首页 > 最新文献

2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)最新文献

英文 中文
Efficient Binary Data Hiding Technique in Boundary Points 边界点的有效二进制数据隐藏技术
Subodh Kumar, Sandip Mal
Data hiding is now becoming most important research area now a day. One efficient binary data hiding technique into a digital image has been proposed in this study. The proposed work focuses on the learning of different edge detection and data hiding techniques and analysis of their relative performances. Work focuses on finding the boundary edges of size of the length of the data to be hided. Sobel, Prewitt, Roberts and Canny edge detection techniques have been used to hide data. Comparison results show Prewitt is a better technique for finding the edges of particular size. Binary data of different size have been hided in edges points to generate the image with hided data. Original data is also extracted from the image with similar approach of hiding. The proposed technique hides data with minimum number of change of bits of the original image (As an example: Twenty bits of data can hide by changing of four bits only). Therefore the proposed approach is most efficient and useful for hiding information.
数据隐藏已成为当今世界最重要的研究领域。本文提出了一种有效的数字图像二进制数据隐藏技术。本文的工作重点是学习不同的边缘检测和数据隐藏技术,并分析它们的相对性能。工作的重点是寻找与待隐藏数据长度大小相等的边界边。Sobel, Prewitt, Roberts和Canny边缘检测技术被用来隐藏数据。比较结果表明,对于寻找特定尺寸的边缘,Prewitt是一种更好的技术。将不同大小的二值数据隐藏在边缘点中,生成隐藏数据的图像。采用类似的隐藏方法从图像中提取原始数据。该技术以最小的原始图像位数变化来隐藏数据(例如:仅改变4位就可以隐藏20位数据)。因此,该方法对于信息隐藏是最有效和有用的。
{"title":"Efficient Binary Data Hiding Technique in Boundary Points","authors":"Subodh Kumar, Sandip Mal","doi":"10.1109/CICT.2016.18","DOIUrl":"https://doi.org/10.1109/CICT.2016.18","url":null,"abstract":"Data hiding is now becoming most important research area now a day. One efficient binary data hiding technique into a digital image has been proposed in this study. The proposed work focuses on the learning of different edge detection and data hiding techniques and analysis of their relative performances. Work focuses on finding the boundary edges of size of the length of the data to be hided. Sobel, Prewitt, Roberts and Canny edge detection techniques have been used to hide data. Comparison results show Prewitt is a better technique for finding the edges of particular size. Binary data of different size have been hided in edges points to generate the image with hided data. Original data is also extracted from the image with similar approach of hiding. The proposed technique hides data with minimum number of change of bits of the original image (As an example: Twenty bits of data can hide by changing of four bits only). Therefore the proposed approach is most efficient and useful for hiding information.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125421355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Security Enhancement Through Number System: A Turing-Machine Approach 通过数字系统增强数据安全:一种图灵机方法
H. Tripathi, Bramah Hazela
Now a day's privacy is the main issue to sending information from one point to another in data transmission. Encryption of data is the most effective way of computer science concerned with developing schemes and formula to achieve data & information security. In its course of action, it allows sequence to be encoded in the form of cipher text where it is extremely difficult to read or recognize the codes where decryption is the procedure to transforming encoded text into the original message and information. In this paper we present an algorithm for data encryption and decryption which is based on number theory. In addition, data encryption using strange number system (especially using pentaoctagesimal (SNS) can make available physical or substantial security to information - allowing updating only to authorized users. This algorithm is used pentaoctagesimal strange number system to encrypt data and we propose a better data encryption and decryption strategy, which will offer better security towards all possible ways of attacks while data transmission. In reference to data security, a Turing-Machine is a device based on hypothesis that manages numbers dexterously on stripe of tape according to conditions of the table. In contempt of its simplicity, Turing-Machine can be pertinent at any computer algorithm after simulating the logic that would be useful in illuminating the function of a CPU. In this research-work authors have proposed a notion that takes binary number for a given decimal number and simulate the binary number through Turing-Machine. As a result of which the next number can be generated in binary form. Further if again we calculate the decimal of the obtained binary digits, the resultant decimal number is one more than the previous decimal number. This approach would be helpful to generate next successor decimal number from a given decimal number. Further this approach of number generation through Turing machine would be helpful in cryptographic techniques where, generated number can be applied for data security enhancement at both sender as well as receiver end.
