Reliable transfer on Wireless device Networks
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.105-216, Sep-2014
Abstract
Many presentations in Wireless device Networks, counting construction monitoring, need gathering all figures without damage after nodes. End-to-end retransmission, which is used in the internet for dependable transport, develops very incompetent in Wireless device Networks, since wireless communication, and forced capitals posture new challenges. We appearance at subjects affecting reliability, and hunt for well-organized mixtures of the likely options. Info joblessness alike retransmission, and removal codes, can be used. Route fix, which tries supernumerary next hop after certain failures, also decreases pack loss. We applied and assessed these choices on an actual test bed of Berkeley mica2dot motes. Our new consequences show that all choice overwhelms dissimilar kinds of failures. Link-level retransmission is well-organized nonetheless incomplete in attaining reliability. Removal cypher allows very tall dependability by standing pack losses. Route fix replies to link disappointments quickly. Preceding work consumed originate it problematic to upsurge dependability past a sure threshold. We show that the correct mixture of primitives can yield additional than 99% dependability with low overhead, if a viable supernumerary to end-to-end retransmission over manifold hops.
Key-Words / Index Term
Component; Formatting; Style; Styling; Insert
References
[1] Yih-Lang Li ; Dept. of Comput. Sci., Nat. Chiao Tung Univ., Hsinchu ; Jin-Yih Li ; Wen-Bin Chen �An Efficient Tile-Based ECO Router Using Routing Graph Reduction and Enhanced Global Routing Flow� Published in: Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on (Volume:26 , Issue: 2 ) Date of Publication: Feb. 2007 Page(s): 345 � 358.
[2] Yanheng Zhang ; Placement Technol. Group, Cadence Design Syst., San Jose, CA, USA ; Chu, C. �GDRouter: Interleaved global routing and detailed routing for ultimate routability� Published in: Design Automation Conference (DAC), 2012 49th ACM/EDAC/IEEE Date of Conference: 3-7 June 2012 Page(s): 597 � 602.
[3] Dongsoo Kim ; Stony Brook Univ., Stony Brook, NY, USA ; Noel, E. ; Tang, K.W. �Reliable and efficient routing protocol for graph theory based communication topology� Published in: Performance Computing and Communications Conference (IPCCC), 2013 IEEE 32nd International Date of Conference: 6-8 Dec. 2013 Page(s): 1 � 10.
[4] Samar, P. ; Sch. of Electr. & Comput. Eng., Cornell Univ., Ithaca, NY, USA ; Pearlman, M.R. ; Haas, Z.J. �Independent zone routing: an adaptive hybrid routing framework for ad hoc wireless networks� Published in: Networking, IEEE/ACM Transactions on (Volume:12 , Issue: 4 ) Date of Publication: Aug. 2004 Page(s): 595 � 608.
[5] Jie Wu ; Dept. of Comput. & Inf. Sci., Temple Univ., Philadelphia, PA, USA ; Yunsheng Wang �Hypercube-Based Multipath Social Feature Routing in Human Contact Networks� Published in: Computers, IEEE Transactions on (Volume:63 , Issue: 2 ) Date of Publication: Feb. 2014 Page(s): 383 � 396.
[6] Ravilla, D. ; Dept. of Electron. & Commun. Eng., Manipal Inst. of Technol., Manipal, India ; Sumalatha, V. ; Reddy, P.C.S. �Performance comparisons of ZRP and IZRP routing protocols for ad hoc wireless networks� Published in: Energy, Automation, and Signal (ICEAS), 2011 International Conference on Date of Conference: 28-30 Dec. 2011 Page(s): 1 � 8.
[7] Hwa-Chun Lin ; Dept. of Comput. Sci., Nat. Tsing Hua Univ., Hsinchu ; Sheng-Wei Wang ; Meng-Lin Hung �Finding Routing Paths for Alternate Routing in All-Optical WDM Networks� Published in: Lightwave Technology, Journal of (Volume:26 , Issue: 11 ) Date of Publication: June1, 2008 Page(s): 1432 � 1444.
[8] Jianlin Guo ; Mitsubishi Electr. Res. Labs., Cambridge, MA, USA ; Orlik, P. ; Jinyun Zhang ; Ishibashi, K. �Reliable routing in large scale wireless sensor networks� Published in: Ubiquitous and Future Networks (ICUFN), 2014 Sixth International Conf on Date of Conference: 8-11 July 201 Page(s): 99 � 104.
[9] Moustafa, M.A. ; Dept. of Comput. & Syst. Eng., Alexandria Univ., Alexandria, Egypt ; Youssef, M. ; El-Derini, M.N. �MSR: A multipath secure reliable routing protocol for WSNs� Published in: Computer Systems and Applications (AICCSA), 2011 9th IEEE/ACS International Conference on Date of Conference: 27-30 Dec. 2011 Page(s): 54 � 59.
[10] [10] Rezgui, A. ; Sch. of Inf. Sci., Univ. of Pittsburgh, Pittsburgh, PA ; Eltoweissy, M. �μRACER: A Reliable Adaptive Service-Driven Efficient Routing Protocol Suite for Sensor-Actuator Networks� Published in: Parallel and Distributed Systems, IEEE Transactions on (Volume:20 , Issue: 5 ) Date of Publication: May 2009 Page(s): 607 - 622 .
[11] [11] Hu Rong ; Sch. of Inf. Sci. & Eng., Central South Univ., Changsha, China ; Hu Zhigang ; Ma Hao �A reliable routing algorithm based on fuzzy applicability of F sets in MANET� Published in: Dependable Computing, 2005. Proceedings. 11th Pacific Rim International Symposium on Date of Conference: 12-14 Dec. 2005.
[12] Jiann-Liang Chen ; Nat. Dong Hwa Univ., Hualien ; Huan-Wen Tzeng ; Chia-Ping Lai �Routing Mechanism for Reliable Sensor Network Applications� Published in: Systems and Networks Communications, 2007. ICSNC 2007. Second International Conference on Date of Conference: 25-31 Aug. 2007 Page(s): 34.
[13] Hua Song ; Sch. of Inf. Sci. & Technol., Sun Yat-sen Univ., Guangzhou, China ; Xiaola Lin �Spectrum aware highly reliable routing in multihop cognitive radio networks� Published in: Wireless Communications & Signal Processing, 2009. WCSP 2009. International Conference on Date of Conference: 13-15 Nov. 2009 Page(s): 1 � 5.
[14] Nen-Chung Wang ; Dept. of Comput. Sci. & Inf. Eng., Nat. United Univ., Miao-Li ; Chao-Yang Lee �A Reliable QoS Routing Protocol for Mobile Ad Hoc Networks with Multi-Path Strategy� Published in: Networks, 2006. ICON `06. 14th IEEE International Conference on (Volume:2 ) Date of Conference: Sept. 2006 Page(s): 1 � 6.
[15] Krco, S. ; Tsiatsis, V. ; Matusikova, K. ; Johansson, M. more authors, �Mobile Network Supported Wireless Sensor Network Services� Published in:Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE Internatonal Conference on Date of Conference: 8-11 Oct. 2007 Page(s): 1 � 3
[16] Xuhui Chen ; Coll. of Comput. & Commun., Lanzhou Univ. of Technol., Lanzhou, China ; Peiqiang Yu, �Research on hierarchical mobile wireless sensor network architecture with mobile sensor nodes� Published in: Biomedical Engineering and Informatics (BMEI), 2010 3rd International Conference on (Volume:7 ) Date of Conference: 16-18 Oct. 2010 Page(s): 2863 � 2867
[17] Zhang, Xuyuan ; Sch. of Commun. & Inf. Eng., Dept. Commun. Eng., Shanghai Univ., Shanghai, China, �Model Design of Wireless Sensor Network Based on Scale-Free Network Theory� Published in: Wireless Communications, Networking and Mobile Computing, 2009. WiCom `09. 5th International Conference on Date of Conference: 24-26 Sept. 2009 Page(s): 1 � 4
[18] Yong-Sik Choi ; Dept. of Comput. Sci. & Eng., Univ. of Incheon, Incheon, South Korea ; Young-Jun Jeon ; Sang-Hyun Park, �A study on sensor nodes attestation protocol in a Wireless Sensor Network� Published in: Advanced Communication Technology (ICACT), 2010 The 12th International Conference on (Volume:1 ) Date of Conference: 7-10 Feb. 2010 Page(s): 574 � 579
[19] Yang Wenguo ; Coll. of Engneering, Grad. Univ. of the Chinese Acad. of Sci., Beijing, China ; Guo Tiande, �Notice of Retraction The Non-uniform Property of Energy Consumption and its Solution to the Wireless Sensor Network� Published in: Education Technology and Computer Science (ETCS), 2010 Second International Workshop on (Volume:2 ) Date of Conference: 6-7 March 2010 Page(s): 186 � 192
[20] Mitra, S. ; Dept. of Comput. Sci. & Eng., Birla Inst. of Technol., Mesra, India ; De Sarkar, A. �Energy aware fault tolerant framework in Wireless Sensor Network� Published in: Applications and Innovations in Mobile Computing (AIMoC), 2014 Date of Conference: Feb. 27 2014-March 1 2014 Page(s): 139 - 145
[21] Chi-Tsun Cheng ; Dept. of Electr. & Comput. Eng., Univ. of Calgary, Calgary, AB, Canada ; Tse, C.K. ; Lau, F.C.M. �A Delay-Aware Data Collection Network Structure for Wireless Sensor Networks� Published in: Sensors Journal, IEEE (Volume:11 , Issue: 3 ) Date of Publication: March 2011 Page(s): 699 - 710
[22] Malandrino, F. ; Politec. di Torino, Turin, Italy ; Borgiattino, C. ; Casetti, C. ; Chiasserini, C.-F. more authors, �Verification and Inference of Positions in Vehicular Networks through Anonymous Beaconing� Published in: Mobile Computing, IEEE Transactions on (Volume:13 , Issue: 10 ) Date of Publication: Oct. 2014 Page(s): 2415 � 2428
[23] Davies, G.L. �Theory of Design and Calibration of Vibrating Reed Indicators for Radio Range Beacons� Published in: Radio Engineers, Proceedings of the Institute of (Volume:20 , Issue: 1 ) Date of Publication: Jan. 1932 Page(s): 161 � 181
[24] Rokitansky, C.-H. ; Commun. Networks, RWTH Aachen Univ. of Technol., Germany, �SIMCO2: simulator for performance evaluation of vehicle-beacon and inter-vehicle communication protocols (media access/knowledge-based routing)� Published in: Vehicular Technology Conference, 1991. Gateway to the Future Technology in Motion., 41st IEEE Date of Conference: 19-22 May 1991 Page(s): 893 � 899
[25] Malandrino, F. ; Casetti, C. ; Chiasserini, C.F. ; Fiore, M. more authors, �A-VIP: Anonymous verification and inference of positions in vehicular networks� Published in: INFOCOM, 2013 Proceedings IEEE Date of Conference:14-19 April 2013 Page(s): 105 - 109
Citation
A.K. Vizhi, L. VijayaKalyani, "Reliable transfer on Wireless device Networks," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.105-216, 2014.
