首页 > 最新文献

2013 International Conference on Recent Trends in Information Technology (ICRTIT)最新文献

英文 中文
Highly secure DNA-based audio steganography 高度安全的基于dna的音频隐写术
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844257
C. M. Shyamasree, Sheena Anees
Security is the important criteria relevant to information in transit as well as in storage. This paper proposes a highly secure method to hide the secret messages to prevent unauthorized access. The proposed method works in three levels. Single level of encryption and two levels of steganography are used. First level makes use of a DNA based playfair encryption. Second level hides the encrypted secret file in a randomly generated DNA sequence. In the third level, embedded DNA is hidden in an audio file. The main objective of the proposed method is that no one could be able to find the existence of the secret file.
安全性是与传输和存储中的信息相关的重要标准。本文提出了一种高度安全的秘密消息隐藏方法,以防止未经授权的访问。所提出的方法在三个层次上起作用。使用单级加密和两级隐写。第一个关卡使用基于DNA的公平加密。第二层将加密的秘密文件隐藏在随机生成的DNA序列中。在第三层,嵌入的DNA隐藏在音频文件中。提出的方法的主要目的是没有人能够发现秘密文件的存在。
{"title":"Highly secure DNA-based audio steganography","authors":"C. M. Shyamasree, Sheena Anees","doi":"10.1109/ICRTIT.2013.6844257","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844257","url":null,"abstract":"Security is the important criteria relevant to information in transit as well as in storage. This paper proposes a highly secure method to hide the secret messages to prevent unauthorized access. The proposed method works in three levels. Single level of encryption and two levels of steganography are used. First level makes use of a DNA based playfair encryption. Second level hides the encrypted secret file in a randomly generated DNA sequence. In the third level, embedded DNA is hidden in an audio file. The main objective of the proposed method is that no one could be able to find the existence of the secret file.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130727641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Design of prototype filter using windowing and linear optimization technique for the non-uniform filter banks 针对非均匀滤波器组,采用加窗和线性优化技术设计原型滤波器
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844229
Aman Kumar, R. K. Sunkaria
Non-uniform filter banks (NUFBs) are being preferred because it divides the signal into unequal bands. Among perfect reconstruction (PR) and Nearly Perfect Reconstruction (NPR) filter banks, the later is preferred since the filter banks can be realized with minimal complexity. In this paper, a prototype filter is designed using the windowing techniques and the pass-band edge frequency (ωp) is optimized using the linear optimization technique for the design of a near perfect reconstructed filter bank. Among the different windowing techniques, Kaiser and dolph-chebyshev windows have been considered. The performance of the filter banks for each of these windowing techniques was measured in terms of Peak Reconstruction Error (PRE). These techniques are being applied on an Electro Cardio Gram (ECG) signal and their respective results are also being discussed.
非均匀滤波器组(nufb)是首选,因为它将信号分成不等的频带。在完全重构(PR)和几乎完全重构(NPR)滤波器组中,由于滤波器组可以以最小的复杂性实现,因此后者是首选。本文采用加窗技术设计了原型滤波器,并采用线性优化技术对通带边缘频率(ωp)进行了优化,设计了近似完美的重构滤波器组。在不同的开窗技术中,恺撒窗和多尔夫-切比雪夫窗被考虑过。这些加窗技术的滤波器组的性能是根据峰值重建误差(PRE)来测量的。这些技术正在应用于心电图(ECG)信号,其各自的结果也在讨论中。
{"title":"Design of prototype filter using windowing and linear optimization technique for the non-uniform filter banks","authors":"Aman Kumar, R. K. Sunkaria","doi":"10.1109/ICRTIT.2013.6844229","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844229","url":null,"abstract":"Non-uniform filter banks (NUFBs) are being preferred because it divides the signal into unequal bands. Among perfect reconstruction (PR) and Nearly Perfect Reconstruction (NPR) filter banks, the later is preferred since the filter banks can be realized with minimal complexity. In this paper, a prototype filter is designed using the windowing techniques and the pass-band edge frequency (ωp) is optimized using the linear optimization technique for the design of a near perfect reconstructed filter bank. Among the different windowing techniques, Kaiser and dolph-chebyshev windows have been considered. The performance of the filter banks for each of these windowing techniques was measured in terms of Peak Reconstruction Error (PRE). These techniques are being applied on an Electro Cardio Gram (ECG) signal and their respective results are also being discussed.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134229164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A-Routing for intermittently connected mobile ad hoc networks 间歇连接移动自组织网络的路由
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844191
S. Ramesh, R. Indira, R. Praveen, P. G. Kumar
The Wireless and the Mobile Networks appear to provide a wide range of applications. Following these, the Mobile Ad hoc Networks (MANET) aid in wide development of many applications. The achievement of the real world applications are attained through effective routing. The Intermittently Connected Mobile Ad hoc Network (ICMANET) is a sparse network where a full connectivity is never possible. ICMANET is a disconnected MANET and is also a Delay Tolerant Network (DTN) that sustains for higher delays. The routing in a disseminated network is a difficult task. A new routing scheme called A-Routing (AR) is been proposed with a motto of achieving optimal result in delivering the data packet towards the destined node. A-Routing is proposed with the basis of Ant Colony Optimization technique (ACO). The routing in ICMNAET is done by means of Ant routing protocol. This paper enchants a novel routing methodology for data transmission in ICMANET.
