2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS)最新文献

筛选
英文 中文
Statistical compression-based models for text classification 基于统计压缩的文本分类模型
V. Saikrishna, D. Dowe, S. Ray
{"title":"Statistical compression-based models for text classification","authors":"V. Saikrishna, D. Dowe, S. Ray","doi":"10.1109/ECO-FRIENDLY.2016.7893212","DOIUrl":"https://doi.org/10.1109/ECO-FRIENDLY.2016.7893212","url":null,"abstract":"Text classification is the task of assigning predefined categories to text documents. It is a common machine learning problem. Statistical text classification that makes use of machine learning methods to learn classification rules are particularly known to be successful in this regard. In this research project we are trying to re-invent the text classification problem with a sound methodology based on statistical data compression technique-the Minimum Message Length (MML) principle. To model the data sequence we have used the Probabilistic Finite State Automata (PFSAs). We propose two approaches for text classification using the MML-PFSAs. We have tested both the approaches with the Enron spam dataset and the results of our empirical evaluation has been recorded in terms of the well known classification measures i.e. recall, precision, accuracy and error. The results indicate good classification accuracy that can be compared with the state of art classifiers.","PeriodicalId":405434,"journal":{"name":"2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114179593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of shared memory in Distributed and non Distributed environment 分布式和非分布式环境下的共享内存分析
Dharmendra Dangi, Sachin Bhandari, Amita Bhagat
{"title":"Analysis of shared memory in Distributed and non Distributed environment","authors":"Dharmendra Dangi, Sachin Bhandari, Amita Bhagat","doi":"10.1109/ECO-FRIENDLY.2016.7893253","DOIUrl":"https://doi.org/10.1109/ECO-FRIENDLY.2016.7893253","url":null,"abstract":"Shared memory, one of the most popular models for programming parallel platforms, is becoming ubiquitous both in low-end workstations and high-end servers. With the advent of low-latency networking hardware, clusters of workstations strive to offer the same processing power as high-end servers for a fraction of the cost. In such environments, shared memory has been limited to page-based systems that control access to shared memory using the memory' s page protection to implement shared memory coherence protocols. Unfortunately, In distributed and parallel computing system, efficient memory sharing, that is free from false-sharing and fragmentation issue and consistent, of data intensive applications is one of the most essential and difficult issues without degrading the system efficiency. Therefore proposed analysis is to simulating the behavior of the existing distributed shared memory programming model to find out some way to improve the efficiency. In Distributed shared memory environment, a process may require access to remotely available data. So the aim is to propose a distributed shared memory programming model which will maximize the utilization of shared memory, at the same time, a high degree of parallelism and efficiency.","PeriodicalId":405434,"journal":{"name":"2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115730209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Minimization of overhead using minislot allocation algorithm in IEEE 802.16 mesh network 在IEEE 802.16 mesh网络中使用minilot分配算法实现开销最小化
Subhash Chandra Pradhan, K. K. Mallik
{"title":"Minimization of overhead using minislot allocation algorithm in IEEE 802.16 mesh network","authors":"Subhash Chandra Pradhan, K. K. Mallik","doi":"10.1109/ECO-FRIENDLY.2016.7893244","DOIUrl":"https://doi.org/10.1109/ECO-FRIENDLY.2016.7893244","url":null,"abstract":"Distributed scheduling is an important factor to enhance the network performance in IEEE 802.16 mesh network. The scheduling algorithm of control sub-frame was defined in IEEE 802.16 standard, but distributed scheduling of data sub-frame was not defined. In this paper, we propose a minimization of overhead using minislot allocation algorithm (MOMAA) for reducing the overhead of data sub-frame in IEEE 802.16 mesh network. The algorithm reduces the number of free minislots segments allocated by the granter node to the requester node. If the available minislots are not contiguous, the granter node searches for the free minislots of data sub-frame to allocate contiguous minislots as long as possible. The simulation results of the algorithm using NS2 show reduction in average end-to-end data transfer delay and increase in network throughput.","PeriodicalId":405434,"journal":{"name":"2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125278646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intruder detection mechanism against DoS attack on OLSR 针对OLSR DoS攻击的入侵者检测机制
Yogesh Sahu, M. Rizvi, R. Kapoor
