首页 > 最新文献

International Conference on Information Communication and Embedded Systems (ICICES2014)最新文献

英文 中文
Automatic optic disc detection in digital fundus images using image processing techniques 基于图像处理技术的数字眼底图像视盘自动检测
Snehal B. Akhade, V. Deshmukh, S. Deosarkar
Optic disc (OD) is an important part of the eye. In developing systems, automatic OD detection is an important step for automated diagnosis of various serious ophthalmic diseases like Diabetic retinopathy, Glaucoma and hypertension, etc. The variation of intensity within the OD and intensities close to the OD boundary are the major hurdle in automated OD detection. General edge detection algorithms are frequently unsuccessful to segment the OD because of this. Complexity increases due to the presence of blood vessels. This paper presents a simple method for OD segmentation by using techniques like Principal Component Analysis (PCA), Mathematical Morphology and Circular Hough Transform. PCA used for good presentation of the input image and mathematical morphology is used to remove blood vessels from the image. Circular Hough Transform is used for boundary segmentation.
视盘是眼睛的重要组成部分。在开发系统中,自动OD检测是糖尿病视网膜病变、青光眼、高血压等各种严重眼科疾病自动诊断的重要步骤。外径内和外径边界附近的强度变化是外径自动检测的主要障碍。因此,一般的边缘检测算法往往不能成功地分割OD。由于血管的存在,复杂性增加。本文利用主成分分析(PCA)、数学形态学和圆霍夫变换等技术,提出了一种简单的OD分割方法。主成分分析用于更好地呈现输入图像,数学形态学用于去除图像中的血管。采用圆形霍夫变换进行边界分割。
{"title":"Automatic optic disc detection in digital fundus images using image processing techniques","authors":"Snehal B. Akhade, V. Deshmukh, S. Deosarkar","doi":"10.1109/ICICES.2014.7034118","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034118","url":null,"abstract":"Optic disc (OD) is an important part of the eye. In developing systems, automatic OD detection is an important step for automated diagnosis of various serious ophthalmic diseases like Diabetic retinopathy, Glaucoma and hypertension, etc. The variation of intensity within the OD and intensities close to the OD boundary are the major hurdle in automated OD detection. General edge detection algorithms are frequently unsuccessful to segment the OD because of this. Complexity increases due to the presence of blood vessels. This paper presents a simple method for OD segmentation by using techniques like Principal Component Analysis (PCA), Mathematical Morphology and Circular Hough Transform. PCA used for good presentation of the input image and mathematical morphology is used to remove blood vessels from the image. Circular Hough Transform is used for boundary segmentation.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"133 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76289992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Envisage and authoring a video with sketch and text gloss SSG 设想和创作一个视频与素描和文字光泽SSG
S. Selvi, K. Satheesh
Interface intend issues relevant to this project which embrace the assimilation of media, annotation, use of descriptions, standards, accomplish the purpose of the multimedia system. Envisage a video in multimedia milieu with authoring is, serene a prickly way. In this dissertation we present a twofold of action, at initial arena annotate a video with text depiction and sketch generation using Sobel Edge Detection Algorithm. This approach is used to engender sketches using sobel operator which discover the spiky intensity variation of an image and it attain the edges of the objects enclosed on the image and then we found similiarity between sketch and original image. At the instant phase we recommend a scene structured graph to authorize a video.
