Advances in Computing and Communications Part I First International Conference ACC 2011 Kochi India July 22 24 2011 Proceedings 1st edition by Ajith Abraham, Jaime Lloret Mauri, John Buford – Ebook PDF Instant Download/Delivery.9783642227097, 3642227090
Full download Advances in Computing and Communications Part I First International Conference ACC 2011 Kochi India July 22 24 2011 Proceedings 1st edition after payment
Product details:
ISBN 10: 3642227090
ISBN 13: 9783642227097
Author: Ajith Abraham; Jaime Lloret Mauri; John Buford
This volume is the first part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 68 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are organized in topical sections on ad hoc networks; advanced micro architecture techniques; autonomic and context-aware computing; bioinformatics and bio-computing; cloud, cluster, grid and P2P computing; cognitive radio and cognitive networks; cyber forensics; database and information systems.
Advances in Computing and Communications Part I First International Conference ACC 2011 Kochi India July 22 24 2011 Proceedings 1st Table of contents:
Adhoc Networks
An Enhanced Port Hiding Design to Handle DoS Attacks in an Ad-Hoc Environment
Introduction
Dependability
Denial of Service Attacks
Proposed Architectural Design
Admission Control
Challenge Server
IP Filter
Challenge Phase
Hide Port Generation
Trust Token
Congestion Control
Adaptive Wireless Greedy Primal Dual Algorithm
Priority Update
Results
Conclusion
References
An Efficient Routing Protocol for Ad-Hoc Networks
Introduction
Proposed Scheme
Route Discovery
Route Maintenance
Simulation Results
Simulation Topology and Environment
Results
Conclusions
References
3-Disjoint Paths Fault-Tolerant Multi-stage Interconnection Networks
Introduction and Motivation
Concept of Coloring Schemes and Reachable Sets for Disjoint MINs
Three Theorems for Supporting the Application of Coloring Schemes and Reachable Sets to the Disjoint
Comparison of Disjoint Paths Fault-Tolerant Multi-stage Interconnection Networks on the Basis of Arc
Disjoint Paths 16 x 16 Omega Fault-Tolerant Multi-stage Interconnection Network
Disjoint Paths 8 x 8 Gamma Fault-Tolerant Multi-stage Interconnection Network
Comparison of 3-Disjoint Paths 16 x 16 Omega and 8 x 8 Gamma Fault-Tolerant Multi-stage Interconnect
Conclusion
References
Reduction of Inter Carrier Interference by Pilot Aided Self Cancellation Compared to Self Cancellati
Introduction
OFDM Architecture
Self Cancellation Method
Pilot Aided Self Cancellation Technique
Pilot Modulation
Algorithm in Support of Estimation of CFO
Simulations
Conclusions
References
A Novel AttackModel Simulation inOLSR
Introduction
OLSR Protocol
HELLO Messages
TC Messages
Route Calculation
Related Work
Vulnerabilities in OLSR
Proposed Attack Model
Collecting Network Information
Updating Own Topology Information
Broadcast Fake Information
Packets Do Not Reach Intended Recipient
Simulation Results
Experimental Setup
Results
Proposed Detection Methodology
Conclusion
References
Performance Investigations of Routing Protocols in Manets
Introduction
Performance Investigations on Ad-Hoc Network Routing Rotocols with CBR Traffic
Varying Mobility
Varying Scalability
Varying Maximum Speed
Conclusions
References
Mobile Query Processing-Taxonomy, Issues and Challenges
Introduction
Context
Classification of Mobile Queries
Moving Object Database Queries
Classification of Moving Object Database Queries
Location Dependent Query Processing
Classification of Mobile Queries
Clasification of Location Dependent Query
Query Execution and Optimization
Issues and Challenges in Query Processing in Mobile Environment
Location Management
Uncertainty Management
Data Management
Conclusion
References
A Compact Low-Cost Phase Shifter for Wireless Applications
Introduction
Splitter and Phase Shifter Design
Progressive Phase Delay Numerical Results for an Array Antenna
Simulation Results
Measured Result
Conclusion
References
A Study on the Effect of Traffic Patterns in Mobile Ad Hoc Network
Introduction
Traffic Models in MANET
