首页 > 最新文献

2013 International Conference on Recent Trends in Information Technology (ICRTIT)最新文献

英文 中文
Cost-optimized resource provisioning in cloud 成本优化的云资源配置
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844189
P. Varalakshmi, K. Maheshwari
The main objective of the proposed system is to increase the resource utilization and the provider's profit in a cloud environment. While reserving the resources, the users' requests are posted onto the Virtual Machines (VMs), and then these VMs are deployed onto the Physical Machines (PMs). The proposed system uses a Bin-Packing procedure for VM Placement which is used to reduce the number of physical machines required by the cloud providers. The proposed work has two parts, Job placement and VM placement. Job placement is done by the cloud broker which uses the best fit heuristic approach and then, the VM placement is done by the cloud broker that follows the worst fit heuristic approach. This work has been executed and the performance results are analysed with CloudSim tool, which showcased the good power conservation compared to other strategies.
该系统的主要目标是提高云环境中的资源利用率和提供商的利润。预留资源的同时,将用户的请求发布到虚拟机上,然后将这些虚拟机部署到物理机上。提出的系统使用Bin-Packing过程进行VM放置,用于减少云提供商所需的物理机器数量。建议的工作分为两个部分,就业安置和虚拟机安置。作业放置由使用最佳拟合启发式方法的云代理完成,然后,VM放置由遵循最差拟合启发式方法的云代理完成。这项工作已经执行,并使用CloudSim工具分析了性能结果,与其他策略相比,显示了良好的节能效果。
{"title":"Cost-optimized resource provisioning in cloud","authors":"P. Varalakshmi, K. Maheshwari","doi":"10.1109/ICRTIT.2013.6844189","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844189","url":null,"abstract":"The main objective of the proposed system is to increase the resource utilization and the provider's profit in a cloud environment. While reserving the resources, the users' requests are posted onto the Virtual Machines (VMs), and then these VMs are deployed onto the Physical Machines (PMs). The proposed system uses a Bin-Packing procedure for VM Placement which is used to reduce the number of physical machines required by the cloud providers. The proposed work has two parts, Job placement and VM placement. Job placement is done by the cloud broker which uses the best fit heuristic approach and then, the VM placement is done by the cloud broker that follows the worst fit heuristic approach. This work has been executed and the performance results are analysed with CloudSim tool, which showcased the good power conservation compared to other strategies.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124404014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A regression based adaptive incremental algorithm for health abnormality prediction 一种基于回归的健康异常预测自适应增量算法
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844284
Srinivasan S, Ram Srivatsa, Ram Kumar, Bhargavi R, Vaidehi V
Existing learning systems for health prediction require batch-wise data or sub-text along with data to begin the learning process. These techniques are slow in learning and require more time to achieve a commendable accuracy. The techniques also provide less scope for adaptation to varying data. Since health parameters change dynamically, there is a need to reduce false positives. In this paper, a Regression Based Adaptive Incremental Learning Algorithm (RBAIL) is proposed. The novel RBAIL algorithm performs regression on the vital parameters such as Heart Rate, Blood Pressure and Saturated Oxygen Level to predict the abnormality. It also validates the data before learning, thus reducing the probability of a false positive. The proposed algorithm has been validated with varied data and is observed to provide increased accuracy in prediction and adaptability to fluctuating data. Simulation over real world data sets is used to validate the effectiveness of this algorithm.
