首页 > 最新文献

International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)最新文献

英文 中文
Increasing cluster uniqueness in Fuzzy C-Means through affinity measure 通过亲和度量提高模糊c均值聚类唯一性
A. Banumathi, A. Pethalakshmi
Clustering is a widely used technique in data mining application for discovering patterns in large dataset. In this paper the Fuzzy C-Means algorithm is analyzed and found that quality of the resultant cluster is based on the initial seed where it is selected either sequentially or randomly. Fuzzy C-Means uses K-Means clustering approach for the initial operation of clustering and then degree of membership is calculated. Fuzzy C-Means is very similar to the K-Means algorithm and hence in this paper K-Means is outlined and proved how the drawback of K-Means algorithm is rectified through UCAM (Unique Clustering with Affinity Measure) clustering algorithm and then UCAM is refined to give a new view namely Fuzzy-UCAM. Fuzzy C-Means algorithm should be initiated with the number of cluster C and initial seeds. For real time large database it's difficult to predict the number of cluster and initial seeds accurately. In order to overcome this drawback the current paper focused on developing the Fuzzy-UCAM algorithm for clustering without giving initial seed and number of clusters for Fuzzy C-Means. Unique clustering is obtained with the help of affinity measures.
聚类是一种广泛应用于数据挖掘的技术,用于在大数据集中发现模式。本文对模糊c均值算法进行了分析,发现聚类结果的质量取决于初始种子,初始种子的选择可以是顺序的,也可以是随机的。模糊C-Means采用K-Means聚类方法进行聚类的初始操作,然后计算隶属度。模糊C-Means与K-Means算法非常相似,因此本文概述了K-Means算法,并证明了如何通过UCAM (Unique Clustering with Affinity Measure)聚类算法纠正K-Means算法的缺点,然后对UCAM进行改进,给出了一种新的观点,即Fuzzy-UCAM。模糊C-均值算法的初始化需要有聚类C的个数和初始种子的个数。对于实时的大型数据库,很难准确地预测聚类和初始种子的数量。为了克服这一缺点,本文重点研究了不给出模糊c均值初始种子和簇数的Fuzzy- ucam聚类算法。利用亲和度量获得了唯一的聚类。
{"title":"Increasing cluster uniqueness in Fuzzy C-Means through affinity measure","authors":"A. Banumathi, A. Pethalakshmi","doi":"10.1109/ICPRIME.2012.6208282","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208282","url":null,"abstract":"Clustering is a widely used technique in data mining application for discovering patterns in large dataset. In this paper the Fuzzy C-Means algorithm is analyzed and found that quality of the resultant cluster is based on the initial seed where it is selected either sequentially or randomly. Fuzzy C-Means uses K-Means clustering approach for the initial operation of clustering and then degree of membership is calculated. Fuzzy C-Means is very similar to the K-Means algorithm and hence in this paper K-Means is outlined and proved how the drawback of K-Means algorithm is rectified through UCAM (Unique Clustering with Affinity Measure) clustering algorithm and then UCAM is refined to give a new view namely Fuzzy-UCAM. Fuzzy C-Means algorithm should be initiated with the number of cluster C and initial seeds. For real time large database it's difficult to predict the number of cluster and initial seeds accurately. In order to overcome this drawback the current paper focused on developing the Fuzzy-UCAM algorithm for clustering without giving initial seed and number of clusters for Fuzzy C-Means. Unique clustering is obtained with the help of affinity measures.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"341 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113955953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of secure, platform-free, and network-based remote controlling and monitoring system 安全、无平台、基于网络的远程控制与监控系统的设计与实现
C. L. Chowdhary, P. Mouli
In present scenario, it is challenging to access widely distributed and huge data from many network systems to a single network system. There are several problems like, monitoring of remote devices and controlling of its operations. A reliable, secure and platform-free remote controller, with ability of monitoring, can overcome such problems. In this paper, a new design of network-based remote controlling and monitoring system is proposed which is platform-free and more secure in comparison with other existing systems. The basic concept is to use the network base for the purpose of real-time remote monitoring and controlling of processing equipment.
