniques and diagnosis for the prevention of thyroid. Machine Learning Algorithms, support vector machine (SVM), K-NN, Decision Trees were used to predict the estimated risk on a patient's chance of obtaining thyroid disease.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124862601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信