Constant Bit Rate (CBR)
Exponential Traffic
Pareto Traffic
Routing Models in MANET
Ad Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing (DSR)
Simulation Results and Analysis
Packet Delivery Fraction
Normalized Routing Load
Conclusion
References
I-SAODV: Improving SAODV to Mitigate Hop-Count Attack in Mobile Adhoc Network
Introduction
Overview of I-SAODV
One-Way Hash Chain
Tree Authenticated Values
Implementation of I-SAODV
Security Analysis of I-SAODV
Attacks on RREQ Message
Attacks on RREP Messages
Performance Analysis of I-SAODV
Conclusion and Future Scope
References
Social Network Aware Routing for Delay Tolerant Networks
Introduction
Related Works
Frame Work
Proposed Routing and Buffer Management Scheme
Simulation and Results
Conclusions
References
Sybil Secure Architecture for Multicast Routing Protocols for MANETs
Introduction
Sybil Attack in MANETs
Problems with Centralized Authority
Sybil Secure Routing in MANETs
Results and Discussions
Throughput
Conclusion
References
Fault Diagnosis in MANET
Introduction
Proposed Model
System and Fault Model
Dynamic Distributed Diagnosis Model
Proposed Model Analysis
Correctness Proof
Completeness Proof
Communication Complexity
Time Complexity
Conclusion
References
Mobile Agent Security Based on Trust Model in MANET
Introduction
Security Issues
Related Work
Our Work
Modeling MANET
ModelingMobile Agents Based System
Our Model
Experimental Results
Conclusions
References
An Efficient Protocol to Study the Effect of Flooding on Energy Consumption in MANETS
Introduction
Related Work
Destination Sequenced Distance Vector (DSDV)
Dynamic Source Routing (DSR)
Ad-Hoc on Demand Distance Vector (AODV)
Other Routing Protocols
Ring Protocol
Node Identifier
Ring Formation
Neighbor_Registry Table
New Node Joining the Network
Performance Evaluation
Conclusion
References
An Approach to Suppress Selfish Behavior of a Node in MANET by Hiding Destination Identity in Routin
Introduction
Related Work
Modified RREQ Packet in DSR Protocol
Basic Assumptions
Proposed Scheme
Conclusion and Future Work
References
Broken Link Fraud in DSDV Routing – Detection and Countermeasure
Introduction
DSDV Protocol
Attack Models in DSDV
Step 1: Byzantine Attack
Step 2: Broken Link Fraud
Related Work
Methodology
Metric
Detection
Response
Simulation
Simulation Setup
Simulation Result and Discussion
Conclusion and Future Work
References
Advanced Micro Architecture Techniques
Research on Power Optimization Techniques for Multi Core Architectures
Introduction
Multi Core Challenges
Related Work
Power Optimization Algorithm
Simultaneous Optimization of Power and Energy Based on Game Theory
Power Optimization Using Transcoding systems
Power Optimization Based on DVFS-Enabled H.264 Decoder
A Meta Heuristics Approach for Multi Objective Optimization
Resource Constrained Optimization
Optimization in Volunteer Computing
Optimized Cache Architecture
Exploring Power Optimization
Coordinated Power optimization
Coordinating System Software for Power Savings
On Line Optimization Based on Analog Computation
Power Exploration for Parallel Applications
Power Optimization/ Scheduling for Real Time Applications
Power Optimization Scheduling
Parallelization and Energy Consumption
Removal-Cost Method: Voltage Selection Algorithm
Energy Optimization Based on PVT Aware Voltage Island Formation
Power Management Based on Supervised Learning
Optimization Based on 3D Torus Network on Chip
Future Challenges
Summary of Power Optimization Techniques
Conclusion
References
Optimization Techniques and Performance Evaluation of a Multithreaded Multi-core Architecture Using
Introduction
Multi-core
OPENMP
Over View of The System
Implementation and Testing
Results and Discussion
Conclusion and Future Work
References
Review on VLSI Architectures for Optical OFDM Receivers
Introduction
Optical OFDM verrsus Typical OFDM Systems
FFT
Fast Hartley Transform
Cyclic Prefix Removal
Decoder and Demapper
Results
Conclusion
References
A Pre-fetch Enabled Cache-Core Architecture for Multi-cores
Introduction
Background and Related Work
The Cell BE Architecture
Cache-Core Architecture
