2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)最新文献

筛选
英文 中文
A Review of Biometric based Authentication for MANET 基于生物特征的MANET认证研究综述
Vandana, Navdeep Kaur
{"title":"A Review of Biometric based Authentication for MANET","authors":"Vandana, Navdeep Kaur","doi":"10.1109/PDGC.2018.8745982","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745982","url":null,"abstract":"Security and ease of access have become the most basic demand of any service provider community whether it is a social media, a communication network or a wireless network. Everyone living on this planet wants an easy access to the things that are available in this world but at the similar time, they also want it to be safe. Normally, security authentication measures cannot be termed as safe for several sorts of the transaction within the network. It's a world of biometrics, the questions that arise here is that how a biometric would be used when any network security transaction comes into action. There are several threats in Mobile Adhoc Network (MANET) such as Black-hole attack, Worm-hole attack, Sybil attack and so on. Saving every single node is not a responsibility of the network administrator until and unless the node is authentic, i.e. that particular node is really a part of the network. This paper covers a brief overview of the Unimodal and Multimodal biometrics on MANET, their characteristics; applications and the relation of both of them. Various attacks on the MANET network and its layer are also illustrated. The domain of biometric authentication is briefly given.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124807593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functional words removal techniques: A review 虚词去除技术综述
S. Gandotra, B. Arora
{"title":"Functional words removal techniques: A review","authors":"S. Gandotra, B. Arora","doi":"10.1109/PDGC.2018.8745904","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745904","url":null,"abstract":"With the growth of internet activities, electronic documents has become the key source of data and optimization of this data is very important for various research tasks such as Information Retrieval, Natural Language Processing, Web mining, Text mining etc. The data which is present in the web is a combination of both structured as well as unstructured data which mostly contains textual data. Hence, text processing is required for extracting useful information from that type of data which can then be used for further processes. Preprocessing plays a vital role in all text processing activities. Stop-word removal is one of the most important pre-processing techniques which eliminate the functional words from the document. Thus, helps in improving the performance of the system. In this paper, all the stop-word removal techniques used for Indian text are discussed along with the analysis of results produced by using those techniques for various Indian languages is also presented.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125834425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Lightweight Node Authentication Algorithms in Wireless Sensor Networks 无线传感器网络中轻量级节点认证算法研究进展
Vandana Mohindru, Yashwant Singh, Ravindara Bhatt
{"title":"A Review on Lightweight Node Authentication Algorithms in Wireless Sensor Networks","authors":"Vandana Mohindru, Yashwant Singh, Ravindara Bhatt","doi":"10.1109/PDGC.2018.8745800","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745800","url":null,"abstract":"Wireless sensor nodes are prone to several critical attacks due to the distributed placement of sensor nodes in unattended environments. Sensor nodes are the core part of the WSN therefore, securing these sensor nodes are the utmost important task. Without security, sensor nodes are easily compromised by the attacker and then the attacker get the access to the sensor networks, which result in the total degradation of the WSN. Therefore, an authentication mechanism is needed to check the genuineness of sensor node in the network, before communication actually takes place. The main challenge in WSN security is to design an authentication algorithm that is lightweight because sensor nodes have low energy and low memory. Many works have so far been discussed towards securing WSN in terms of lightweight node authentication algorithms. This paper, presented the various lightweight node authentication algorithms in WSN. Also, their performance is compared in terms of communication overhead, computational overhead, memory overhead & security level.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125242704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure Authentication Protocol for 5G Enabled IoT Network 5G物联网安全认证协议
Suraj Sharma, S. Satapathy, Shivani Singh, A. K. Sahu, M. Obaidat, Sanjay Saxena, Deepak Puthal
