首页 > 最新文献

International Conference on Information Communication and Embedded Systems (ICICES2014)最新文献

英文 中文
Comparative analysis of Wi-Fi and WiMAX Wi-Fi和WiMAX的对比分析
D. Selvarani, T. Ravi
Wireless networking provides an alternative answer for the problem of accessing information from the remote areas where the wired networks are not possible due to high cost. It has simply changed the way in which people can communicate and share information, without worrying about the location or distance. Two such popular wireless broadband networks are Wireless Fidelity (Wi-Fi) and Worldwide Interoperability for Microwave Access (WiMax). Wi-Fi is for Wireless Local Area Network with the standard IEEE802.11 and WiMax is for Wireless Metropolitan Area Network with the standard IEEE 802.16. These technologies aim to provide broadband wireless access to residential areas and small business enterprises, in addition to providing internet access in countries without any wired network infrastructure. This paper provides an overview of Wi-Fi and WiMax technologies including the features, specifications, architecture, advantages, limitations and security. Finally a comparison is made between Wi-Fi and WiMax. It is suggested that when Wi-Fi is synergized with WiMax, it will provide the best solution for last mile coverage.
无线网络为从偏远地区获取信息的问题提供了另一种解决方案,因为有线网络由于成本高而无法访问这些地区。它只是改变了人们交流和分享信息的方式,而不用担心位置或距离。两种流行的无线宽带网络是无线保真(Wi-Fi)和全球微波接入互操作性(WiMax)。Wi-Fi是指采用IEEE802.11标准的无线局域网,WiMax是指采用ieee802.16标准的无线城域网。除了在没有任何有线网络基础设施的国家提供互联网接入外,这些技术旨在为居民区和小型企业提供宽带无线接入。本文概述了Wi-Fi和WiMax技术的特点、规格、架构、优势、局限性和安全性。最后对Wi-Fi和WiMax进行了比较。有人建议,当Wi-Fi与WiMax协同时,它将提供最后一英里覆盖的最佳解决方案。
{"title":"Comparative analysis of Wi-Fi and WiMAX","authors":"D. Selvarani, T. Ravi","doi":"10.1109/ICICES.2014.7033799","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033799","url":null,"abstract":"Wireless networking provides an alternative answer for the problem of accessing information from the remote areas where the wired networks are not possible due to high cost. It has simply changed the way in which people can communicate and share information, without worrying about the location or distance. Two such popular wireless broadband networks are Wireless Fidelity (Wi-Fi) and Worldwide Interoperability for Microwave Access (WiMax). Wi-Fi is for Wireless Local Area Network with the standard IEEE802.11 and WiMax is for Wireless Metropolitan Area Network with the standard IEEE 802.16. These technologies aim to provide broadband wireless access to residential areas and small business enterprises, in addition to providing internet access in countries without any wired network infrastructure. This paper provides an overview of Wi-Fi and WiMax technologies including the features, specifications, architecture, advantages, limitations and security. Finally a comparison is made between Wi-Fi and WiMax. It is suggested that when Wi-Fi is synergized with WiMax, it will provide the best solution for last mile coverage.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"37 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85941584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
MUX-based design of DPLL for wireless communication 基于mux的无线通信DPLL设计
Sabyasachi Bhattacharyya, R. Sarma, K. Bhattacharyya, Ragib Nasir Ahmed, Roushan Saikia
For modern day communication devices, the key aspect lies in the proper reception of data at minimum possible error rates and also on maintenance of great degrees of precision. But, while doing so, a very important aspect that should be kept in mind is the ability of the device developed to operate at reasonable speeds, because it must be compatible with the other sub-systems of the communication setup. Also, the design complexity of the device and the cost of design should be minimum. By putting all these factors together, we can define a common term called time complexity which is the main concern of this proposed work. Considering the various constraints at hand, we would like to propose the design of a Multiplexer-based DPLL device which comprises of features such as good speed, simplified design and precise reception of data.