无线和移动网络似乎提供了广泛的应用。在此之后,移动自组织网络(MANET)有助于许多应用程序的广泛开发。通过有效的路由可以实现实际应用。间断性连接移动自组网(ICMANET)是一种稀疏网络,永远不可能实现完全连接。ICMANET是一种断开式MANET,也是一种支持更高延迟的容忍延迟网络(DTN)。分布式网络中的路由是一项艰巨的任务。提出了一种新的路由方案,称为A- routing (AR),其宗旨是在向目标节点发送数据包时达到最优结果。提出了基于蚁群优化技术的a -路由算法。ICMNAET中的路由是通过Ant路由协议完成的。本文提出了一种新的ICMANET数据传输路由方法。
{"title":"A-Routing for intermittently connected mobile ad hoc networks","authors":"S. Ramesh, R. Indira, R. Praveen, P. G. Kumar","doi":"10.1109/ICRTIT.2013.6844191","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844191","url":null,"abstract":"The Wireless and the Mobile Networks appear to provide a wide range of applications. Following these, the Mobile Ad hoc Networks (MANET) aid in wide development of many applications. The achievement of the real world applications are attained through effective routing. The Intermittently Connected Mobile Ad hoc Network (ICMANET) is a sparse network where a full connectivity is never possible. ICMANET is a disconnected MANET and is also a Delay Tolerant Network (DTN) that sustains for higher delays. The routing in a disseminated network is a difficult task. A new routing scheme called A-Routing (AR) is been proposed with a motto of achieving optimal result in delivering the data packet towards the destined node. A-Routing is proposed with the basis of Ant Colony Optimization technique (ACO). The routing in ICMNAET is done by means of Ant routing protocol. This paper enchants a novel routing methodology for data transmission in ICMANET.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133304801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Indoor RF-channel characterization of nano-through femto-cell ambient at millimeter-wave/THz frequencies in LTE contexts LTE环境下毫米波/太赫兹频率下纳米至飞蜂窝环境的室内射频信道特性
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844273
Bharti Sharma, P. Neelakanta, V. Aalo, D. De Groff
RF channel characterization in forging conceivable short-range wireless links in nano-through femto-cells applications of WLAN/WPAN in long term evolution (LTE) context is considered. Relevant next-generation wireless-based indoor services are required to support multi-gigabit information transfer rates. As such, the associated electromagnetic (EM) spectral needs warrant accommodating almost unlimited wireless channels each shouldering enormous bandwidth. Relevant wireless transport requirements can be met with the span of EM spectra that currently remain unclaimed and unregulated. They exist as prospective resources in the frontiers of mm-wave range (spanning 30 GHz to terahertz band). Addressed in this study thereof is the feasibility of conceiving “inferential prototypes” of RF channel-models in the 30+ GHz through THz spectrum of indoor ambient by judiciously sharing the “similarity” of details pertinent to already existing (known) “models” of traditional, lower-side EM spectrum, (namely, VLF through micro-/mm-wave); and, an approach based on the principle of similitude due to Edgar Buckingham is invoked toward model-to-(inferential) prototype transformations. Examples on indoor path-loss estimation for line-of-sight (LoS) case is presented for the spectral range of interest and the efficacy of the proposal is outlined.
