作者:
M. TamilSelviR. RenugaPG Scholar
Department of Computer Science and Engineering Coimbatore Institute of Technology Coimbatore - 641014 India Associate Professor
Department of Computer Science and Engineering Coimbatore Institute of Technology Coimbatore - 641014 India
Applications are featured with both text and location information, which leads to a search like: spatial approximate string search (SAS). Mainly four issues are identified in the general area of SAS. They are: (i) Spa...
详细信息
Applications are featured with both text and location information, which leads to a search like: spatial approximate string search (SAS). Mainly four issues are identified in the general area of SAS. They are: (i) Spatial approximate string search in Euclidean space (E sas ); (ii) Spatial approximate string search on road networks (R SAS ); (iii) Selectivity Estimation for E sas Range Queries; (iv) Multi-Approximate-Keyword Routing query on road networks. For efficiently answering spatial approximate string queries in Euclidean space, SAS propose a novel index structure, IR 2 -tree, which is based on the R-tree augmented with the min-wise signature and the linear hashing technique. Extensive experiments on large real data sets demonstrate the efficiency and effectiveness of the proposed approach.
Mobile Ad-hoc network (MANET) is infrastructure less, self-organizing bandwidth constraint on demand wireless network. MANET is a multi-hop wireless network therefore, needs an efficient routing protocol to transmit d...
详细信息
Mobile Ad-hoc network (MANET) is infrastructure less, self-organizing bandwidth constraint on demand wireless network. MANET is a multi-hop wireless network therefore, needs an efficient routing protocol to transmit data packet from source to destination. MANET routing protocol can be divided as proactive, reactive and hybrid. In an ad-hoc network a node cannot identify the nodes that are beyond its radio range. The nodes in MANET are movable so, a fixed path cannot be defined in between source to a destination. In MANET's reactive routing protocol, like Dynamic Source Routing (DSR), a source node locate the destination before data transmission take place by broadcasting/flooding route request (RREQ) control message and establishes the path after receiving route reply (RREP) control message. During route discovery using DSR routing protocol a malicious node may enter in between source-destination path as an intermediate node or eavesdrop to the source by sending RREP control message before original RREPs (multiple path exists between source to destination) reach to the source with unexpected path information. As a result, without knowing anything source may deliver data packet to a different destination. In this paper, we identified the issues and proposed a solution to prevent to enter the malicious node in between source-destination path. In our proposal, initially we formed a group by considering neighbour nodes of an individual node from the original network and presented the way of communication by the group member using Diffie-Hellman group key (GDH) management scheme in the network through our proposed algorithm. Our proposed algorithm will prevent a malicious node to enter in between source-destination path during route discovery using DSR routing protocol. Further our technique prevents to gainaccess to any node in the network except the group member hence malicious node cannot identify the source to sent RREP control message with wrong path information.
作者:
K. VaidehiT.S. SubashiniResearch Scholar
Department of Computer Science and Engineering Faculty of Engineering and Technology Annamalai University India Associate Professor
Department of Computer Science and EngineeringFaculty of Engineering and Technology Annamalai University India
The paper aims to develop an automated breast mass characterization system for assisting the radiologist to analyze the digital mammograms. Mammographic Image Analysis Society (MIAS) database images are used in this s...
详细信息
The paper aims to develop an automated breast mass characterization system for assisting the radiologist to analyze the digital mammograms. Mammographic Image Analysis Society (MIAS) database images are used in this study. Fuzzy C-means technique is used to segment the mass region from the input image. GLCM texture features namely contrast, correlation, energy and homogeneity are obtained from the region of interest. The texture features extracted from gray level co-occurrence matrix (GLCM) are computed at distance d=1 and θ=0 o , 45 o , 90 o , 135 o . These with three classifiers namely adaboost, back propagation neural network and sparse representation classifiers are used for characterizing the region containing either benign mass or malignant mass. The experimental results show the SRC classifier is more effective with an accuracy of 93.75% and with the Mathew's correlation coefficient (MCC) of 87.35%.
作者:
S. SosuthaD. MohanaPG Scholar
Department of Computer Science and EngineeringCoimbatore Institute of Technology Coimbatore and 641014 India Associate Professor
Department of Computer Science and Engineering Coimbatore Institute of Technology Coimbatore and 641014 India
CUDA ( Compute Unified Device Architecture ) is a parallel computing platform and programming model created by NVIDIA and implemented by the graphics processing units (GPUs) that they produce. Using CUDA, the GPUs can...
详细信息
CUDA ( Compute Unified Device Architecture ) is a parallel computing platform and programming model created by NVIDIA and implemented by the graphics processing units (GPUs) that they produce. Using CUDA, the GPUs can be used for general purpose processing which involves parallel computation. CUDA has been used to accelerate non-graphical applications in computational biology, cryptography and other fields by an order of magnitude or more. Chemical processes need validation of their experimental data. It was found that Chemical process could become one such application where CUDA can be efficiently used. These validations of Chemical processes normally involve calculation of many coefficients. The chemical process that has been chosen for parallelizing is Heat Transfer process. This process involves calculation of coefficients for multiple iterations. As each of these iterations is independent of one another, CUDA was used to parallelize the calculation process. The execution time analysis shows that though CPU outperforms GPU when the numbers of iterations are less, when the number of iterations increase the GPU outperforms CPU greatly.
作者:
R. Ragul RaviV. JayanthiPG Scholar
Department of Computer science and Engineering Coimbatore institute of technology Coimbatore and 641014 India Assistant Professor
Department of Computer science and Engineering Coimbatore institute of technology Coimbatore and 641014 India
Wireless networks adapt easily to changes and offers flexibility in the configuration of the network. In MANET, each node will change its location dynamically and configure itself according to the environment. An effe...