本项目涉及的接口问题包括媒体的同化、注释、描述、标准的使用等,以达到多媒体系统的目的。在多媒体环境中设想视频和创作是,宁静的一种方式。在本文中,我们提出了一种双重操作,即在初始阶段使用Sobel边缘检测算法对视频进行文本描述和草图生成。该方法利用sobel算子发现图像的尖刺强度变化,生成草图,得到图像上被包围物体的边缘,然后发现草图与原始图像的相似度。在即时阶段,我们推荐使用场景结构化图来授权视频。
{"title":"Envisage and authoring a video with sketch and text gloss SSG","authors":"S. Selvi, K. Satheesh","doi":"10.1109/ICICES.2014.7033746","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033746","url":null,"abstract":"Interface intend issues relevant to this project which embrace the assimilation of media, annotation, use of descriptions, standards, accomplish the purpose of the multimedia system. Envisage a video in multimedia milieu with authoring is, serene a prickly way. In this dissertation we present a twofold of action, at initial arena annotate a video with text depiction and sketch generation using Sobel Edge Detection Algorithm. This approach is used to engender sketches using sobel operator which discover the spiky intensity variation of an image and it attain the edges of the objects enclosed on the image and then we found similiarity between sketch and original image. At the instant phase we recommend a scene structured graph to authorize a video.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"1 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75737612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Optimal centroid based actionable 3D subspace clustering 基于最优质心的可操作三维子空间聚类
V. Atchaya, R. Vanitha
An efficient Optimal Centroid-based Actionable 3D Subspace Clustering from continuous valued 3D data which is suitable for real world problems like discovery of profitable stocks, biologically significant protein residues etc. lt achieves actionability(ability to suggest profitable or beneficial actions to users), incorporation of domain knowledge which allows users to choose the preferred utility function, parameter insensitivity and excellent performance through a set of centroids generetaed by Single Pass Seed Selection and by the combination of singular value decomposition, numerical optimization and 3D closed frequent item set mining.
一种高效的基于最优质心的可操作3D子空间聚类,适用于连续有价值的3D数据,适用于现实世界的问题,如发现有利可图的股票,具有生物意义的蛋白质残基等。它实现了可操作性(向用户建议有利可图或有益的操作的能力),结合了允许用户选择首选效用函数的领域知识。通过单次种子选择生成的一组质心,结合奇异值分解、数值优化和三维封闭频繁项集挖掘,获得了参数不敏感和优异的性能。
{"title":"An Optimal centroid based actionable 3D subspace clustering","authors":"V. Atchaya, R. Vanitha","doi":"10.1109/ICICES.2014.7033862","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033862","url":null,"abstract":"An efficient Optimal Centroid-based Actionable 3D Subspace Clustering from continuous valued 3D data which is suitable for real world problems like discovery of profitable stocks, biologically significant protein residues etc. lt achieves actionability(ability to suggest profitable or beneficial actions to users), incorporation of domain knowledge which allows users to choose the preferred utility function, parameter insensitivity and excellent performance through a set of centroids generetaed by Single Pass Seed Selection and by the combination of singular value decomposition, numerical optimization and 3D closed frequent item set mining.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"15 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74765026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reduced three steps logarithmic search for motion estimation 减少了运动估计的三步对数搜索
Hussain Ahmed Choudhury, M. Saikia
In video processing there is a huge demand of video compression. The basic of video compression requires a technique known as motion estimation (ME). There are many algorithms to find the motion estimation of current block in reference frame. In this paper we have proposed an algorithm of Block Matching for motion estimation named as Reduced Three Steps Logarithmic Search (RTSLS) which is computationally more efficient than many of the existing techniques. Simulation result shows that it performs better than that of Three Steps Search (TSS), New Three Step Search (NTSS) and reduces the checking points by almost 50% than that of TSS.