对于现代通信设备来说,关键在于以尽可能低的错误率正确接收数据,并保持高度的精度。但是,在这样做的同时,应该记住的一个非常重要的方面是开发的设备以合理速度运行的能力,因为它必须与通信设置的其他子系统兼容。此外,设备的设计复杂性和设计成本应该是最小的。通过把所有这些因素放在一起,我们可以定义一个共同的术语,称为时间复杂性,这是本建议工作的主要关注点。考虑到手头的各种限制,我们想提出一种基于多路复用器的DPLL器件的设计,该器件具有速度快、设计简化和数据接收精确等特点。
{"title":"MUX-based design of DPLL for wireless communication","authors":"Sabyasachi Bhattacharyya, R. Sarma, K. Bhattacharyya, Ragib Nasir Ahmed, Roushan Saikia","doi":"10.1109/ICICES.2014.7033978","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033978","url":null,"abstract":"For modern day communication devices, the key aspect lies in the proper reception of data at minimum possible error rates and also on maintenance of great degrees of precision. But, while doing so, a very important aspect that should be kept in mind is the ability of the device developed to operate at reasonable speeds, because it must be compatible with the other sub-systems of the communication setup. Also, the design complexity of the device and the cost of design should be minimum. By putting all these factors together, we can define a common term called time complexity which is the main concern of this proposed work. Considering the various constraints at hand, we would like to propose the design of a Multiplexer-based DPLL device which comprises of features such as good speed, simplified design and precise reception of data.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"435 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76768650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Visual and tag-based social image search based on hypergraph ranking method 基于超图排序方法的视觉和基于标签的社交图像搜索
K. Manjula, S. Palanivel, Rajan Asst Professor
Due to the popularity of social media Web sites, extensive research efforts have been dedicated to tag-based social image search. Both visual information and tags have been investigated in the research field. However, most existing methods use tags and visual characteristics either separately or sequentially in order to estimate the relevance of images. In this paper, simultaneously utilizes both visual and textual information to estimate the relevance of user tagged images. The relevance estimation is determined with a hypergraph learning approach. In this method, a social image hypergraph is constructed, where vertices represent images and hyperedges represent visual or textual terms. Learning is achieved with use of a set of pseudo-positive images, where the weights of hyperedges are updated throughout the learning process. In this way, the impact of different tags and visual words can be automatically modulated. Comparative results of the experiments conducted on a dataset including 370 images are presented, which demonstrate the effectiveness of the proposed approach.
由于社交媒体网站的流行,广泛的研究工作已经致力于基于标签的社交图像搜索。视觉信息和标签都是研究领域的热点。然而,大多数现有的方法使用标签和视觉特征分开或顺序来估计图像的相关性。在本文中,同时利用视觉和文本信息来估计用户标记图像的相关性。使用超图学习方法确定相关性估计。在该方法中,构建了一个社会图像超图,其中顶点表示图像,超边表示视觉或文本术语。学习是通过使用一组伪正图像实现的,其中超边的权重在整个学习过程中不断更新。这样,就可以自动调节不同标签和视觉词的影响。在包含370张图像的数据集上进行的实验对比结果证明了所提出方法的有效性。
{"title":"Visual and tag-based social image search based on hypergraph ranking method","authors":"K. Manjula, S. Palanivel, Rajan Asst Professor","doi":"10.1109/ICICES.2014.7034079","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034079","url":null,"abstract":"Due to the popularity of social media Web sites, extensive research efforts have been dedicated to tag-based social image search. Both visual information and tags have been investigated in the research field. However, most existing methods use tags and visual characteristics either separately or sequentially in order to estimate the relevance of images. In this paper, simultaneously utilizes both visual and textual information to estimate the relevance of user tagged images. The relevance estimation is determined with a hypergraph learning approach. In this method, a social image hypergraph is constructed, where vertices represent images and hyperedges represent visual or textual terms. Learning is achieved with use of a set of pseudo-positive images, where the weights of hyperedges are updated throughout the learning process. In this way, the impact of different tags and visual words can be automatically modulated. Comparative results of the experiments conducted on a dataset including 370 images are presented, which demonstrate the effectiveness of the proposed approach.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"190 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77034384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A drawing robotic hand based on inverse kinematics 基于逆运动学的绘图机械手
Shubham Agarwal, S. Rawat, V. Sumathi
The paper aims to create a robotic hand having the capability of self drawing. The application of hand is to artificially evolve drawing patterns using the given function. It describes the implementations and theory of converting the visual information to depict into pictorial view. Inverse kinematics is a method used for pronouncing the same. A target is given as an input by the user and accordingly it sketches the same contours on the paper. The purpose behind using inverse kinematics lies in the fact that it doesn't need the information about the location of each specific limb and hereby angle between them it uses mathematical equations to calculate the angle by itself. The robotic hand equipped with prismatic (translational) and revolute (rotational) joint works well even at increased complexity. This work is further extended to make it as an autonomous system. Few example figures are taken as input to test the system and they are plotted without any human intervene.