如今,在数据传输中,一天的隐私是信息从一个点发送到另一个点的主要问题。数据加密是计算机科学开发方案和公式以实现数据和信息安全的最有效途径。在其操作过程中,它允许序列以密文的形式进行编码,这是极其难以读取或识别的代码,其中解密是将编码文本转换为原始消息和信息的过程。本文提出了一种基于数论的数据加解密算法。此外,使用奇数系统(特别是使用五八进制(SNS))进行数据加密可以为信息提供物理或实质性的安全性——只允许授权用户更新。该算法采用五八进制奇数系统对数据进行加密,提出了一种更好的数据加解密策略,在数据传输过程中对各种可能的攻击方式提供了更好的安全性。在数据安全方面,图灵机是一种基于假设的设备,它根据表的条件在纸带上灵巧地管理数字。图灵机虽然简单,但在模拟了有助于阐明CPU功能的逻辑之后,它可以适用于任何计算机算法。本文提出了用二进制数表示给定的十进制数,并通过图灵机模拟二进制数的概念。其结果是下一个数字可以以二进制形式生成。此外,如果我们再次计算得到的二进制数的十进制数,得到的十进制数比前一个十进制数大1。这种方法有助于从给定的十进制数生成下一个后继十进制数。此外,这种通过图灵机生成数字的方法将有助于加密技术,其中生成的数字可以应用于发送端和接收端的数据安全性增强。
{"title":"Data Security Enhancement Through Number System: A Turing-Machine Approach","authors":"H. Tripathi, Bramah Hazela","doi":"10.1109/CICT.2016.131","DOIUrl":"https://doi.org/10.1109/CICT.2016.131","url":null,"abstract":"Now a day's privacy is the main issue to sending information from one point to another in data transmission. Encryption of data is the most effective way of computer science concerned with developing schemes and formula to achieve data & information security. In its course of action, it allows sequence to be encoded in the form of cipher text where it is extremely difficult to read or recognize the codes where decryption is the procedure to transforming encoded text into the original message and information. In this paper we present an algorithm for data encryption and decryption which is based on number theory. In addition, data encryption using strange number system (especially using pentaoctagesimal (SNS) can make available physical or substantial security to information - allowing updating only to authorized users. This algorithm is used pentaoctagesimal strange number system to encrypt data and we propose a better data encryption and decryption strategy, which will offer better security towards all possible ways of attacks while data transmission. In reference to data security, a Turing-Machine is a device based on hypothesis that manages numbers dexterously on stripe of tape according to conditions of the table. In contempt of its simplicity, Turing-Machine can be pertinent at any computer algorithm after simulating the logic that would be useful in illuminating the function of a CPU. In this research-work authors have proposed a notion that takes binary number for a given decimal number and simulate the binary number through Turing-Machine. As a result of which the next number can be generated in binary form. Further if again we calculate the decimal of the obtained binary digits, the resultant decimal number is one more than the previous decimal number. This approach would be helpful to generate next successor decimal number from a given decimal number. Further this approach of number generation through Turing machine would be helpful in cryptographic techniques where, generated number can be applied for data security enhancement at both sender as well as receiver end.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125558152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image Classification Using Humps of Histogram 利用直方图的驼峰进行图像分类
A. Khare
Classification techniques classify the remotely sensed image by using reflectance properties of pixels. This paper presents a new approach to classify multispectral remotely sensed image. This approach classifies the multispectral image using frequencies of spectral bands' grey level values (DN values) in Histogram. It draws histogram for different spectral bands of the image. Then, it finds and separates the humps in histograms. This approach yields more meaningful classification for multi-modal or bi-modal histograms. It creates 3 potential centroids in each hump for each spectral band. More the number of humps, more would be potential centroids for classification. Different spectral bands have different peaks in their humps of histograms. It reads all the pixels of one peak of one band and draw the local histogram of other bands' grey level values using pixels read. This way, peak of one hump of one band can find corresponding peaks in local histogram and these peaks make a pixel that can be a potential centroid and some of these peak frequencies is the actual frequency of that centroid. Now, I choose extreme left and extreme right grey level values whose frequency is greater than or equal to the average frequency of that hump. As each hump of each spectral band has three grey level values, I can find three centroids for each hump of each spectral band. Duplicate centroids are eliminated from the list of centroids. The rest of the centroids are recursively iterated and centroids with lesser frequencies than the nearby centroids are eliminated. Later, algorithm uses gravitational force to find out two nearby centroids.
