Pinak Panigrahi, Sriram Kanchiraju, A. Srinivasan, P. K. Baruah, C. D. Sudheer
{"title":"Optimizing MPI collectives on intel MIC through effective use of cache","authors":"Pinak Panigrahi, Sriram Kanchiraju, A. Srinivasan, P. K. Baruah, C. D. Sudheer","doi":"10.1109/PDGC.2014.7030721","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030721","url":null,"abstract":"The Intel MIC architecture, implemented in the Xeon Phi coprocessor, is targeted at highly parallel applications. In order to exploit it, one needs to make full use of simultaneous multi-threading, which permits four simultaneous threads per core. Our results also show that distributed tag directories can be a greater bottleneck than the ring for small messages when multiple threads access the same cache line. Careful design of algorithms and implementations based on these results can yield substantial performance improvement. We demonstrate these ideas by optimizing MPI collective calls. We obtain a speedup of 9x on barrier and a speed-up of 10x on broadcast, when compared with Intel's MPI implementation. We also show the usefulness of our collectives in two realistic codes: particle transport and the load balancing phase in QMC. Another important contribution of our work lies in showing that optimization techniques - such as double buffering - used with programmer controlled caches are also useful on MIC. These results can help optimize other communication intensive codes running on MIC.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121186640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of various symmetric encryption algorithms","authors":"Shaify Kansal, Meenakshi Mittal","doi":"10.1109/PDGC.2014.7030724","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030724","url":null,"abstract":"With rise in the use of internet in various fields like banking, military and government sector, the security and privacy of the data has been the main concern. Today, most of the data handling and electronic transactions are done on the internet. When the information is transferred from the sender to the receiver over the internet, it may be eavesdropped by an intruder and thus is a continuous threat to the secrecy or confidentiality of the data. The popular technique that protects the confidentiality of the data is cryptography which converts the plain text into unreadable form and then receiver applies reverse mechanism to decrypt the unreadable form of data to readable form. This mechanism is called as encryption-decryption process. Thus to secure the data over the internet, it is important to find out which algorithm performs better than the other algorithms. In this paper, the different symmetric encryption algorithms like DES, 3DES, AES have been analyzed with respect to different parameters and data types (like text files, image) on i7 processor.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126574855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed pattern matching and document analysis in big data using Hadoop MapReduce model","authors":"A. Ramya, E. Sivasankar","doi":"10.1109/PDGC.2014.7030762","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030762","url":null,"abstract":"Sequential pattern mining and Document analysis is an important data mining problem in Big Data with broad applications. This paper investigates a specific framework for managing distributed processing in dataset pattern match and document analysis context. MapReduce programming model on a Hadoop cluster is highly scalable and works with commodity machines with integrated mechanisms for fault tolerance. In this paper, we propose a Knuth Morris Pratt based sequential pattern matching in distributed environment with the help of Hadoop Distributed File System as efficient mining of sequential patterns. It also investigates the feasibility of partitioning and clustering of text document datasets for document comparisons. It simplifies the search space and acquires a higher mining efficiency. Data mining tasks has been decomposed to many Map tasks and distributed to many Task trackers. The map tasks find the intermediate results and send to reduce task which consolidates the final result. Both theoretical analysis and experimental result with data as well as cluster of varying size shows the effectiveness of MapReduce model primarily based on time requirements.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126847796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hostile intent identification by movement pattern analysis: Using artificial neural networks","authors":"Souham Biswas, M. Nene","doi":"10.13140/2.1.4429.7281","DOIUrl":"https://doi.org/10.13140/2.1.4429.7281","url":null,"abstract":"In the recent years, the problem of identifying suspicious behavior has gained importance and identifying this behavior using computational systems and autonomous algorithms is highly desirable in a tactical scenario. So far, the solutions have been primarily manual which elicit human observation of entities to discern the hostility of the situation. To cater to this problem statement, a number of fully automated and partially automated solutions exist. But, these solutions lack the capability of learning from experiences and work in conjunction with human supervision which is extremely prone to error. In this paper, a generalized methodology to predict the hostility of a given object based on its movement patterns is proposed which has the ability to learn and is based upon the mechanism of humans of “learning from experiences”. The methodology so proposed has been implemented in a computer simulation. The results show that the posited methodology has the potential to be applied in real world tactical scenarios.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127507393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed computing approach to optimize road traffic simulation","authors":"A. Sinha, Tapas Saini, S. Srikanth","doi":"10.1109/PDGC.2014.7030771","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030771","url":null,"abstract":"Distributed computing is the method of running CPU intensive computations on multiple computers collectively in order to achieve a common objective. Common problems that can be solved on the distributed systems include climate/weather modeling, earthquake simulation, evolutionary computing problems and so on. These type of problems may involve billions or even trillions of computations. A single computer is not capable to finish these computations in short span of time, which is typically in days. Distributed computation helps to solve these problems in hours, which could take weeks to solve on a single computer. Distributed computing generally uses the existing resources of the organization. Traffic simulation is the process of simulating transportation systems through software on a virtual road network. Traffic simulation helps in analyzing city traffic at different time intervals of a single day. Common use cases could be analyzing city wide traffic, estimating traffic demand at a particular traffic junction and so on. This paper discusses about the approach to use distributed computing paradigm for optimizing the traffic simulations. Optimizing simulations involves running a number of traffic simulations followed by estimating the nearness of that simulation to the real available traffic data. This real data could be obtained by either manual counting at traffic junctions, or using the probes such as loop inductors, CCTV cameras etc. This distributed computing based approach works to find the best traffic simulation corresponding to the real data in hand, using evolutionary computing technique.