考虑了在长期演进(LTE)环境下WLAN/WPAN的纳米到飞蜂窝应用中锻造可想象的短距离无线链路的射频信道特性。相关的下一代基于无线的室内服务需要支持千兆位的信息传输速率。因此,相关的电磁(EM)频谱需要保证容纳几乎无限的无线信道,每个信道都承担着巨大的带宽。相关的无线传输要求可以通过目前无人认领和不受管制的EM频谱范围来满足。它们是毫米波范围(30 GHz至太赫兹波段)前沿的潜在资源。在这项研究中,通过明智地分享与传统的(已知的)低侧EM频谱(即VLF到微/毫米波)的现有“模型”相关的细节的“相似性”,在室内环境的30+ GHz到太赫兹频谱中构想RF信道模型的“推理原型”的可行性;并且,基于Edgar Buckingham的相似原则的方法被用于模型到(推理)原型的转换。针对感兴趣的光谱范围,给出了室内视距(LoS)情况下路径损失估计的实例,并概述了该建议的有效性。
{"title":"Indoor RF-channel characterization of nano-through femto-cell ambient at millimeter-wave/THz frequencies in LTE contexts","authors":"Bharti Sharma, P. Neelakanta, V. Aalo, D. De Groff","doi":"10.1109/ICRTIT.2013.6844273","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844273","url":null,"abstract":"RF channel characterization in forging conceivable short-range wireless links in nano-through femto-cells applications of WLAN/WPAN in long term evolution (LTE) context is considered. Relevant next-generation wireless-based indoor services are required to support multi-gigabit information transfer rates. As such, the associated electromagnetic (EM) spectral needs warrant accommodating almost unlimited wireless channels each shouldering enormous bandwidth. Relevant wireless transport requirements can be met with the span of EM spectra that currently remain unclaimed and unregulated. They exist as prospective resources in the frontiers of mm-wave range (spanning 30 GHz to terahertz band). Addressed in this study thereof is the feasibility of conceiving “inferential prototypes” of RF channel-models in the 30+ GHz through THz spectrum of indoor ambient by judiciously sharing the “similarity” of details pertinent to already existing (known) “models” of traditional, lower-side EM spectrum, (namely, VLF through micro-/mm-wave); and, an approach based on the principle of similitude due to Edgar Buckingham is invoked toward model-to-(inferential) prototype transformations. Examples on indoor path-loss estimation for line-of-sight (LoS) case is presented for the spectral range of interest and the efficacy of the proposal is outlined.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133854205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pattern analysis of cipher text: A combined approach 密文模式分析:一种组合方法
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844236
Shivendra Mishra, A. Bhattacharjya
In this paper, we propose and implement a combined approach for identification of a given unknown sample of cipher text. In the first part of system, cipher text samples are generated randomly using different cipher algorithms. In the second part; the system analyses sample through a) Block Length/stream Detection b) Entropy/Reoccurrence Analysis c) Dictionary and Decision tree based approach. All these blocks analyzethe sample simultaneously. The block length/stream detection is done through counting the block length and by comparing to known sample's patterns. Whereas, the Entropy/reoccurrence analysis and Dictionary-Decision tree based approaches are done through the large data set characterization. At last, in the third part; the different block results are compared and result is generated. Finally, we analyze the system with unknown ciphertext samplesof AES, DES and Blow Fish, which is generated in random fashion and given as input to the system.