在目前的情况下,将分布广泛的海量数据从多个网络系统中接入到一个单一的网络系统中是一项挑战。有几个问题,如远程设备的监控和控制其操作。一个可靠、安全、无平台、具有监控功能的遥控器可以克服这些问题。本文提出了一种新的基于网络的远程控制与监控系统的设计方案,与现有的系统相比,该系统具有无平台性和更高的安全性。其基本概念是利用网络基地对加工设备进行实时远程监控。
{"title":"Design and implementation of secure, platform-free, and network-based remote controlling and monitoring system","authors":"C. L. Chowdhary, P. Mouli","doi":"10.1109/ICPRIME.2012.6208342","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208342","url":null,"abstract":"In present scenario, it is challenging to access widely distributed and huge data from many network systems to a single network system. There are several problems like, monitoring of remote devices and controlling of its operations. A reliable, secure and platform-free remote controller, with ability of monitoring, can overcome such problems. In this paper, a new design of network-based remote controlling and monitoring system is proposed which is platform-free and more secure in comparison with other existing systems. The basic concept is to use the network base for the purpose of real-time remote monitoring and controlling of processing equipment.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121140440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Genetic clustering with Bee Colony Optimization for flexible protein-ligand docking 基于蜂群优化的柔性蛋白配体对接遗传聚类
E. K. Nesamalar, C. P. Chandran
In this paper Flexible Protein Ligand Docking is carried out using Genetic Clustering with Bee Colony Optimization. The molecular docking problem is to find a good position and orientation for docking and a small molecule ligand to a large receptor molecule. It is originated as an optimization problem consists of optimization method and the clustering technique. Clustering is a data mining task which groups the data on the basis of similarities among the data. A Genetic clustering algorithm combine a Genetic Algorithm (GA) with the K-medians clustering algorithm. GA is one of the evolutionary algorithms inspired by biological evolution and utilized in the field of clustering. K-median clustering is a variation of K-means clustering where instead of calculating the mean for each cluster to determine its centroid, one instead calculates the median. Genetic Clustering is combined with Bee Colony Optimization (BCO) algorithm to solve Molecular docking problem. BCO is a new Swarm Intelligent algorithm that was first introduced by Karaboga. It is based on the Fuzzy Clustering with Artificial Bee Colony Optimization algorithm proposed by Dervis Karaboga and Celal Ozturk. In this work, we propose a new algorithm called Genetic clustering Bee Colony Optimization (GCBCO). The performance of GCBCO is tested in 10 docking instances from the PDB bind core set and compared the performance with PSO and ACO algorithms. The result shows that the GCBCO could find ligand poses with best energy levels than the existing search algorithms.
本文利用遗传聚类和蜂群优化技术实现柔性蛋白配体对接。分子对接问题是寻找一个合适的位置和取向,使小分子配体与大的受体分子对接。它起源于一个由最优化方法和聚类技术组成的优化问题。聚类是一种数据挖掘任务,它根据数据之间的相似性对数据进行分组。遗传聚类算法将遗传算法(GA)与k -median聚类算法相结合。遗传算法是一种受生物进化启发的进化算法,应用于聚类领域。k -中位数聚类是K-means聚类的一种变体,它不是计算每个聚类的平均值来确定其质心,而是计算中位数。将遗传聚类与蜂群优化(BCO)算法相结合,解决分子对接问题。BCO是一种新的群智能算法,由Karaboga首次提出。该算法基于Dervis Karaboga和Celal Ozturk提出的模糊聚类人工蜂群优化算法。本文提出了一种新的遗传聚类蜂群优化算法(Genetic clustering Bee Colony Optimization, GCBCO)。在PDB绑定核集的10个对接实例中测试了GCBCO算法的性能,并与粒子群算法和蚁群算法进行了性能比较。结果表明,与现有的搜索算法相比,GCBCO能找到具有最佳能级的配体位姿。
{"title":"Genetic clustering with Bee Colony Optimization for flexible protein-ligand docking","authors":"E. K. Nesamalar, C. P. Chandran","doi":"10.1109/ICPRIME.2012.6208291","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208291","url":null,"abstract":"In this paper Flexible Protein Ligand Docking is carried out using Genetic Clustering with Bee Colony Optimization. The molecular docking problem is to find a good position and orientation for docking and a small molecule ligand to a large receptor molecule. It is originated as an optimization problem consists of optimization method and the clustering technique. Clustering is a data mining task which groups the data on the basis of similarities among the data. A Genetic clustering algorithm combine a Genetic Algorithm (GA) with the K-medians clustering algorithm. GA is one of the evolutionary algorithms inspired by biological evolution and utilized in the field of clustering. K-median clustering is a variation of K-means clustering where instead of calculating the mean for each cluster to determine its centroid, one instead calculates the median. Genetic Clustering is combined with Bee Colony Optimization (BCO) algorithm to solve Molecular docking problem. BCO is a new Swarm Intelligent algorithm that was first introduced by Karaboga. It is based on the Fuzzy Clustering with Artificial Bee Colony Optimization algorithm proposed by Dervis Karaboga and Celal Ozturk. In this work, we propose a new algorithm called Genetic clustering Bee Colony Optimization (GCBCO). The performance of GCBCO is tested in 10 docking instances from the PDB bind core set and compared the performance with PSO and ACO algorithms. The result shows that the GCBCO could find ligand poses with best energy levels than the existing search algorithms.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122893305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Location-aware service discovery in next generation wireless networks 下一代无线网络中的位置感知服务发现
K. R. Nanthagobal, C. Chandrasekar
The service discovery mechanism in next generation wireless network should be flexible to both location and environment change of the user which can be achieved by appropriately predicting the user mobility. As a result, effective user mobility prediction technique need to be designed for offering the services without affecting the user location. In this paper, we propose a location aware service discovery protocol in next generation wireless networks. This technique consists of three phases: Handoff triggering based on received signal strength of the base station (BS), Client mobility prediction as per its velocity and direction, BS selection with maximum available bandwidth and residual power. By simulation results, we show that our proposed approach minimizes the query latency.