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130350954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of cloud based load balancing techniques","authors":"Aayush Agarwal, G. Manisha, R. Milind, S. Shylaja","doi":"10.1109/PDGC.2014.7030714","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030714","url":null,"abstract":"Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. In cloud computing, load balancing is one of the key issues. Load balancing is the process of apportioning the load among various nodes of a distributed system to improve both resource utilization and job response time while avoiding a situation where some of the nodes are heavily loaded while others are idle. This paper outlines an experimentation based comparative analysis of the load balancing algorithms for different scenario use cases.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130368058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges and issues in underwater acoustics sensor networks: A review","authors":"Himanshu Jindal, S. Saxena, Singara Singh","doi":"10.1109/PDGC.2014.7030751","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030751","url":null,"abstract":"The Underwater Acoustic Sensor Networks (UWASN) consists of sensors that are deployed underwater for gathering information for the unexplored parts of oceans or rivers. UWASN consists of variable number of floating and anchored sensors, sink and vehicles that are deployed over an area to be explored. The characteristics of UWASN are mainly node mobility for floating, capacity for data collection and recording and autonomous vehicles which are battery operable. The communication is possible among underwater devices through optical waves, radio waves, electromagnetic and acoustics. Out of these, acoustics communication is best suited as it can carry digital information through underwater channel and can travel to longer distances. The communication can be classified in two parts: Single and multi hoping. But in underwater we use multi-hop communication for sending data from end nodes to sink nodes. The various challenges to UWASN are limited bandwidth, multipath fading, limited battery, limited data capacity and delay in propagation. Hence, in this paper we have focussed on various issues and challenges in underwater wireless sensor networks for acoustic communications.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131192449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Manna, Vedic Choubey, S. Chattopadhyay, I. Sengupta
{"title":"Thermal variance-aware application mapping for mesh based network-on-chip design using Kernighan-Lin partitioning","authors":"K. Manna, Vedic Choubey, S. Chattopadhyay, I. Sengupta","doi":"10.1109/PDGC.2014.7030755","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030755","url":null,"abstract":"This paper presents a Kernighan-Lin bi-partitioning based approach to perform mapping the core graph of an application onto a mesh-based Network-on-Chip (NoC) architecture. It aims at optimizing both communication cost and thermal variance of the resulting solution. Experimental results show that the approach could obtain significant reduction in mean temperature of the die and its standard deviation, compared to many of the recently reported application mapping strategies such as NMAP [1], LMAP [2] and DPSO [3]. All these reported approaches attempt to obtained a communication aware mapping, without any concern about temperature profile of the die. Our proposed approach outperforms all these reported approaches except DPSO, in-terms of communication cost, whereas, in-terms of temperature profile, it outperforms all these approaches. Tradeoff between the communication cost and temperature profile could also be achieved.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133396188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cluster head selection technique for optimization of energy conservation in MANET","authors":"K. Govil, S. Gupta, A. Agarwal","doi":"10.1109/PDGC.2014.7030712","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030712","url":null,"abstract":"A Mobile Ad hoc Network (MANET) is a wireless network where mobile nodes are connected to each other through infrastructure-less connections. Cluster head is a node within the cluster which acts as a leader node. It maintains the information having list of nodes, path of each and every nodes related to its corresponding cluster. Proposed algorithm forms cluster head which is for energy conservation by considering battery power and neighbor mobile node connectivity level.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123985530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Sharma, H. Saini, Geetanjali Rathee, T. C. Panda
{"title":"Proposed optimized algorithm for coverage area with capacity calculation","authors":"L. Sharma, H. Saini, Geetanjali Rathee, T. C. Panda","doi":"10.1109/PDGC.2014.7030790","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030790","url":null,"abstract":"In the current era of the increase customers for cellular networks it is required to optimize the cellular network planning process. Cellular planning incorporates three major component named frequency planning, capacity expansion and coverage area optimization. As the number of cellular users are increasing day by day hence the coverage area should also be optimized in response to serve the more users. Therefore, in the present paper we have discussed one of the existing algorithms known as PSO Algorithm to optimize coverage area and further enhancement is suggested and evaluated in the proposed algorithm for coverage area optimization.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121328818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}