Design of Pre-fetch Enabled Cache-Core Architecture
Methodology
Evaluation
Conclusion
References
Performance Analysis of Adaptive Scan Compression Methodology and Calculations of Compression Ratio
Introduction
Basics of Adaptive Scan Compression
Fault Coverage Loss vs. Compression
Pattern Inflation from Compression
Experimental Results
Conclusion
References
Autonomic and Context-Aware Computing
Better Debugging of Logical Errors Using Optimized Call Stack Restricted Slicing
Introduction
System Dependence Graph
Related Works
Context Sensitive Slicing
Optimized Call Stack Restricted Slicing
Experimental Results
Conclusions
References
Towards Incremental Reasoning for Context Aware Systems
Introduction
Ontology-Based Modeling and Reasoning
Incremental Reasoning
Conclusion and Future Work
References
On the Potential of Using Conventional Mobile Communication Technology for Human Context Awareness i
Introduction
State-of-the-Art Approaches
Analysis of the Surveyed Approaches
Potential Use of Standard Mobile Communication Technique
Analysis of the Mobile Communication Based Scheme
Conclusion
References
A Novel Adaptive Monitoring Compliance Design Pattern for Autonomic Computing Systems
Introduction
Related Work
Adaptive Sensor Factory Design Pattern Template
Proposed Pattern
Experimental Setup
Application Desciption
Making Application Monitoring Compliance
Proposed Pattern Approach
Conclusion and Future Work
References
Bioinformatics and Bio-computing
Predictive Analysis of Lung Cancer Recurrence
Introduction
Background Study
Gene Expression Data and Its Complexities
Feature Selection Methods for Gene Expression Data
Classification Techniques for Recurrence Prediction
Proposed Method
Data Collection
Hybrid Method for Gene Selection
Hybrid Method for Classification
Calculation of Statistical Parameters
Results
Step I (Gene Selection)
Step II (Classification Accuracy, Prediction Accuracy and Other Statistical Parameters (Before and A
Comparison with Previous Results
Summary
Conclusions and Future Work
References
Development and Validation of Matlab Models for Nanowire Sensors
Introduction
DNA Sensors
Diffusion-Capture Model
Experimental Setup for Nanosensor Simulation
VI Characteristics of Silicon Nanowire
Mathematical Models for Nanowire Sensor
Conclusion
References
Application of Recurrence Quantification Analysis (RQA) in Biosequence Pattern Recognition
Introduction
Materials and Methods
Materials
Method
Results
Discussion
References
New Feature Vector for Apoptosis Protein Subcellular Localization Prediction
Introduction
Materials and Methods
Data Sets
Naive Bayes Classification
Correlation Based Feature Selection (CFS)
Feature Vector
Results and Discussion
Conclusion
References
Hurst CGR (HCGR) – A Novel Feature Extraction Method from Chaos Game Representation of Genomes
Introduction
Chaos Game Representation and Hurst Exponent
Materials and Methods
Dataset
Methodology
Results and Discussions
Conclusion
References
Hub Characterization of Tumor Protein P53 Using Artificial Neural Networks
Introduction
Background
Hub Protein
Artificial Nerual Network (ANN)
Hydrophobicity
Existing Methods
Method 1
Method 2
Hub Classifier
Other Methods
Data Set
Proposed Method
Results and Discussions
Conclusion
References
Lacunarity Analysis of Protein Sequences Reveal Fractal Like Behavior of Amino Acid Distributions
Introduction
Methods
Lacunarity Measurement Using the Gliding Box Algorithm
Lacunarity Analysis of the Distribution of Hydrophobic Amino Acids in a Protein Sequence
Lacunarity Analysis of Chaos Game Representation of Protein Sequences
Dataset
Results
Conclusions
References
Classification and Rule-Based Approach to Diagnose Pulmonary Tuberculosis
Introduction
Literature Survey
Proposed Model
Collection of Parameters
Creation of an IDT
Deduction of Rules by Traversing through IDT
Experimental Setup and Results
Complete IDT
Rules for Diagnosis
Reduction of Parameters
Effectiveness of the System
Comparative Study
Conclusion
References
Identification and Analysis of Cell Cycle Phase Genes by Clustering in Correspondence Subspaces