下一代无线网络中的服务发现机制应该对用户的位置和环境变化具有灵活性,而这可以通过对用户移动性的适当预测来实现。因此,需要设计有效的用户移动性预测技术,以在不影响用户位置的情况下提供服务。本文提出了一种下一代无线网络中的位置感知服务发现协议。该技术包括三个阶段:基于接收到的基站信号强度触发切换、根据其速度和方向预测客户端移动性、根据最大可用带宽和剩余功率选择基站。仿真结果表明,我们提出的方法使查询延迟最小化。
{"title":"Location-aware service discovery in next generation wireless networks","authors":"K. R. Nanthagobal, C. Chandrasekar","doi":"10.1109/ICPRIME.2012.6208296","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208296","url":null,"abstract":"The service discovery mechanism in next generation wireless network should be flexible to both location and environment change of the user which can be achieved by appropriately predicting the user mobility. As a result, effective user mobility prediction technique need to be designed for offering the services without affecting the user location. In this paper, we propose a location aware service discovery protocol in next generation wireless networks. This technique consists of three phases: Handoff triggering based on received signal strength of the base station (BS), Client mobility prediction as per its velocity and direction, BS selection with maximum available bandwidth and residual power. By simulation results, we show that our proposed approach minimizes the query latency.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130107520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image compression using H.264 and deflate algorithm 图像压缩采用H.264和deflate算法
M. Sundaresan, E. Devika
Compound image is combination of text, graphics and pictures. Compression is the process of reducing the amount of data required to represent information. It also reduces the time required for the data to be sent over the Internet or Web pages. Compound image compression is done on the basis of lossy and lossless compression. Lossy compression is a data encoding method that compresses data by discarding (losing) some data in the image. Lossless compression is used to compress the image without any loss of data in the image. Image compression is done using lossy compression and lossless compression. In this paper different techniques are used for compressing compound images. The performance of these techniques has been compared.
复合图像是文字、图形和图片的组合。压缩是减少表示信息所需的数据量的过程。它还减少了通过Internet或Web页面发送数据所需的时间。复合图像压缩是在有损压缩和无损压缩的基础上进行的。有损压缩是一种通过丢弃(丢失)图像中的一些数据来压缩数据的数据编码方法。无损压缩是指在不丢失图像数据的情况下对图像进行压缩。图像压缩分为有损压缩和无损压缩两种。本文采用了不同的技术来压缩复合图像。对这些技术的性能进行了比较。
{"title":"Image compression using H.264 and deflate algorithm","authors":"M. Sundaresan, E. Devika","doi":"10.1109/ICPRIME.2012.6208351","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208351","url":null,"abstract":"Compound image is combination of text, graphics and pictures. Compression is the process of reducing the amount of data required to represent information. It also reduces the time required for the data to be sent over the Internet or Web pages. Compound image compression is done on the basis of lossy and lossless compression. Lossy compression is a data encoding method that compresses data by discarding (losing) some data in the image. Lossless compression is used to compress the image without any loss of data in the image. Image compression is done using lossy compression and lossless compression. In this paper different techniques are used for compressing compound images. The performance of these techniques has been compared.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127132572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mammogram image segmentation using fuzzy clustering 基于模糊聚类的乳房x线图像分割
R. Boss, K. Thangavel, D. Daniel
This paper proposes mammogram image segmentation using Fuzzy C-Means (FCM) clustering algorithm. The median filter is used for pre-processing of image. It is normally used to reduce noise in an image. The 14 Haralick features are extracted from mammogram image using Gray Level Co-occurrence Matrix (GLCM) for different angles. The features are clustered by K-Means and FCM algorithms inorder to segment the region of interests for further classification. The performance of segmentation result of the proposed algorithm is measured according to the error values such as Mean Square Error (MSE) and Root Means Square Error (RMSE). The Mammogram images used in our experiment are obtained from MIAS database.
