2011 Third International Conference on Advanced Computing最新文献

筛选
英文 中文
Novel architecture for cluster based service Discovery and load balancing in Mobile Ad hoc Network 移动自组网中基于集群的服务发现与负载均衡新架构
2011 Third International Conference on Advanced Computing Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165191
M. Buvana, M. Suganthi, K. Muthumayil
{"title":"Novel architecture for cluster based service Discovery and load balancing in Mobile Ad hoc Network","authors":"M. Buvana, M. Suganthi, K. Muthumayil","doi":"10.1109/ICOAC.2011.6165191","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165191","url":null,"abstract":"A Mobile Ad hoc Network (MANET) is a collection of two or more mobile devices (PDA, laptop, cellphones, etc.) it is getting more and more important for mobile users to discover resources (eg: Printer, fax machines) without any need of configuration. To this end service discovery is an important feature of MANET. In this paper we propose a novel architecture that the cluster based service Discovery, leads to high degree of stability in the network and improves the load balancing. Its performance is studied under packet delivery ratio, Discovery Time, Energy consumption, load.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131876989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Web service recommendation framework using QoS based discovery and ranking process Web服务推荐框架采用基于QoS的发现和排序过程
2011 Third International Conference on Advanced Computing Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165204
R. Jeberson, R. Raj, T Sasipraba
{"title":"Web service recommendation framework using QoS based discovery and ranking process","authors":"R. Jeberson, R. Raj, T Sasipraba","doi":"10.1109/ICOAC.2011.6165204","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165204","url":null,"abstract":"Locating the desired web service to a client requirement is an onerous task as many web services are ready to satisfy a request. Recommending the pertinent web service and not providing the unwarranted service are the two main issues to be addressed in web service selection process. The limitation of keyword search is that it doesn't articulate the client request accurately. Current search engines and UDDI are based on keyword search, which is inherently impractical for providing the right service to the client. Since the keyword search is unable to grasp the underlying semantics of the searched query, web services discovery based on input and output operation has been introduced. Though the operation based search returns relevant result, still the returned result is not ranked based on performance of web services. So the search mechanism must be incorporated with the QoS requirements will augment to complete the selection process. Therefore, QoS aware web service discovery based on input and output operation has been introduced. In this approach, QoSConsultant acts as a broker between client and service provider. The QoS attributes are normalized, and the match score value is stored in the Service pool. The WSDLParser extracts the input/output operation from the WSDL file and stores it in the service pool. Whenever a search is performed for a given input/output operation, the consultant selects a list of candidate services that are matched with the given request will be provided to the client for setting weights over QoS attributes. The highest degree of the matched web service will be provided to the client for invocation process. The system has been tested with real and synthetic data which shows propitious result.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129770999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Detection of DDoS attacks using Enhanced Support Vector Machines with real time generated dataset 基于增强支持向量机实时生成数据集的DDoS攻击检测
2011 Third International Conference on Advanced Computing Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165212
T. Subbulakshmi, Dr. S. Mercy Shalinie, V. GanapathiSubramanian
{"title":"Detection of DDoS attacks using Enhanced Support Vector Machines with real time generated dataset","authors":"T. Subbulakshmi, Dr. S. Mercy Shalinie, V. GanapathiSubramanian","doi":"10.1109/ICOAC.2011.6165212","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165212","url":null,"abstract":"An approach for combating network intrusion detection is the development of systems applying machine learning and data mining techniques. Many Intrusion Detection Systems (IDS) suffer from a high rate of false alarms and missed intrusions. The detection rate has to be improved while maintaining low rate of misses. The focus of this paper is to generate the Distributed Denial of Service (DDoS) detection dataset and detect them using the Enhanced Support Vector Machines. The DDoS dataset with various direct and derived attributes is generated in an experimental testbed which has 14 attributes and 10 types of latest DDoS attack classes. Using the generated DDoS dataset the Enhanced Multi Class Support Vector Machines (EMCSVM) is used for detection of the attacks into various classes. The performance of the EMCSVM is evaluated over SVM with various parameter values and kernel functions. It is inferred that EMCSVM produces better classification rate for the DDoS dataset with ten types of latest DDoS attacks when compared with the kddcup 99 dataset which has six types of DoS attacks.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131202743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Countermeasures to threats from agent platform and malicious code check using dynamic policy file 利用动态策略文件应对代理平台威胁和恶意代码检查
2011 Third International Conference on Advanced Computing Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165206
C. Valliyammai, S. Selvi, T. Amarnath, B. Kumar, S. Siva