Introduction
Prior Research and Overview of Proposed Method
Proposed Approach
Data Set
Missing Value Estimation
Identification of Non-differential Genes Using ANOVA
Correspondence Analysis
UPGMA Clustering in the Correspondence Subspace
Experimental Investigations and Results
Missing Value Estimation
Influence of ANOVA
Analyzing the Data Using Correspondence Analysis and Clustering
Conclusions and Discussions
References
Reliability Assessment of Microarray Data Using Fuzzy Classification Methods: A Comparative Study
Introduction
Classification Methods
Classification Using Normal Mixture Modeling (NMM)
Fuzzy C-Means Classification (FCM)
Kernel Fuzzy C-Means Classification (KFCM)
Fuzzy C-Medoid Classification (FCMdd)
Gustafson and Kessel Classification (GK)
Gath Geva Classification (GG)
Fuzzy Possibilistic C-Means (FPCM)
Experimental Results
Conclusion
References
Association Rule Mining for the Identification of Activators from Gene Regulatory Network
Introduction
Related Work
Mining Positive and Negative Co-related Gene Clusters
Gene Regulatory Networks
Analysis of Results
Conclusion and Future Enhancements
References
Cloud, Cluster, Grid and P2P Computing
MPI Performance Analysis of Amazon EC2 Cloud Services for High Performance Computing
Background and Introduction
Methods
Testing Communication Speeds
Implementation of Speed Tests
Analysis of Results
Graphical Display
Appling Performance Tests
Results and Discussion
Instances from One Zone
Normal Instances from Different Zones
Spot Instances
Variance of Performance Values
Consistency of Results
Discussion and Conclusions
Availability
Future Work
References
Algorithmic Approach to Calculating Minimal Resource Allocation Recommender for Grid Using Reliabili
Introduction
Resource Allocation Matrix
Minimum Resource Spanning Tree, MRST
Reliability Computationsresp
Important Terms
Reliability of Minimum Resource Spanning Tree, MRSTrel
Grid Service Reliability
Overall Grid Service Reliability
Trust Computationstra
Direct Trust Based on Availability
Reputation Based on Reliability Computation
Trust Evaluation Based on Reputation
Trust Update
Search
2-Way Split Backward Search
M-Way Split Backward Search
Example of Sample Grid Network
Grid Configuration Information
Generate All Possible MRST’s(Minimum Resource Spanning Tree) of Each Service
Compute Reliability of MRST’s of a Service in a Grid and Overall Reliability of All Services
Generate Possible Resource Allocation Matrices Using 2-Way Split Backward Search Algorithm and Compu
Use Trust Computations to Find Out the Minimal Allocation with Maximal Reliability
Advantages
Future Work
Conclusion
References
Virtualization Techniques: A Methodical Review of XEN and KVM
Introduction
Virtualization Approaches and Implementations
Overview
XEN: Architecture
KVM: Architecture
Qualitative Comparison
Xen Implementation and Performance Evaluation
Xen Implementation
Performance Evaluation of Xen Implementation
Discussion
Conclusion
References
An Optimal Workflow Based Scheduling and Resource Allocation in Cloud
Introduction
Related Work
Resource Monitoring
Workflow Based Scheduling Strategy
Implementation
Conclusion and Future Work
References
Energy Efficient Time Synchronization Protocol for Wireless Sensor Networks
Introduction
Related Work
Existing Synchronization Protocols
Clustered Based WSNs Model
System Model
Assumption of Proposed Algorithm
Proposed Algorithm
Energy Analysis
Simulation and Analysis
Conclusion
References
Elastic VM for Cloud Resources Provisioning Optimization
Introduction
Overview
Apache Server
SLOs Enforcement Complexity
Feedback Control of Computing Systems
Elastic VM Architecture
Related Work
Experimental Setup
Experimental Setup 1
Experimental Setup 2
Experimental Setup 3
Conclusions and Future Work
References
Employing Bloom Filters for Enforcing Integrity of Outsourced Databases in Cloud Environments
Introduction
Related Work
Database Integrity with Bloom Filters
Aggregated Signatures with Bloom Filter
Authenticated Data Structures Using Bloom Filters
Results
Results for Aggregated Signatures Using Bloom Filters