本文提出了一种基于模糊c均值(FCM)聚类算法的乳房x线图像分割方法。采用中值滤波器对图像进行预处理。它通常用于减少图像中的噪声。利用灰度共生矩阵(GLCM)对不同角度的乳房x线照片提取14个哈拉利克特征。通过K-Means和FCM算法对特征进行聚类,以分割感兴趣的区域进行进一步分类。根据均方误差(Mean Square error, MSE)和均方根误差(Root Mean Square error, RMSE)等误差值来衡量该算法的分割效果。在我们的实验中使用的乳房x光图像是从MIAS数据库中获得的。
{"title":"Mammogram image segmentation using fuzzy clustering","authors":"R. Boss, K. Thangavel, D. Daniel","doi":"10.1109/ICPRIME.2012.6208360","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208360","url":null,"abstract":"This paper proposes mammogram image segmentation using Fuzzy C-Means (FCM) clustering algorithm. The median filter is used for pre-processing of image. It is normally used to reduce noise in an image. The 14 Haralick features are extracted from mammogram image using Gray Level Co-occurrence Matrix (GLCM) for different angles. The features are clustered by K-Means and FCM algorithms inorder to segment the region of interests for further classification. The performance of segmentation result of the proposed algorithm is measured according to the error values such as Mean Square Error (MSE) and Root Means Square Error (RMSE). The Mammogram images used in our experiment are obtained from MIAS database.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131240500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Network programming and mining classifier for intrusion detection using probability classification 基于概率分类的入侵检测网络规划与挖掘分类器
P. Prasenna, A. V. T. RaghavRamana, R. Krishnakumar, A. Devanbu
In conventional network security simply relies on mathematical algorithms and low counter measures to taken to prevent intrusion detection system, although most of this approaches in terms of theoretically challenged to implement. Therefore, a variety of algorithms have been committed to this challenge. Instead of generating large number of rules the evolution optimization techniques like Genetic Network Programming (GNP) can be used. The GNP is based on directed graph, In this paper the security issues related to deploy a data mining-based IDS in a real time environment is focused upon. We generalize the problem of GNP with association rule mining and propose a fuzzy weighted association rule mining with GNP framework suitable for both continuous and discrete attributes. Our proposal follows an Apriori algorithm based fuzzy WAR and GNP and avoids pre and post processing thus eliminating the extra steps during rules generation. This method can sufficient to evaluate misuse and anomaly detection. Experiments on KDD99Cup and DARPA98 data show the high detection rate and accuracy compared with other conventional method.