分类技术是利用像元的反射率对遥感影像进行分类。提出了一种新的多光谱遥感图像分类方法。该方法利用直方图中各谱带灰度值(DN值)的频率对多光谱图像进行分类。对图像的不同光谱波段绘制直方图。然后,它在直方图中找到并分离驼峰。这种方法对多模态或双模态直方图产生更有意义的分类。它为每个光谱带在每个驼峰中创建3个潜在质心。峰的数量越多,分类的潜在质心就越多。不同的光谱带在直方图的峰中有不同的峰。它读取一个波段的一个峰值的所有像素,并使用读取的像素绘制其他波段灰度值的局部直方图。这样,一个频带的一个峰的峰值可以在局部直方图中找到相应的峰值,这些峰值形成一个像素,可以作为潜在的质心,其中一些峰值频率就是该质心的实际频率。现在,我选择最左和最右灰度值它们的频率大于或等于这个驼峰的平均频率。由于每个光谱带的每个驼峰都有三个灰度值,所以我可以为每个光谱带的每个驼峰找到三个质心。重复的质心将从质心列表中消除。其余质心递归迭代,剔除频率小于附近质心的质心。然后,算法利用引力找出两个附近的质心。
{"title":"Image Classification Using Humps of Histogram","authors":"A. Khare","doi":"10.1109/CICT.2016.37","DOIUrl":"https://doi.org/10.1109/CICT.2016.37","url":null,"abstract":"Classification techniques classify the remotely sensed image by using reflectance properties of pixels. This paper presents a new approach to classify multispectral remotely sensed image. This approach classifies the multispectral image using frequencies of spectral bands' grey level values (DN values) in Histogram. It draws histogram for different spectral bands of the image. Then, it finds and separates the humps in histograms. This approach yields more meaningful classification for multi-modal or bi-modal histograms. It creates 3 potential centroids in each hump for each spectral band. More the number of humps, more would be potential centroids for classification. Different spectral bands have different peaks in their humps of histograms. It reads all the pixels of one peak of one band and draw the local histogram of other bands' grey level values using pixels read. This way, peak of one hump of one band can find corresponding peaks in local histogram and these peaks make a pixel that can be a potential centroid and some of these peak frequencies is the actual frequency of that centroid. Now, I choose extreme left and extreme right grey level values whose frequency is greater than or equal to the average frequency of that hump. As each hump of each spectral band has three grey level values, I can find three centroids for each hump of each spectral band. Duplicate centroids are eliminated from the list of centroids. The rest of the centroids are recursively iterated and centroids with lesser frequencies than the nearby centroids are eliminated. Later, algorithm uses gravitational force to find out two nearby centroids.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121318428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Secure Authentication Scheme for VANETs 一种新的vanet安全认证方案
Dinesh Tiwari, Mayank Bhushan, Ankit Yadav, Suman Jain
In wireless networks, Vehicular Adhoc Network (VANET), is one of most recent research area, which is growing day by day. It is used to provide an efficient Traffic Information System (TIS), Intelligent Transportation System (ITS), and Life Safety. Authentication is an emerging issue for VANET security. There are many authentication schemes which have been proposed for stabilized communication among autonomous entities for efficient, fast, scalable and reliable data transmission. In current scenario, there is not adopted a real-life general solution in the worldwide standard for the autonomous mobile node authentication in VANETs. Here introducing a new efficient secure scheme that is "A Secure Authentication Scheme for VANETs", combination of Group signature and Identity based(ID-based) Signature scheme. The scheme Provides cost effective, highly privacy preserving of user, efficient message authentication and verification than existing system for VANETs. Only Authentic mobile node can enter in secure VANETs system. Group leader Local Authority (LA) can authenticate messages without involvement of concern Central Authority (CA). Malicious mobile node can very easily identify at beginning of joining the system and the system are trusty for all new mobile node to join VANETs. The scheme more suitable for high traffic density area or urban area, performance is more better in highly density traffic area and easy to verification of messages. The new anonymous authentication schemes which are more secure efficient, robust, and scalable for VANET's authentication and provide real-life solution match with the standard.