A New Tactic to Establish Organized Figures in Mobile Location
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.117-123, Sep-2014
Abstract
A unique tactic to establish organized figures in moveable plans propounds an IOPBD (Improved organization procedure based on tenable communication Digest) in instruction to ease figures organization among a server-side catalogue and a moveable database. The IOPBD procedure brands a communication abridgment bench (MDT) at the waiter catalogue and the moveable catalogue using safe communication Digest. The communication abridgment bench grips the encoded procedure of figures stowed by the user. These communication abridgment benches are likened row-wise in instruction to choice the rows wanted for synchronization. If and when any two rows of these met are different, the organization procedure progresses rendering to the organization policy. The IOPBD procedure fixes not use methods that are reliant on exact catalogue vendors; neither fixes it use triggers, stowed procedures or timestamps. The IOPBD uses only the normal sql meanings for the synchronization. The IOPBD procedure can be used in any mixtures of server-side catalogue and moveable catalogue since of its independency of catalogue vendor. The encoded figures stowed in the waiter catalogue can be decrypted and protected upon user�s request. Keywords: wireless networks, processer nets and others.
Key-Words / Index Term
wireless networks, processer nets
References
[1] Fang-Chen Cheng ; Wireless Inf. Network Lab., Rutgers Univ., Piscataway, NJ, USA ; Holtzman, J.M. �Wireless intelligent ATM network and protocol design for future personal communication systems� Published in: Selected Areas in Communications, IEEE Journal on (Volume:15 , Issue: 7 )Date of Publication:Sep 1997Page(s): 1289 � 1307.
[2] Zeyu Zheng ; Dept. of Comput. Sci., City Univ. of Hong Kong, Hong Kong, China ; Jianping Wang ; Jin Wang, �A Study of Network Throughput Gain in Optical-Wireless (FiWi) Networks Subject to Peer-to-Peer Communications� Published in:Communications, 2009. ICC `09. IEEE International Conference on Date of Conference:14-18 June 2009 Page(s): 1 � 6.
[3] Uchida, N. ; Fac. of Software & Inf. Sci., Iwate Prefectural Univ., Iwate, Japan ; Takahata, K. ; Shibata, Y. �Evaluation of Cognitive Wireless Networks in Rural Area for Disaster Information Network� Published in: Computational Science and Its Applications (ICCSA), 2011 International Conference on Date of Conference: 20-23 June 2011 Page(s): 135 � 142.
[4] LaSorte, N.J. ; Electr. & Comput. Eng, Univ. of Oklahoma, Tulsa, OK, USA ; Bloom, D. ; Rajab, S. ; Refai, H.H. �Creating an automated and emulated 802.11g wireless interfering network for wireless coexistence testing� Published in: Instrumentation and Measurement Technology Conference (I2MTC), 2013 IEEE International Date of Conference: 6-9 May 2013 Page(s): 1022 � 1027.
[5] Gusev, M. ; Fac. of Comput. Sci. & Eng., Ss. Cyril & Methodius Univ., Skopje, Macedonia ; Ristov, S. ; Donevski, A. �Integrating practical CISCO CCNA courses in the Computer Networks` curriculum� Published in: Global Engineering Education Conference (EDUCON), 2014 IEEE Date of Conference: 3-5 April 2014 Page(s): 499 � 506.
[6] Nykolaiychuk, Y. ; Inst. of Comput. Inf. Technol., Ternopil Acad. of Nat. Econ., Ukraine ; Kudriashov, Y. ; Yatskiv, V. ; Lenhyuk, T. �A strategy and outlook for creation in Ukraine of multilevel computer networks with opened optical channels� Published in: Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, International Workshop on, 2001. Date of Conference: 2001 Page(s): 95 � 98.
[7] McAfee, L.C., Jr. ; Dept. of Electr. Eng. & Comput. Sci., Michigan Univ., Ann Arbor, MI, USA �Models and simulation for analysis of a computer network� Published in: Circuits and Systems, 1993., Proceedings of the 36th Midwest Symposium on Date of Conference: 16-18 Aug 1993 Page(s): 1316 - 1319 vol.2.
[8] Jian Feng ; Coll. of Comput. Sci. & Technol., Xi`an Univ. of Sci. & Technol., Xi`an, China �Notice of Retraction Research on Teaching Reform of Computer Networks Course� Published in: Education Technology and Training, 2009. ETT `09. Second International Conference on Date of Conference: 13-14 Dec. 2009 Page(s): 79 � 82.
[9] Ismail, Z. ; Kuliyyah of Inf. Sci. & Technol., Kolej Univ. Insaniah, Alor Setar, Malaysia ; Hassan, R. �Effects of Packet Size on AODV Routing Protocol Implementation in Homogeneous and Heterogeneous MANET� Published in: Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference on Date of Conference: 20-22 Sept. 2011 Page(s): 351 � 356.
[10] Ismail, Z. ; Kuliyyah of Inf. Sci. & Technol., Kolej Univ. Insaniah, Alor Setar, Malaysia ; Hassan, R. �A performance study of various mobility speed on AODV routing protocol in homogeneous and heterogeneous MANET� Published in: Communications (APCC), 2011 17th Asia-Pacific Conference on Date of Conference: 2-5 Oct. 2011 Page(s): 637 � 642.
[11] Gnana Jayanthi, J. ; Dept. of Comput. Sci., St. Joseph``s Coll., Tiruchirappalli, India ; Rabara, S.A. ; Macedo Arokiaraj, A.R. �IPv6 MANET: An Essential Technology for Future Pervasive Computing� Published in: Communication Software and Networks, 2010. ICCSN `10. Second International Conference on Date of Conference: 26-28 Feb. 2010 Page(s): 466 � 470.
[12] Lacharite, Y. ; Commun. Res. Centre, Ottawa ; Wang, M. ; Lamont, L. ; Landmark, L. �A Simplified Approach to Multicast Forwarding Gateways in MANET� Published in: Wireless Communication Systems, 2007. ISWCS 2007. 4th International Symposium on Date of Conference: 17-19 Oct. 2007 Page(s): 426 � 430.
[13] Jun Sun ; Fossa, C. ; Mak, T. �On heterogeneous mobile network connectivity: Number of gateway nodes� Published in: MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011 Date of Conference: 7-10 Nov. 2011 Page(s): 1915 � 1920.
[14] Ali, M.B. ; Fac. of Comput. Sci. & Inf. Technol., Albutana Univ., Ruffaa, Sudan ; Abdalla, A.H. ; El-Azhary, I. �Investigation of Nested Nemo Schemes in mobile network environment� Published in: Computing, Electrical and Electronics Engineering (ICCEEE), 2013 International Conference on Date of Conference: 26-28 Aug. 2013 Page(s): 492 � 496.
[15] Okano, K. ; Grad. Sch. of Inf. Sci., Hiroshima City Univ., Hiroshima, Japan ; Ohta, T. ; Kakuda, Y. �A dynamic network gateway selection scheme based on autonomous clustering for heterogeneous mobile ad hoc network environment� Published in: Globecom Workshops (GC Wkshps), 2012 IEEE Date of Conference: 3-7 Dec. 2012 Page(s): 513 � 517.
[16] Ohta, T. ; Grad. Sch. of Inf. Sci., Hiroshima City Univ., Hiroshima, Japan ; Hashimoto, T. ; Kakuda, Y.� Self-Organizing Real-Time Service Dissemination and Collection Using Mobile Agents for Mobile Ad Hoc Networks� Published in: Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), 2011 14th IEEE International Symposium on Date of Conference: 28-31 March 2011 Page(s): 199 � 206.
[17] Khan, K. ; Dept. of CSE, Muffakham Jah Coll. of Eng. & Tech., Hyderabad ; Zaman, R.U. ; Reddy, A.V. �A bi-directional connectivity framework for Mobile ad hoc network and the internet� Published in: Wireless Days, 2008. WD `08. 1st IFIP Date of Conference: 24-27 Nov. 2008 Page(s): 1 � 5.
Citation
S.K. Devi, R. Mala, "A New Tactic to Establish Organized Figures in Mobile Location," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.117-123, 2014.
Optimum Communicate Assortment for Vigor-Efficient Obliging Ad-hoc Networks
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.124-129, Sep-2014
Abstract
The obliging communication (CC) is a skill that permits manifold nodes to concurrently transmit the alike data. It can but control and spread transmission coverage. However, previous investigation work on topology switch reproduces cc only in the eye of vigor saving, not that of attention extension. We classify the examinations in the development of a central topology switch scheme, called obliging Bridges, which decreases transmission control of nodes as well as upsurges net connectivity. previous investigation on topology switch with cc only emphases on upholding the net connectivity, minimalizing the transmission control of all node, whereas disregards the vigor competence of trails in complete topologies. This may aim incompetent routes and upset the general net presentation in obliging ad hoc networks. In this paper, to statement this problem, we deliberate topology switch problematic for energy-efficient topology switch problematic with obliging communication. We future best communicate nodes assortment for cc net to decrease general control ingesting of network.