现有的健康预测学习系统需要批处理数据或随数据一起的子文本来开始学习过程。这些技术学习起来很慢,需要更多的时间才能达到值得称赞的准确性。这些技术还提供了较小的适应变化数据的空间。由于健康参数是动态变化的,因此需要减少误报。提出一种基于回归的自适应增量学习算法(RBAIL)。该算法通过对心率、血压、饱和氧水平等重要参数的回归来预测异常。它还在学习之前验证数据,从而减少误报的概率。所提出的算法已经用不同的数据进行了验证,并观察到该算法在预测精度和对波动数据的适应性方面有所提高。通过对真实数据集的仿真,验证了该算法的有效性。
{"title":"A regression based adaptive incremental algorithm for health abnormality prediction","authors":"Srinivasan S, Ram Srivatsa, Ram Kumar, Bhargavi R, Vaidehi V","doi":"10.1109/ICRTIT.2013.6844284","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844284","url":null,"abstract":"Existing learning systems for health prediction require batch-wise data or sub-text along with data to begin the learning process. These techniques are slow in learning and require more time to achieve a commendable accuracy. The techniques also provide less scope for adaptation to varying data. Since health parameters change dynamically, there is a need to reduce false positives. In this paper, a Regression Based Adaptive Incremental Learning Algorithm (RBAIL) is proposed. The novel RBAIL algorithm performs regression on the vital parameters such as Heart Rate, Blood Pressure and Saturated Oxygen Level to predict the abnormality. It also validates the data before learning, thus reducing the probability of a false positive. The proposed algorithm has been validated with varied data and is observed to provide increased accuracy in prediction and adaptability to fluctuating data. Simulation over real world data sets is used to validate the effectiveness of this algorithm.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124430278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trustworthy distributed collaborative intrusion detection using mobile agents 基于移动代理的可信分布式协同入侵检测
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844188
N. Asokan, A. Sujitha, R. Poornima, P. Sujatha, A. Kannan
A distributed environment is one in which intrusions are prevalent and drastically affect the performance of the networks. Therefore a need for Intrusion Detection Networks arises. Collaborators could be used here to enhance the detection of attacks. But still this concept suffers from lack of trustworthiness in the distributed environment. We introduce Mobile Agents (MA) to handle this problem effectively. A DCE - TRUST architecture is proposed where MAs are used to migrate from one node to another autonomously within the range of collaborators in and out of each network to inform them about the detected intrusions accurately and in a timely manner. We also found that the proposed architecture enhances detection rate and minimizes the rate in which each node gets to know about the attacks.
在分布式环境中,入侵是普遍存在的,并且会极大地影响网络的性能。因此,入侵检测网络应运而生。合作者可以在这里使用,以加强对攻击的检测。但是这个概念在分布式环境中仍然缺乏可信度。为了有效地解决这一问题,我们引入了移动代理(MA)。提出了一种DCE - TRUST架构,利用MAs在每个网络内外的协作者范围内自主地从一个节点迁移到另一个节点,以准确及时地通知他们检测到的入侵。我们还发现,所提出的体系结构提高了检测率,并最小化了每个节点了解攻击的速度。
{"title":"Trustworthy distributed collaborative intrusion detection using mobile agents","authors":"N. Asokan, A. Sujitha, R. Poornima, P. Sujatha, A. Kannan","doi":"10.1109/ICRTIT.2013.6844188","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844188","url":null,"abstract":"A distributed environment is one in which intrusions are prevalent and drastically affect the performance of the networks. Therefore a need for Intrusion Detection Networks arises. Collaborators could be used here to enhance the detection of attacks. But still this concept suffers from lack of trustworthiness in the distributed environment. We introduce Mobile Agents (MA) to handle this problem effectively. A DCE - TRUST architecture is proposed where MAs are used to migrate from one node to another autonomously within the range of collaborators in and out of each network to inform them about the detected intrusions accurately and in a timely manner. We also found that the proposed architecture enhances detection rate and minimizes the rate in which each node gets to know about the attacks.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121142180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive learning based human activity and fall detection using fuzzy frequent pattern mining 基于模糊频繁模式挖掘的自适应学习人类活动和跌倒检测
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844293
J. Surana, C. Hemalatha, V. Vaidehi, S. Palavesam, M. Khan
Human activity recognition (HAR) has gained a lot of significance in monitoring the health of people, especially to detect fall among elderly people who live independently. This project proposes a novel method for recognizing activities and detecting fall of a person using body-worn sensors. Traditional algorithms like Naïve Bayes classifier and Support Vector Machine are mainly used for activity classification. However, these systems fail to capture significant association that exists between interesting patterns. Existing accelerometer based wearable systems are not sufficient to determine the fall of a person. Hence, a Fuzzy Associative Classification based Human Activity Recognition (FAC-HAR) system is proposed to overcome the aforementioned drawbacks in detecting abnormal status of a person. The proposed (FAC-HAR) system uses three different sensors namely heartbeat, breathing rate and accelerometer and employs fuzzy clustering and associative classification for abnormality detection. The proposed system introduces a novel learning mechanism is to improve classification accuracy. A classification accuracy of 92% is achieved with the proposed fuzzy frequent pattern mining based human activity recognition.