在视频处理中,对视频压缩有着巨大的需求。视频压缩的基础需要一种称为运动估计的技术。当前块在参考系中的运动估计算法有很多。本文提出了一种用于运动估计的块匹配算法,称为简化三步对数搜索(RTSLS),该算法在计算效率上比许多现有技术都要高。仿真结果表明,该方法优于三步搜索(TSS)和新三步搜索(NTSS),并且比TSS减少了近50%的检查点。
{"title":"Reduced three steps logarithmic search for motion estimation","authors":"Hussain Ahmed Choudhury, M. Saikia","doi":"10.1109/ICICES.2014.7033946","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033946","url":null,"abstract":"In video processing there is a huge demand of video compression. The basic of video compression requires a technique known as motion estimation (ME). There are many algorithms to find the motion estimation of current block in reference frame. In this paper we have proposed an algorithm of Block Matching for motion estimation named as Reduced Three Steps Logarithmic Search (RTSLS) which is computationally more efficient than many of the existing techniques. Simulation result shows that it performs better than that of Three Steps Search (TSS), New Three Step Search (NTSS) and reduces the checking points by almost 50% than that of TSS.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"16 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73191788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Social data analysis for predicting next event 社会数据分析预测下一个事件
M. Deiva Ragavi, S. Usharani
Twitter is a user-friendly social network which deserves its real-time nature. With the help of an algorithm, the investigation can be made with regard to some of the real-time events such as earthquake. The target event is assumed and classified based on the keywords, number of words and their context. The probabilistic spatiotemporal model is provided which can find the Centre of the event location. The Twitter users are regarded as sensors and apply particle filter, mainly used for detecting the location. Because of the numerous earthquakes and the large number of Twitter users throughout the country, we can detect an earthquake with high probability merely by monitoring tweets. Our system detects earthquakes promptly and notification much faster than JMA (Japan Meteorological Agency) broadcast announcements.
Twitter是一个用户友好的社交网络,值得它的实时性。在算法的帮助下,可以对地震等实时事件进行调查。假设目标事件并根据关键字、单词数量及其上下文进行分类。提出了一种寻找事件中心的概率时空模型。将Twitter用户视为传感器,对其进行粒子滤波,主要用于位置检测。因为全国地震多,推特用户多,所以我们仅仅通过监测推特就可以高概率地发现地震。我们的系统能及时发现地震,并比日本气象厅(JMA)的广播通知快得多。
{"title":"Social data analysis for predicting next event","authors":"M. Deiva Ragavi, S. Usharani","doi":"10.1109/ICICES.2014.7033935","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033935","url":null,"abstract":"Twitter is a user-friendly social network which deserves its real-time nature. With the help of an algorithm, the investigation can be made with regard to some of the real-time events such as earthquake. The target event is assumed and classified based on the keywords, number of words and their context. The probabilistic spatiotemporal model is provided which can find the Centre of the event location. The Twitter users are regarded as sensors and apply particle filter, mainly used for detecting the location. Because of the numerous earthquakes and the large number of Twitter users throughout the country, we can detect an earthquake with high probability merely by monitoring tweets. Our system detects earthquakes promptly and notification much faster than JMA (Japan Meteorological Agency) broadcast announcements.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"46 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73280051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Ascertaining security in online reputation systems using Rate Auditing Tool (RAT) 使用Rate Auditing Tool (RAT)确定在线信誉系统的安全性
D. Dhivyalakshmi, K. Kalaivani, V. Tamilarasi, P. Bhavani
In our proposed model we implement Rate Auditing Tool (RAT) to monitor each and every rating manipulation. It checks whether the time logged in and logged out matches the stipulated time for viewing any videos or messages and giving appropriate rating. It monitors either the video provided is fully or atleast partly viewed thus accordingly their ratings given. It also checks whether the login in network which is providing rating is either from same location or its location varies each and every time from vast geographical location. It also checks whether from same ip address multiple logins giving ratings continuously. Thus by doing this the attacker is also detected and given counter measure to their attacks.