Key-Words / Index Term
Obliging Communication, Topology Control, Control Efficient, Avaricious Algorithm, Best Relay
References
[1] Yuan Bao ; Lei Ren ; Lin Zhang ; Xuesong Zhang ; Yongliang Luo �Massive sensor data management framework in Cloud manufacturing based on Hadoop� Industrial Informatics (INDIN), 2012 10th IEEE International Conference on Publication Year: 2012 , Page(s): 397 - 401
[2] Abbasi, A. ; Khunjush, F. ; Azimi, R. �A preliminary study of incorporating GPUs in the Hadoop framework� Computer Architecture and Digital Systems (CADS), 2012 16th CSI International Symposium on Publication Year: 2012 , Page(s): 178 � 185
[3] R.K. ; Manimegalai, R. ; Kumar, S.S. �Medical Image Retrieval System in Grid Using Hadoop Framework Grace�, Computational Science and Computational Intelligence (CSCI), 2014 International Conference on Volume: 1 Publication Year: 2014 , Page(s): 144 � 148
[4] Tomar, Anuradha ; Bodhankar, Jahnavi ; Kurariya, Pavan ; Jain, Priyanka ; Lele, Anuradha ; Darbari, Hemant ; Bhavsar, Virendrakumar C. �Translation Memory for a Machine Translation System Using the Hadoop Framework� Advances in Computing and Communications (ICACC), 2014 Fourth International Conference on Publication Year: 2014 , Page(s): 203 � 207
[5] Lan Huang ; Wang Xiao-wei ; Zhai Yan-dong ; Bin Yang �Extraction of User Profile Based on the Hadoop Framework Wireless Communications�, Networking and Mobile Computing, 2009. WiCom `09. 5th International Conference on Publication Year: 2009 , Page(s): 1 - 6
[6] Therdphapiyanak, J. ; Piromsopa, K. �An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework� Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2013 10th International Conference on Publication Year: 2013 , Page(s): 1 � 6
[7] Sethi, Priyanka, Kumar, Prakash �Leveraging hadoop framework to develop duplication detector and analysis using Mapreduce, Hive and Pig� Contemporary Computing (IC3), 2014 Seventh International Conference on Publication Year: 2014 , Page(s): 454 � 460
[8] Jai-Andaloussi, S. ; Elabdouli, A. ; Chaffai, A. ; Madrane, N. ;Sekkaki, A. �Medical content based image retrieval by using the Hadoop framework� Telecommunications (ICT), 2013 20th International Conference on Publication Year: 2013 , Page(s): 1 � 5
[9] Hui Li ; Chunmei Liu �Prediction of protein structures using a map-reduce Hadoop framework based simulated annealing algorithm� Bioinformatics and Biomedicine (BIBM), 2013 IEEE International Conference on Publication Year: 2013 , Page(s): 6 � 10
[10] Weikuan Yu ; Yandong Wang ; Xinyu Que �Design and Evaluation of Network-Levitated Merge forHadoop Acceleration� Parallel and Distributed Systems, IEEE Transactions on Volume: 25 , Issue: 3 Publication Year: 2014 , Page(s): 602 � 611
[11] Shen Li ; Shaohan Hu ; Shiguang Wang ; Lu Su ; Abdelzaher, T. ;Gupta, I. ; Pace, R. �WOHA: Deadline-Aware Map-Reduce Workflow Scheduling Framework over Hadoop Clusters Distributed Computing Systems (ICDCS)�, 2014 IEEE 34th International Conference on Publication Year: 2014 , Page(s): 93 � 103
[12] Lightweight workflow engine based on HADOOP and OSGI Shengmei Luo ; Lixia Liu ; Juan Yang ; Di Zhang Broadband Network & Multimedia Technology (IC-BNMT), 2013 5th IEEE International Conference on Publication Year: 2013 , Page(s): 262 � 267
[13] Wenjun Wu ; Hui Zhang ; Yaokuan Mao ; Liang Luo GreenPipe,�A Hadoop Based Workflow System on Energy-efficient Clouds� Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), 2012 IEEE 26th International Publication Year: 2012 , Page(s): 2211 - 2219
[14] Sethi, M. ; Sachindran, N. ; Raghavan, S. �SASH: Enabling continuous incremental analytic workflowson Hadoop Data Engineering (ICDE), 2013 IEEE 29th International Conference on Publication Year: 2013 , Page(s): 1219 � 1230
[15] Gattiker, A. ; Gebara, F.H. ; Hofstee, H.P. ; Hayes, J.D. ; Hylick, A. �Big Data text-oriented benchmark creation for Hadoop� IBM Journal of Research and Development Volume: 57 , Issue: 3/4 Publication Year: 2013 , Page(s): 10:1 - 10:6
[16] Liu, Yewei ; Xiao, Guirong ; Wu, Jianwei ; Lin, Jianfeng CSWf: A cloud service workflow system Information Science and Technology (ICIST), 2013 International Conference on Publication Year: 2013 , Page(s): 408 � 413
[17] Zhuoyao Zhang ; Cherkasova, L. ; Boon Thau Loo Getting more for less in optimized MapReduce workflows Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on Publication Year: 2013 , Page(s): 93 � 100
[18] Altintas, I. �Workflow-driven programming paradigms for distributed analysis of biological big data� Computational Advances in Bio and Medical Sciences (ICCABS), 2013 IEEE 3rd International Conference Publication Year: 2013 , Page(s): 1
[19] Rongrong Gu ; Shaochun Wu ; Han Dong ; Yongquan Xu ; Gaozhao Chen ; Lingyu Xu A Modeling Method of Scientific Workflow Based on Cloud Environment Computer and Information Science (ICIS), 2012 IEEE/ACIS 11th International Conference on Publication Year: 2012 , Page(s): 31 � 36
[20] Tudoran, R. ; Costan, A. ; Rad, R.R. ; Brasche, G. ; Antoniu, G. �Adaptive file management for scientific workflows on the Azure cloud Big Data�, 2013 IEEE International Conference on Publication Year: 2013 , Page(s): 273 - 281
[21] Jingui Li ; Xuelian Lin ; Xiaolong Cui ; Yue Ye �Improving the Shuffle of Hadoop MapReduce Cloud Computing Technology and Science (CloudCom)�, 2013 IEEE 5th International Conference on Volume: 1 Publication Year: 2013 , Page(s): 266 � 273
[22] Yandong Wang ; Cong Xu ; Xiaobing Li ; Weikuan Yu �JVM-Bypass for Efficient Hadoop Shuffling� Parallel & Distributed Processing (IPDPS), 2013 IEEE 27th International Symposium on Publication Year: 2013 , Page(s): 569 � 578
[23] Mandal, A. ; Yufeng Xin ; Baldine, I. ; Ruth, P. ; Heerman, C. ; Chase, J. ; Orlikowski, V. ; Yumerefendi, A. �Provisioning and Evaluating Multi-domain Networked Clouds for Hadoop-based Applications Cloud Computing Technology and Science (CloudCom)�, 2011 IEEE Third International Conference on Publication Year: 2011 , Page(s): 690 - 697
[24] Wasi-Ur-Rahman, M. ; Islam, N.S. ; Xiaoyi Lu ; Jose, J. ; Subramoni, H. ; Hao Wang ; Panda, D.K.D. �High-Performance RDMA-based Design of HadoopMapReduce over InfiniBand� Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), 2013 IEEE 27th International Publication Year: 2013 , Page(s): 1908 � 1917
[25] Hadoop Acceleration in an OpenFlow-Based Cluster Narayan, S. ; Bailey, S. ; Daga, A. High Performance Computing, Networking, Storage and Analysis (SCC), 2012 SC Companion: Publication Year: 2012 , Page(s): 535 - 538
Citation
V.S. Vani, R. Mala, "Optimum Communicate Assortment for Vigor-Efficient Obliging Ad-hoc Networks," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.124-129, 2014.
An Actual Tactic for Video Reproduction Detection and Documentation Of Naughty Users
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.130-136, Sep-2014
Abstract
Debauched development in the arena of hypermedia skill has grown calmer to store and admittance big quantity of video data. This skill has editing and duplication of video figures that will aim to violation of numerical rights. So, reproduction privileges care develops a dangerous problematic for the enormous volume of video data. This has led to the needful Video reproduction detection has remained actively learned in a big variety of the hypermedia applications. The auto dual-threshold method is utilized and it is segmenting the videos hooked on sections with the gratified of alike and then the key edge is excerpt after each segment. The sift topographies are detached after that sections of key frames. Then suggest a svd-based method to competition two video edges with the sift opinion set descriptors. To get the video order corresponding consequence suggest a graph- based method. It is used to change the video order hooked on identifying the lengthiest trail in the edges to classify the video matching-result with time constraint. As the future Work, suppose if the enquiry video is coordinated then waiter classifies the unauthorized user and part that recognized user at exact time. I.e. based on timestamp, again the alike user enquiries the alike video then that exact user timing will upsurges (i.e. 2 in to preceding part time). Currently we also deliver chance to all users� i.e. (user�s tries to login 3 attempts). Suppose if exertion of user is traversed the limit then that exact user will abandon after the network.
Key-Words / Index Term
Video reproduction Detection, SVD-SIFT, Keyframes, Features, chart based order method, timestamp
References
[1] Shikui Wei ; Inst. of Inf. Sci., Beijing Jiaotong Univ., Beijing, China ; Yao Zhao ; Ce Zhu ; Changsheng Xu more authors �Frame Fusion for Video Copy Detection� Published in: Circuits and Systems for Video Technology, IEEE Transactions on (Volume:21 , Issue:1 ) Date of Publication: Jan. 2011 Page(s): 15 � 28.
[2] Hyun-seok Min ; Image & Video Syst. Lab., Korea Adv. Inst. of Sci. & Technol. (KAIST), Daejeon, South Korea ; Se Min Kim ; De Neve, W. ; Yong Man Ro �Video Copy Detection Using Inclined Video Tomography and Bag-of-Visual-Words� Published in: Multimedia and Expo (ICME), 2012 IEEE International Conference on Date of Conference: 9-13 July 2012 Page(s): 562 � 567.
[3] Gupta, V.; Centre de Rech. Inf. de Montreal (CRIM), MontreÌal, QC, Canada ; Varcheie, P.D.Z.; Gagnon, L. ; Boulianne, G. �Content-based video copy detection using nearest-neighbor mapping� Published in: Information Science, Signal Processing and their Applications (ISSPA), 2012 11th International Conference on Date of Conference: 2-5 July 2012 Page(s): 918 � 923.
[4] Zheng Cao ; Dept. of Autom., Univ. of Sci. & Technol. of China, Hefei, China ; Ming Zhu �An efficient video copy detection method based on video signature� Published in: Automation and Logistics, 2009. ICAL `09. IEEE International Conference on Date of Conference: 5-7 Aug. 2009 Page(s): 855 � 859.
[5] Hong Liu; Sch. of Comput. Sci., Fudan Univ., Shanghai, China; Hong Lu; Xiangyang Xue �A Segmentation and Graph-Based Video Sequence Matching Method for Video Copy Detection� Published in: Knowledge and Data Engineering, IEEE Transactions on (Volume: 25, Issue: 8) Date of Publication: Aug. 2013 Page(s): 1706 � 1718.
[6] Wan-Lei Zhao; INRIA-Rennes, Rennes, France; Chong-Wah Ngo �Flip-Invariant SIFT for Copy and Object Detection� Published in: Image Processing, IEEE Transactions on (Volume: 22, Issue: 3) Date of Publication: March 2013 Page(s): 980 � 991.
[7] Huanjing Yue ; Tianjin Univ., Tianjin, China ; Xiaoyan Sun ; Feng Wu ; Jingyu Yang �SIFT-Based Image Compression� Published in: Multimedia and Expo (ICME), 2012 IEEE International Conference on Date of Conference: 9-13 July 2012 Page(s): 473 � 478.
[8] Whisnant, K. ; Sun MicroSysterms Inc., San Diego, CA, USA ; Iyer, R.K. ; Kalbarczyk, Z.T. ; Jones, P.H., III more authors �The Effects of an ARMOR-based SIFT environment on the performance and dependability of user applications� Published in: Software Engineering, IEEE Transactions on (Volume:30, Issue: 4 ) Date of Publication: April 2004 Page(s): 257 � 277.