传统的网络安全仅仅依靠数学算法和较低的防御措施来采取入侵检测系统,尽管大多数这种方法在理论上难以实现。因此,各种各样的算法都致力于解决这一挑战。可以使用遗传网络规划(GNP)等进化优化技术来代替生成大量规则。本文重点研究了在实时环境中部署基于数据挖掘的入侵检测系统的安全问题。将关联规则挖掘广义化GNP问题,提出了一种适用于连续属性和离散属性的模糊加权关联规则挖掘框架。我们的建议遵循基于模糊WAR和GNP的Apriori算法,避免了预处理和后处理,从而消除了规则生成过程中的额外步骤。该方法可以充分评估误用和异常检测。在KDD99Cup和DARPA98数据上的实验表明,与其他常规方法相比,该方法具有较高的检出率和准确率。
{"title":"Network programming and mining classifier for intrusion detection using probability classification","authors":"P. Prasenna, A. V. T. RaghavRamana, R. Krishnakumar, A. Devanbu","doi":"10.1109/ICPRIME.2012.6208344","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208344","url":null,"abstract":"In conventional network security simply relies on mathematical algorithms and low counter measures to taken to prevent intrusion detection system, although most of this approaches in terms of theoretically challenged to implement. Therefore, a variety of algorithms have been committed to this challenge. Instead of generating large number of rules the evolution optimization techniques like Genetic Network Programming (GNP) can be used. The GNP is based on directed graph, In this paper the security issues related to deploy a data mining-based IDS in a real time environment is focused upon. We generalize the problem of GNP with association rule mining and propose a fuzzy weighted association rule mining with GNP framework suitable for both continuous and discrete attributes. Our proposal follows an Apriori algorithm based fuzzy WAR and GNP and avoids pre and post processing thus eliminating the extra steps during rules generation. This method can sufficient to evaluate misuse and anomaly detection. Experiments on KDD99Cup and DARPA98 data show the high detection rate and accuracy compared with other conventional method.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122624894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Deceptive phishing detection system: From audio and text messages in Instant Messengers using Data Mining approach 欺骗性网络钓鱼检测系统:基于数据挖掘方法的即时通讯语音和文本信息
M. M. Ali, L. Rajamani
Deceptive Phishing is the major problem in Instant Messengers, much of sensitive and personal information, disclosed through socio-engineered text messages for which solution is proposed[2] but, detection of phishing through voice chatting technique in Instant Messengers is not yet done which is the motivating factor to carry out the work and solution to address this problem of privacy in Instant Messengers (IM) is proposed using Association Rule Mining (ARM) technique a Data Mining approach integrated with Speech Recognition system. Words are recognized from speech with the help of FFT spectrum analysis and LPC coefficients methodologies. Online criminal's now-a-days adapted voice chatting technique along with text messages collaboratively or either of them in IM's and wraps out personal information leads to threat and hindrance for privacy. In order to focus on privacy preserving we developed and experimented Anti Phishing Detection system (APD) in IM's to detect deceptive phishing for text and audio collaboratively.
欺骗性网络钓鱼是即时通讯工具中的主要问题,许多敏感和个人信息通过社会工程文本消息泄露,对此提出了解决方案[2],但是,利用语音聊天技术检测即时通讯软件中的网络钓鱼的研究尚未完成,这是开展这项工作的激励因素,并提出了利用关联规则挖掘(ARM)技术和语音识别系统相结合的数据挖掘方法来解决即时通讯软件(IM)中的隐私问题。在FFT频谱分析和LPC系数方法的帮助下,从语音中识别单词。当今网络犯罪分子将语音聊天技术与文本信息协同使用,或者在IM中使用其中之一,并包装个人信息,导致隐私受到威胁和阻碍。为了保护用户的隐私,我们开发并试验了IM中的反网络钓鱼检测系统(APD),以协同检测文本和音频的欺骗性网络钓鱼。
{"title":"Deceptive phishing detection system: From audio and text messages in Instant Messengers using Data Mining approach","authors":"M. M. Ali, L. Rajamani","doi":"10.1109/ICPRIME.2012.6208390","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208390","url":null,"abstract":"Deceptive Phishing is the major problem in Instant Messengers, much of sensitive and personal information, disclosed through socio-engineered text messages for which solution is proposed[2] but, detection of phishing through voice chatting technique in Instant Messengers is not yet done which is the motivating factor to carry out the work and solution to address this problem of privacy in Instant Messengers (IM) is proposed using Association Rule Mining (ARM) technique a Data Mining approach integrated with Speech Recognition system. Words are recognized from speech with the help of FFT spectrum analysis and LPC coefficients methodologies. Online criminal's now-a-days adapted voice chatting technique along with text messages collaboratively or either of them in IM's and wraps out personal information leads to threat and hindrance for privacy. In order to focus on privacy preserving we developed and experimented Anti Phishing Detection system (APD) in IM's to detect deceptive phishing for text and audio collaboratively.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127870962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Comparison of DTW and HMM for isolated word recognition DTW和HMM在孤立词识别中的比较
S. C. Sajjan, C. Vijaya
This study proposes limited vocabulary isolated word recognition using Linear Predictive Coding(LPC) and Mel Frequency Cepstral Coefficients(MFCC) for feature extraction, Dynamic Time Warping(DTW) and discrete Hidden Markov Model (HMM) for recognition and their comparisons. Feature extraction is carried over the speech frame of 300 samples with 100 samples overlap at 8 KHz sampling rate of the input speech. MFCC analysis provides better recognition rate than LPC as it operates on a logarithmic scale which resembles human auditory system whereas LPC has uniform resolution over the frequency plane. This is followed by pattern recognition. Since the voice signal tends to have different temporal rate, DTW is one of the methods that provide non-linear alignment between two voice signals. Another method called HMM that statistically models the words is also presented. Experimentally it is observed that recognition accuracy is better for HMM compared with DTW. The database used is TI-46 isolated word corpus zero-nine from Linguist Data Consortium.