人体活动识别(HAR)在监测人体健康,特别是检测独立生活的老年人跌倒方面具有重要意义。这个项目提出了一种新的方法来识别活动和检测跌倒的人使用身体穿戴传感器。活动分类主要采用Naïve贝叶斯分类器和支持向量机等传统算法。然而,这些系统无法捕捉有趣模式之间存在的重要关联。现有的基于可穿戴系统的加速度计不足以确定一个人的下落。为此,本文提出了一种基于模糊关联分类的人体活动识别(facc - har)系统,以克服上述检测人体异常状态的缺陷。提出的(facc - har)系统采用心跳、呼吸频率和加速度三种不同的传感器,并采用模糊聚类和关联分类进行异常检测。该系统引入了一种新的学习机制来提高分类精度。本文提出的基于模糊频繁模式挖掘的人类活动识别方法的分类准确率达到92%。
{"title":"Adaptive learning based human activity and fall detection using fuzzy frequent pattern mining","authors":"J. Surana, C. Hemalatha, V. Vaidehi, S. Palavesam, M. Khan","doi":"10.1109/ICRTIT.2013.6844293","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844293","url":null,"abstract":"Human activity recognition (HAR) has gained a lot of significance in monitoring the health of people, especially to detect fall among elderly people who live independently. This project proposes a novel method for recognizing activities and detecting fall of a person using body-worn sensors. Traditional algorithms like Naïve Bayes classifier and Support Vector Machine are mainly used for activity classification. However, these systems fail to capture significant association that exists between interesting patterns. Existing accelerometer based wearable systems are not sufficient to determine the fall of a person. Hence, a Fuzzy Associative Classification based Human Activity Recognition (FAC-HAR) system is proposed to overcome the aforementioned drawbacks in detecting abnormal status of a person. The proposed (FAC-HAR) system uses three different sensors namely heartbeat, breathing rate and accelerometer and employs fuzzy clustering and associative classification for abnormality detection. The proposed system introduces a novel learning mechanism is to improve classification accuracy. A classification accuracy of 92% is achieved with the proposed fuzzy frequent pattern mining based human activity recognition.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114911774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Video traffic analysis for abnormal event detection using frequent item set mining 基于频繁项集挖掘的视频流量异常事件检测分析
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844262
P. S. A. Kumar, V. Vaidehi, E. Chandralekha
As powerful computers and cameras have become wide spread, the number of applications using vision techniques has increased enormously. One such application that has received significant attention from the computer vision community is traffic surveillance. We propose a new event detection technique for detecting abnormal events in traffic video surveillance. The main objective of this work is to detect the abnormal events which normally occur at junction, in video surveillance. Our work consists of two phases 1) Training Phase 2) Testing Phase. Our main novelty in this work is modified lossy counting algorithm based on set approach. Initially, the frames are divided into grid regions at the junction and labels are assigned. The proposed work consist of blob detection and tracking, conversion of object location to data streams, frequent item set mining and pattern matching. In the training phase, blob detection is carried out by separating the modelled static background frame using Gaussian mixture models (GMM) and this will be carried out for every frame for tracking purpose. The blobs location is determined by assigning to the corresponding grid label and numbered moving object direction to form data streams. A modified lossy counting algorithm is performed over temporal data steams for discovering regular spatial video patterns. In testing phase, the same process is repeated except frequent item set mining, for finding the spatial pattern in each frame and it is compared with stored regular video patterns for abnormal event detection. The proposed system has shown significant improvement in performance over to the existing techniques.