[9] Zhouxin Yang ; Grad. Sch. of Eng., Hiroshima Univ., Higashi-hiroshima, Japan ; Kurita, T. �Improvements to the Descriptor of SIFT by BOF Approaches� Published in: Pattern Recognition (ACPR), 2013 2nd IAPR Asian Conference on Date of Conference: 5-8 Nov. 2013 Page(s): 95 � 99.
[10] Zhou Yonglong ; Xian Jiaotong Univ., Xian, China ; Mei Kuizhi ; Ji Xiang ; Dong Peixiang �Parallelization and Optimization of SIFT on GPU Using CUDA� Published in: High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on Date of Conference: 13-15 Nov. 2013 Page(s): 1351 � 1358.
[11] Areia, J.D. ; Inst. de Telecomun., Inst. Super. Tecnico, Lisbon ; Pereira, F. ; Fernando, W.A.C. �Impact of the key frames quality on the overall Wyner-Ziv video coding performance� Published in: ELMAR, 2008. 50th International Symposium (Volume:2 ) Date of Conference: 10-12 Sept. 2008 Page(s): 467 � 470.
[12] Brandi, F. ; Electr. Eng. Dept., Univ. de Brasilia Brasilia, Brasilia; de Queiroz, Ricardo; Mukherjee, D. �Super resolution of video using key frames� Published in: Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on Date of Conference: 18-21 May 2008 Page(s): 1608 � 1611.
[13] Qing Xu ; Sch. of Comput. Secience & Technol., Tianjin Univ., Tianjin, China ; Pengcheng Wang ; Bin Long ; Sbert, M. more authors �Selection and 3D visualization of video key frames� Published in: Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on Date of Conference: 10-13 Oct. 2010 Page(s): 52 � 59.
[14] Jing Ge ; Sch. of Inf. Sci. & Eng., Shandong Univ., Jinan, China ; Boyang Zhang ; Ju Liu ; Feng Wang more authors �Key frames-based video super-resolution using adaptive overlapped block motion compensation� Published in: Intelligent Control and Automation (WCICA), 2012 10th World Congress on Date of Conference: 6-8 July 2012 Page(s): 4712 � 4716.
[15] Tianming Liu ; Microsoft Res. Asia, Beijing, China ; Hong-Jiang Zhang ; Feihu Qi �A novel video key-frame-extraction algorithm based on perceived motion energy model� Published in: Circuits and Systems for Video Technology, IEEE Transactions on (Volume:13 , Issue: 10 ) Date of Publication: Oct. 2003 Page(s): 1006 � 1013.
[16] Hong Liu; Sch. of Comput. Sci., Fudan Univ., Shanghai, China ; Hong Lu ; Xiangyang Xue �A Segmentation and Graph-Based Video Sequence Matching Method for Video Copy Detection� Published in: Knowledge and Data Engineering, IEEE Transactions on (Volume:25 , Issue: 8 ) Date of Publication: Aug. 2013 Page(s): 1706 � 1718.
[17] Yan Yan ; Div. of Biomed. Eng., Univ. of Saskatchewan, Saskatoon, SK, Canada ; Kusalik, A.J. ; Fang-Xiang Wu �A multi-edge graph based de novo peptide sequencing method for HCD spectra� Published in: Bioinformatics and Biomedicine (BIBM), 2013 IEEE International Conference on Date of Conference: 18-21 Dec. 2013 Page(s): 176 � 181.
[18] Jiang, Hua ; National OMS Engineering Research Center, Tsinghua University, Beijing 100084 ; Zhang, Yuyun ; Xiong, Guangleng ; Zhou, Ji �Assembly sequence planning for mechanical products� Published in: Tsinghua Science and Technology (Volume:4 , Issue: 2 ) Date of Publication: June 1999 Page(s): 1436 � 1439.
[19] Aziz Muslim, M.; Dept. of Brain Sci. & Eng., Kyushu Inst. of Technol., Iizuka ; Ishikawa, M. �Formation of graph-based maps for mobile robots using Hidden Markov Models� Published in: Neural Networks, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). IEEE International Joint Conference on Date of Conference: 1-8 June 2008 Page(s): 3099 � 3105.
[20] Xu Jinghu ; Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China ; Li Aiping ; Zhao Hui ; Yin Hong �A multi-step attack pattern discovery method based on graph mining� Published in: Computer Science and Network Technology (ICCSNT), 2012 2nd International Conference on Date of Conference: 29-31 Dec. 2012 Page(s): 376 � 380.
Citation
G. Anu, S. Padmavathi, "An Actual Tactic for Video Reproduction Detection and Documentation Of Naughty Users," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.130-136, 2014.
A Debauched Gathering Procedure to Bunch Very Big Definite Figures Sets in Data Mining
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.137-144, Sep-2014
Abstract
Partitioning a big set of substances hooked on alike bunches is a important procedure in figures mining. The k-means procedure is greatest right for applying this procedure since of its competence in gathering big figures sets. However, working only on numeric values limits its use in figures removal since figures sets in figures removal frequently cover definite values. In this newspaper we current an algorithm, called k-modes, to spread the k-means example to definite domains. We current new difference events to contract with definite objects, supernumerary incomes of bunches with modes, and use a incidence based method to update styles in the gathering procedure to minimize the gathering charge function. Verified with the well-recognized soybean illness figures set the procedure has recognized a very decent group performance. trials on a very big fitness cover figures set entailing of partial a zillion annals and 34 definite qualities show that the procedure is climbable in footings of composed the amount of bunches and the amount of records.
Key-Words / Index Term
Fast Cluster, Datamining, Large Dataset, Categorical Data
References
[1] Fucai Liu ; Dept. of Autom., Yanshan Univ., Qin-Huangdao, China ; Pingli Lu ; Run Pei �A new fuzzy modeling and identification based on fast-cluster and genetic algorithm� Published in: Intelligent Control and Automation, 2004. WCICA 2004. Fifth World Congress on (Volume:1 ) Date of Conference:15-19 June 2004 Page(s):290 - 293 Vol.1.
[2] Patra, S.; Dept. of Inf. Eng. & Comput. Sci., Univ. of Trento, Trento, Italy; Bruzzone, L. �A Fast Cluster-Assumption Based Active-Learning Technique for Classification of Remote Sensing Images� Published in: Geoscience and Remote Sensing, IEEE Transactions on (Volume:49 , Issue: 5 ) Date of Publication: May 2011 Page(s): 1617 � 1626.
[3] Badoni, D. ; Dept. of Phys., Univ. of Rome �Tor Vergata�, Rome, Italy ; Bizzarri, M. ; Bonaiuto, V. ; Checcucci, B. �Fast cluster reconstruction in the NA62 Liquid Krypton electromagnetic calorimeter by using soft core embedded processors in FPGA� Published in: Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC), 2013 IEEE Date of Conference: Oct. 27 2013-Nov. 2 2013 Page(s) :1 � 3.
[4] Freeman, J. ; Fermi National Accelerator Laboratory �A Fast Cluster-Finder for the Fermilab Collider Detector Jet Trigger� Published in: Nuclear Science, IEEE Transactions on (Volume:29 , Issue: 1 ) Date of Publication: Feb. 1982 Page(s): 303 � 306.
[5] Yokoyama, S. ; GRACE Center, Nat. Inst. of Inf., Tokyo, Japan ; Yoshioka, N. �Dodai-Deploy: Fast Cluster Deployment Tool� Published in: Web Services (ICWS), 2012 IEEE 19th International Conference on Date of Conference: 24-29 June 2012 Page(s): 681 � 682.
[6] Qinbao Song ; Dept. of Comput. Sci. & Technol., Xi``an Jiaotong Univ., Xian, China ; Jingjie Ni ; Guangtao Wang �A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data� Published in: Knowledge and Data Engineering, IEEE Transactions on (Volume:25 , Issue: 1 ) Date of Publication: Jan. 2013 Page(s): 1 � 14.
[7] Emanuel, A.W.R. ; Fac. of Inf. Technol., Maranatha Christian Univ., Bandung, Indonesia ; Wardoyo, R. ; Istiyanto, J.E. ; Mustofa, K. �Success factors of OSS projects from sourceforge using Datamining Association Rule� Published in: Distributed Framework and Applications (DFmA), 2010 International Conference on Date of Conference: 2-3 Aug. 2010 Page(s): 1 � 8
[8] Gulski, E. ; Delft Univ. of Technol., Netherlands ; Quak, B. ; Wester, F.J. ; de Vries, F. �Application of datamining techniques for power cable diagnosis� Published in: Properties and Applications of Dielectric Materials, 2003. Proceedings of the 7th International Conference on (Volume:3 ) Date of Conference: 1-5 June 2003 Page(s): 986 - 989 vol.3
[9] Drias, H. ; Comput. Sci. Dept., USTHB, Algiers, Algeria ; Hireche, C. ; Douib, A. �Datamining techniques and swarm intelligence for problem solving: Application to SAT� Published in: Nature and Biologically Inspired Computing (NaBIC), 2013 World Congress on Date of Conference: 12-14 Aug. 2013 Page(s): 200 � 206.
[10] Abraham, R.; Simha, J.B. ; Iyengar, S.S. �Medical Datamining with a New Algorithm for Feature Selection and Naive Bayesian Classifier� Published in: Information Technology, (ICIT 2007). 10th International Conference on Date of Conference: 17-20 Dec. 2007 Page(s): 44 � 49.
[11] Erraguntla, M. ; Ramachandran, S. ; Chang-Nien Wu ; Mayer, R.J. �Avian Influenza Datamining Using Environment, Epidemiology, and Etiology Surveillance and Analysis Toolkit (E3SAT)� Published in: System Sciences (HICSS), 2010 43rd Hawaii International Conference on Date of Conference: 5-8 Jan. 2010 Page(s): 1 � 7.
[12] Panah, O. ; Ayatollah Amoli Branch, Comput. Dept., Islamic Azad Univ., Amol, Iran ; Panah, A. ; Panah, A. �Evaluating the datamining techniques and their roles in increasing the search speed data in web� Published in: Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on (Volume:9 ) Date of Conference: 9-11 July 2010 Page(s): 806 � 809.
[13] Xie Jianbin ; NUDT, Changsha ; Liu Tong ; Zhuang Zhaowen ; Wang Jinyan �A New Method for Dynamic-Loading Large Terrain Dataset Visualization in Flight Simulation� Published in: Digital Media and its Application in Museum & Heritages, Second Workshop on Date of Conference: 10-12 Dec. 2007 Page(s): 218 � 222.