在无线网络中,车载自组网(Vehicular Adhoc Network, VANET)是近年来蓬勃发展的研究领域之一。它用于提供高效的交通信息系统(TIS)、智能交通系统(ITS)和生命安全。身份验证是VANET安全的一个新兴问题。为了实现高效、快速、可扩展和可靠的数据传输,已经提出了许多自治实体之间稳定通信的认证方案。在目前的情况下,全球标准中并没有针对VANETs中自主移动节点认证采用一个现实的通用解决方案。本文介绍了一种新的高效的安全方案——“VANETs安全认证方案”,它将组签名和基于身份(id)的签名方案相结合。与现有的VANETs系统相比,该方案具有成本效益高、用户隐私保护程度高、消息认证和验证效率高等优点。只有正版移动节点才能进入安全VANETs系统。组领导本地机构(LA)可以在不涉及相关中央机构(CA)的情况下验证消息。恶意移动节点在加入系统时可以很容易地识别出来,系统对所有新的移动节点加入VANETs都是可信的。该方案更适用于高交通密度区域或城区,在高密度交通区域性能更佳,且易于消息验证。新的匿名认证方案为VANET的认证提供了更安全、高效、健壮和可扩展的解决方案,并提供了符合标准的现实解决方案。
{"title":"A Novel Secure Authentication Scheme for VANETs","authors":"Dinesh Tiwari, Mayank Bhushan, Ankit Yadav, Suman Jain","doi":"10.1109/CICT.2016.64","DOIUrl":"https://doi.org/10.1109/CICT.2016.64","url":null,"abstract":"In wireless networks, Vehicular Adhoc Network (VANET), is one of most recent research area, which is growing day by day. It is used to provide an efficient Traffic Information System (TIS), Intelligent Transportation System (ITS), and Life Safety. Authentication is an emerging issue for VANET security. There are many authentication schemes which have been proposed for stabilized communication among autonomous entities for efficient, fast, scalable and reliable data transmission. In current scenario, there is not adopted a real-life general solution in the worldwide standard for the autonomous mobile node authentication in VANETs. Here introducing a new efficient secure scheme that is \"A Secure Authentication Scheme for VANETs\", combination of Group signature and Identity based(ID-based) Signature scheme. The scheme Provides cost effective, highly privacy preserving of user, efficient message authentication and verification than existing system for VANETs. Only Authentic mobile node can enter in secure VANETs system. Group leader Local Authority (LA) can authenticate messages without involvement of concern Central Authority (CA). Malicious mobile node can very easily identify at beginning of joining the system and the system are trusty for all new mobile node to join VANETs. The scheme more suitable for high traffic density area or urban area, performance is more better in highly density traffic area and easy to verification of messages. The new anonymous authentication schemes which are more secure efficient, robust, and scalable for VANET's authentication and provide real-life solution match with the standard.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116380761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Multilabel Approach Using Binary Relevance and One-versus-Rest Least Squares Twin Support Vector Machine for Scene Classification 一种基于二值相关和单对余最小二乘双支持向量机的场景分类方法
Divya Tomar, Sonali Agarwal
The classification of an image scene having multiple class labels produces significant challenge to the researchers. A semantic scene may be described by multiple objects or by multiple classes. For example, a beach scene may also contain mountain or buildings in the background. This research work proposes a multi-label scene classification model by using Binary Relevance (BR) based one-versus-rest Least Squares Twin Support Vector Machine (LSTSVM). Fifteen evaluation metrics have been used to analyze and compare the result of the proposed scene classification model with the six existing multi-label classifiers. Experimental results demonstrate the superiority and usefulness of the proposed model in the classification of multi-label scene over the existing multi-label approaches.