{"title":"Intruder detection mechanism against DoS attack on OLSR","authors":"Yogesh Sahu, M. Rizvi, R. Kapoor","doi":"10.1109/ECO-FRIENDLY.2016.7893250","DOIUrl":"https://doi.org/10.1109/ECO-FRIENDLY.2016.7893250","url":null,"abstract":"In an environment where there is no base station and no static infrastructure Mobile Ad Hoc Network plays a vital role. It is becoming popular technology because of fast growth of wireless devices, dynamically changing network topology. Because of the ad hoc in nature MANET is more vulnerable to different types of attacks and thus need to be protected against these attacks. One of the common attacks is infiltration; therefore, infiltrator detection should be added as another defense before an infiltrator can transgression the system. For such defense one can use Infiltrator verification mechanism. In current scenario infiltrator verification mechanism for conventional wireless networks are not well suited for MANETs. In this paper an approach is proposed to implement a new adroit infiltrator verification mechanism which provides second layer security for node isolation attack (DoS) using OLSR. The performance of proposed algorithm is tested in terms of packet delivery ration and network throughput and is found improved as compared to Standard OLSR.","PeriodicalId":405434,"journal":{"name":"2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122564452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance analysis of hybrid cascaded multilevel converter for HVDC transmission 高压直流输电混合级联多电平变换器性能分析
M. Bhise, Vivek Ahire
{"title":"Performance analysis of hybrid cascaded multilevel converter for HVDC transmission","authors":"M. Bhise, Vivek Ahire","doi":"10.1109/ECO-FRIENDLY.2016.7893237","DOIUrl":"https://doi.org/10.1109/ECO-FRIENDLY.2016.7893237","url":null,"abstract":"HVDC transmission systems deals with bulk amount of power, therefore protection of these systems is highly important. This paper presents newly introduced voltage source converter with DC fault blocking capability, called hybrid cascaded multilevel converter. This converter has ability to prevent any uncontrolled fault current to flow from AC to DC side during DC faults, without the action of AC circuit breaker. This feature blocks power exchange between AC and DC side and may eliminate need of DC circuit breaker. Converter provides various features of multilevel converter and is able to operate over an extended modulation index range, independent of load power factor. This paper presents DC fault blocking capability of hybrid cascaded multilevel converter. System performance before fault and during fault is examined through extensive MATLAB simulation.","PeriodicalId":405434,"journal":{"name":"2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122908359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of benchmark functions and practical problems using Crow Search Algorithm 用Crow搜索算法优化基准函数和实际问题
Swati Rajput, M. Parashar, H. Dubey, M. Pandit
{"title":"Optimization of benchmark functions and practical problems using Crow Search Algorithm","authors":"Swati Rajput, M. Parashar, H. Dubey, M. Pandit","doi":"10.1109/ECO-FRIENDLY.2016.7893245","DOIUrl":"https://doi.org/10.1109/ECO-FRIENDLY.2016.7893245","url":null,"abstract":"Researchers are increasingly looking towards natural phenomenon to search answers for complex real-world problems. This paper demonstrates how the intelligent behavior of crows can be utilized for getting an optimized output for complex engineering problems. The Crow Search Algorithm (CrSA) is a population based nature inspired meta-heuristic algorithm which is based on the navigation method of crows; how the crows use their intelligence in storing their food, in steeling other crow's food and saving themselves from becoming future victims. To validate the effectiveness of CrSA simulations have been performed on various mathematical benchmark functions and on some practical engineering design problem. The results obtained with the proposed algorithm have been compared with other existing meta-heuristic approaches available in literatures. This paper also shows the effect of change of control parameters on the performance of CrSA. Due to the parallel search capability, non-dependence on nature of problem, excellent direct search capability and easy MATLAB implementation, the CrSA is found to be superior to traditional mathematical techniques for real-world engineering problems.","PeriodicalId":405434,"journal":{"name":"2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
On demand Virtual Machine allocation and migration at cloud data center using Hybrid of Cat Swarm Optimization and Genetic Algorithm 基于Cat群优化和遗传算法的云数据中心虚拟机按需分配和迁移
N. Sharma, R. R. Guddeti