[14] Yildirim, E. ; Dept. of Comput. Eng., Fatih Univ., Istanbul, Turkey ; JangYoung Kim ; Kosar, T. �How GridFTP Pipelining, Parallelism and Concurrency Work: A Guide for Optimizing Large Dataset Transfers� Published in: High Performance Computing, Networking, Storage and Analysis (SCC), 2012 SC Companion: Date of Conference: 10-16 Nov. 2012 Page(s): 506 � 515.
[15] Shuo Gao ; Beihang Univ., Beijing ; Yue Qi ; Xukun Shen ; Yong Hu A Realtime Rendering Framework of Large Dataset Environment Based on Precomputed HLOD� Published in: Digital Media and its Application in Museum & Heritages, Second Workshop on Date of Conference: 10-12 Dec. 2007 Page(s): 212 � 217.
[16] Zaman, A.N.K. ; Comput. Sci. Program, Univ. of Northern British Columbia (UNBC), Prince George, BC, Canada ; Brown, C.G. �Latent semantic indexing and large dataset: Study of term-weighting schemes� Published in: Digital Information Management (ICDIM), 2010 Fifth International Conference on Date of Conference: 5-8 July 2010 Page(s): 1 � 4.
[17] Peng Yang ; Chongqing Univ. of Arts & Sci., Chongqing ; Biao Huang �A Modified Density Based Outlier Mining Algorithm for Large Dataset� Published in: Future Information Technology and Management Engineering, 2008. FITME `08. International Seminar on Date of Conference: 20-20 Nov. 2008 Page(s): 37 � 40.
[18] Reddy, H.V. ; Dept. of Comput. Sci. & Eng., Vardhaman Coll. of Eng., Hyderabad, India ; Viswanadha Raju, S. ; Agrawal, P. �Data labeling method based on cluster purity using relative rough entropy for categorical data clustering� Published in: Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on Date of Conference: 22-25 Aug. 2013 Page(s): 500 � 506.
[19] Alamuri, M. ; Sch. of Comput. & Inf. Sci., Univ. of Hyderabad, Hyderabad, India ; Surampudi, B.R. ; Negi, A. �A survey of distance/similarity measures for categorical data� Published in: Neural Networks (IJCNN), 2014 International Joint Conference on Date of Conference: 6-11 July 2014 Page(s): 1907 � 1914.
[20] Mukhopadhyay, A. ; Univ. of Kalyani, Kalyani ; Maulik, U. �Multiobjective approach to categorical data clustering� Published in: Evolutionary Computation, 2007. CEC 2007. IEEE Congress on Date of Conference: 25-28 Sept. 2007 Page(s): 1296 � 1303.
[21] Kosara, R. ; Dept. of Comput. Sci., North Carolina Univ., Charlotte, NC, USA ; Bendix, F. ; Hauser, H. � Parallel Sets: interactive exploration and visual analysis of categorical data� Published in: Visualization and Computer Graphics, IEEE Transactions on (Volume:12 , Issue: 4 ) Date of Publication: July-Aug. 2006 Page(s): 558 � 568.
[22] Fernstad, S.J. ; C-Res., Linkoping Univ., Linkoping, Sweden ; Johansson, J. �A Task Based Performance Evaluation of Visualization Approaches for Categorical Data Analysis� Published in: Information Visualisation (IV), 2011 15th International Conference on Date of Conference: 13-15 July 2011 Page(s): 80 � 89.
Citation
S.S.B. Devi, R. Mala, "A Debauched Gathering Procedure to Bunch Very Big Definite Figures Sets in Data Mining," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.137-144, 2014.
Uses of HDFS in Metadata Management System
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.145-150, Sep-2014
Abstract
A (HDFS) Hadoop Distributed File System is intended to store very large data sets unfailingly and to stream those data sets at elevated bandwidth to consumer applications. Metadata managing is serious to distributed file system. In HDFS design, a solo master server administers all metadata, while numerals of data servers pile up file data. This design can�t gather the exponentially improved storage claim in cloud computing, as the solo master server may happen to a performance traffic jam. Proportional study of a metadata managing proposal is done. Its consist of three techniques tree separation, hashing and reliable hashing of metadata managing proposal. Out of these three proposals reliable hashing is the best techniques which utilize multiple Name Nodes, and segregate the metadata into �Buckets� which can be energetically move around among Name Nodes according to system job weight. To uphold consistency, metadata is simulated in dissimilar Name Nodes with log duplication knowledge, and Paxos algorithm is adopted to keep duplication uniformity.
Key-Words / Index Term
Hadoop, HDFS, Distributed File System, File Management System, Metadata Management
References
[1] Zhanye Wang ; Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing, China ; Dongsheng Wang �NCluster: Using Multiple Active Name Nodes to Achieve High Availability for HDFS� Published in: High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on Date of Conference: 13-15 Nov. 2013 Page(s): 2291 � 2297.
[2] Azzedin, F. ; Inf. & Comput. Sci. Dept., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia �Towards a scalable HDFS architecture� Published in: Collaboration Technologies and Systems (CTS), 2013 International Conference on Date of Conference: 20-24 May 2013 Page(s): 155 � 161.
[3] Dutta, R. ; Dept. of Comput. Sci. & Eng., Nat. Inst. of Technol. Karnataka, Surathkal, India ; Annappa, B. �A Scalable Cloud Platform using Matlab Distributed Computing Server Integrated with HDFS� Published in: Cloud and Services Computing (ISCOS), 2012 International Symposium on Date of Conference: 17-18 Dec. 2012 Page(s): 141� 145.
[4] Cheng Li-xin ; Suzhou Inst. of Nano-Tech & Nano-Bionics (SINANO), Suzhou, China ; Yue Yang ; Liu Yun-yun ; Ka Lok Man �A research on the storage structure and reconstruction algorithm of Meta data during the startup process of solid state storage systems� Published in: SoC Design Conference (ISOCC), 2013 International Date of Conference: 17-19 Nov. 2013 Page(s): 263 � 266.
[5] Zhen-Chun Huang ; Dept. of Comput. Sci. & Eng., Tsinghua Univ., Beijing ; Guo-qing Li �Meta-Data Adapter: A Way to Enable Spatial Information Data Grid� Published in: Future Generation Communication and Networking Symposia, 2008. FGCNS `08. Second International Conference on (Volume:5 ) Date of Conference: 13-15 Dec. 2008 Page(s): 87 � 92.
[6] Narayan, S. ; InfoBlox Inc., Santa Clara, CA, USA ; Bailey, S. ; Daga, A. �Hadoop Acceleration in an OpenFlow-Based Cluster� Published in: High Performance Computing, Networking, Storage and Analysis (SCC), 2012 SC Companion: Date of Conference: 10-16 Nov. 2012 Page(s): 535 � 538.
[7] Mandal, A. ; Renaissance Comput. Inst., Univ. of North Carolina at Chapel Hill, Chapel Hill, NC, USA ; Yufeng Xin ; Baldine, I. ; Ruth, P. �Provisioning and Evaluating Multi-domain Networked Clouds for Hadoop-based Applications� Published in: Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on Date of Conference: Nov. 29 2011-Dec. 1 2011 Page(s): 690 � 697.
[8] Xiaoyi Lu ; Islam, N.S. ; Wasi-Ur-Rahman, M. ; Jose, J. �High-Performance Design of Hadoop RPC with RDMA over InfiniBand� Published in: Parallel Processing (ICPP), 2013 42nd International Conference on Date of Conference: 1-4 Oct. 2013 Page(s): 641 � 650.
Citation
N. Durga, D. Ragupathi, V.R Kumar, "Uses of HDFS in Metadata Management System," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.145-150, 2014.
Content Based Image Recovery Approaches Using Graphical Image Recovery Procedure (GIRP)
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.151-157, Sep-2014
Abstract
This document stretches a transitory account of a scheme industrialized for redeemable images alike to an enquiry image after a big set of distinct images. It shadows an image division based tactic to excerpt the dissimilar topographies current in an image. These topographies are stowed in vectors called eye vectors and likened to the eye vectors of enquiry image and thus, the image catalogue is organized in lessening instruction of similarity. Dissimilar after outdated dimensionality discount procedures such as Principal constituent examination (PCA) and lined differentiate examination (LDA), which professionally see only the worldwide euclidean structure, GIRP is envisioned for knowledge the local various structure. Therefore, GIRP is probable to be additional appropriate for image retrieval, where adjacent national hunt is usually involved. After projecting the images hooked on an inferior dimensional subspace, the pertinent images become earlier to the enquiry image; thus, the recovery presentation can be enhanced.
Key-Words / Index Term
CBIR, Hyper media info system, Image retrival, Significaance reply image eye extraction, Image analysis, Image search, Image resemblance
References
[1] Ponciano-Silva, M. ; Dept. of Comput. Sci., Univ. of Sao Paulo at Sao Carlos, Sao Carlos, Brazil ; Souza, J.P. ; Bugatti, P.H. ; Bedo, M.V.N. more authors �Does a CBIR system really impact decisions of physicians in a clinical environment?� Published in: Computer-Based Medical Systems (CBMS), 2013 IEEE 26th International Symposium on Date of Conference: 20-22 June 2013 Page(s): 41 � 46.
[2] Marques, O. ; Dept. of Comput. Sci. & Eng., Florida Atlantic Univ., Boca Raton, FL ; Mayron, L.M. ; Borba, G.B. ; Gamba, H.R. �On the Potential of Incorporating Knowledge of Human Visual Attention into Cbir Systems� Published in: Multimedia and Expo, 2006 IEEE International Conference on Date of Conference: 9-12 July 2006 Page(s): 773 � 776.
[3] ShiXi Tang ; Nationalities Inf. Acad., Northwest Univ., Lanzhou ; WeiLan Wang ; HuaMing Liu ; Hui Xie more authors �Further Study on the Design of Multi-language Web CBIR Searching Engine Based on MAS� Published in: Pervasive Computing and Applications, 2006 1st International Symposium on Date of Conference: 3-5 Aug. 2006 Page(s): 658 � 662.
[4] Borowski, M. ; German Nat. Res. Center for Comput. Sci., St. Augustin, Germany ; Brocker, L. ; Heisterkamp, S. ; Loffler, J. �Structuring the visual content of digital libraries using CBIR systems� Published in: Information Visualization, 2000. Proceedings. IEEE International Conference on Date of Conference: 2000 Page(s): 288 � 293.
[5] Yihua Lan ; Sch. of Comput. Eng., Huaihai Inst. of Technol., Lianyungang, China ; Haozheng Ren ; Yong Zhang ; Hongbo Yu �Similarity in Mammography CAD Using CBIR Approach: A Validation Study� Published in: Intelligent Human-Machine Systems and Cybernetics (IHMSC), 2012 4th International Conference on (Volume:2 ) Date of Conference: 26-27 Aug. 2012 Page(s): 373 � 376.