{"title":"Secure Authentication Protocol for 5G Enabled IoT Network","authors":"Suraj Sharma, S. Satapathy, Shivani Singh, A. K. Sahu, M. Obaidat, Sanjay Saxena, Deepak Puthal","doi":"10.1109/PDGC.2018.8745799","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745799","url":null,"abstract":"The rapid growth of Internet of Things(IoT) along with wide range of applications made IoT popular. Moreover, the network connectivity and communication support is provided by 5G technology. The mobile technology is also becoming the essential component of Social life, which is also becoming the essential interface for IoT. Various services of IoT may be availed from IoT server, which are enabled with 5G network technology. The IoT service access would require a intermediate access network to connect to 5G, and access network may be publicly accessible. Hence, there exists security threat to user's data. Here, In this paper, We provided an application layer security protocol to mitigate all those attacks originating from public access network. We have also tested the security protocol by an automated security testing tool, Scyther. The security protocol exhibits Secrecy, Aliveness, Non-Injective Agreement, and Non-Inective Synchronization. The protocol is resistant to various attacks, which could originate from Confidentiality, Integrity and Availability. The user-credentials and services-request are secretly communicated, thereby preserving the privacy.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125479944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Network flow Optimization through Monte Carlo Simulation 通过蒙特卡罗模拟优化网络流量
S. Hande, Prasoon Patidar, Sachin Meena, Saurabh Banerjee
{"title":"Network flow Optimization through Monte Carlo Simulation","authors":"S. Hande, Prasoon Patidar, Sachin Meena, Saurabh Banerjee","doi":"10.1109/PDGC.2018.8745965","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745965","url":null,"abstract":"We encounter network flows in day to day life. They are the backbone of logistics, city planning, processes etc. In order to study these networks, domain specific connectivity graphs along with their historical observations are used. Traditionally, birth & death process, Little's law, Burke's theorem, etc. have been applied to analyze various network flow scenarios. In this paper, we approach similar problems using Monte Carlo simulations, Markov Chain and Queuing Theory, which provide an edge over traditional methods in case of high dimensionality of multiple nodes. The methodologies described in paper can be applied to various situations of business formulations: Load/traffic balancing, Queue reduction, Network Anomaly detection, etc. This paper provides an effective tool for designing, diagnosing, monitoring & predictions of process of networks. Networks flow are the backbone of logistics, city planning, processes, etc.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127314954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brain Tumor Segmentation by Texture Feature Extraction with the Parallel Implementation of Fuzzy C-Means using CUDA on GPU 基于GPU的模糊c均值并行实现纹理特征提取脑肿瘤分割
Sanjay Saxena, Suraj Shama
{"title":"Brain Tumor Segmentation by Texture Feature Extraction with the Parallel Implementation of Fuzzy C-Means using CUDA on GPU","authors":"Sanjay Saxena, Suraj Shama","doi":"10.1109/PDGC.2018.8745726","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745726","url":null,"abstract":"Exact segmentation of the brain tumor is one of the imperative tasks in medical image processing and its analysis as it deals with extracting the information of the tumorous region from the brain MRI sequences. Automated segmentation and detection of brain tumors from the brain MRI is an exigent issue caused by the texture, size, shape, and location. In this paper, a significant method of brain tumor segmentation from the FLAIR MRI sequences is by classifying local window followed by parallel fuzzy c means clustering. Fuzzy c-means methods have shown their efficiency in extracting a variety of objects in several medical image processing applications. However, one of the major issues of these algorithms is high computational requirements at the time of dealing with large data set. Nowadays, NVIDIA's GPU plays an extremely essential role in implementing such time-consuming algorithms to reduce the time complexity. Our experiments based on NCI-MICCAI BRATS 2017 FLAIR MRI of HGG (High-Grade Glioma) demonstrate the efficiency of the implemented parallel algorithm. For the segmentation of tumorous region, a mechanism of sliding window is implemented on CPU (host) in which a 45 × 45 sized window is taken to classify whether that particular window is having tumor region or not. For perfect segmentation at the GPU (device) side, fuzzy c means technique is used to get the exact location of the tumor. Approx 17.6 speed up obtained, for the BRATS data sets over the implementation of the algorithm on CPU. Apart from speed up significant dice similarity coefficients are obtained which shows the efficient segmentation in the reasonable time.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134070007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Geo-spatial Clustering of Sentiments on Social Media 社交媒体上情感的地理空间聚类
Ayushi Verma, Deepanshi, Anjali Chauhan, Adwitiya Sinha