具有多个类标签的图像场景的分类给研究人员带来了很大的挑战。语义场景可以由多个对象或多个类来描述。例如,海滩场景也可能包含山或建筑物作为背景。本文提出了一种基于二值相关(BR)的单对rest最小二乘双支持向量机(LSTSVM)的多标签场景分类模型。使用15个评价指标对所提出的场景分类模型与现有的6种多标签分类器的分类结果进行分析和比较。实验结果证明了该模型在多标签场景分类方面的优越性和有效性。
{"title":"A Multilabel Approach Using Binary Relevance and One-versus-Rest Least Squares Twin Support Vector Machine for Scene Classification","authors":"Divya Tomar, Sonali Agarwal","doi":"10.1109/CICT.2016.17","DOIUrl":"https://doi.org/10.1109/CICT.2016.17","url":null,"abstract":"The classification of an image scene having multiple class labels produces significant challenge to the researchers. A semantic scene may be described by multiple objects or by multiple classes. For example, a beach scene may also contain mountain or buildings in the background. This research work proposes a multi-label scene classification model by using Binary Relevance (BR) based one-versus-rest Least Squares Twin Support Vector Machine (LSTSVM). Fifteen evaluation metrics have been used to analyze and compare the result of the proposed scene classification model with the six existing multi-label classifiers. Experimental results demonstrate the superiority and usefulness of the proposed model in the classification of multi-label scene over the existing multi-label approaches.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116519996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
PMSG Based Wind Energy Conversion System for Maximum Power Extraction 基于PMSG的最大功率提取风能转换系统
M. Lakshmi, Y. Babu, P. M. Babu
In this paper a permanent magnet synchronous generator based wind energy conversion system (WECS) with 2 level back to back converter under normal and fault condition on grid side is studied by using two effective controllers i.e tip speed ratio (TSR) and Fuzzy logic control (FLC) for maximum power extraction. The control schemes are used to track maximum generator power and to protect the wind turbine from damages with the help of machine side converter control. On the grid side the inverter is used to control active and reactive power independently with the control of d-axis and q-axis currents by using vector control theory (VC) with direct power control technique (DPC). Simulation results show the improved performance with FLC strategy compared to TSR contr oller under normal and fault conditions.
本文采用叶尖速比(TSR)和模糊逻辑控制(FLC)两种有效控制器,研究了基于永磁同步发电机的2级背靠背变流器风电转换系统在电网侧正常和故障情况下的最大功率提取。该控制方案用于跟踪发电机最大功率,并借助机侧变流器控制保护风力机免受损坏。在电网侧,利用矢量控制理论(VC)和直接功率控制技术(DPC)对d轴和q轴电流进行控制,实现对有功和无功功率的独立控制。仿真结果表明,与TSR控制器相比,FLC策略在正常和故障情况下的性能都有所提高。
{"title":"PMSG Based Wind Energy Conversion System for Maximum Power Extraction","authors":"M. Lakshmi, Y. Babu, P. M. Babu","doi":"10.1109/CICT.2016.78","DOIUrl":"https://doi.org/10.1109/CICT.2016.78","url":null,"abstract":"In this paper a permanent magnet synchronous generator based wind energy conversion system (WECS) with 2 level back to back converter under normal and fault condition on grid side is studied by using two effective controllers i.e tip speed ratio (TSR) and Fuzzy logic control (FLC) for maximum power extraction. The control schemes are used to track maximum generator power and to protect the wind turbine from damages with the help of machine side converter control. On the grid side the inverter is used to control active and reactive power independently with the control of d-axis and q-axis currents by using vector control theory (VC) with direct power control technique (DPC). Simulation results show the improved performance with FLC strategy compared to TSR contr oller under normal and fault conditions.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128452711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Innovative and Easy Approach for Clipping Curves along a Circular Window 一个创新和简单的方法裁剪曲线沿圆形窗口
Rohan Gupta, V. Tripathi, Kartikeya Singh, Nandish Pathak, Rohit Rastogi
This paper deals with a method of clipping a line segment into a circular window. Its unlike other algorithms, instead of dividing region into segments and generating the corresponding region codes, yields results based their parametric equations which not only yields precise result for each pixel but also compute faster. Its an algorithm that can be embedded in many circular displays in order to save their buffer memory and displaying fast and accurate result on the screen, after that they can be translated and scaled into the required area known as viewport.
