首页 > 最新文献

9th International Conference on Information Technology (ICIT'06)最新文献

英文 中文
The Soft Computing Approach to Program Development Time Estimation 程序开发时间估算的软计算方法
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.84
V. Bhattacherjee
Software effort modeling is one of the fields in which machine learning techniques have proved effective. In this paper, attempt has been made to establish a relation between program development time with respect to its dependence on various program and personnel attributes. A neural network model has been developed to predict the development time of various software programs. The model is a three layer feed forward network with 17 neurons in the hidden layer. The model has 5 inputs and 1 output.
软件工作量建模是机器学习技术被证明有效的领域之一。在本文中,试图建立程序开发时间与各种程序和人员属性之间的关系。建立了一种神经网络模型来预测各种软件程序的开发时间。该模型是一个三层前馈网络,隐藏层有17个神经元。该模型有5个输入和1个输出。
{"title":"The Soft Computing Approach to Program Development Time Estimation","authors":"V. Bhattacherjee","doi":"10.1109/ICIT.2006.84","DOIUrl":"https://doi.org/10.1109/ICIT.2006.84","url":null,"abstract":"Software effort modeling is one of the fields in which machine learning techniques have proved effective. In this paper, attempt has been made to establish a relation between program development time with respect to its dependence on various program and personnel attributes. A neural network model has been developed to predict the development time of various software programs. The model is a three layer feed forward network with 17 neurons in the hidden layer. The model has 5 inputs and 1 output.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132898013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Securing Membership Control in Mobile Ad Hoc Networks 移动Ad Hoc网络中的安全成员控制
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.81
Yunfang Feng, Zhiyuan Liu, Jun Yu Li
Lack of online trusted dealer and group membership dynamics make the membership control become a challenging task in wireless ad hoc network. Based on the threshold cryptography (and verifiable secret sharing), we propose a secure membership control scheme using a new threshold signature based on the RSA variant. Compared with other proposed solutions based on RSA, the scheme does not need the operation of t-bounded coalition offsetting; moreover, it provides verifiable GMC issuance and share acquisition, which is only achieved in threshold DSA before.
由于缺乏在线可信经销商和组成员动态特性,使得组成员控制成为无线自组织网络中一个具有挑战性的任务。基于阈值密码学(和可验证的秘密共享),我们提出了一种基于RSA变体的新阈值签名的安全成员控制方案。与其他基于RSA的方案相比,该方案不需要t有界联盟偏移操作;此外,它还提供了可验证的GMC发行和股票获取,这在以前的阈值DSA中是无法实现的。
{"title":"Securing Membership Control in Mobile Ad Hoc Networks","authors":"Yunfang Feng, Zhiyuan Liu, Jun Yu Li","doi":"10.1109/ICIT.2006.81","DOIUrl":"https://doi.org/10.1109/ICIT.2006.81","url":null,"abstract":"Lack of online trusted dealer and group membership dynamics make the membership control become a challenging task in wireless ad hoc network. Based on the threshold cryptography (and verifiable secret sharing), we propose a secure membership control scheme using a new threshold signature based on the RSA variant. Compared with other proposed solutions based on RSA, the scheme does not need the operation of t-bounded coalition offsetting; moreover, it provides verifiable GMC issuance and share acquisition, which is only achieved in threshold DSA before.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133449281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improved Bitmap Indexing Strategy for Data Warehouses 数据仓库的改进位图索引策略
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.59
Navneet Goyal, Susheel Kumar Zaveri, Yashvardhan Sharma
Improving the query performance is critical in data warehousing and decision support systems. A lot of methods have been proposed by various researches. Indexing the data warehouse is a common but effective technique. Bitmap indices play a very important role in improving query performance in data warehousing and decision support systems. In this paper we present a new bitmap indexing strategy that can be applied to any existing bitmap compression schemes that are based on run length encoding. The new strategy, in most cases, requires less space and provides performance gains as well. The new strategy is tested on two commonly used bitmap compression schemes namely, word-aligned hybrid (WAH) and byte-aligned bitmap code (BBC) and results are presented graphically. The proposed strategy simply sorts the field on which a bitmap is to be created. Sorting of the field ensures long runs of ones and zeros. These long runs of ones and zeros are desirable for any compression scheme that is based on run length encoding and its variants. The space required to store the bitmap indexes goes down dramatically. The effect of sorting on query response time is studied for equality and range queries and it is found that there is a considerable decrease in the response time of queries. The overheads associated with the proposed strategy are sorting a table on a particular field and maintaining a sorted table. These extra tasks could be easily performed during the ETL process or when the data warehouse is offline. The new strategy concentrates on reducing space requirement for the bitmap index and the response time of queries and achieves both objectives without incurring any processing overheads when the data warehouse is online.