随着功能强大的计算机和照相机的普及,使用视觉技术的应用也大大增加。一个这样的应用已经受到了计算机视觉社区的极大关注,那就是交通监控。针对交通视频监控中的异常事件,提出了一种新的事件检测技术。本工作的主要目的是检测视频监控中通常发生在路口的异常事件。我们的工作分为两个阶段:1)培训阶段2)测试阶段。我们在这项工作中的主要新颖之处是基于集合方法的改进有损计数算法。最初,帧在结点处被划分为网格区域,并分配标签。提出的工作包括斑点检测和跟踪、目标位置到数据流的转换、频繁项集挖掘和模式匹配。在训练阶段,通过使用高斯混合模型(GMM)分离建模的静态背景帧来进行blob检测,并将对每一帧进行blob检测以进行跟踪。通过分配相应的网格标签和编号的移动对象方向来确定blob的位置,从而形成数据流。一种改进的有损计数算法在时间数据流上执行,用于发现规则的空间视频模式。在测试阶段,除了频繁的项目集挖掘之外,重复同样的过程来寻找每帧中的空间模式,并将其与存储的规则视频模式进行比较,以进行异常事件检测。与现有的技术相比,所提出的系统在性能上有了显著的提高。
{"title":"Video traffic analysis for abnormal event detection using frequent item set mining","authors":"P. S. A. Kumar, V. Vaidehi, E. Chandralekha","doi":"10.1109/ICRTIT.2013.6844262","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844262","url":null,"abstract":"As powerful computers and cameras have become wide spread, the number of applications using vision techniques has increased enormously. One such application that has received significant attention from the computer vision community is traffic surveillance. We propose a new event detection technique for detecting abnormal events in traffic video surveillance. The main objective of this work is to detect the abnormal events which normally occur at junction, in video surveillance. Our work consists of two phases 1) Training Phase 2) Testing Phase. Our main novelty in this work is modified lossy counting algorithm based on set approach. Initially, the frames are divided into grid regions at the junction and labels are assigned. The proposed work consist of blob detection and tracking, conversion of object location to data streams, frequent item set mining and pattern matching. In the training phase, blob detection is carried out by separating the modelled static background frame using Gaussian mixture models (GMM) and this will be carried out for every frame for tracking purpose. The blobs location is determined by assigning to the corresponding grid label and numbered moving object direction to form data streams. A modified lossy counting algorithm is performed over temporal data steams for discovering regular spatial video patterns. In testing phase, the same process is repeated except frequent item set mining, for finding the spatial pattern in each frame and it is compared with stored regular video patterns for abnormal event detection. The proposed system has shown significant improvement in performance over to the existing techniques.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116421685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Concept based document management in cloud storage 云存储中基于概念的文档管理
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844186
M. Sumalatha, E. Pugazhendi, D. Archana
Cloud computing is one of the most useful environment that provides various information services in which required information can be retrieved through many web-based tools and applications. Now the new surge of interest in cloud computing is accompanied with the exponential growth of data sizes. There is a need to find the desired content quickly and efficiently by simply consulting the index. Thus there arises a question of how to effectively process these immense data sets is becoming increasingly urgent. Our existing system is searching the content through ontology in cloud which practically suffers from maintaining a consistent logic for the input documents given and taking this advantage into consideration we have brought in new concepts called Document Retrieval Algorithm. In this paper we discuss how effectively and efficiently information can be retrieved from cloud taking into account their storage space too, where we store the metadata of file in cloud and not the entire file which holds a lot of space in distributed environment. Thus we bring in the concept of Named Entity Recognition and Universal Word List with Term frequency, which maximizes the information retrieval more effective and efficient and also to bridge the gap between the semantic web and the users which reduces the complexity met by them in information retrieval.