在本文中,我们提出并实现了一种用于识别给定未知密文样本的组合方法。在系统的第一部分,采用不同的密码算法随机生成密文样本。第二部分;系统通过a)块长度/流检测b)熵/重现分析c)基于字典和决策树的方法分析样本。所有这些模块同时分析样品。块长度/流检测是通过计算块长度和比较已知样本的模式来完成的。而熵/重复分析和基于字典-决策树的方法是通过大数据集表征来完成的。最后,在第三部分;比较不同的块结果并生成结果。最后,我们用随机生成的AES、DES和Blow Fish的未知密文样本作为系统的输入,对系统进行了分析。
{"title":"Pattern analysis of cipher text: A combined approach","authors":"Shivendra Mishra, A. Bhattacharjya","doi":"10.1109/ICRTIT.2013.6844236","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844236","url":null,"abstract":"In this paper, we propose and implement a combined approach for identification of a given unknown sample of cipher text. In the first part of system, cipher text samples are generated randomly using different cipher algorithms. In the second part; the system analyses sample through a) Block Length/stream Detection b) Entropy/Reoccurrence Analysis c) Dictionary and Decision tree based approach. All these blocks analyzethe sample simultaneously. The block length/stream detection is done through counting the block length and by comparing to known sample's patterns. Whereas, the Entropy/reoccurrence analysis and Dictionary-Decision tree based approaches are done through the large data set characterization. At last, in the third part; the different block results are compared and result is generated. Finally, we analyze the system with unknown ciphertext samplesof AES, DES and Blow Fish, which is generated in random fashion and given as input to the system.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124376795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A comprehensive presentation to XML signature and encryption 对XML签名和加密的全面介绍
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844276
A. El-Aziz, A. Kannan
XML has been widely adopted for information exchange across various networks due to flexibility providing common syntax for messaging systems. XML documents may contain private information that cannot be shared by all user communities. Therefore, XML Security has a great importance to the overall security of the distributed systems. In this paper, we provide a comprehensive tutorial on XML security standards. The presented standards include XML signature and XML encryption. We describe how to create and verify XML signature and how to encrypt and decrypt XML data. This paper should serve as a roadmap for future research and basis for further exploration of relevant scientific literature and standard specifications.
由于为消息传递系统提供通用语法的灵活性,XML已被广泛用于跨各种网络的信息交换。XML文档可能包含不能被所有用户社区共享的私有信息。因此,XML安全性对分布式系统的整体安全性具有重要意义。在本文中,我们提供了一个关于XML安全标准的全面教程。提出的标准包括XML签名和XML加密。我们描述了如何创建和验证XML签名,以及如何加密和解密XML数据。本文可作为今后研究的路线图和进一步挖掘相关科学文献和标准规范的基础。
{"title":"A comprehensive presentation to XML signature and encryption","authors":"A. El-Aziz, A. Kannan","doi":"10.1109/ICRTIT.2013.6844276","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844276","url":null,"abstract":"XML has been widely adopted for information exchange across various networks due to flexibility providing common syntax for messaging systems. XML documents may contain private information that cannot be shared by all user communities. Therefore, XML Security has a great importance to the overall security of the distributed systems. In this paper, we provide a comprehensive tutorial on XML security standards. The presented standards include XML signature and XML encryption. We describe how to create and verify XML signature and how to encrypt and decrypt XML data. This paper should serve as a roadmap for future research and basis for further exploration of relevant scientific literature and standard specifications.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116569204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Path stream group level encoding: Efficient wireless XML streaming 路径流组级编码:高效的无线XML流
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844267
P. Prabhavathy, S. Bose
In this paper, we propose an efficient encoding for XML information dissemination scheme in mobile computing where conserving power and time is a critical task. We define a novel structure called Path Stream Group Level (PSGL) node for streaming XML data and selective download of XML document. A XML document may contain many elements with same name. But each element having same name with different XML tree path information can have various meaning in XML document. Therefore, our encoding scheme uses Location Path information of XML document to uniquely identify a node and groups its elements having same name and location path into PSGL node. Each PSGL node structure includes Level Number, Node Name, Location Path, Child Index, Sibling Index, Attribute Value List, Text Value List, Select Bit String (SBS) coding and SBS count. Level number helps in tuning into particular level of XML document tree where the result node of query or first predicate condition resides in Xpath expression for selective download of XML document. The indices and Value Lists helps in an efficient XML query processing. Thus PSGL encoding scheme exploits the XML document object model in terms of depth and level order tree traversals for XML parsing and streaming. Simple path query and twig pattern queries can be processed efficiently due to parent-child and siblings relationship coded in SBS coding.