Results for Authenticated Data Structures Using Bloom Filters
Conclusion and Future Work
References
Parallel Implementation of Part of Speech Tagging for Text Mining Using Grid Computing
Introduction
Background
Part of Speech Tagging
Grid Computing and Globus Toolkit
System Design
Implementation
Results and Discussion
Conclusion and Future Works
References
SLA with Dual Party Beneficiality in Distributed Cloud
Introduction
Related Work
The Proposed Framework
Cloud Computing Architecture
Working Principle of the Architecture
Lease Request Generation
Negotiation
SLA Formation
Simulated Scenarios
Performance Analysis
Waiting Time, Memory and CPU Speed Violation
Cloud Provider Income and Makespan
Conclusion
References
Privacy Preserving Keyword Search over Encrypted Cloud Data
Introduction
Related Work
System Model
Secure Inverted Index Scheme
Framework
Security Analysis
Result
Conclusion
References
Preventing Insider Attacks in the Cloud
Introduction
Related Work
Architecture
Cloud Manager
Trusted Policy Enforcement Entity (TPEE)
Node Allocation Table
Policy Creation Module
Policy Stores
Policy Integrity Verification Module
Policy Enforcement Engine
Access Control Protocols
Establishing Mutual Trust
Policy Creation
Policy Propagation
Policy Enforcement
Illustration
Conclusions
References
C2C (Cloud-to-Cloud): An Ecosystem of Cloud Service Providers for Dynamic Resource Provisioning
Introduction
Background and Related Work
System Model
Sequence of Operations
Experimental Results
Assumptions
Conclusions and Future Work
References
Modeling Cloud SaaS with SOA and MDA
Introduction
Cloud Computing
Model Driven Architecture (MDA)
Service Oriented Architecture (SOA)
Cloud SaaS, SOA and Interoperability
Cloud SaaS and Model Driven Architecture (MDA)
Conclusion and Future Work
References
Cognitive Radio and Cognitive Networks
Optimized Subcarrier Power Allocation in OFDM Underlay Cognitive Radio System
Introduction
Review of Related Works, Limitation and Scope of the Present Work
Review of Related Works
Scope of the Work
Proposed Power Allocation Algorithm
System Model
Interference Introduced by the Secondary User’s Signal
Interference Introduced by the Primary User’s Signal
Problem Formulation
Performance Evaluation and Discussion
Conclusions and Scope of Future Works
References
Multimedia Traffic Transmission over Cognitive Radio Networks Using Multiple Description Coding
Introduction
System Descriptions
Spectrum Pooling Concept
Proposed Work
General Analysis
Formalizing the Transmission Problem
Priority Encoding Transmission Framework for CR Networks
An Analytical Expression for PPU(n)
An Analytical Expression for PSC(n)
PSNR Maximization Problem
Numerical Results
General Simulations
Comparison with Previous Works
Conclusion
References
Cyber Forensics
Digital Image Evidence Detection Based on Skin Tone Filtering Technique
Introduction
Retrieving Picture Files from Digital Media
Introduction to File Systems
Retrieval of Undeleted Files
Retrieval of Deleted Files
Skin Tone Filtering
RGB Skin Detection Technique
Algorithm to Detect Skin Tone in a Given Picture File
Results
Conclusion
References
BlackBerry Forensics: An Agent Based Approach for Database Acquisition
Introduction
Digital Evidential Principles
BlackBerry Device
IPD File Generation
The Proposed Approach
Agent File Accessing BlackBerry Data
Uploading Agent to Blackberry Device
Agent Based Acquisition
Authentication of Evidence
BlackBerry Acquisition and Analysis Tool
Advantages of the Tool
Conclusion
References
Scattered Feature Space for Malware Analysis
Introduction
Related Work
Proposed Method for Malware Analysis
Portable Executable Features
Feature Processing
Evaluation Metrics
Experimental Setup
Results and Analysis
Classification Results
Effect of Feature Vector Lengths (PE Header)
Prominent PE Header Entries
Performance of Classifiers
Conclusions
References
Database and Information Systems
Multilevel Policy Based Security in Distributed Database
Introduction
Proposed Model
Consistency Controlled System
Policy Integration
Policy Implementation