在我们提出的模型中,我们实现了Rate Auditing Tool (RAT)来监控每一个评级操作。它检查登录和注销的时间是否符合观看任何视频或消息的规定时间,并给出适当的评级。它监控所提供的视频是否被完全观看或至少部分观看,从而相应地给出它们的评级。它还检查提供评级的网络登录是否来自同一位置,或者其位置每次都从广阔的地理位置变化。它还检查是否从同一ip地址多次登录给予评级连续。因此,通过这样做,攻击者也被检测到并给予反击措施。
{"title":"Ascertaining security in online reputation systems using Rate Auditing Tool (RAT)","authors":"D. Dhivyalakshmi, K. Kalaivani, V. Tamilarasi, P. Bhavani","doi":"10.1109/ICICES.2014.7033951","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033951","url":null,"abstract":"In our proposed model we implement Rate Auditing Tool (RAT) to monitor each and every rating manipulation. It checks whether the time logged in and logged out matches the stipulated time for viewing any videos or messages and giving appropriate rating. It monitors either the video provided is fully or atleast partly viewed thus accordingly their ratings given. It also checks whether the login in network which is providing rating is either from same location or its location varies each and every time from vast geographical location. It also checks whether from same ip address multiple logins giving ratings continuously. Thus by doing this the attacker is also detected and given counter measure to their attacks.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"13 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74254843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Programmable synaptic memory with spiking neural network in VLSI 超大规模集成电路中带尖峰神经网络的可编程突触存储器
V. Sivakumar, M. Malathi
This work evaluates the performance of Neuromorphic architecture for accessing Static Random Access Memory (SRAM) in an asynchronous manner. Spike-Timing Dependent Plasticity (STDP) learning algorithm for updating the synaptic weights values in the SRAM module. Input, output, and synaptic weight values are transmitted to/from the chip using a common communication protocol based on the Address Event Representation (AER). Memory array an important block in digital system. Bassically SRAM is used for increasing speed of the processor. Which is mostly connected between the DRAM and microprocessor. SRAM serves as cache memory which stores the information and losses its data without power. We may design the SRAM using 4T, 6T, 8T....for storing one bit. Sense amplifier is used to perform read and write operation. Instead of using sense amplifier we use the neural network concept. Synapse is connected between the SRAM and neuron. The minute gap across which nerve impulses pass from one neurone to the next, at the end of a nerve fiber. Each neurone has an enlarged portion the cell body, containing the nucleus; from the body extend several process through which impulses enter from their branches. A longer process, the nerve fiber, extends outwards and carries impulse away from the cell body. This is normally unbranched except at the nerve ending. This consumes less power than the normal memory circuit.
本工作评估了以异步方式访问静态随机存取存储器(SRAM)的Neuromorphic架构的性能。基于STDP (Spike-Timing Dependent Plasticity)学习算法的SRAM模块突触权值更新。输入、输出和突触权重值使用基于地址事件表示(AER)的公共通信协议传输到/从芯片。存储阵列是数字系统的重要组成部分。基本上,SRAM用于提高处理器的速度。它主要连接在DRAM和微处理器之间。SRAM作为高速缓存存储器,存储信息,没有电源就会丢失数据。我们可以使用4T, 6T, 8T来设计SRAM ....用于存储一个比特。感测放大器用于进行读写操作。我们使用神经网络的概念来代替感测放大器。突触连接SRAM和神经元。神经间隙神经脉冲从一个神经元传递到另一个神经元的间隙,位于神经纤维的末端每个神经元在细胞体上有一个增大的部分,包含细胞核;从身体延伸出几个过程,通过这些过程,冲动从它们的分支进入。一个更长的过程,神经纤维,向外延伸,把冲动带离细胞体。除神经末梢外,这部分通常是无分支的。这比普通的存储电路消耗更少的功率。
{"title":"Programmable synaptic memory with spiking neural network in VLSI","authors":"V. Sivakumar, M. Malathi","doi":"10.1109/ICICES.2014.7034098","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034098","url":null,"abstract":"This work evaluates the performance of Neuromorphic architecture for accessing Static Random Access Memory (SRAM) in an asynchronous manner. Spike-Timing Dependent Plasticity (STDP) learning algorithm for updating the synaptic weights values in the SRAM module. Input, output, and synaptic weight values are transmitted to/from the chip using a common communication protocol based on the Address Event Representation (AER). Memory array an important block in digital system. Bassically SRAM is used for increasing speed of the processor. Which is