本文讨论了一种将线段裁剪成圆形窗口的方法。与其他算法不同的是,它不是将区域划分成段并生成相应的区域代码,而是基于它们的参数方程产生结果,不仅对每个像素产生精确的结果,而且计算速度更快。它是一种算法,可以嵌入到许多圆形显示器中,以节省它们的缓冲内存,并在屏幕上显示快速准确的结果,之后它们可以被转换和缩放到所需的称为视口的区域。
{"title":"An Innovative and Easy Approach for Clipping Curves along a Circular Window","authors":"Rohan Gupta, V. Tripathi, Kartikeya Singh, Nandish Pathak, Rohit Rastogi","doi":"10.1109/CICT.2016.132","DOIUrl":"https://doi.org/10.1109/CICT.2016.132","url":null,"abstract":"This paper deals with a method of clipping a line segment into a circular window. Its unlike other algorithms, instead of dividing region into segments and generating the corresponding region codes, yields results based their parametric equations which not only yields precise result for each pixel but also compute faster. Its an algorithm that can be embedded in many circular displays in order to save their buffer memory and displaying fast and accurate result on the screen, after that they can be translated and scaled into the required area known as viewport.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127350205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RMI Approach to Cluster Based Cache Oblivious Peano Curves 基于聚类缓参无关Peano曲线的RMI方法
Sachin Bagga, A. Girdhar, M. Trivedi, Yingzhi Yang
There are number of problems that are so complex/large that it becomes impractical or even in some cases impossible to solve these problems on a single machine. As compared to the serial computation, parallel computation is much result oriented for understanding, simulating of number of complex and real world physical process. The cache oblivious(CO) model helps us in designing the algorithms which are cache alert. Moreover these algorithms will be independent of the given system's cache size. A matrix multiplication based upon the Peano curves helps in designing of the cache oblivious algorithms. The distributed environment is being developed using RMI (Remote Method Invocation). In this setup the Master system will decompose a large size matrix into the smaller (ones depending upon the system available). The slave systems will perform the computations as per the equations based upon space filling Peano curves which are cache oblivious in nature. As a result we are able to reuse the matrix elements again and again which leads to decrease in number of cache misses and increasing the overall execution time of whole cluster. At the master system actual partitioning is done to generate submatrix and the virtual partitioning into size of 3x3 is being done at the slave systems for implementing multiplication based upon Peano curves(PC). PC algorithmic approach provides spatial locality which is a basic requirement for increasing the overall system efficiency.
有许多问题非常复杂/大,以至于在一台机器上解决这些问题变得不切实际,甚至在某些情况下不可能解决这些问题。与串行计算相比,并行计算在理解和模拟大量复杂的现实物理过程方面更加注重结果。缓存无关(CO)模型可以帮助我们设计缓存警报算法。此外,这些算法将独立于给定系统的缓存大小。基于Peano曲线的矩阵乘法有助于缓存无关算法的设计。使用RMI(远程方法调用)开发分布式环境。在这种设置中,主系统将把大尺寸的矩阵分解成较小的矩阵(取决于可用的系统)。从系统将根据基于空间填充Peano曲线的方程执行计算,这些曲线本质上是缓存无关的。因此,我们能够一次又一次地重用矩阵元素,从而减少缓存丢失的数量,并增加整个集群的总体执行时间。在主系统上进行实际分区以生成子矩阵,在从系统上进行虚拟分区以实现基于Peano曲线(PC)的乘法。PC算法提供了空间局部性,这是提高系统整体效率的基本要求。
{"title":"RMI Approach to Cluster Based Cache Oblivious Peano Curves","authors":"Sachin Bagga, A. Girdhar, M. Trivedi, Yingzhi Yang","doi":"10.1109/CICT.2016.26","DOIUrl":"https://doi.org/10.1109/CICT.2016.26","url":null,"abstract":"There are number of problems that are so complex/large that it becomes impractical or even in some cases impossible to solve these problems on a single machine. As compared to the serial computation, parallel computation is much result oriented for understanding, simulating of number of complex and real world physical process. The cache oblivious(CO) model helps us in designing the algorithms which are cache alert. Moreover these algorithms will be independent of the given system's cache size. A matrix multiplication based upon the Peano curves helps in designing of the cache oblivious algorithms. The distributed environment is being developed using RMI (Remote Method Invocation). In this setup the Master system will decompose a large size matrix into the smaller (ones depending upon the system available). The slave systems will perform the computations as per the equations based upon space filling Peano curves which are cache oblivious in nature. As a result we are able to reuse the matrix elements again and again which leads to decrease in number of cache misses and increasing the overall execution time of whole cluster. At the master system actual partitioning is done to generate submatrix and the virtual partitioning into size of 3x3 is being done at the slave systems for implementing multiplication based upon Peano curves(PC). PC algorithmic approach provides spatial locality which is a basic requirement for increasing the overall system efficiency.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134482368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Optimization of Automatic Generated Test Cases for Path Testing Using Genetic Algorithm 基于遗传算法的路径测试自动生成测试用例优化
Rijwan Khan, Mohd Amjad, Akhilesh Kumar Srivastava
Software testing is a process for insuring the delivery of an error free software to customers. The success or failure of the software to achieve its desirability is depend on the software testing components. All the software industries spend a lot of their money and time for software testing process. Automatic testing is a key area where cost and time of software testing process has been considerably reduced as compared to manual testing. Path testing is a process of finding all du-path coverage for a given program. In this paper genetic algorithm is used for automatic test cases generation and optimization. The proposed method with genetic algorithm accepts a set of inputs and check of for path coverage.