在移动计算中,我们提出了一种高效的XML信息传播编码方案。我们定义了一种新的结构,称为路径流组级(PSGL)节点,用于XML数据流和XML文档的选择性下载。一个XML文档可能包含许多具有相同名称的元素。但是,具有相同名称但具有不同XML树路径信息的每个元素在XML文档中可能具有不同的含义。因此,我们的编码方案使用XML文档的Location Path信息来唯一标识节点,并将具有相同名称和位置路径的元素分组到PSGL节点中。每个PSGL节点结构包括级别号、节点名称、位置路径、子索引、兄弟索引、属性值列表、文本值列表、SBS编码选择和SBS计数。级别号有助于调优到XML文档树的特定级别,其中查询的结果节点或第一个谓词条件驻留在Xpath表达式中,以便选择性地下载XML文档。索引和值列表有助于高效的XML查询处理。因此,PSGL编码方案在深度和层次顺序树遍历方面利用XML文档对象模型进行XML解析和流处理。由于在SBS编码中编码了父子和兄弟关系,因此可以有效地处理简单的路径查询和分支模式查询。
{"title":"Path stream group level encoding: Efficient wireless XML streaming","authors":"P. Prabhavathy, S. Bose","doi":"10.1109/ICRTIT.2013.6844267","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844267","url":null,"abstract":"In this paper, we propose an efficient encoding for XML information dissemination scheme in mobile computing where conserving power and time is a critical task. We define a novel structure called Path Stream Group Level (PSGL) node for streaming XML data and selective download of XML document. A XML document may contain many elements with same name. But each element having same name with different XML tree path information can have various meaning in XML document. Therefore, our encoding scheme uses Location Path information of XML document to uniquely identify a node and groups its elements having same name and location path into PSGL node. Each PSGL node structure includes Level Number, Node Name, Location Path, Child Index, Sibling Index, Attribute Value List, Text Value List, Select Bit String (SBS) coding and SBS count. Level number helps in tuning into particular level of XML document tree where the result node of query or first predicate condition resides in Xpath expression for selective download of XML document. The indices and Value Lists helps in an efficient XML query processing. Thus PSGL encoding scheme exploits the XML document object model in terms of depth and level order tree traversals for XML parsing and streaming. Simple path query and twig pattern queries can be processed efficiently due to parent-child and siblings relationship coded in SBS coding.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128509381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Paraphrase identification in short texts using grammar patterns 使用语法模式解释短文本中的识别
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844249
V. Vaishnavi, M. Saritha, R. S. Milton
We can determine whether two texts are paraphrases of each other by finding out the extent to which the texts are similar. The typical lexical matching technique works by matching the sequence of tokens between the texts to recognize paraphrases, and fails when different words are used to convey the same meaning. We can improve this simple method by combining lexical with syntactic or semantic representations of the input texts. The present work makes use of syntactical information in the texts and computes the similarity between them using word similarity measures based on WordNet and lexical databases. The texts are converted into a unified semantic structural model through which the semantic similarity of the texts is obtained. An approach is presented to assess the semantic similarity and the results of applying this approach is evaluated using the Microsoft Research Paraphrase (MSRP) Corpus.
我们可以通过找出两个文本相似的程度来确定两个文本是否是彼此的意译。典型的词汇匹配技术是通过匹配文本之间的符号序列来识别释义,而当使用不同的词来表达相同的意思时,这种匹配技术就失效了。我们可以通过将输入文本的词法表示与语法或语义表示相结合来改进这个简单的方法。本文利用文本中的句法信息,利用基于WordNet和词汇数据库的词相似度度量来计算文本之间的相似度。将文本转换成统一的语义结构模型,通过该模型获得文本的语义相似度。提出了一种评估语义相似度的方法,并使用微软研究释义(MSRP)语料库对应用该方法的结果进行了评估。
{"title":"Paraphrase identification in short texts using grammar patterns","authors":"V. Vaishnavi, M. Saritha, R. S. Milton","doi":"10.1109/ICRTIT.2013.6844249","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844249","url":null,"abstract":"We can determine whether two texts are paraphrases of each other by finding out the extent to which the texts are similar. The typical lexical matching technique works by matching the sequence of tokens between the texts to recognize paraphrases, and fails when different words are used to convey the same meaning. We can improve this simple method by combining lexical with syntactic or semantic representations of the input texts. The present work makes use of syntactical information in the texts and computes the similarity between them using word similarity measures based on WordNet and lexical databases. The texts are converted into a unified semantic structural model through which the semantic similarity of the texts is obtained. An approach is presented to assess the semantic similarity and the results of applying this approach is evaluated using the Microsoft Research Paraphrase (MSRP) Corpus.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114712036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Slack time scheduling for managing database transactions in mobile ad-hoc networks 在移动自组织网络中管理数据库事务的松弛时间调度
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844239
B. Diwan, M. Sumalatha
In a mobile ad-hoc network (MANET), traditional mobile nodes (TMNs) are movable and can communicate with other TMNs through a wireless medium without any infrastructure network. MANET is focused in the field of applications such as military, disaster recovery situations where it is difficult to establish a fixed network. The network systems that schedule database transactions in MANET need to focus additional issues such as energy limitation and scheduling constraints. This paper proposes a solution for scheduling database transactions that reduces the number of transaction missing deadlines while balancing the energy consumption by the TMNs in the system. The proposed solution is setting up reasonable concurrency control when guaranteeing isolation. This paper then reports the simulation experiments that were conducted to evaluate the effectiveness of the proposed system in terms of number of transaction missing deadlines, total energy consumption and distribution of energy consumption among TMNs.