本研究提出了使用线性预测编码(LPC)和Mel频率倒谱系数(MFCC)进行特征提取,动态时间扭曲(DTW)和离散隐马尔可夫模型(HMM)进行识别并比较有限词汇孤立词的方法。在输入语音的8 KHz采样率下,对300个样本的语音帧进行特征提取,其中100个样本重叠。MFCC分析具有比LPC更好的识别率,因为它在类似于人类听觉系统的对数尺度上运行,而LPC在频率平面上具有均匀的分辨率。接下来是模式识别。由于语音信号往往具有不同的时间速率,DTW是在两个语音信号之间提供非线性对准的方法之一。本文还介绍了另一种称为HMM的方法,该方法可以对单词进行统计建模。实验结果表明,HMM的识别精度优于DTW。使用的数据库是来自Linguist Data Consortium的TI-46孤立词语料库zero- 9。
{"title":"Comparison of DTW and HMM for isolated word recognition","authors":"S. C. Sajjan, C. Vijaya","doi":"10.1109/ICPRIME.2012.6208391","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208391","url":null,"abstract":"This study proposes limited vocabulary isolated word recognition using Linear Predictive Coding(LPC) and Mel Frequency Cepstral Coefficients(MFCC) for feature extraction, Dynamic Time Warping(DTW) and discrete Hidden Markov Model (HMM) for recognition and their comparisons. Feature extraction is carried over the speech frame of 300 samples with 100 samples overlap at 8 KHz sampling rate of the input speech. MFCC analysis provides better recognition rate than LPC as it operates on a logarithmic scale which resembles human auditory system whereas LPC has uniform resolution over the frequency plane. This is followed by pattern recognition. Since the voice signal tends to have different temporal rate, DTW is one of the methods that provide non-linear alignment between two voice signals. Another method called HMM that statistically models the words is also presented. Experimentally it is observed that recognition accuracy is better for HMM compared with DTW. The database used is TI-46 isolated word corpus zero-nine from Linguist Data Consortium.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128671487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Interpolation based image watermarking resisting to geometrical attacks 基于插值的抗几何攻击图像水印
J. Veerappan, G. Pitchammal
The main theme of this application is to provide an algorithm for grayscale and color image watermark to manage the attacks such as rotation, scaling and translation. In the existing watermarking algorithms, those exploited robust features are more or less related to the pixel position, so they cannot be more robust against the attacks. In order to solve this problem this application focus on certain parameters rather than the pixel position for watermarking. Two statistical features such as the histogram shape and the mean of Gaussian filtered low-frequency component of images are taken for this proposed application to make the watermarking algorithm robust to attacks and also interpolation technique is used to increase the number of bites to be needed.
本应用程序的主题是为灰度和彩色图像水印提供一种算法来管理旋转,缩放和平移等攻击。在现有的水印算法中,所利用的鲁棒性特征或多或少与像素位置有关,因此对攻击的鲁棒性无法提高。为了解决这个问题,本应用侧重于某些参数而不是像素位置进行水印。利用直方图形状和高斯滤波图像低频分量的均值这两个统计特征使水印算法对攻击具有鲁棒性,并采用插值技术增加了所需的咬数。
{"title":"Interpolation based image watermarking resisting to geometrical attacks","authors":"J. Veerappan, G. Pitchammal","doi":"10.1109/ICPRIME.2012.6208353","DOIUrl":"https://doi.org/10.1109/ICPRIME.2012.6208353","url":null,"abstract":"The main theme of this application is to provide an algorithm for grayscale and color image watermark to manage the attacks such as rotation, scaling and translation. In the existing watermarking algorithms, those exploited robust features are more or less related to the pixel position, so they cannot be more robust against the attacks. In order to solve this problem this application focus on certain parameters rather than the pixel position for watermarking. Two statistical features such as the histogram shape and the mean of Gaussian filtered low-frequency component of images are taken for this proposed application to make the watermarking algorithm robust to attacks and also interpolation technique is used to increase the number of bites to be needed.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121909923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1