mostly connected between the DRAM and microprocessor. SRAM serves as cache memory which stores the information and losses its data without power. We may design the SRAM using 4T, 6T, 8T....for storing one bit. Sense amplifier is used to perform read and write operation. Instead of using sense amplifier we use the neural network concept. Synapse is connected between the SRAM and neuron. The minute gap across which nerve impulses pass from one neurone to the next, at the end of a nerve fiber. Each neurone has an enlarged portion the cell body, containing the nucleus; from the body extend several process through which impulses enter from their branches. A longer process, the nerve fiber, extends outwards and carries impulse away from the cell body. This is normally unbranched except at the nerve ending. This consumes less power than the normal memory circuit.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"99 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74564193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fabric quality testing using image processing 织物质量检测使用图像处理
V. Agilandeswari, J. Anuja, Elizabeth Dona George, R. Prasath
The main purpose of this paper is to identify the damaged cloth which may contain defective yarns, colour bleeding, and pores that may be mingled with the good cloth materials at areas such as textile fabric industries, garments, and weaving factories. Automated defect detection for fabrics based on filters is proposed to manage the problem of human visual inspection. The monitoring process is done by a web camera, to capture the details of the cloth. A pre-trained Gabor wavelet network is used to extract the important texture features in the textile fabric. In this defect detection, few specific filters are used to process each frames of the cloth which is being captured by the web camera.
本文的主要目的是识别在纺织面料工业、服装和织造工厂等领域可能含有缺陷纱线、掉色和可能与好布料混合的毛孔的损坏布料。提出了一种基于过滤器的织物缺陷自动检测方法,以解决人眼视觉检测的问题。监控过程由网络摄像机完成,以捕捉布料的细节。采用预训练Gabor小波网络提取纺织织物的重要纹理特征。在这种缺陷检测中,使用一些特定的过滤器来处理由网络摄像机捕获的织物的每一帧。
{"title":"Fabric quality testing using image processing","authors":"V. Agilandeswari, J. Anuja, Elizabeth Dona George, R. Prasath","doi":"10.1109/ICICES.2014.7033989","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033989","url":null,"abstract":"The main purpose of this paper is to identify the damaged cloth which may contain defective yarns, colour bleeding, and pores that may be mingled with the good cloth materials at areas such as textile fabric industries, garments, and weaving factories. Automated defect detection for fabrics based on filters is proposed to manage the problem of human visual inspection. The monitoring process is done by a web camera, to capture the details of the cloth. A pre-trained Gabor wavelet network is used to extract the important texture features in the textile fabric. In this defect detection, few specific filters are used to process each frames of the cloth which is being captured by the web camera.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"69 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72655225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Data security and privacy using data partition and centric key management in cloud 在云中使用数据分区和中心密钥管理的数据安全和隐私
Krunal K Patel, K. S. Sendhil Kumar, Navneet Singh, Kushang Parikh, N. Jaisankar
The Cloud Computing is a next generation platform, which provides virtualization with resource pool. There are three types of cloud service models, Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). Most of the scientific research focus on IaaS model, which manage virtualization and storage. IaaS allows customer to scale based on user demand and user only pays for the resource usage. Data security plays a crucial role in cloud environment and user trust is most challenging problem of cloud services. This research paper proposed new methodology that secures data and provide privacy to the customer in cloud. Our technique providing security by using data partition approach and that partitioned data will be proceed further parallel for encryption mechanism. Here privacy is given by centric key management scheme.