{"title":"Countermeasures to threats from agent platform and malicious code check using dynamic policy file","authors":"C. Valliyammai, S. Selvi, T. Amarnath, B. Kumar, S. Siva","doi":"10.1109/ICOAC.2011.6165206","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165206","url":null,"abstract":"Mobile agents are autonomous programs that can migrate from one computer host to various hosts and resumes its execution in the remote hosts. Mobile agents are mainly used in distributed environments like Grid. Mobile agents are mostly used in e-commerce applications. The main objective of the proposed system helps in identifying and preventing various types of security threats that occurs in the mobile agent environment. The system provides an efficient and reliable attack detection and prevention process which plays a vital role for the reliable working of the mobile agent system. Distributed environments having heterogeneous architecture being geographically distributed and interconnected via unreliable network media are at the risk of various security threats. A distributed environment consists of unreliable resources therefore security mechanisms cannot be ignored and an efficient security framework is needed. These security threats have to be dealt at the right time so as to increase the computational power of the mobile agent environment.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123689507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VC message VC的消息
2011 Third International Conference on Advanced Computing Pub Date : 1900-01-01 DOI: 10.1109/icoac.2011.6165239
{"title":"VC message","authors":"","doi":"10.1109/icoac.2011.6165239","DOIUrl":"https://doi.org/10.1109/icoac.2011.6165239","url":null,"abstract":"","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130609976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dean message 院长消息
2011 Third International Conference on Advanced Computing Pub Date : 1900-01-01 DOI: 10.1109/icoac.2011.6165226
Thamarai Selvi, S. Selvi
{"title":"Dean message","authors":"Thamarai Selvi, S. Selvi","doi":"10.1109/icoac.2011.6165226","DOIUrl":"https://doi.org/10.1109/icoac.2011.6165226","url":null,"abstract":"It is inspiring to note that this International Conference is the firs'! one organized after the bloom of the Department of Computer Technology, MIT Campus, Anna University, Chennai. I am sure ICoAC 2011, will take international researchers together to present their ground-breaking ideas, thrash out the current issues, exchange ideas and disseminate information in the hottest research areas ofadvanced computing not only in India but also abroad, which keeps the educational universities and industries abreast.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114708488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Convenor messages 会议召集人消息
2011 Third International Conference on Advanced Computing Pub Date : 1900-01-01 DOI: 10.1109/icoac.2011.6165221
{"title":"Convenor messages","authors":"","doi":"10.1109/icoac.2011.6165221","DOIUrl":"https://doi.org/10.1109/icoac.2011.6165221","url":null,"abstract":"December 2011, with the participation of distinguished people, delegates and representatives of esteemed international organizations and renowned IT experts globally. The ever growing demand and the need for rapidly changing and Advanced Computing or technologies will be viewed from several different perspectives. This third International Conference on Advanced Computing (ICoAC) 2011 is aimed to provide a forum for demonstrating the latest research fmdings and exchanging ideas of research, development, and knowledge among the different research groups and faculties of the department. This conference represents a unique opportunity for meeting colleagues and friends, exchanging the organizing committee, who did very active and endless work and put tremendous effort into the conference.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130679396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Programme schedule day 3 节目安排第3天
2011 Third International Conference on Advanced Computing Pub Date : 1900-01-01 DOI: 10.1109/icoac.2011.6165225
{"title":"Programme schedule day 3","authors":"","doi":"10.1109/icoac.2011.6165225","DOIUrl":"https://doi.org/10.1109/icoac.2011.6165225","url":null,"abstract":"","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125143726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Programme schedule day 2 节目安排第2天
2011 Third International Conference on Advanced Computing Pub Date : 1900-01-01 DOI: 10.1109/icoac.2011.6165224
Chinchu Jose, M. Kurian, Sanjiban Sekhar Roy
{"title":"Programme schedule day 2","authors":"Chinchu Jose, M. Kurian, Sanjiban Sekhar Roy","doi":"10.1109/icoac.2011.6165224","DOIUrl":"https://doi.org/10.1109/icoac.2011.6165224","url":null,"abstract":"Day 2 Soft Computing 335 “Peformance Comparison of Autonomous Neural Network based GPS/INS integration”, M.Malleswaran, V.Vaidehi, M.Jebarsi” 328 “A hybrid approach for GPS/INS integration using Kalman filter and IDNN” , M.Malleswaran, Dr.V.Vaidehi, M.Mohan kumar” 333 “Genetically Optimized ANFIS based Intelligent Navigation System”, M.Malleswaran, Dr.V.Vaidehi, R. Abilash Joseph Networks/Network Security 167 “Multilanguage Block Ciphering Using Two Dimensional Substitution Array”, M.Rajendiran, B.Syed Ibrahim, R.Pratheesh, Dr.C.NelsonKennnedyBabu","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115832004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Programme schedule day 1 节目安排第1天
2011 Third International Conference on Advanced Computing Pub Date : 1900-01-01 DOI: 10.1109/icoac.2011.6165223
M. Praba
{"title":"Programme schedule day 1","authors":"M. Praba","doi":"10.1109/icoac.2011.6165223","DOIUrl":"https://doi.org/10.1109/icoac.2011.6165223","url":null,"abstract":"19 \" Roadway for sustainable disposal of scrap computers in India \" , Dr.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127005561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信