[6] Pereira, M.H.R. ; Lab. de Pesquisas Interdisciplinares em Informacao Multimidia, Centro Fed. de Educ. Tecnol. de Minas Gerais, Belo Horizonte, Brazil ; Padua, F.L.C. ; Silva, G.D. ; Assis, G.T. more authors �A multimedia information system to support the discourse analysis of video recordings of television programs� Published in: Information Systems and Technologies (CISTI), 2012 7th Iberian Conference on Date of Conference: 20-23 June 2012 Page(s): 1 � 6.
[7] Merlet, J.F. ; U.R.A.CO.M., Ramonville Saint-Agne, France ; Nadalin, C. ; Soutou, C. ; Lapujade, A. more authors �Toward a design method of a multimedia information system� Published in: Systems, Man and Cybernetics, 1993. `Systems Engineering in the Service of Humans`, Conference Proceedings., International Conference on Date of Conference: 17-20 Oct 1993 Page(s): 367 - 372 vol.4.
[8] Zhang Xinchen ; Coll. of Phys. Sci. & Technol., Central China Normal Univ., Wuhan ; Liu Shouyin ; Huang Mei �Wireless Video Access for Talent Market Multimedia Information System� Published in: Business and Information Management, 2008. ISBIM `08. International Seminar on (Volume: 1) Date of Conference: 19-19 Dec. 2008 Page(s): 63 � 66.
[9] Shu-Ching Chen ; Sch. of Comput. Sci., Florida Int. Univ., Miami, FL, USA ; Sista, Srinivas ; Mei-Ling Shyu ; Kashyap, R. �Augmented transition networks as video browsing models for multimedia databases and multimedia information systems� Published in: Tools with Artificial Intelligence, 1999. Proceedings. 11th IEEE International Conference on Date of Conference: 1999 Page(s): 175 � 182.
[10] Weber, M. ; Dept. for Distributed Syst., Ulm Univ., Germany ; Gumhold, M. �Developing a municipal multimedia information system� Published in: EUROMICRO 97. `New Frontiers of Information Technology`. Short Contributions., Proceedings of the 23rd Euromicro Conference Date of Conference: 1-4 Sep 1997 Page(s): 88 � 93.
[11] En Cheng ; Case Western Reserve Univ., Cleveland, OH, USA ; Feng Jing ; Chao Zhang ; Lei Zhang �Search Result Clustering Based Relevance Feedback for Web Image Retrival� Published in: Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on (Volume:1 ) Date of Conference: 15-20 April 2007 Page(s): I-961 - I-964.
[12] Zhongwei Li ; Coll. of Software, Nankai Univ., Tianjin, China ; Chiahung Wei ; Yue Li ; Tsaiyang Sun �Research of shoeprint image stream retrival algorithm with scale-invariance feature transform� Published in: Multimedia Technology (ICMT), 2011 International Conference on Date of Conference: 26-28 July 2011 Page(s): 5488 � 5491.
[13] Unay, D. ; Video Process. & Anal. Group, Philips Res. Eur., Eindhoven ; Ekin, A.� Intensity versus texture for medical image search and retrival� Published in: Biomedical Imaging: From Nano to Macro, 2008. ISBI 2008. 5th IEEE International Symposium on Date of Conference: 14-17 May 2008 Page(s): 241 � 244.
[14] Mohanapriya, S. ; M. Kumarasamy Coll. of Eng., Karur, India ; Vadivel, M. �Automatic retrival of MRI brain image using multiqueries system� Published in: Information Communication and Embedded Systems (ICICES), 2013 International Conference on Date of Conference: 21-22 Feb. 2013 Page(s): 1099 � 1103.
[15] Ghosh, S. ; Dept. of Appl. Opt. & Photonics, Univ. of Calcutta, Kolkata, India ; Ghosh, A. �Content based retrival of malaria positive images from a clinical database� Published in: Image Information Processing (ICIIP), 2013 IEEE Second International Conference on Date of Conference: 9-11 Dec. 2013 Page(s): 313 � 318.
[16] Qingming Zhan ; Molenaar, M. ; Yinghui Xiao �Hierarchical object-based image analysis of high-resolution imagery for urban land use classification� Published in: Remote Sensing and Data Fusion over Urban Areas, IEEE/ISPRS Joint Workshop 2001 Date of Conference: 2001 Page(s): 35 � 39.
[17] Leiguang Gong ; IBM Thomas J. Watson Res. Center, Hawthorne, NY, USA ; Kulikowski, C.A. �Defining spatial context for focused image analysis� Published in: Systems, Man, and Cybernetics, 2001 IEEE International Conference on (Volume:2 ) Date of Conference: 2001 Page(s): 1184 - 1187 vol.2.
[18] Kosir, A. ; Fac. of Electr. Eng., Ljubljana Univ., Slovenia ; Tasic, J.F.� Formal system based on fuzzy logic applied to digital image scene analysis� Published in: Electrotechnical Conference, 2002. MELECON 2002. 11th Mediterranean Date of Conference: 2002 Page(s): 409 � 413.
[19] Braga-Neto, U. ; Virology & Exp. Therapy Lab., Aggeu Magalhaes Res. Center, Recife, Brazil ; Goutsias, J. �Object-based image analysis using multiscale connectivity� Published in: Pattern Analysis and Machine Intelligence, IEEE Transactions on (Volume:27 , Issue: 6 )Date of Publication: June 2005 Page(s): 892 � 907.
[20] Suapang, P. ; Dept. of Telecommun. Eng., King Mongkut``s Inst. of Technol. Ladkrabang, Bangkok, Thailand ; Dejhan, K. ; Yimmun, S. �Medical Image Archiving, Processing, Analysis and Communication System for Teleradiology� Published in: TENCON 2010 - 2010 IEEE Region 10 Conference Date of Conference: 21-24 Nov. 2010 Page(s): 339 � 345.
[21] Xiaoou Tang ; Dept. of Inf. Eng., Chinese Univ. of Hong Kong, Shatin, China ; Ke Liu ; Jingyu Cui ; Fang Wen more authors �IntentSearch: Capturing User Intention for One-Click Internet Image Search� Published in: Pattern Analysis and Machine Intelligence, IEEE Transactions on (Volume:34 , Issue: 7 ) Date of Publication: July 2012 Page(s): 1342 � 1353.
[22] Xinmei Tian ; Dept. of Electron. Eng. & Inf. Sci., Univ. of Sci. & Technol. of China, Hefei, China ; Yijuan Lu ; Linjun Yang �Query Difficulty Prediction for Web Image Search� Published in: Multimedia, IEEE Transactions on (Volume:14 , Issue: 4 ) Date of Publication: Aug. 2012 Page(s): 951 � 962.
[23] Shikui Wei ; Beijing Key Lab. of Adv. Inf. Sci. & Network Technol., Beijing Jiaotong Univ., Beijing, China ; Dong Xu ; Xuelong Li ; Yao Zhao �Joint Optimization Toward Effective and Efficient Image Search� Published in: Cybernetics, IEEE Transactions on (Volume:43 , Issue: 6 ) Date of Publication: Dec. 2013 Page(s): 2216 � 2227.
[24] Jun Huang ; Shanghai Key Lab. of Digital Media Process. & Transmissions, Shanghai Jiao Tong Univ., Shanghai, China ; Xiaokang Yang ; Rui Zhang ; Xiangzhong Fang �Re-ranking image search results by multiscale visual saliency model� Published in: Broadband Multimedia Systems and Broadcasting (BMSB), 2010 IEEE International Symposium on Date of Conference: 24-26 March 2010 Page(s): 1 � 4.
[25] Yushi Jing ; Google Res., Mountain View, CA, USA ; Covell, M. ; Tsai, D. ; Rehg, J.M. �Learning Query-Specific Distance Functions for Large-Scale Web Image Search� Published in: Multimedia, IEEE Transactions on (Volume:15 , Issue: 8 ) Date of Publication: Dec. 2013 Page(s): 2022 � 2034.
Citation
M.S. Kumar, A.I. Mercy, "Content Based Image Recovery Approaches Using Graphical Image Recovery Procedure (GIRP)," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.151-157, 2014.
A Confidentiality Preservative Climbable Building For Obliging Occasion Correlation
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.157-165, Sep-2014
Abstract
We suggest an well-organized software building for secluded obliging occasion processing, allowing info distribution and dispensation amid administratively and geographically split governments over the Internet. The building is accomplished of uniting and correlating occasions undecided after the governments in near real-time, while preservative the confidentiality of subtle figures substances smooth in the circumstance of alliance of attackers. while there is a rich works in the arena of safe multi gathering calculation methods that reservation the confidentiality in a dispersed systems, the competence of such schemes to gage up horizontally (number of participants) and vertically (dataset per participant) is still limited. The key innovation of the building is the usage of a pseudo-random oracle functionality dispersed amid the governments contributing to the scheme for obfuscating the data that permits for attaining a decent equal of confidentiality while guaranteeing scalability in composed dimensions. Certain preliminary presentation consequences are provided.
Key-Words / Index Term
Privacy-Preserving, Safe Combined Computation Obliging Environments
References
& Technol. of China, Hefei ; Liusheng Huang ; Wei Yang ; Dong li �Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application� Published in: Knowledge Discovery and Data Mining, 2009. WKDD 2009. Second International Workshop on Date of Conference: 23-25 Jan. 2009 Page(s): 554 � 558.
[2] Keng-Pei Lin ; Dept. of Electr. Eng., Nat. Taiwan Univ., Taipei, Taiwan ; Ming-Syan Chen �On the Design and Analysis of the Privacy-Preserving SVM Classifier� Published in: Knowledge and Data Engineering, IEEE Transactions on (Volume:23 , Issue: 11 ) Date of Publication: Nov. 2011 Page(s): 1704 � 1717.
[3] Yu, Z. ; Manchester Univ., Manchester ; Zhang, N. �Achieving Privacy-preserving Computation on Data Grids� Published in: Computers and Communications, 2007. ISCC 2007. 12th IEEE Symposium on Date of Conference: 1-4 July 2007 Page(s): 763 � 768.
[4] Vaidya, J. ; MSIS Dept., Rutgers Univ., Newark, NJ, USA ; Shafiq, B. ; Wei Fan ; Mehmood, D. �A Random Decision Tree Framework for Privacy-Preserving Data Mining� Published in: Dependable and Secure Computing, IEEE Transactions on (Volume:11 , Issue: 5 ) Date of Publication: Sept.-Oct. 2014 Page(s): 399 � 411.
[5] Yan Zhao ; Coll. of Inf. Sci. & Technol., Donghua Univ., Shanghai, China ; Ming Du ; Jiajin Le ; Yongcheng Luo �A Survey on Privacy Preserving Approaches in Data Publishing� Published in: Database Technology and Applications, 2009 First International Workshop on Date of Conference: 25-26 April 2009 Page(s): 128 � 131.