云计算是提供虚拟化和资源池的新一代平台。有三种类型的云服务模型:基础设施即服务(IaaS)、平台即服务(PaaS)和软件即服务(SaaS)。大部分的科学研究都集中在IaaS模型上,它管理虚拟化和存储。IaaS允许客户根据用户需求进行扩展,用户只需为资源使用付费。数据安全在云环境中起着至关重要的作用,用户信任是云服务最具挑战性的问题。本文提出了一种新的方法来保护云中的数据并为客户提供隐私。我们的技术通过使用数据分区方法来提供安全性,并且分区后的数据将进一步并行进行加密机制。这里的隐私是通过中心密钥管理方案来实现的。
{"title":"Data security and privacy using data partition and centric key management in cloud","authors":"Krunal K Patel, K. S. Sendhil Kumar, Navneet Singh, Kushang Parikh, N. Jaisankar","doi":"10.1109/ICICES.2014.7033769","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033769","url":null,"abstract":"The Cloud Computing is a next generation platform, which provides virtualization with resource pool. There are three types of cloud service models, Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). Most of the scientific research focus on IaaS model, which manage virtualization and storage. IaaS allows customer to scale based on user demand and user only pays for the resource usage. Data security plays a crucial role in cloud environment and user trust is most challenging problem of cloud services. This research paper proposed new methodology that secures data and provide privacy to the customer in cloud. Our technique providing security by using data partition approach and that partitioned data will be proceed further parallel for encryption mechanism. Here privacy is given by centric key management scheme.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73400930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enhanced techniques to strengthening DTN against flood attacks 加强DTN抵御洪水攻击的改进技术
D. S. D. Hepsiba, S. Prabhu
The intermittent connectivity between nodes to transfer data is exploited using Disruption tolerant networks (DTNs). DTNs are susceptible to flood attacks which limit the network resources. Various methods were used to defend these attacks based on distributed schemes with certain difficulties to count the packets or duplicates sent by a node. This is due to lack of communication infrastructure. Two limits are used to mitigate packet flood and replica flood attacks, respectively. Violation of both the limits can be easily noticed by claim-carry-and-check. The inconsistency check against full claims is trivial. This is designed to work in a distributed system. Moreover, it allows tolerating a little amount of attackers for collision. Proposed algorithm is learning automata. It uses the feedback mechanism. The feedback from the previous nodes is collected and thereby reduces the limitation for the successor nodes. The goal is to detect the attacker by approximate counting and discard the flooded packets.
节点之间的间歇性连接传输数据是利用中断容忍网络(DTNs)。ddn容易受到洪水攻击,使网络资源受到限制。为了防御这些攻击,采用了多种基于分布式方案的防御方法,但对节点发送的数据包或副本进行计数有一定困难。这是由于缺乏通讯基础设施。有两种限制分别用于减轻报文flood和复制flood攻击。违反这两个限制很容易被认领-携带-检查发现。针对完整声明的不一致性检查是微不足道的。这被设计成在分布式系统中工作。此外,它允许容忍少量的攻击者进行碰撞。提出的算法是学习自动机。它使用反馈机制。收集来自前一个节点的反馈,从而减少对后继节点的限制。目标是通过近似计数来检测攻击者并丢弃淹没的数据包。
{"title":"Enhanced techniques to strengthening DTN against flood attacks","authors":"D. S. D. Hepsiba, S. Prabhu","doi":"10.1109/ICICES.2014.7033952","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033952","url":null,"abstract":"The intermittent connectivity between nodes to transfer data is exploited using Disruption tolerant networks (DTNs). DTNs are susceptible to flood attacks which limit the network resources. Various methods were used to defend these attacks based on distributed schemes with certain difficulties to count the packets or duplicates sent by a node. This is due to lack of communication infrastructure. Two limits are used to mitigate packet flood and replica flood attacks, respectively. Violation of both the limits can be easily noticed by claim-carry-and-check. The inconsistency check against full claims is trivial. This is designed to work in a distributed system. Moreover, it allows tolerating a little amount of attackers for collision. Proposed algorithm is learning automata. It uses the feedback mechanism. The feedback from the previous nodes is collected and thereby reduces the limitation for the successor nodes. The goal is to detect the attacker by approximate counting and discard the flooded packets.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"92 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79429241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
International Conference on Information Communication and Embedded Systems (ICICES2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1