2014 Sixth International Conference on Advanced Computing (ICoAC)最新文献

筛选
英文 中文
Dynamic resource management in cloud 云中的动态资源管理
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229727
S. Selvi, C. Valliyammai, G. Sindhu, S. S. Basha
{"title":"Dynamic resource management in cloud","authors":"S. Selvi, C. Valliyammai, G. Sindhu, S. S. Basha","doi":"10.1109/ICOAC.2014.7229727","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229727","url":null,"abstract":"Cloud computing provides flexible resources to users through utility based computing that is paid per usage model. Virtualization stands as a key enabling feature of cloud computing. Resource needs are not static due to the diversity of applications and need to manage resources dynamically. To achieve dynamic resource management there is a need to increase the performance of resource allocation for different resources requested by the client through better allocation of virtual machines to the host, performing the migration of a VM from one host to the other. Server consolidation is done to power off the least utilized nodes when the workload concentration is fewer in certain nodes to reduce the carbon emission. This approach increases the utilization of cloud resources even in idle periods by forming virtual clusters.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121902828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Smart interface for sensors in robot 机器人传感器的智能接口
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229763
Y. Kumar, S. Ilaiyaraja
{"title":"Smart interface for sensors in robot","authors":"Y. Kumar, S. Ilaiyaraja","doi":"10.1109/ICOAC.2014.7229763","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229763","url":null,"abstract":"Robots can be connected with wireless sensor networks. They need to gather the data from the surrounding environment, and they need a sensor interface. These robots can be worked with IoT environment. In fact, in traditional methods the number of sensors connected are minimized, sampling rate is less and even has a restriction over types of signal in sensors. Using reconfigurable smart sensor interface the complexity of the code can be reduced in IoT environment. In the proposed system, FPGA is taken as the main logic controller. It can parallel process the data in real time. It is smaller in size and has finer grain capability. It works faster than CPLD. This system uses IEEE1451.2 standard; this gives an intelligent sensor interface between sensors in robot. On the whole, it comprises both the hardware and software for a clever acquisition of information by common sensors. It is practically applied in disaster management control with good performance, and it can be also used in industrial and medical environment.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123067909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ERPT based reliable data dissemination in Wireless Sensor Network 基于ERPT的无线传感器网络数据可靠传播
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229725
M. Subburam, R. Nandhakumar
{"title":"ERPT based reliable data dissemination in Wireless Sensor Network","authors":"M. Subburam, R. Nandhakumar","doi":"10.1109/ICOAC.2014.7229725","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229725","url":null,"abstract":"Reprogramming is a critical problem in Wireless Sensor Network (WSN). Each cluster head receive a different form of data among individual sensor nodes and from other neighborhood cluster head, which leads to loss in accuracy of data. Multihop transmission to the base station will cause loss in actually sensed data. In this paper, Enhanced Reprogramming Technique (ERPT) is to maximize accuracy of data with minimum energy utilization. In our approach, two levels of aggregations are performed. One is an intra-cluster aggregation within the cluster head and inter-cluster head aggregation are performed from one cluster head to another cluster head. It improves network lifetime by reducing the amount of traffic among individual sensor nodes to the base station because sensor nodes are resource constraints. Increasing number of nodes among sensor network will maximize the accurate data, but it leads to more energy consume. This will be improved by enhanced reprogramming. The proposed technique addresses the scalability issues with minimized energy consumption compared to traditional approaches.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123554760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving QoS in MANET by estimating the available bandwidth 通过估计可用带宽来提高MANET的QoS
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229723
S. Raguvaran
{"title":"Improving QoS in MANET by estimating the available bandwidth","authors":"S. Raguvaran","doi":"10.1109/ICOAC.2014.7229723","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229723","url":null,"abstract":"Bandwidth estimation plays a vital role in case of multimedia communications because it drastically degrades the performance of throughput in mobile networks. Hence an efficient management and sharing of bandwidth among the users is essential to improve the performance of networks. There are so many techniques are available to estimate the available bandwidth, but most of the techniques fail to estimate available bandwidth in a wireless resource constrained network due to the increased variability of wireless channel conditions and variable bit rate. To improve the accuracy in Available Bandwidth Estimation, the proposed system estimate Service Process and Effective Service Curve for a variable bit rate (VBR) flows using stochastic process model. The random factors incoming data rate ri and outgoing data rate ro are used to determine the flows. By increasing the accuracy of the bandwidth estimation, the end to end throughput is increased and delay is minimized in MANET.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130222887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A framework for secure cryptographic key management systems 安全密码密钥管理系统的框架
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229733
P. Varalakshmi, A. R. Shajina, T. Kanimozhi
{"title":"A framework for secure cryptographic key management systems","authors":"P. Varalakshmi, A. R. Shajina, T. Kanimozhi","doi":"10.1109/ICOAC.2014.7229733","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229733","url":null,"abstract":"Cloud computing era helping organizations to compute and outsource humongous volume of data in flexible and cost effective manner. The trend is permitting myriad of users to share data, services and resources on cloud environment. With the growing adoption of cloud, it's necessary to ensure the confidentiality of data is maintained by efficient key management to avoid unauthorized access, as large quantum of sensitive data is shared among a dynamic group of members. In this paper, a novel framework is proposed for efficient key management in cloud for multi-owner. Our system utilized the Shamir's secret sharing scheme for Key establishment along with dynamic identity. The evaluation result shows that the proposed mechanism works more efficiently than other systems.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116548971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting and revocation the compromised node in zone - based wireless sensor network using a two stage approach 在基于区域的无线传感器网络中,采用两阶段方法检测和撤销受损节点