Comparisons with Other Related Approaches
Conclusion
References
Mining Indirect Positive and Negative Association Rules
Introduction
Basic Concepts and Terminology
Negative Association Rules
Indirect Association
Indirect Negative Association
Related Work in Indirect Association Rule Mining
Algorithm
Experimental Results and Performance Evaluation
Conclusion and Future Work
References
Application of FOP and AOP Methodologies in Concert for Developing Insurance Software Using Eclipse-
Introduction
Insurance System
Software Requirements
Design and Implementation
Feature Model
Feature Implementation
Identification of Crosscutting Concerns and Aspects
Implementation of Aspects
Discussion
Conclusion
References
Revisiting B-Trees
Introduction
Literature Survey
Our Contribution
B-Tree Definition and Examples
Upper and Lower Bounds on Height of a B-Tree
Organization of the Page
Time Complexity of the Algorithms
Choosing Optimum Value for k
Observations
Conclusion
References
Multi-density Clustering Algorithm for Anomaly Detection Using KDD’99 Dataset
Introduction
Literature Survey
Clustering
Problem Definition and Proposed Algorithm
Training Steps for Proposed Anomaly Detection Algorithm
Proposed Testing Algorithm for Anomaly Detection
Experiment and Results
Experimental Data
Determination of Number of Cluster and Branching Factor
Results
Comparison of Results with Other Clustering Algorithms
Conclusion
References
LLAC: Lazy Learning in Associative Classification
Introduction
Related Works
Lazy Learning Associative Classification (LLAC)
Problem Definition
Experimental Results
Conclusion
References
Association Rule Mining Using Genetic Algorithm: The Role of Estimation Parameters
Introduction
Association Rules and Genetic Algorithms
Association Rules
Genetic Algorithm
Methodology
Parameters in Genetic Algorithm
Encoding
Population
Selection
Fitness Function
Crossover Operator
Mutation Operator
Number of Generations
Experimental Studies
Conclusion
References
UDSCA: Uniform Distribution Based Spatial Clustering Algorithm
Introduction
Related Works
Benefits and Limitations
Basic Notions of UDSCA
Problems in Existing Approaches
Formal Definition of LRD (Local Reachability Density)
UDSCA
Proposed Approach of Making Eps Adaptive
Heuristic for Improving the Running Time of the Algorithm
The Algorithm
Parameter Minpts
Performance Evaluation
Complexity Analysis
Experimental Evaluation
References
A Classification Model for Customer Segmentation
Introduction
Related Works
Customer Value
High Utility Pattern Mining
Basic Terms and Definitions
A Conceptual Framework for Customer Category Prediction Model
Dataset Description
Determination of Class Label
Constructing Classifier Model
Conclusion
References
A Rough Set Based Approach for Ranking Decision Rules
Introduction
Rule Induction
Ranking of Conditional Attributes of a Decision Table
Degree of Significance of a Rule
Proposed Work
Rules Ranking Algorithm
Experiments
Conclusion
References
A Kernel Based Feature Selection Method Used in the Diagnosis of Wisconsin Breast Cancer Dataset
Introduction
Related Work and Literature Survey
Feature Selection
F-Score
Support Vector Machines
Experimental Observations
Results and Discussion
Conclusion
References
Comparative Study on Data Warehouse Evolution Techniques
Introduction
State of the Art
Schema Evolution
Schema Versioning
View Maintenance
Temporal Warehousing
Comparison of Research Works
Conclusion
References
An Adaptive Framework for Clustering Data Streams
Introduction
Related Work
Data Stream Mining Quality
Resource Adaptation
A Generic Framework
Description of the Framework
Using the Framework for Data Stream Clustering
Conclusion and Future Work
References
Author Index
People also search for Advances in Computing and Communications Part I First International Conference ACC 2011 Kochi India July 22 24 2011 Proceedings 1st :
international conference on advances in computing and communications
advances in computing and network communications
advances in computing communications and informatics
communication advancements in the industrial revolution