{"title":"Geo-spatial Clustering of Sentiments on Social Media","authors":"Ayushi Verma, Deepanshi, Anjali Chauhan, Adwitiya Sinha","doi":"10.1109/PDGC.2018.8745980","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745980","url":null,"abstract":"Social networking sites have tremendously captured online communication over the social web. With the growth in number of users on social networks, the social data has also grown exponentially. One of the predominantly used social networking sites includes Twitter. It is one of the most authenticate social platform that allows users to express their views on current trends and topics. Sentimental analysis of such dynamically changing user behavior upholds huge amount of contextual information. The behavioral data could be further evaluated to find the associated sentiments. Our research is focused on pre-processed analysis and classification of real-time tweets, based on the emotional content. Our novel approach applies density-based clustering with longitudinal locations from the tweets to reveal social communities for sentimental analysis.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116142998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Innovative Ghost Power Wastage Reduction System 一个创新的幽灵电力浪费减少系统
Animesh Srivastava, L. Kumar, Rittwik Sood, Aniket Srivastava, Shubham Sharma
{"title":"An Innovative Ghost Power Wastage Reduction System","authors":"Animesh Srivastava, L. Kumar, Rittwik Sood, Aniket Srivastava, Shubham Sharma","doi":"10.1109/PDGC.2018.8745974","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745974","url":null,"abstract":"The research paper presents an innovative system for the reduction of energy wastage due to ghost or vampire power with the help of Visible Light Communication, Very large scale integration (VLSI) devices and the Internet of Things (IoT) technology. The system assembles daily energy usage data using an Intelligent Energy Meter system on a cloud server. The data of electricity consumption requirement of various devices is processed on the server. An intelligent energy switch is designed which lets the power supply of an appliance connected to it to turn off and thus avoids the excess electric leakage loss. The switch is operated using visual light communication technique, it also utilizes the use of a relay and Very large scale integration (VLSI) techniques for fast turn off action. The total power consumption is also measured by the intelligent energy meter.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123281940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Data locality in Hadoop MapReduce Hadoop MapReduce数据局部性研究综述
Anil Sharma, Gurwinder Singh
{"title":"A Review on Data locality in Hadoop MapReduce","authors":"Anil Sharma, Gurwinder Singh","doi":"10.1109/PDGC.2018.8745928","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745928","url":null,"abstract":"MapReduce has emerged as a strong model for processing parallel and distributed data for huge datasets. Hadoop an open source implementation of MapReduce has approved MapReduce widely. Hadoop fragments the input file into number of data blocks to allocate them to various DataNodes in cluster. Hadoop must provide effective scheduling to process these data blocks in efficient way. One of the issues that play vital role in efficient processing of MapReduce is Data Locality which is caused due to overhead of network. Data locality is equipped for moving the computation adjacent to the data where it dwells. It is a key resource in distributed environment which influences the tasks accomplishing time. The issues which troubles data locality are cluster and network load, resource sharing, cluster environment, size of data blocks, number of mappers and reducers. This paper aims to review various algorithms that are aware of data locality in scheduling, along with their strengths and weaknesses.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128674423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Extraction of Features from Breast Cancer Mammogram Image Using Some Image Processing Techniques 基于图像处理技术的乳腺癌乳房x光图像特征提取
Dakshya Prasad Pati, S. Panda
{"title":"Extraction of Features from Breast Cancer Mammogram Image Using Some Image Processing Techniques","authors":"Dakshya Prasad Pati, S. Panda","doi":"10.1109/PDGC.2018.8745891","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745891","url":null,"abstract":"Breast cancer is a major root cause of death in most cancer affected women and every year millions of women are dying around the globe because of this deadly disease. Now-a-days various image processing techniques are used to extract the features from mammogram image. Mammograms are X-ray images of the breast which are used to visualize the early sign of breast cancer. Oncologists are using various images processing technique for effective decisions making, by comparing the mammographic images. Microcalcifications are small calcium deposits that look like white specks on mammogram. These are usually not a result of cancer but if they appear in certain pattern and cluster together, can lead to early stage of cancer. Different image processing technique can be used for detecting these microcalcification. The aim of the paper is to detect the cancerous cells by the use of different existing image filter with their comparisons of output performance and the advantages of this method is future predictions of breast cancer. If the cancer cells are detected at early stage, many precious lives can be saved.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124721358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信