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229747
Rajkumar D. Udaya Suriya, R. Vayanaperumal
{"title":"Detecting and revocation the compromised node in zone - based wireless sensor network using a two stage approach","authors":"Rajkumar D. Udaya Suriya, R. Vayanaperumal","doi":"10.1109/ICOAC.2014.7229747","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229747","url":null,"abstract":"Since the WSN is not secure in nature, it compromises the sensor node and the physical capture of these nodes is very easy for the intruder nodes. The intruder nodes simply communicate with any node in the zone, thus compromising the nodes and in turn spoiling the nature of the network. To reduce the damages be fallen on the compromised nodes, it should be successfully detected and revoked as soon as possible. Range of node specifies detection systems in wireless ad-hoc and sensor networks have been projected by academicians, of late. In the existing approach Leader based intrusion detection system is used to find out suspect regions where the compromised nodes are ensconced, here the Leader will be elected region wise based on the energy level to detect the attacker and revoke the compromised node. To overcome this as well as to provide high security two new stage approaches are proposed. They are the DPFM-[Data Packet Format Matching] method which detects the attacker node and DAA-[Divert Attention Attacker] method which prevents nodes compromising in the zone. The simulation result shows that the compromising node is eliminated and attacks are controlled in the network.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128464401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A trust enhanced Recommender System for medicare applications 一个信任增强推荐系统的医疗保险申请
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229734
S. Krishna, Venkatesh R. Prasanna, S. Swagath, C. Valliyammai
{"title":"A trust enhanced Recommender System for medicare applications","authors":"S. Krishna, Venkatesh R. Prasanna, S. Swagath, C. Valliyammai","doi":"10.1109/ICOAC.2014.7229734","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229734","url":null,"abstract":"Recommender Systems are software tools that suggest the users, the required items based on the previous user-item interactions. Becoming extremely powerful, Recommender Systems can be accommodated into areas of vital importance. The proposed work aims to provide healthcare recommendations that include Blood Donor recommendations and Hospital Specialization. The system employs a model based collaborative filtering to predict the future requirements of items, following a specific scenario. The problems in the traditional recommender systems such as cold start and scalability are addressed. The system accommodates a trust factor in the classical recommender system and reaps the efficiencies of the k-means++ algorithm, which provides the threshold rating for the cold start users. The number of clusters required is computed using the slope statistic method. The results of the work show that the proposed system provides cost effective recommendations.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131499006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimizing the spatial query processing with a proxy-based approach 用基于代理的方法优化空间查询处理
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229750
K. Geetha, A. Kannan
{"title":"Optimizing the spatial query processing with a proxy-based approach","authors":"K. Geetha, A. Kannan","doi":"10.1109/ICOAC.2014.7229750","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229750","url":null,"abstract":"In recent years, processing spatial queries fastly is a major challenge in mobile environments. Introduction of a proxy for spatial query processing reduces the number of queries submitted by the mobile clients to provide the relevant results. Hence, proxy based approach is prefered to server based approach. This is done to the reduction in waiting time of the query retrieval by proxy. Morover, it reduces the server load in mobile environments. Continuous Nearest Neighbor query processing increases the server load done to the number of consecutive queries submitted by the mobile client who tries to get the desired results. The mutual support between the results of the nearest neighbor queries and window queries are used to enhance the performance. Caching a number of queries in the cache leads to performance degradation. This is overcome in this work by using a cache replacement technique, and hence this system improves the performance of the spatial query processing.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134353149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A low power encoder for a 5-GS/s 5-bit flash ADC 用于5-GS/s 5位闪存ADC的低功耗编码器
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229743
T. Lakshmi, Avireni Srinivasulu
{"title":"A low power encoder for a 5-GS/s 5-bit flash ADC","authors":"T. Lakshmi, Avireni Srinivasulu","doi":"10.1109/ICOAC.2014.7229743","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229743","url":null,"abstract":"A low power high speed encoder is proposed for a 5-GS/s 5-bit flash analogue-to-digital converter (ADC). The designing of a thermometer code to binary code is one of the bottlenecks in achieving high speed. The modus operandi involved in this process is that an encoder circuit translates the thermometer code into the gray code to reduce the effect of meta-stability and reduction of bubble errors. And also that low power and high speed encoder is designed by deploying a new logic design style to implement conversion of the thermometer code to binary code through differential cascade voltage switch logic (DCVSL). However the encoder proposed is designed by using Cadence 180 nm CMOS technology with a supply rail voltage typically ±0.5 V. The simulating results thus obtained is shown for sampling frequency of 5-GS/s and the average power dissipation of 23.29 μW.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131002512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Development of shopping assistant using extraction of text images for visually impaired 基于视障人士文本图像提取的购物助手的开发
2014 Sixth International Conference on Advanced Computing (ICoAC) Pub Date : 2014-12-01 DOI: 10.1109/ICOAC.2014.7229748
Afritha Farhath K, R. Amruthavarshini, S. Harshitha, A. Saranya, R. Velumadhavarao
{"title":"Development of shopping assistant using extraction of text images for visually impaired","authors":"Afritha Farhath K, R. Amruthavarshini, S. Harshitha, A. Saranya, R. Velumadhavarao","doi":"10.1109/ICOAC.2014.7229748","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229748","url":null,"abstract":"This paper proffers an application in order to expedite easy and innate shopping for the blind person in a super market. The pictures of the objects held are captured by the inbuilt camera in the mobile. The image is processed and consequently text localisation and extraction is done by which the label of the product is identified. This is converted to speech and given as voice output to the user. A bill calculator is also consolidated with this application which on receiving the voice/speech input from the user, calculates the total bill amount of the purchase. This bill amount is then sent as voice output to the user.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115666668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信