详细信息
Wireless networks adapt easily to changes and offers flexibility in the configuration of the network. In MANET, each node will change its location dynamically and configure itself according to the environment. An effective mechanism for route discovery in such networks is broadcasting, but routing overhead associated with broadcasting can be large in high dynamic networks. To reduce this routing overhead in MANETs, a neighbor coverage based probabilistic rebroadcast protocol is used. To determine the rebroadcast order, a novel rebroadcast delay is used and it obtains the more accurate additional coverage ratio by sensing neighbor coverage knowledge. The rebroadcast probability is calculated by merging the additional coverage ratio and connectivity factor. In the proposed method Energy Efficient Neighbor Coverage Protocol(EENCP) is introduced. In this, the node does not forward RREQ unless there is sufficient energy (battery lifetime), and until the node density in its surrounding exceeds a particular threshold. These two parameters are defined taking into consideration various statistics. EENCP analyzes these two parameters, when implementing routing discovery, and avoiding the unnecessary information sending efficiently and avoid unnecessary information transfer.
作者:
K. SumathiA. PriyadharshiniPG Scholar
Department of Computer Science and Engineering Coimbatore Institute of Technology Coimbatore and 641014 India Assistant professor
Department of Computer Science and Engineering Coimbatore Institute of Technology Coimbatore and 641014 India
Mobile Ad hoc networks (MANET) allow a set of wireless hosts to exchange information without any special infrastructure. The projct entitled “ Energy Optimization in Manets using On-Demand Routing Protocol” motivate...
详细信息
Mobile Ad hoc networks (MANET) allow a set of wireless hosts to exchange information without any special infrastructure. The projct entitled “ Energy Optimization in Manets using On-Demand Routing Protocol” motivates the need for energy management in ad hoc wireless networks. Limited battery power is one of the most important issues in mobile ad hoc network as the mobile nodes operate in limited battery power. Also there occurs a problem of broken links due to the lack of energy which cause disorder in network system. Such problem occurs due to the unawareness of energy of mobile neighbor nodes. This paper presents the implementation of Adaptive HELLO messaging scheme to determine the local link connectivity information for monitoring the link status between nodes along with the incorporation of Dynamic On Demand Routing Protocol to reduce the energy consumption of mobile nodes to certain extent.
The software testing is the process of detecting & correcting errors in the transformation of programming system to software. The programming system is the executable code as per the developer. It contains the lim...
The software testing is the process of detecting & correcting errors in the transformation of programming system to software. The programming system is the executable code as per the developer. It contains the limited syntactics, semantics of the programming language as per the pragmatics visualized by the developer. This has to be transformed into the software to incorporate pragmatics of all types of users of the system and also the robustness. The current software testing methodology is carried out manually through human skill based test cases and test oracles. This has the limitation in the correctness, completeness, efficiency and robustness. In the suigeneris methodology, the structural testing is carried out as a byproduct. The methodology uses reverse engineering technique to limit the semiotics of the programming system. The reverse engineered UML diagrams, each have been developed automatically with suigeneris purpose which can be used for testing tampered sequence, lapse in behavior, lack of inclusion of other semiotics, robustness in activities and handling exceptional data. The class diagram which is hither to used as ornamental, has been transformed to very resourceful diagram that identifies imbrication of different work processes, different works and different usecases. The entire tutorial is developed with automated tools supported by sound mathematical empiricism. The tutorial explains the methodology with typical case study.
作者:
G.N. BalajiT.S. SubashiniN. ChidambaramResearch scholar
Department of computer science and Engineering Faculty of Engineering and Technology Annamalai University India Associate professor
Department of computer science and Engineering Faculty of Engineering and Technology Annamalai University India Professor and Head
Department of Cardiology Faculty of Medicine Annamalai University India
Automatic classification cardiac views is the first step to automate wall motion analysis, computer aided disease diagnosis, measurement computation etc. In this paper a fully automatic classification of cardiac view ...
详细信息
Automatic classification cardiac views is the first step to automate wall motion analysis, computer aided disease diagnosis, measurement computation etc. In this paper a fully automatic classification of cardiac view in echocardiogram is proposed. The system is built based on a machine learning approach which characterizes two features 1) Histogram features and 2) Statistical features. In this system four standard views parasternal short axis (PSAX), parasternal long axis (PLAX), apical two chamber (A2C) and apical four chamber (A4C) views are classified. Experiments over 200 echocardiogram images show that the proposed method with an accuracy of 87.5% can be effectively used in cardiac view classification.
Commercially available mobile devices with various kinds of hardware and software platforms have resulted in a huge amount of mobile services. This has a new challenge in designing multiple services that are compatibl...
详细信息
For today's most demanding service of cloud computing, there are many tasks required to be executed by the available resources to achieve best performance, reduce response time and utilize resources. There is a ne...
详细信息
For today's most demanding service of cloud computing, there are many tasks required to be executed by the available resources to achieve best performance, reduce response time and utilize resources. There is a need of designing a new task scheduling algorithm that outperform appropriate allocation map of task. to achieve these challenges. As Load Balanced Min-Min Algorithm selects the task with minimum completion time and assigns it to appropriate resource, it sometimes does not produce better makespan and does not utilize resources effectively. This paper represents study of variety of task scheduling algorithms and modification of Load balanced Min-Min (ELBMM) algorithm for Static Meta-Task Scheduling. The modified algorithm is built based on comprehensive study of the impact of Load balanced Min-Min algorithm for Static Meta-Task Scheduling in grid computing. Enhanced Load balanced Min-Min algorithm (ELBMM) is based on Min-Min strategy and tasks rescheduling to use the unutilized resources effectively. It selects the task with maximum completion time and assigns it to appropriate resource to produce better makespan and utilize resource effectively.
暂无评论