软件测试是一个确保向客户交付无错误软件的过程。软件实现其期望的成功或失败取决于软件测试组件。所有的软件行业都在软件测试过程中花费了大量的金钱和时间。与手动测试相比,自动测试是软件测试过程的成本和时间大大减少的关键领域。路径测试是为给定程序找到所有双路径覆盖的过程。本文采用遗传算法自动生成和优化测试用例。该方法采用遗传算法,接受一组输入并进行路径覆盖检查。
{"title":"Optimization of Automatic Generated Test Cases for Path Testing Using Genetic Algorithm","authors":"Rijwan Khan, Mohd Amjad, Akhilesh Kumar Srivastava","doi":"10.1109/CICT.2016.16","DOIUrl":"https://doi.org/10.1109/CICT.2016.16","url":null,"abstract":"Software testing is a process for insuring the delivery of an error free software to customers. The success or failure of the software to achieve its desirability is depend on the software testing components. All the software industries spend a lot of their money and time for software testing process. Automatic testing is a key area where cost and time of software testing process has been considerably reduced as compared to manual testing. Path testing is a process of finding all du-path coverage for a given program. In this paper genetic algorithm is used for automatic test cases generation and optimization. The proposed method with genetic algorithm accepts a set of inputs and check of for path coverage.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131164650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Incremental Architectural Re-engineering for the Cloud: An Overview 云的增量架构再造:概述
Suman Jain, Mayank Bhushan, Ankit Yadav, Dinesh Tiwari
The advances in cloud computing have presented the global vision of utility computing with promising trends to a new world of information and communication technology. The legacy systems built on the obsolete and older technologies are typically addressed for the modification and alteration processed to leverage the benefits of cloud. Migrating to the cloud deployment models and re-engineering the on premises applications are two main issues concerning the cloud computing deployment. It can intensely expand the quality and scope of the software applications for resource provisioning with better efficiency. Instead of opting the traditional way of modifying the entire system in one go, incremental re-engineering of software architecture can lead to a safer and flexible way involving the correction of architectural deviation of legacy systems.
云计算的进步为信息和通信技术的新世界带来了具有前景的实用计算的全球视野。基于过时和较旧的技术构建的遗留系统通常用于处理修改和更改,以利用云的优势。迁移到云部署模型和重新设计本地应用程序是涉及云计算部署的两个主要问题。它可以极大地扩展软件应用的质量和范围,以提高资源配置的效率。与选择一次性修改整个系统的传统方法不同,软件体系结构的增量重新工程可以导致一种更安全、更灵活的方法,包括对遗留系统的体系结构偏差的纠正。
{"title":"Incremental Architectural Re-engineering for the Cloud: An Overview","authors":"Suman Jain, Mayank Bhushan, Ankit Yadav, Dinesh Tiwari","doi":"10.1109/CICT.2016.135","DOIUrl":"https://doi.org/10.1109/CICT.2016.135","url":null,"abstract":"The advances in cloud computing have presented the global vision of utility computing with promising trends to a new world of information and communication technology. The legacy systems built on the obsolete and older technologies are typically addressed for the modification and alteration processed to leverage the benefits of cloud. Migrating to the cloud deployment models and re-engineering the on premises applications are two main issues concerning the cloud computing deployment. It can intensely expand the quality and scope of the software applications for resource provisioning with better efficiency. Instead of opting the traditional way of modifying the entire system in one go, incremental re-engineering of software architecture can lead to a safer and flexible way involving the correction of architectural deviation of legacy systems.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115773753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1