云计算是最有用的环境之一,它提供各种信息服务,可以通过许多基于web的工具和应用程序检索所需的信息。现在,对云计算的兴趣激增伴随着数据大小的指数级增长。需要通过简单地查询索引来快速有效地找到所需的内容。因此,如何有效地处理这些庞大的数据集的问题变得越来越紧迫。我们现有的系统是通过云上的本体来搜索内容,这实际上是在为给定的输入文档保持一致的逻辑,考虑到这个优点,我们引入了新的概念,称为文档检索算法。本文讨论了如何在考虑存储空间的情况下有效地从云中检索信息,我们将文件的元数据存储在云中,而不是将整个文件存储在分布式环境中,因为它占用了大量的空间。在此基础上,我们引入了命名实体识别和带词频的通用词表的概念,使信息检索更有效、更高效,同时也弥合了语义网与用户之间的鸿沟,降低了用户在信息检索中遇到的复杂性。
{"title":"Concept based document management in cloud storage","authors":"M. Sumalatha, E. Pugazhendi, D. Archana","doi":"10.1109/ICRTIT.2013.6844186","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844186","url":null,"abstract":"Cloud computing is one of the most useful environment that provides various information services in which required information can be retrieved through many web-based tools and applications. Now the new surge of interest in cloud computing is accompanied with the exponential growth of data sizes. There is a need to find the desired content quickly and efficiently by simply consulting the index. Thus there arises a question of how to effectively process these immense data sets is becoming increasingly urgent. Our existing system is searching the content through ontology in cloud which practically suffers from maintaining a consistent logic for the input documents given and taking this advantage into consideration we have brought in new concepts called Document Retrieval Algorithm. In this paper we discuss how effectively and efficiently information can be retrieved from cloud taking into account their storage space too, where we store the metadata of file in cloud and not the entire file which holds a lot of space in distributed environment. Thus we bring in the concept of Named Entity Recognition and Universal Word List with Term frequency, which maximizes the information retrieval more effective and efficient and also to bridge the gap between the semantic web and the users which reduces the complexity met by them in information retrieval.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122197409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECG anomaly detection using wireless BAN and HEMFCM clustering 基于无线BAN和HEMFCM聚类的心电异常检测
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844213
S. R. Janani, C. Hemalatha, V. Vaidehi
In recent days, elderly people living alone at home are steadily increasing throughout the world. This situation drives to develop a health care system for monitoring the health parameters of elderly people and help them to lead ahealthy independent life. This paper presents a system that uses wireless sensors for monitoring the health parameters without disturbing the normal activities of elderly people. The proposed system provides a wearable health care solution using the wireless Shimmer sensor device for collecting ECG data in home PC. ECG data anomaly is detected using rule based classifier. Classification rules are generated based on cluster centroids obtained using a novel scheme named Hybrid Expectation Maximization and Fuzzy C Means (HEMFCM) Clustering. The proposed method is validated using real data collected from different subjects and abnormal data readings from the MIT BIH database. Experimental results show that proposed method achieves 85% classification accuracy which is better than EM and FCM clustering methods.
近年来,世界各地独居老人的数量正在稳步增加。在这种情况下,需要开发一种卫生保健系统来监测老年人的健康参数,帮助他们过上健康独立的生活。本文介绍了一种利用无线传感器监测老年人健康参数而不干扰老年人正常活动的系统。该系统提供了一种可穿戴式医疗保健解决方案,使用无线Shimmer传感器设备在家庭PC中收集心电数据。采用基于规则的分类器检测心电数据异常。采用混合期望最大化和模糊C均值(HEMFCM)聚类方法获得聚类质心,生成分类规则。采用从不同受试者收集的真实数据和从MIT BIH数据库中读取的异常数据验证了所提出的方法。实验结果表明,该方法的分类准确率达到85%,优于EM和FCM聚类方法。
{"title":"ECG anomaly detection using wireless BAN and HEMFCM clustering","authors":"S. R. Janani, C. Hemalatha, V. Vaidehi","doi":"10.1109/ICRTIT.2013.6844213","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844213","url":null,"abstract":"In recent days, elderly people living alone at home are steadily increasing throughout the world. This situation drives to develop a health care system for monitoring the health parameters of elderly people and help them to lead ahealthy independent life. This paper presents a system that uses wireless sensors for monitoring the health parameters without disturbing the normal activities of elderly people. The proposed system provides a wearable health care solution using the wireless Shimmer sensor device for collecting ECG data in home PC. ECG data anomaly is detected using rule based classifier. Classification rules are generated based on cluster centroids obtained using a novel scheme named Hybrid Expectation Maximization and Fuzzy C Means (HEMFCM) Clustering. The proposed method is validated using real data collected from different subjects and abnormal data readings from the MIT BIH database. Experimental results show that proposed method achieves 85% classification accuracy which is better than EM and FCM clustering methods.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129605440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Monitoring and reconfiguring the services in service oriented system using AOBPEL 使用AOBPEL对面向服务系统中的服务进行监控和重新配置
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844241
V. Krishnamurty, R. Natarajan, C. Babu
Web services describe the standardized way of integrating the web based applications using XML, SOAP, WSDL and UDDI. A service oriented application is developed by composing suitable services available in the registry. Monitoring of the services is enabled using Apache Jmeter, in which the load and the invocation time for each service is specified which in turn helps to simulate the response time of the services. If the services are probably expected to violate the contract, then services with the same functionality are identified to reconfigure the application without affecting the base code. This paper proposes to use the AO4BPEL technique to change the BPEL workflow at runtime and bypass the services. Towards this objective, the proposed aspect based reconfiguration framework has been tested on a prototype SOA based application in the domain of e-Shopping.