本文旨在制造具有自动绘图能力的机械手。手的应用是利用给定的函数人工地进化出绘图图案。描述了将视觉信息转换为图形视图的实现方法和原理。逆运动学是一种用于发音相同的方法。一个目标是由用户输入的,它相应地在纸上画出相同的轮廓。使用逆运动学的目的在于它不需要关于每个特定肢体的位置以及它们之间的夹角的信息,而是使用数学方程自己计算角度。配备了移动关节和旋转关节的机械手即使在复杂的情况下也能很好地工作。这项工作进一步扩大,使其成为一个自治系统。在没有任何人为干预的情况下,以少量示例图作为测试系统的输入并绘制它们。
{"title":"A drawing robotic hand based on inverse kinematics","authors":"Shubham Agarwal, S. Rawat, V. Sumathi","doi":"10.1109/ICICES.2014.7034005","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034005","url":null,"abstract":"The paper aims to create a robotic hand having the capability of self drawing. The application of hand is to artificially evolve drawing patterns using the given function. It describes the implementations and theory of converting the visual information to depict into pictorial view. Inverse kinematics is a method used for pronouncing the same. A target is given as an input by the user and accordingly it sketches the same contours on the paper. The purpose behind using inverse kinematics lies in the fact that it doesn't need the information about the location of each specific limb and hereby angle between them it uses mathematical equations to calculate the angle by itself. The robotic hand equipped with prismatic (translational) and revolute (rotational) joint works well even at increased complexity. This work is further extended to make it as an autonomous system. Few example figures are taken as input to test the system and they are plotted without any human intervene.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"32 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77247711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data hiding in gray scale images using Integer Wavelet Transform 利用整数小波变换在灰度图像中隐藏数据
S. Maheswari, D. Hemanth
This paper presents a novel data hiding using Integer Wavelet Transform (TWT) through lifting scheme that aims to achieve high quality of stego image. This method transforms a spatial domain cover image into a frequency domain cover image. It hides the secret message into detail coefficients (CH, CV, CD) of IWT by construct a binary image in any of selected bit in CH, CV, CD separately and compresses that bit by using arithmetic coding. This method is very simple and effective.
提出了一种利用整数小波变换(TWT)提升方案实现高质量隐写图像的数据隐藏方法。该方法将空间域覆盖图像转换为频率域覆盖图像。该算法分别在CH、CV、CD中的任意一个比特上构造二值图像,将秘密信息隐藏到IWT的详细系数(CH、CV、CD)中,并对该比特进行算术编码压缩。这个方法非常简单有效。
{"title":"Data hiding in gray scale images using Integer Wavelet Transform","authors":"S. Maheswari, D. Hemanth","doi":"10.1109/ICICES.2014.7034037","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034037","url":null,"abstract":"This paper presents a novel data hiding using Integer Wavelet Transform (TWT) through lifting scheme that aims to achieve high quality of stego image. This method transforms a spatial domain cover image into a frequency domain cover image. It hides the secret message into detail coefficients (CH, CV, CD) of IWT by construct a binary image in any of selected bit in CH, CV, CD separately and compresses that bit by using arithmetic coding. This method is very simple and effective.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"12 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80974328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantics based access management framework for securing data in cloud 基于语义的云数据访问管理框架
Auxilia M, K Raja
Data security is one of the critical issues in evaluating cloud based services. The reason is that even a naive user can store his/her data in any cloud storage provided by diverse cloud service providers. Each cloud service provider has his/her own access control policies written in diverse policy languages and schemes. Most of the traditional access control policies like MAC, DAC, and RBAC lack consideration about the relationship between access control entities. In this paper, we propose a semantic based access management framework which considers the semantic relationship between the access control entities like subject, object and action. This framework works for diverse cloud service providers and users and provides fine granular access control over the data stored in cloud.