在移动自组织网络(MANET)中,传统的移动节点(tmn)是可移动的,无需任何基础设施网络即可通过无线介质与其他tmn进行通信。MANET主要应用于难以建立固定网络的军事、灾难恢复等领域。在MANET中调度数据库事务的网络系统需要关注诸如能量限制和调度约束等附加问题。本文提出了一种调度数据库事务的解决方案,该方案在平衡系统中tmn的能量消耗的同时减少了事务错过截止日期的数量。提出的解决方案是在保证隔离的同时设置合理的并发控制。然后,本文报告了进行的仿真实验,以评估所提出的系统在交易错过截止日期的数量,总能耗和能源消耗在tmn之间的分布方面的有效性。
{"title":"Slack time scheduling for managing database transactions in mobile ad-hoc networks","authors":"B. Diwan, M. Sumalatha","doi":"10.1109/ICRTIT.2013.6844239","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844239","url":null,"abstract":"In a mobile ad-hoc network (MANET), traditional mobile nodes (TMNs) are movable and can communicate with other TMNs through a wireless medium without any infrastructure network. MANET is focused in the field of applications such as military, disaster recovery situations where it is difficult to establish a fixed network. The network systems that schedule database transactions in MANET need to focus additional issues such as energy limitation and scheduling constraints. This paper proposes a solution for scheduling database transactions that reduces the number of transaction missing deadlines while balancing the energy consumption by the TMNs in the system. The proposed solution is setting up reasonable concurrency control when guaranteeing isolation. This paper then reports the simulation experiments that were conducted to evaluate the effectiveness of the proposed system in terms of number of transaction missing deadlines, total energy consumption and distribution of energy consumption among TMNs.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121901826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information extraction and unfilled-form structure retrieval from filled-up forms 从已填写的表单中提取信息和检索未填写的表单结构
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844219
S. Deivalakshmi, Rajasekharreddy Poreddy, P. Palanisamy, Souvik Malakar
Form processing is an essential operation in business and government organizations. In this digital arena, it is necessary to extract the information from the form documents and the Information extraction is useful in postal address extraction and forgery detection in bank cheques etc. This process can also recover the Unfilled-Form structure from a filled up form and can be used in retrieval of empty bank cheques and postal cards etc. This paper presents the method for information extraction and retrieval of unfilled form structure from filled-up form documents in two steps. First step deals with the detection of lines present in the form document along with starting and ending points of those lines and second step involves the extraction of character information present above these detected lines using mask processing.
表单处理是企业和政府机构的基本操作。在这个数字化的舞台上,从表单文档中提取信息是必要的,信息提取在邮政地址提取和银行支票的伪造检测等方面都是有用的。此流程还可以从已填写的表格中恢复未填写表格结构,并可用于检索空的银行支票和邮政卡等。本文提出了从已填写表单文档中提取信息和检索未填写表单结构的方法。第一步处理表单文档中存在的行以及这些行的起点和终点的检测,第二步涉及使用掩码处理提取这些检测到的行上方的字符信息。
{"title":"Information extraction and unfilled-form structure retrieval from filled-up forms","authors":"S. Deivalakshmi, Rajasekharreddy Poreddy, P. Palanisamy, Souvik Malakar","doi":"10.1109/ICRTIT.2013.6844219","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844219","url":null,"abstract":"Form processing is an essential operation in business and government organizations. In this digital arena, it is necessary to extract the information from the form documents and the Information extraction is useful in postal address extraction and forgery detection in bank cheques etc. This process can also recover the Unfilled-Form structure from a filled up form and can be used in retrieval of empty bank cheques and postal cards etc. This paper presents the method for information extraction and retrieval of unfilled form structure from filled-up form documents in two steps. First step deals with the detection of lines present in the form document along with starting and ending points of those lines and second step involves the extraction of character information present above these detected lines using mask processing.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114347561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 International Conference on Recent Trends in Information Technology (ICRTIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1