Web服务描述了使用XML、SOAP、WSDL和UDDI集成基于Web的应用程序的标准化方法。通过组合注册中心中可用的合适服务来开发面向服务的应用程序。使用Apache Jmeter启用了对服务的监视,其中指定了每个服务的负载和调用时间,这反过来有助于模拟服务的响应时间。如果服务可能会违反契约,那么将识别具有相同功能的服务,以便在不影响基础代码的情况下重新配置应用程序。本文建议使用AO4BPEL技术在运行时更改BPEL工作流并绕过服务。为了实现这一目标,所提出的基于方面的重构框架已经在电子购物领域的一个基于SOA的原型应用程序上进行了测试。
{"title":"Monitoring and reconfiguring the services in service oriented system using AOBPEL","authors":"V. Krishnamurty, R. Natarajan, C. Babu","doi":"10.1109/ICRTIT.2013.6844241","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844241","url":null,"abstract":"Web services describe the standardized way of integrating the web based applications using XML, SOAP, WSDL and UDDI. A service oriented application is developed by composing suitable services available in the registry. Monitoring of the services is enabled using Apache Jmeter, in which the load and the invocation time for each service is specified which in turn helps to simulate the response time of the services. If the services are probably expected to violate the contract, then services with the same functionality are identified to reconfigure the application without affecting the base code. This paper proposes to use the AO4BPEL technique to change the BPEL workflow at runtime and bypass the services. Towards this objective, the proposed aspect based reconfiguration framework has been tested on a prototype SOA based application in the domain of e-Shopping.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128289153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intelligent accident mitigation system by mining vital signs using wireless body sensor 利用无线身体传感器挖掘生命体征的智能事故缓解系统
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844205
K. Bharathwajan, S. Janani, K. Raguram, C. Hemalatha, V. Vaidehi
Recent surveys show that the number of road accidents has increased predominantly. One of the major causes to which increased accidents are attributed to is physical ailment of drivers. Continuous monitoring of driver's health condition is essential in order to reduce car accidents that occur due to health abnormality. A non-intrusive method is demanded so as to prevent hindering of driving activity. This paper presents a mobile health monitoring system which is an application running in Android based smart phone. The mobile phone acquires vital parameters such as Heart Rate (HR) and Respiration Rate (RR) from a wearable body sensor through Bluetooth. As faster heart beat and shortness of breath are the most common symptoms of heart problem, the proposed system considers heart rate and respiration rate for deciding abnormal health status. A Bayesian Belief network (BBN) is designed to analyze the vital parameters along with the driver's health history and decide whether the health status of the driver is normal or abnormal in real time. Bayesian Network is a powerful representation for uncertain domains like human health status. Also, it improves classification accuracy as it allows seamless integration of additional information such as the driver's health records with sensed vital information for deciding abnormality and thus avoids false alarms. When abnormality is detected, immediately the driver gets a beep alert call in his mobile and call alert is generated to the caregiver in the case of emergency. The proposed system is tested in real time and it gives reasonable accuracy.