数据安全是评估基于云的服务的关键问题之一。原因是,即使是一个天真的用户也可以将他/她的数据存储在各种云服务提供商提供的任何云存储中。每个云服务提供商都有自己的访问控制策略,使用不同的策略语言和方案编写。传统的访问控制策略,如MAC、DAC、RBAC等,大多没有考虑访问控制实体之间的关系。本文提出了一个基于语义的访问管理框架,该框架考虑了访问控制主体、对象和动作之间的语义关系。该框架适用于各种云服务提供商和用户,并提供对存储在云中的数据的精细粒度访问控制。
{"title":"Semantics based access management framework for securing data in cloud","authors":"Auxilia M, K Raja","doi":"10.1109/ICICES.2014.7033866","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033866","url":null,"abstract":"Data security is one of the critical issues in evaluating cloud based services. The reason is that even a naive user can store his/her data in any cloud storage provided by diverse cloud service providers. Each cloud service provider has his/her own access control policies written in diverse policy languages and schemes. Most of the traditional access control policies like MAC, DAC, and RBAC lack consideration about the relationship between access control entities. In this paper, we propose a semantic based access management framework which considers the semantic relationship between the access control entities like subject, object and action. This framework works for diverse cloud service providers and users and provides fine granular access control over the data stored in cloud.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"10 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85833726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on video distribution services in cloud computing 云计算中视频分发服务的调查
P. Sobiya, M. G. Nayagam, K. Ramar
Cloud computing is a new infrastructure environment that delivers on the promise of supporting on-demand services in a flexible manner by scheduling bandwidth, storage and compute resources on the fly. Content delivery networks (CDN) based systems are considered as the potential solutions to deliver User-generated content (UGC). But none of the existing CDN based solutions can support all the required features in UGC delivery. In this paper we analyses the various mechanism for deploying video in geographically distributed cloud server and optimal utilization of bandwidth, storage and other computing resources. Optimal Deployment can be done by using Nash Bargaining solutions, Greedy algorithm, Convex optimization and Lagrange Duality methods are used.
云计算是一种新的基础设施环境,它通过动态调度带宽、存储和计算资源,以一种灵活的方式实现了对按需服务的支持。基于内容交付网络(CDN)的系统被认为是交付用户生成内容(UGC)的潜在解决方案。但是现有的基于CDN的解决方案都不能支持UGC交付所需的所有功能。本文分析了在地理分布的云服务器上部署视频的各种机制以及带宽、存储和其他计算资源的最佳利用。最优部署可以通过纳什议价解、贪心算法、凸优化和拉格朗日对偶方法来实现。
{"title":"A survey on video distribution services in cloud computing","authors":"P. Sobiya, M. G. Nayagam, K. Ramar","doi":"10.1109/ICICES.2014.7033800","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033800","url":null,"abstract":"Cloud computing is a new infrastructure environment that delivers on the promise of supporting on-demand services in a flexible manner by scheduling bandwidth, storage and compute resources on the fly. Content delivery networks (CDN) based systems are considered as the potential solutions to deliver User-generated content (UGC). But none of the existing CDN based solutions can support all the required features in UGC delivery. In this paper we analyses the various mechanism for deploying video in geographically distributed cloud server and optimal utilization of bandwidth, storage and other computing resources. Optimal Deployment can be done by using Nash Bargaining solutions, Greedy algorithm, Convex optimization and Lagrange Duality methods are used.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"3 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84073477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Monte Carlo-rough based mixed-integer probablistic non-linear programming model for predicting and minimizing unavailability of power system components 基于蒙特卡罗粗糙的混合整数概率非线性规划模型预测和最小化电力系统部件的不可用性
A. Dube, Prateek Saraf, R. Dashora, Rohit Singh
Data mining processes were initially invented and developed for finding out meaningful information and deriving rules from more recent data sets. With growth in the size of power systems due to the increased requirements of industries and cities for uninterrupted power supply, data mining in electrical systems has emerged as a very efficient tool for continuous assessment of power systems. In this paper we propose Rough Set based knowledge discovery for predicting faults and probability of failure in high voltage equipment present in a real electrical systems. The approach has several different steps viz. analysis of real time data, creation and population of databases, pre-processing of data and use of rough sets based data mining algorithm to finally determine the set of rules for knowledge discovery. The methodology has been validated by presenting a case study and application of the algorithm on real time data.