在数据仓库和决策支持系统中,提高查询性能至关重要。各种各样的研究已经提出了许多方法。为数据仓库建立索引是一种常见但有效的技术。位图索引在提高数据仓库和决策支持系统的查询性能方面起着非常重要的作用。在本文中,我们提出了一种新的位图索引策略,该策略可以应用于任何现有的基于运行长度编码的位图压缩方案。在大多数情况下,新策略需要更少的空间,并提供性能提升。在两种常用的位图压缩方案即字对齐混合(WAH)和字节对齐位图码(BBC)上对新策略进行了测试,并以图形方式给出了测试结果。所提出的策略只是对要创建位图的字段进行排序。字段的排序确保长时间运行1和0。对于基于运行长度编码及其变体的任何压缩方案来说,这些长时间的1和0都是理想的。存储位图索引所需的空间急剧减少。研究了等号查询和范围查询排序对查询响应时间的影响,发现排序对查询响应时间有较大的降低。与所建议的策略相关的开销是对特定字段上的表进行排序并维护已排序的表。这些额外的任务可以在ETL过程中或数据仓库脱机时轻松执行。新策略专注于减少位图索引的空间需求和查询的响应时间,并且在数据仓库在线时不产生任何处理开销的情况下实现了这两个目标。
{"title":"Improved Bitmap Indexing Strategy for Data Warehouses","authors":"Navneet Goyal, Susheel Kumar Zaveri, Yashvardhan Sharma","doi":"10.1109/ICIT.2006.59","DOIUrl":"https://doi.org/10.1109/ICIT.2006.59","url":null,"abstract":"Improving the query performance is critical in data warehousing and decision support systems. A lot of methods have been proposed by various researches. Indexing the data warehouse is a common but effective technique. Bitmap indices play a very important role in improving query performance in data warehousing and decision support systems. In this paper we present a new bitmap indexing strategy that can be applied to any existing bitmap compression schemes that are based on run length encoding. The new strategy, in most cases, requires less space and provides performance gains as well. The new strategy is tested on two commonly used bitmap compression schemes namely, word-aligned hybrid (WAH) and byte-aligned bitmap code (BBC) and results are presented graphically. The proposed strategy simply sorts the field on which a bitmap is to be created. Sorting of the field ensures long runs of ones and zeros. These long runs of ones and zeros are desirable for any compression scheme that is based on run length encoding and its variants. The space required to store the bitmap indexes goes down dramatically. The effect of sorting on query response time is studied for equality and range queries and it is found that there is a considerable decrease in the response time of queries. The overheads associated with the proposed strategy are sorting a table on a particular field and maintaining a sorted table. These extra tasks could be easily performed during the ETL process or when the data warehouse is offline. The new strategy concentrates on reducing space requirement for the bitmap index and the response time of queries and achieves both objectives without incurring any processing overheads when the data warehouse is online.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117308344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Policy Specification and Enforcement for Detection of Security Violations in a Mail Service 邮件服务中安全违规检测的策略规范和实施
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.72
A.M.M. Rao
The paper presents a policy-based approach to detect security violations by enforcing security policy at run-time for providing secure email service. As email service usage is increasing day by day, hackers or attackers are also playing a vital role to destruct email service and even to crash the email server. Due to this, it is a challenging task today to the system administrators to provide secure email service. In this paper, security policy is defined at operating system level, mail application level and network infrastructure level. A policy at system level specifies mandatory usage profile, usages of system sensitive resources such as file system objects, processes, system memory and inter process communication objects. Policies for mail application are defined with sensitive files/directories and parameters, which have impact in delivering a service. Policies for network are defined for controlling inbound and outbound traffic, specifying demilitarized zone, denying misuse of public IP and detecting suspicious network activity. The proposed system architecture supports the layered approach in policy enforcement, proactive defensive mechanism against security violations and scope for new policy discovery. The approach is prototyped on Linux-2.4.21-4 and have built rules for squirrel mail version 1.4.5 to detect security violations in a mail service at run-time.