最近的调查显示道路交通事故的数量明显增加。事故增加的主要原因之一是司机的身体不适。为了减少因健康异常而发生的交通事故,对驾驶员的健康状况进行持续监测是必不可少的。需要一种非侵入性的方法,以防止妨碍驾驶活动。本文介绍了一种运行在Android智能手机上的移动健康监测系统。手机通过蓝牙从可穿戴式身体传感器获取心率(HR)和呼吸率(RR)等重要参数。由于心跳加快和呼吸短促是心脏问题最常见的症状,因此提出的系统考虑心率和呼吸速率来判断异常健康状态。设计了贝叶斯信念网络(BBN),结合驾驶员健康史对关键参数进行分析,实时判断驾驶员的健康状态是正常还是异常。贝叶斯网络是一个强大的不确定领域的表示,如人类健康状况。此外,它还可以将驾驶员的健康记录等附加信息与感知到的重要信息无缝集成,从而提高分类的准确性,从而避免误报。当检测到异常时,驾驶员的手机会立即收到哔哔声警报电话,在紧急情况下会向护理人员发出呼叫警报。该系统经过了实时测试,具有一定的精度。
{"title":"Intelligent accident mitigation system by mining vital signs using wireless body sensor","authors":"K. Bharathwajan, S. Janani, K. Raguram, C. Hemalatha, V. Vaidehi","doi":"10.1109/ICRTIT.2013.6844205","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844205","url":null,"abstract":"Recent surveys show that the number of road accidents has increased predominantly. One of the major causes to which increased accidents are attributed to is physical ailment of drivers. Continuous monitoring of driver's health condition is essential in order to reduce car accidents that occur due to health abnormality. A non-intrusive method is demanded so as to prevent hindering of driving activity. This paper presents a mobile health monitoring system which is an application running in Android based smart phone. The mobile phone acquires vital parameters such as Heart Rate (HR) and Respiration Rate (RR) from a wearable body sensor through Bluetooth. As faster heart beat and shortness of breath are the most common symptoms of heart problem, the proposed system considers heart rate and respiration rate for deciding abnormal health status. A Bayesian Belief network (BBN) is designed to analyze the vital parameters along with the driver's health history and decide whether the health status of the driver is normal or abnormal in real time. Bayesian Network is a powerful representation for uncertain domains like human health status. Also, it improves classification accuracy as it allows seamless integration of additional information such as the driver's health records with sensed vital information for deciding abnormality and thus avoids false alarms. When abnormality is detected, immediately the driver gets a beep alert call in his mobile and call alert is generated to the caregiver in the case of emergency. The proposed system is tested in real time and it gives reasonable accuracy.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130383869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Providing secure storage services on cloud 提供安全的云存储服务
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844190
K. Vanathi, C. Valliyammai
Cloud computing allows the cloud customer to hoard their data on the remote store and endow them to utilize the On-demand high quality applications with super colossal computational power. As prodigious amount of data are stored on the cloud, it inevitably acquaint new security hazards such as data integrity, data availability problems in the system. To overcome these issues, we propose an extensible mechanism to perform data integrity auditing by delegating it to the Third Party Auditor (TPA) in a privacy preserving manner. This design is formulated based on tagging and hash tag table which supports the updates in the data and also it identifies the deleterious servers. With the use of TPA, it also reduces the burden of Cloud Service Provider (CSP).
云计算允许云客户将他们的数据存储在远程存储中,并赋予他们使用随需应变的高质量应用程序和超级巨大的计算能力。由于大量的数据存储在云上,不可避免地会带来新的安全隐患,如系统中的数据完整性、数据可用性问题。为了克服这些问题,我们提出了一种可扩展的机制,通过以保护隐私的方式将其委托给第三方审计员(TPA)来执行数据完整性审计。该设计基于标签和哈希标签表,支持数据更新,并识别有害服务器。通过TPA的使用,也减轻了云服务提供商(CSP)的负担。
{"title":"Providing secure storage services on cloud","authors":"K. Vanathi, C. Valliyammai","doi":"10.1109/ICRTIT.2013.6844190","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844190","url":null,"abstract":"Cloud computing allows the cloud customer to hoard their data on the remote store and endow them to utilize the On-demand high quality applications with super colossal computational power. As prodigious amount of data are stored on the cloud, it inevitably acquaint new security hazards such as data integrity, data availability problems in the system. To overcome these issues, we propose an extensible mechanism to perform data integrity auditing by delegating it to the Third Party Auditor (TPA) in a privacy preserving manner. This design is formulated based on tagging and hash tag table which supports the updates in the data and also it identifies the deleterious servers. With the use of TPA, it also reduces the burden of Cloud Service Provider (CSP).","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130271471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 International Conference on Recent Trends in Information Technology (ICRTIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1