数据挖掘过程最初是为了从最近的数据集中发现有意义的信息和推导规则而发明和发展的。随着工业和城市对不间断供电需求的增加,电力系统的规模不断扩大,电力系统中的数据挖掘已经成为电力系统持续评估的一种非常有效的工具。本文提出了一种基于粗糙集的知识发现方法,用于预测实际电力系统中高压设备的故障和故障概率。该方法有几个不同的步骤,即实时数据的分析、数据库的创建和填充、数据的预处理以及使用基于粗糙集的数据挖掘算法来最终确定知识发现的规则集。该方法已通过一个案例研究和算法在实时数据上的应用得到验证。
{"title":"A Monte Carlo-rough based mixed-integer probablistic non-linear programming model for predicting and minimizing unavailability of power system components","authors":"A. Dube, Prateek Saraf, R. Dashora, Rohit Singh","doi":"10.1109/ICICES.2014.7034152","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034152","url":null,"abstract":"Data mining processes were initially invented and developed for finding out meaningful information and deriving rules from more recent data sets. With growth in the size of power systems due to the increased requirements of industries and cities for uninterrupted power supply, data mining in electrical systems has emerged as a very efficient tool for continuous assessment of power systems. In this paper we propose Rough Set based knowledge discovery for predicting faults and probability of failure in high voltage equipment present in a real electrical systems. The approach has several different steps viz. analysis of real time data, creation and population of databases, pre-processing of data and use of rough sets based data mining algorithm to finally determine the set of rules for knowledge discovery. The methodology has been validated by presenting a case study and application of the algorithm on real time data.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"56 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78539875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comfortable perception mining in videos using fuzzy logic 基于模糊逻辑的视频舒适感知挖掘
S. Jeeva, V. Saranya
In this paper a fuzzy based approach is used for Effective retrieval of video. Initially a video is partitioned into frames and then we use fuzzy logic method in order to retrieve a video. While existing search engines like Google and yahoo provide a video retrieving through manual textual queries. We provide an advanced concept of giving a relevant image as an input in order to rescue the video. While text based queries uses color histograms our concept makes great advantage of fuzzy logic in order to provide an accurate result.
本文提出了一种基于模糊的视频检索方法。首先对视频进行帧分割,然后利用模糊逻辑方法对视频进行检索。而现有的搜索引擎,如谷歌和雅虎,通过手动文本查询提供视频检索。我们提供了一个先进的概念,给予相关的图像作为输入,以挽救视频。虽然基于文本的查询使用颜色直方图,但我们的概念充分利用了模糊逻辑,以提供准确的结果。
{"title":"Comfortable perception mining in videos using fuzzy logic","authors":"S. Jeeva, V. Saranya","doi":"10.1109/ICICES.2014.7033868","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033868","url":null,"abstract":"In this paper a fuzzy based approach is used for Effective retrieval of video. Initially a video is partitioned into frames and then we use fuzzy logic method in order to retrieve a video. While existing search engines like Google and yahoo provide a video retrieving through manual textual queries. We provide an advanced concept of giving a relevant image as an input in order to rescue the video. While text based queries uses color histograms our concept makes great advantage of fuzzy logic in order to provide an accurate result.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"39 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77431399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network 基于IEEE 802.15.4无线传感器网络中恶意节点的性能分析
Krishan Kant Varshney, P. Samundiswary
Wireless sensor network (WSN) has diverse field of applications, but on the other hand it is very much prone to the various security threats. There are number of attacks on wireless sensor networks like black hole attack, selective forwarding attacks, sink hole attack sybil attack etc. This paper concentrates on the performance of wireless sensor network in the presence of black hole attackers using Ad-hoc on Demand Distance Vector Routing Protocol (AODV). The black hole type of attacker node absorbs every message passing through it. So the affected node attacks the whole traffic in the network Further, the performance of sensor network using AODV with and without black hole attack is also analyzed. The simulation is done by using NS-2.35.
无线传感器网络(WSN)具有广泛的应用领域,但同时也极易受到各种安全威胁。针对无线传感器网络的攻击有很多,如黑洞攻击、选择性转发攻击、沉洞攻击、sybil攻击等。本文主要研究了在黑洞攻击下无线传感器网络的性能,并采用自组织随需应变距离矢量路由协议(AODV)。黑洞类型的攻击者节点吸收通过它的每条消息。在此基础上,分析了有和没有黑洞攻击的AODV传感器网络的性能。采用NS-2.35软件进行仿真。
{"title":"Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network","authors":"Krishan Kant Varshney, P. Samundiswary","doi":"10.1109/ICICES.2014.7033873","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033873","url":null,"abstract":"Wireless sensor network (WSN) has diverse field of applications, but on the other hand it is very much prone to the various security threats. There are number of attacks on wireless sensor networks like black hole attack, selective forwarding attacks, sink hole attack sybil attack etc. This paper concentrates on the performance of wireless sensor network in the presence of black hole attackers using Ad-hoc on Demand Distance Vector Routing Protocol (AODV). The black hole type of attacker node absorbs every message passing through it. So the affected node attacks the whole traffic in the network Further, the performance of sensor network using AODV with and without black hole attack is also analyzed. The simulation is done by using NS-2.35.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"23 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77852309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
International Conference on Information Communication and Embedded Systems (ICICES2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1