Data storage management is one of the most challenging issues for grid resource management since large amount of data intensive applications frequently involve a high degree of data access locality. grid applications ...
详细信息
Full adders is the basic building block of ALU and ALU is a basic functioning unit of the microprocessors and DSP. In the world of technology it has become essential to develop various new design methodologies to redu...
详细信息
Full adders is the basic building block of ALU and ALU is a basic functioning unit of the microprocessors and DSP. In the world of technology it has become essential to develop various new design methodologies to reduce the power and area consumption. In this paper transmission gates have been used to develop the proposed full adder using 6 transistors XOR gates. The carry logic has been efficiently implemented using 2×1 MUX to reduce transistor count. The reduction in Transistor count results in improved area and power consumption. The proposed full adder has been designed using 27 and 18 transistors using 90 nm technologies. The developed adder with 18 transistors has shown an improvement of 6.624% in power and 31.765% in area so as to implement adder efficiently in digital signal processors.
Virtualization, as a technology that enables easy and effective resource sharing with a low cost and energy footprint, is becoming increasingly popular not only in enterprises but also in high performance computing. A...
详细信息
Virtualization, as a technology that enables easy and effective resource sharing with a low cost and energy footprint, is becoming increasingly popular not only in enterprises but also in high performance computing. Applications with stringent performance needs often make use of graphics processors for accelerating their computations. Hence virtualization solutions that support GPU acceleration are gaining importance. This paper performs a detailed evaluation of three frameworks: rCUDA, gVirtuS and Xen, which support GPU acceleration through CUDA, within a virtual machine. We describe the architectures of these three solutions and compare and contrast them in terms of their fidelity, performance, multiplexing and interposition characteristics.
Providing clean, continuous and reliable power to many industrial customers has become a necessity. Where possible, sensitive customers are supplied by two low-voltage utility feeders one of which is used as backup. B...
详细信息
Routing protocols of Wireless Mesh Networks (WMNs) are mainly classified into two types proactive and reactive, which flood the packets during route discovery or dissemination and thus have limited scalability. The ot...
详细信息
Routing protocols of Wireless Mesh Networks (WMNs) are mainly classified into two types proactive and reactive, which flood the packets during route discovery or dissemination and thus have limited scalability. The other routing protocols like geographic and hierarchical protocols handle the scalability at the cost of more state information maintained at each node. Orthogonal Rendezvous Routing Protocol (ORRP) is a lightweight, scalable routing protocol which maintains even distribution of state information and thus avoids from a single point of failure. The problem associated with the ORRP is the deviation of the beam of directional antenna when we cannot find path along the orthogonal directions. In this paper we propose an efficient Orthogonal Rendezvous Routing Protocol to determine when the mandatory deviation is required, and also how to avoid the unnecessary deviation at the intermediate nodes along the orthogonal path. We have carried out extensive simulation experiments. The simulation results indicate that the performance of our proposed Modified ORRP is substantially improved when compared with the basic ORRP.
Ontology alignment plays a vital role for interoperability among the heterogeneous semantic data sources. It is a set of correspondences between two or more ontologies. There are lots of methods to measure the semanti...
Ontology alignment plays a vital role for interoperability among the heterogeneous semantic data sources. It is a set of correspondences between two or more ontologies. There are lots of methods to measure the semantic similarity between entities from several ontologies. To acquire the comprehensive and precise results, all the similarity measures are integrated. Therefore, integrating different similarity measures into a single similarity metric pose a challenging problem. In general, weights corresponding to various similarity measures are assigned manually or through some method. The problem is that it suffers from lack of optimality. There are many evolutionary based approaches to find the optimal solution but they optimize a single objective function. In this article, a multiobjective particle swarm optimization algorithm is proposed for achieving various weights correspond to different similarity measures. Then subsequently similarity aggregation function is calculated for identifying the optimal alignment. Here, two objectives precision and recall are simultaneously optimized and a optimal alignment is produced for which f-measure is very high.
In this paper, we propose a new method to develop secure image-encryption techniques using a logistics -based encryption algorithm. In this technique, a Haar wavelet transform was used to decompose the image and decor...
详细信息
In this paper, we propose a new method to develop secure image-encryption techniques using a logistics -based encryption algorithm. In this technique, a Haar wavelet transform was used to decompose the image and decorrelate its pixels into averaging and differencing components. [3] The logistic based encryption algorithm produces a cipher of the test image that has good diffusion and confusion properties [5]. The remaining components (the differencing components) are compressed using a wavelet transform. Many test images are used to demonstrate the validity of the proposed algorithm. The results of several experiments show that the proposed algorithm for image cryptosystems provides an efficient and secure approach to real-time image encryption and transmission. To send the keys in secure form stenography will be used. Steganography is a technique that allows one application to communicate information to another application without a third party even knowing that the communication is occurring. Many tests like NPCR, UACI, PSNR etc. have been done on the sample images to prove the results.
An image fusion method based on salient features is proposed in this paper. In this work, we have concentrated on salient features of the image for fusion in order to preserve all relevant information contained in the...
详细信息
An image fusion method based on salient features is proposed in this paper. In this work, we have concentrated on salient features of the image for fusion in order to preserve all relevant information contained in the input images and tried to enhance the contrast in fused image and also suppressed noise to a maximum extent. In our system, first we have applied a mask on two input images in order to conserve the high frequency information along with some low frequency information and stifle noise to a maximum extent. Thereafter, for identification of salience features from sources images, a local moment is computed in the neighborhood of a coefficient. Finally, a decision map is generated based on local moment in order to get the fused image. To verify our proposed algorithm, we have tested it on 120 sensor image pairs collected from Manchester University UK database. The experimental results show that the proposed method can provide superior fused image in terms of several quantitative fusion evaluation index.
Wireless Sensor Network (WSN) may suffer from energy-hole problem due to exhaustion of battery and/ or deliberate destruction of some network nodes. This hole is of great concern when WSN is used in surveillance appli...
详细信息
Wireless Sensor Network (WSN) may suffer from energy-hole problem due to exhaustion of battery and/ or deliberate destruction of some network nodes. This hole is of great concern when WSN is used in surveillance applications as Quality-of-Service (QoS) parameters may not be satisfied in some parts of the network. Detection and repair of these holes through redeployment of nodes is an important research challenge in WSN. In this paper, two types of node failures, namely self and intentional, are modeled with the help of random and Gaussian distribution respectively. The QoS parameters coverage and connectivity are computed using iso-sensing technique and neighbor node information respectively. Based on these parameters we perform redeployment within the budget constraints. The redeployment site is selected based on the maximum gain and a tour is planned using Travelling Salesman Problem (TSP) approach. The sensor redeployment scheme is integrated with network monitoring which results in an efficient network. Simulation results obtained with different network configurations validate the effectiveness of the proposed scheme.
Data streams mining have become a novel research topic of growing interest in knowledge discovery. The data streams which are generated from applications, such as network analysis, real time surveillance systems, sens...
详细信息
Data streams mining have become a novel research topic of growing interest in knowledge discovery. The data streams which are generated from applications, such as network analysis, real time surveillance systems, sensor networks and financial generate huge data streams. These data streams consist of millions or billions of updates and must be processed to extract the useful information. Because of the high speed and huge size of data set in data streams, the traditional classification technologies are no longer applicable. In recent years a great deal of research has been done on this problem, most intends to efficiently solve the data streams mining problem with concept drift. This paper presents a novel approach for data stream classification which handles concept drift. This approach uses weighted majority approach with adaptive sliding window strategies. The experimental result shows that this novel approach works better than other methods.
暂无评论