[6] Luong The Dung ; Inf. Technol. Center, VietNam Gov. Inf. Security Comm., Vietnam ; Ho Tu Bao ; Nguyen The Binh ; Tuan-Hao Hoang �Privacy Preserving Classification in Two-Dimension Distributed Data� Published in: Knowledge and Systems Engineering (KSE), 2010 Second International Conference on Date of Conference: 7-9 Oct. 2010 Page(s): 96 � 103.
[7] Malik, M.B. ; Dept. of Computer. Sci., BGSB Univ., Rajouri, India ; Ghazi, M.A. ; Ali, R. �Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects� Published in: Computer and Communication Technology (ICCCT), 2012 Third International Conference on Date of Conference: 23-25 Nov. 2012 Page(s): 26 � 32.
[8] Hsiao-Ying Lin ; Intell. Inf. & Commun. Res. Center, Nat. Chiao Tung Univ., Hsinchu, Taiwan ; Shiuan-Tzuo Shen ; Lin, B.P. �A Privacy Preserving Smart Metering System Supporting Multiple Time Granularities� Published in: Software Security and Reliability Companion (SERE-C), 2012 IEEE Sixth International Conference on Date of Conference: 20-22 June 2012 Page(s): 119 � 126.
[9] Yong Wang ; Dept. of Comput. Sci. & Commun. Eng., Univ. of Electron. & Sci. Technol. of China, Chengdu, China ; Long-ping He ; Jing Peng ; Jie Hou �A context-dependent privacy preserving framework in road networks� Published in: Communications (ICC), 2014 IEEE International Conference on Date of Conference: 10-14 June 2014 Page(s): 628 � 633.
[10] Cuzzocrea, A. ; ICAR, Univ. of Calabria, Rende, Italy ; Bertino, E. �Further Theoretical Contributions to a Privacy Preserving Distributed OLAP Framework� Published in: Computer Software and Applications Conference (COMPSAC), 2013 IEEE 37th Annual Date of Conference: 22-26 July 2013 Page(s): 234 � 239.
[11] Yan Zhao ; Coll. of Inf. Sci. & Technol., Donghua Univ., Shanghai, China ; Ming Du ; Jiajin Le ; Yongcheng Luo �A Survey on Privacy Preserving Approaches in Data Publishing� Published in: Database Technology and Applications, 2009 First International Workshop on Date of Conference: 25-26 April 2009 Page(s): 128 � 131.
[12] Anrong Xue ; Sch. of Comput. Sci. & Telecommun. Eng., Jiangsu Univ., Zhenjiang ; Xiqiang Duan ; Handa Ma ; Weihe Chen �Privacy Preserving Spatial Outlier Detection� Published in: Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for Date of Conference: 18-21 Nov. 2008 Page(s): 714 � 719.
[13] Baokang Zhao ; Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China ; Xiangyu Su ; Yipin Sun ; Jinshu Su �A Distributed Query Protocol for Continuous Privacy Preserving in Wireless Sensor Networks� Published in: Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on Date of Conference: June 29 2010-July 1 2010 Page(s): 2837 � 2842.
[14] Jinye Peng ; Sch. of Electron. & Inf., Northwestern Polytech. Univ., Xi``an, China ; Babaguchi, N. ; Hangzai Luo ; Yuli Gao �Constructing Distributed Hippocratic Video Databases for Privacy-Preserving Online Patient Training and Counseling� Published in: Information Technology in Biomedicine, IEEE Transactions on (Volume:14 , Issue: 4 ) Date of Publication: July 2010 Page(s): 1014 � 1026.
[15] I-Cheng Wang ; Inst. of Inf. Sci., Acad. Sinica, Taipei, Taiwan ; Chih-Hao Shen ; Kung Chen ; Tsan-sheng Hsu �An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation� Published in: Computational Science and Engineering, 2009. CSE `09. International Conference on (Volume:3 ) Date of Conference: 29-31 Aug. 2009 Page(s): 182 � 188.
[16] Mishra, D.K. ; Acropolis Inst. of Technol. & Res., Indore, India ; Pathak, R. ; Joshi, S. ; Ludhiyani, A. �Secure Multi-Party Computation for statistical computations using virtual parties on a Token Ring Network� Published in: Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference On Date of Conference: 6-8 Sept. 2010 Page(s): 1 � 6.
[17] Bickson, D. ; IBM Haifa Res. Lab., Haifa ; Dolev, D. ; Bezman, G. ; Pinkas, B. �Peer-to-Peer Secure Multi-party Numerical Computation� Published in: Peer-to-Peer Computing , 2008. P2P `08. Eighth International Conference on Date of Conference: 8-11 Sept. 2008 Page(s): 257 � 266.
[18] Shukla, S. ; Dept. of Comput. Sci. &Eng., Christ Univ., Bangalore, India ; Sadashivappa, G. �Secure multi-party computation protocol using asymmetric encryption� Published in: Computing for Sustainable Global Development (INDIACom), 2014 International Conference on Date of Conference: 5-7 March 2014 Page(s): 780 � 785.
[19] Mishra, D.K. ; Acropolis Inst. of Technol. & Res., Indore, India ; Koria, N. ; Kapoor, N. ; Bahety, R. �Malicious computation prevention protocol for secure multi-party computation� Published in: TENCON 2009 - 2009 IEEE Region 10 Conference Date of Conference: 23-26 Jan. 2009 Page(s): 1 � 6.
[20] Mishra, D.K. ; Acropolis Inst. of Technol. & Res., Indore ; Chandwani, M. �Arithmetic cryptography protocol for secure multi-party computation� Published in: SoutheastCon, 2007. Proceedings. IEEE Date of Conference: 22-25 March 2007 Page(s): 22.
[21] Pathak, R. ; Acropolis Inst. of Technol. & Res., Indore, India ; Joshi, S. ; Mishra, D.K. ; Ludhiyani, A. �Tri-TTP based architecture for Secure Multi-Party Computations using Virtual Parties� Published in: Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference On Date of Conference: 6-8 Sept. 2010 Page(s): 1 � 6.
[22] Mishra, D.K. ; Acropolis Inst. of Technol. & Res., Indore ; Chandwani, M. �Anonymity enabled secure multi-party computation for indian BPO� Published in: TENCON 2007 - 2007 IEEE Region 10 Conference Date of Conference: Oct. 30 2007-Nov. 2 2007 Page(s): 1 � 4.
[23] Feng He ; Dept. of Comput. Eng., Shanxi Vocational Poly-tech Coll., Taiyuan, China ; Ting Wang �Research and Application of Secure Multi-Party Computation in Several Computational Geometry Problems� Published in: Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference on Date of Conference: 23-25 Aug. 2012 Page(s): 1434 � 1437.
[24] Kirschbaum, M. ; Inst. for Appl. Inf. Process. & Commun. (IAIK), Graz Univ. of Technol., Graz, Austria ; Plos, T. ; Schmidt, J.-M. �On Secure Multi-party Computation in Bandwidth-Limited Smart-Meter Systems� Published in: Availability, Reliability and Security (ARES), 2013 Eighth International Conference on Date of Conference: 2-6 Sept. 2013 Page(s): 230 � 235.
[25] Maurer, U.M. ; Dept. of Comput. Sci., Eidgenossische Tech. Hochschule, Zurich, Switzerland �Information theory and secure multi-party computation� Published in: Information Theory Workshop, 1998 Date of Conference: 22-26 Jun 1998 Page(s): 152 � 153.
[26] Hu Yunhong ; Coll. of Inf. Sci. & Eng., Shandong Univ. of Sci. & Technol., Qingdao, China ; Fang Liang; He Guoping �Privacy-Preserving SVM Classification on Vertically Partitioned Data without Secure Multi-party Computation� Privacy-Preserving SVM Classification on Vertically Partitioned Data without Secure Multi-party Computation� Published in: Natural Computation, 2009. ICNC `09. Fifth International Conference on (Volume:1 ) Date of Conference: 14-16 Aug. 2009 Page(s): 543 � 546.
[27] Weimin Ouyang ; Manage. Dept., Shanghai Univ. of Sport ; Qinhua Huang �Privacy Preserving Sequential Pattern Mining Based on Secure Multi-party Computation� Published in: Information Acquisition, 2006 IEEE International Conference on Date of Conference: 20-23 Aug. 2006 Page(s): 149 � 154.
[28] Wang Hai-ying ; Dept. of Math. & Comput. Sci., Anshun Coll., Anshun, China ; Fu Zu-feng ; Luo Wen-jun �Application of secure multi-party computation on judging privacy-preserving path� Published in: Computer Application and System Modeling (ICCASM), 2010 International Conference on (Volume:9) Date of Conference: 22-24 Oct. 2010 Page(s): V9-347 - V9-350
Citation
R.S. Shri and S. Padmavathi, "A Confidentiality Preservative Climbable Building For Obliging Occasion Correlation," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.157-165, 2014.
The Hadoop Dispersed File system: Balancing Movability And Performance
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.166-177, Sep-2014
Abstract
Hadoop is a general open-source application of map reduce for the examination of big datasets. To achieve storing capitals crosswise the cluster, Hadoop uses a dispersed user-level file system. This file system � HDFS � is written in java and envisioned for movability crosswise varied hardware and software platforms. This newspaper inspects the presentation of HDFS and uncovers numerous presentation issues. First, architectural blockages be in the Hadoop application that consequence in incompetent HDFS usage owing to postponements in preparation new map reduce tasks. Second, movability limits stop the java application after abusing topographies of the innate platform. Third, HDFS implicitly brands movability molds about how the innate phase achieves storing resources, smooth however innate file systems and I/O schedulers vary widely in arrangement and behavior. This newspaper examines the root details of these presentation blockages in instruction to assess tradeoffs among movability and presentation in the Hadoop dispersed file system.