{"title":"On demand Virtual Machine allocation and migration at cloud data center using Hybrid of Cat Swarm Optimization and Genetic Algorithm","authors":"N. Sharma, R. R. Guddeti","doi":"10.1109/ECO-FRIENDLY.2016.7893236","DOIUrl":"https://doi.org/10.1109/ECO-FRIENDLY.2016.7893236","url":null,"abstract":"This paper deals with the energy saving at the data center using energy aware Virtual Machines (VMs) allocation and migration. The multi-objective based VMs allocation using Hybrid Genetic Cat Swarm Optimization (HGACSO) algorithm saves the energy consumption as well as also reduces resource wastage. Further consolidating VMs onto the minimal number of Physical Machines (PMs) using energy efficient VMs migration, we can shut down idle PMs for enhancing the energy efficiency at a cloud data center. The experimental results show that our proposed HGACSO VM allocation and energy efficient VM migration techniques achieved the energy efficiency and minimization of resource wastage.","PeriodicalId":405434,"journal":{"name":"2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116240767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Performance evaluation of Underwater Communication system using block codes 分组码水下通信系统性能评价
B. Pranitha, L. Anjaneyulu
{"title":"Performance evaluation of Underwater Communication system using block codes","authors":"B. Pranitha, L. Anjaneyulu","doi":"10.1109/ECO-FRIENDLY.2016.7893242","DOIUrl":"https://doi.org/10.1109/ECO-FRIENDLY.2016.7893242","url":null,"abstract":"Underwater Communications (UWC) is a very demanding application in spite of issues like time varying multipath propagation, attenuation of the signal, underwater noise, and interference etc., Orthogonal Frequency Division Multiplexing (OFDM) is a suitable modulation technique for UWC as it has the ability to solve Inter symbol interference (ISI), Inter channel interference (ICI) and also multipath propagation. Bit error rate (BER) versus Signal to noise ratio (SNR) is used as the figure of merit to indicate the performance of the system. In this work it is established that coding at the transmitter in addition to OFDM using Hamming code improves the BER. It is also proved that LDPC code further improves the BER.","PeriodicalId":405434,"journal":{"name":"2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129315860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Non-cascading structure based Flyback-Forward converter with large duty ratio 基于非级联结构的大占空比反激变换器
Sunil Kumar, R. Scholar, Rajesh Kataria, K. Rana, Vineet Kumar
{"title":"Non-cascading structure based Flyback-Forward converter with large duty ratio","authors":"Sunil Kumar, R. Scholar, Rajesh Kataria, K. Rana, Vineet Kumar","doi":"10.1109/ECO-FRIENDLY.2016.7893239","DOIUrl":"https://doi.org/10.1109/ECO-FRIENDLY.2016.7893239","url":null,"abstract":"In this paper, a Flyback-Forward converter employing a non-cascading scheme is presented in discontinuous conduction mode. The converter is designed to enhance the duty ratio of over 50%. As a result, the flyback sub-converter acts in boost mode and generates stepped-up output voltage. Since the switch utilization is required to be as high as possible in a forward converter, in present case, this objective is also simultaneously achieved. The simulation results obtained for a 24 V, 24W converter show the duty ratio greater than 50%.","PeriodicalId":405434,"journal":{"name":"2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131288957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting malicious transactions using Fuzzy Association rule mining 基于模糊关联规则挖掘的恶意交易检测
I. Singh, Rajni Jindal
{"title":"Detecting malicious transactions using Fuzzy Association rule mining","authors":"I. Singh, Rajni Jindal","doi":"10.1109/ECO-FRIENDLY.2016.7893246","DOIUrl":"https://doi.org/10.1109/ECO-FRIENDLY.2016.7893246","url":null,"abstract":"In recent years, databases have become a very crucial part in all organizations and hence database security has become very essential. In order to protect organizational databases, intrusion detection systems (IDS) are deployed. Non-signature based IDS are found to be reasonable better than signature based IDS. In this paper, a new data mining based approach Fuzzy Association Data Dependency Rule Miner (FADDRM) has been proposed for detecting malicious transactions. The proposed anomaly based approach focuses on mining data dependencies between data items in the database using fuzzy association rule mining. The data dependencies are mined using the transactions from the database log. The transactions which are not compliant to the data dependencies are treated as malicious transactions. The proposed approach is exemplified using a data set for typical banking organization and the result shows that FADDRM can detect malicious transactions more effectively as comparison to other approaches cited in literature.","PeriodicalId":405434,"journal":{"name":"2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS)","volume":"6 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127513030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信