Key-Words / Index Term
Component; Formatting; Style; Styling; Insert
References
[1] Chandrasekar, S. ; Dakshinamurthy, R. ; Seshakumar, P.G. ;Prabavathy, B. ; Babu, C. �A novel indexing scheme for efficient handling of small filesin Hadoop Distributed File System�Computer Communication and Informatics (ICCCI), 2013 International Conference on Publication Year: 2013, Page(s): 1 - 8
[2] Jing Zhang ; Gongqing Wu ; Xuegang Hu ; Xindong Wu �A Distributed Cache for Hadoop Distributed File System in Real-Time Cloud Services� Grid Computing (GRID), 2012 ACM/IEEE 13th International Conference on Publication Year: 2012 , Page(s): 12 - 21
[3 Kaushik, R.T. ; Bhandarkar, M. ; Nahrstedt, K. �Evaluation and Analysis of GreenHDFS: A Self-Adaptive, Energy-Conserving Variant of the Hadoop Distributed File System� Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on Publication Year: 2010 , Page(s): 274 - 287
[4] Hieu Hanh Le ; Hikida, S. ; Yokota, H. Dependable, �An Evaluation of Power-Proportional Data Placement forHadoop Distributed File Systems Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on Publication Year: 2011 , Page(s): 752 - 759
[5] Attebury, G. ; Baranovski, A. ; Bloom, K. ; Bockelman, B. ; Kcira, D. ;Letts, J. ; Levshina, T. ; Lundestedt, C. ; Martin, T. ; Maier, W. ;Haifeng Pi ; Rana, A. ; Sfiligoi, I. ; Sim, A. ; Thomas, M. ;Wuerthwein, �Hadoop distributed file system for the Grid� F. Nuclear Science Symposium Conference Record (NSS/MIC), 2009 IEEE Publication Year: 2009 , Page(s): 1056 - 1061
[6] Youwei Wang ; WeiPing Wang ; Can Ma ; Dan Meng �Zput: A speedy data uploading approach for the Hadoop Distributed File System� Cluster Computing (CLUSTER), 2013 IEEE International Conference on Publication Year: 2013 , Page(s): 1 � 5
[7] Shahabinejad, M. ; Khabbazian, M. ; Ardakani, M. �An Efficient Binary Locally Repairable Code for Hadoop Distributed File System� Communications Letters, IEEE Volume: 18 , Issue: 8 Publication Year: 2014 , Page(s): 1287 � 1290
[8] Tomasic, I. ; Ugovsek, J. ; Rashkovska, A. ; Trobec, R. �Multicluster Hadoop Distributed File System�MIPRO, 2012 Proceedings of the 35th International Convention Publication Year: 2012 , Page(s): 301 - 305
[9] Hsiao-Ying Lin ; Shiuan-Tzuo Shen ; Wen-Guey Tzeng ; Lin, B.-S.P. �Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File System� Advanced Information Networking and Applications (AINA), 2012 IEEE 26th International Conference on Publication Year: 2012, Page(s): 740 - 747
[10] Moraveji, R. ; Taheri, J. ; Farahabady, M.R.H. ; Rizvandi, N.B. ;Zomaya, A.Y. �Data-Intensive Workload Consolidation for the Hadoop Distributed File System� Grid Computing (GRID), 2012 ACM/IEEE 13th International Conference on Publication Year: 2012 , Page(s): 95 � 103 �The Hadoop Distributed File System�
[11] Shvachko, K. ; Hairong Kuang ; Radia, S. ; Chansler, R. Mass Storage Systems and Technologies (MSST), 2010 IEEE 26th Symposium on Publication Year: 2010 , Page(s): 1 - 10
[12] Xiayu Hua ; Hao Wu ; Shangping Ren �Enhancing Throughput of Hadoop Distributed File System for Interaction-Intensive Task Parallel, Distributed and Network-Based Processing (PDP), 2014 22nd Euromicro International Conference on Publication Year: 2014 , Page(s): 508 � 511
[13] Wei Zhou ; Jizhong Han ; Zhang Zhang ; Jiao Dai ,�Dynamic Random Access for Hadoop Distributed File System� Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on Publication Year: 2012 , Page(s): 17 � 22
[14] Madaan, S. ; Agrawal, R.K. �Implementation of identity based distributed cloud storage encryption scheme using PHP and C for Hadoop File System� Tier 2 Federation Grid, Cloud & High Performance Computing Science (RO-LCG), 2012 5th Romania Publication Year: 2012 , Page(s): 74 - 77
[15] Yang Jin ; Tang Deyu ; Zhou Yi �A Distributed Storage Model for EHR Based on HBase� Information Management, Innovation Management and Industrial Engineering (ICIII), 2011 International Conference on Volume: 2 Publication Year: 2011 , Page(s): 369 - 372
[16] Yang Jin ; Tang Deyu ; Zheng Xianrong �Research on the distributed electronic medical records storage model� IT in Medicine and Education (ITME), 2011 International Symposium on Volume: 2 Publication Year: 2011 , Page(s): 288 - 292
[17] Krish, K.R. ; Anwar, A. ; Butt, A.R. �hatS: A Heterogeneity-Aware Tiered Storage for Hadoop� Cluster, Cloud and Grid Computing (CCGrid), 2014 14th IEEE/ACM International Symposium on Publication Year: 2014 , Page(s): 502 � 511
[18] Changjian Fu ; Zhihua Leng �A Framework for Recommender Systems in E-Commerce Based on Distributed Storage and Data-Mining� E-Business and E-Government (ICEE), 2010 International Conference on Publication Year: 2010 , Page(s): 3502 - 3505
[19] Bo Dong ; Xiao Zhong ; Qinghua Zheng ; Lirong Jian ; Jian Liu ; Jie Qiu ; Ying Li �Correlation Based File Prefetching Approach for Hadoop� Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on Publication Year: 2010 , Page(s): 41 - 48
[20] Bo Dong ; Jie Qiu ; Qinghua Zheng ; Xiao Zhong ; Jingwei Li ; Ying Li �A Novel Approach to Improving the Efficiency of Storing and Accessing Small Files on Hadoop: A Case Study by PowerPoint Files� Services Computing (SCC), 2010 IEEE International Conference on Publication Year: 2010 , Page(s): 65 - 72
[21] Martha, V.S. ; Weizhong Zhao ; Xiaowei Xu �h-MapReduce: A Framework for Workload Balancing in MapReduce� Advanced Information Networking and Applications (AINA), 2013 IEEE 27th International Conference on Publication Year: 2013 , Page(s): 637 - 644
[22] Li Wang ; Zhiwei Ni ; Yiwen Zhang ; Zhang Jun Wu ; �Liyang Tang Notice of Violation of IEEE Publication Principles �Pipelined-MapReduce: An Improved MapReduce Parallel Programing Model � Intelligent Computation Technology and Automation (ICICTA), 2011 International Conference on Volume: 1 Publication Year: 2011 , Page(s): 871 - 874
[23] Kaiqi Xiong ; Yuxiong He �Power-effiicent resource allocation in MapReduce clusters�Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on Publication Year: 2013 , Page(s): 603 � 608
[24] Yanpei Chen ; Ganapathi, A. ; Griffith, R. ; Katz, R. �The Case for Evaluating MapReduce Performance Using Workload Suites� Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 2011 IEEE 19th International Symposium on Publication Year: 2011 , Page(s): 390 - 399 �Getting more for less in optimized MapReduce workflows�
[25] Zhuoyao Zhang ; Cherkasova, L. ; Boon Thau Loo Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on Publication Year: 2013 , Page(s): 93 � 100
[26] Guigang Zhang ; Jian Wang ; Weixing Huang ; Chao Li ; Yong Zhang; Chunxiao Xing �A Semantic++ MapReduce: A Preliminary Report�Semantic Computing (ICSC), 2014 IEEE International Conference on Publication Year: 2014 , Page(s): 330 � 336
[27] Kewen Wang ; Wenzhong Predator An experience guided configuration optimizer for Hadoop MapReduce Tang Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on Publication Year: 2012 , Page(s): 419 - 426
[28] Chu Huang ; Sencun Zhu ; Dinghao Wu Towards Trusted Services: Result Verification Schemes for MapReduce Cluster, Cloud and Grid Computing (CCGrid), 2012 12th IEEE/ACM International Symposium on Publication Year: 2012 , Page(s): 41 - 48
[29] Cura: A Cost-Optimized Model for MapReduce in a Cloud Palanisamy, B. ; Singh, A. ; Langston, B. Parallel & Distributed Processing (IPDPS), 2013 IEEE 27th International Symposium on Publication Year: 2013 , Page(s): 1275 � 1286
[30] M2M: A simple Matlab-to-MapReduce translator for cloud computing Zhang, Junbo ; Xiang, Dong ; Li, Tianrui ; Pan, Yi Tsinghua Science and Technology Volume: 18 , Issue: 1 Publication Year: 2013 , Page(s): 1-9
Citation
K.U. Malar, D. Ragupathi, G.M. Prabhu, "The Hadoop Dispersed File system: Balancing Movability And Performance," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.166-177, 2014.
Efficient Approach for Mining High Utility Itemsets From Transactional Databases
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.178-184, Sep-2014
Abstract
Mining high utility item sets from transactional database refers to the discovery of item sets with high utility like profits. Although a number of relevant algorithms have been proposed in recent years, they incur the problem of producing a large number of candidate item sets for high utility item sets. Such a large number of candidate item sets degrades the mining performance in terms of execution time and space requirement. The situation may become worse when the database contains lots of long transactions or long high utility item sets. An algorithm, namely UP-Growth proposed [7] for mining high utility item sets with a set of effective strategies for pruning candidate item sets. The information of high utility item sets is maintained in a tree-based data structure named UP-Tree such that candidate item sets can be generated efficiently with only two scans of database. Experimental results show that the proposed algorithm, especially UP-Growth, not only reduce the number of candidates effectively but also outperform other algorithms substantially in terms of runtime, especially when databases contain more no of transactions.
Key-Words / Index Term
High Utility Itemsets, Datamining, Transactional Database
References
[1] Ahmed.C. F, Tanbeer.S. K,Jeong.B.S and Lee.Y.K �Efficient tree structures for high utility pattern mining in incremental databases�, IEEE Transactions onKnowledge and Data Engineering, Vol. 21, Issue 12, pp. 1708- 1721, 2009
[2] Chan.R, Yang.Q and Shen.Y �Mining high utility itemsets�, in Proc. of Third IEEE Int`l Conf. on Data Mining, pp. 19-26, 2003
[3] Cai.C. H, Fu.A. W. C, Cheng.C. H and Kwong.W. W �Mining Association Rules with Weighted Items�, in Proc. of the Int�l Database Engineering and Applications Symposium (IDEAS 1998), pp. 68-77, 1998
[4] Erwin.A, Gopalan.R. P and Achuthan.N. R �Efficient mining of high utility itemsets from large datasets�, in Proc. of PAKDD , LNA 5012, pp. 554- 561, 2008
[5] Han.J,Pei.J, Yin.Y �Mining frequent patterns without candidate generation�,inProc. of the ACM-SIGMOD Int`l Conf. on Management of Data, pp. 1-12, 2000
[6] Liu.Y, Liao.W and Choudhary.A �A fast high utility itemsets mining algorithm�, in Proc. of the Utility-Based Data Mining Workshop, 2005
[7] Vincent S. Tseng, Bai-En Shie, Cheng-Wei Wu, and Philip S. Yu �Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases�, IEEE Transactions on Knowledge and Data Engineering, 2012
Citation
P.S. Prakash, S. Anandamurugan, "Efficient Approach for Mining High Utility Itemsets From Transactional Databases," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.178-184, 2014.