本文提出了一种基于策略的方法,通过在运行时实施安全策略来检测安全违规行为,从而提供安全的电子邮件服务。随着电子邮件服务的使用量日益增加,黑客或攻击者也在破坏电子邮件服务甚至使电子邮件服务器崩溃方面发挥着至关重要的作用。因此,提供安全的电子邮件服务是当今系统管理员面临的一项具有挑战性的任务。本文分别在操作系统级、邮件应用级和网络基础架构级定义了安全策略。系统级的策略指定强制使用配置文件、系统敏感资源(如文件系统对象、进程、系统内存和进程间通信对象)的使用情况。邮件应用程序的策略是用敏感文件/目录和参数定义的,这些文件/目录和参数对服务的交付有影响。网络策略的定义是为了控制入站和出站流量,指定非军事区,拒绝滥用公共IP和检测可疑的网络活动。所建议的系统架构支持策略实施的分层方法、针对安全违规的主动防御机制和新策略发现的范围。该方法在Linux-2.4.21-4上原型化,并为松鼠邮件版本1.4.5构建了规则,以便在运行时检测邮件服务中的安全违规。
{"title":"Policy Specification and Enforcement for Detection of Security Violations in a Mail Service","authors":"A.M.M. Rao","doi":"10.1109/ICIT.2006.72","DOIUrl":"https://doi.org/10.1109/ICIT.2006.72","url":null,"abstract":"The paper presents a policy-based approach to detect security violations by enforcing security policy at run-time for providing secure email service. As email service usage is increasing day by day, hackers or attackers are also playing a vital role to destruct email service and even to crash the email server. Due to this, it is a challenging task today to the system administrators to provide secure email service. In this paper, security policy is defined at operating system level, mail application level and network infrastructure level. A policy at system level specifies mandatory usage profile, usages of system sensitive resources such as file system objects, processes, system memory and inter process communication objects. Policies for mail application are defined with sensitive files/directories and parameters, which have impact in delivering a service. Policies for network are defined for controlling inbound and outbound traffic, specifying demilitarized zone, denying misuse of public IP and detecting suspicious network activity. The proposed system architecture supports the layered approach in policy enforcement, proactive defensive mechanism against security violations and scope for new policy discovery. The approach is prototyped on Linux-2.4.21-4 and have built rules for squirrel mail version 1.4.5 to detect security violations in a mail service at run-time.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133308870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiobjective Genetic Algorithm for k-way Equipartitioning of a Point Set with Application to CAD-VLSI 点集k路等分的多目标遗传算法及其在CAD-VLSI中的应用
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.66
S. Saha, S. Sur-Kolay, S. Bandyopadhyay, P. Dasgupta
Buffered clock-tree design, with cells at its leaves, are known to meet timing and skew requirements better. Clustering of flip-flops leads to reduced clock-tree wirelengths and power-efficient layouts. In this paper, the problem of clustering flip-flops in a given placement is formulated as Multi-way Equi-Partitioning of a given point set, such that (i) total area of the partition (ii) area of the largest partition and (Hi) total deviation of the partitions, are minimal. For this computationally expensive multiobjective optimization problem, also relevant to design of semi-synchronous systems, a technique based on genetic algorithm, is proposed. Crossover and mutation operators specific to the k-way equipartitioning problem, have been designed and a new greedy heuristic operator is employed to accelerate the convergence. Results on data sets obtained from layouts of ISCAS89 benchmark circuit demonstrate the effectiveness of the proposed method.
缓冲时钟树的设计,在它的叶子上有细胞,可以更好地满足时间和倾斜的要求。触发器的聚类可以减少时钟树的长度,降低功耗。本文将给定位置的触发器聚类问题表述为给定点集的多路等分区问题,使得(i)分区的总面积(ii)最大分区的面积和(Hi)分区的总偏差最小。针对半同步系统设计中计算量大的多目标优化问题,提出了一种基于遗传算法的优化方法。针对k-way等分割问题设计了交叉和变异算子,并采用了一种新的贪婪启发式算子来加快收敛速度。ISCAS89基准电路版图数据集验证了该方法的有效性。
{"title":"Multiobjective Genetic Algorithm for k-way Equipartitioning of a Point Set with Application to CAD-VLSI","authors":"S. Saha, S. Sur-Kolay, S. Bandyopadhyay, P. Dasgupta","doi":"10.1109/ICIT.2006.66","DOIUrl":"https://doi.org/10.1109/ICIT.2006.66","url":null,"abstract":"Buffered clock-tree design, with cells at its leaves, are known to meet timing and skew requirements better. Clustering of flip-flops leads to reduced clock-tree wirelengths and power-efficient layouts. In this paper, the problem of clustering flip-flops in a given placement is formulated as Multi-way Equi-Partitioning of a given point set, such that (i) total area of the partition (ii) area of the largest partition and (Hi) total deviation of the partitions, are minimal. For this computationally expensive multiobjective optimization problem, also relevant to design of semi-synchronous systems, a technique based on genetic algorithm, is proposed. Crossover and mutation operators specific to the k-way equipartitioning problem, have been designed and a new greedy heuristic operator is employed to accelerate the convergence. Results on data sets obtained from layouts of ISCAS89 benchmark circuit demonstrate the effectiveness of the proposed method.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124061848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Camouflage Defect Identification: A Novel Approach 伪装缺陷识别:一种新方法
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.34
Nagappa U. Bhajantri, P. Nagabhushan
Camouflaging is an attempt to obscure the signature of a target and sublimate the target in its background frame in terms of co-occurrence matrix texture properties. The objective of this research work is to detect such camouflaged defect. Since the texture similarity between the background and the defect is the premise for accomplishing camouflage, an intensive texture analysis should be able to discriminate defect from its background. In the proposed work we intended to employ Co-occurrence matrix based texture features are computed within the block, a small region of the image. Finally defective portions are detected by cluster analysis and identified through!. Watershed segmentation. Several experiments have been conducted to demonstrate the suitability of the proposed model to spot camouflaged defects. Experimentation on the synthetic and real images corroborates the potential of the method.
伪装是一种利用共现矩阵纹理特性掩盖目标的特征,使目标在其背景框架中得到升华的方法。本研究工作的目的是检测这种伪装缺陷。由于背景与缺陷的纹理相似性是伪装成功的前提,因此需要通过深入的纹理分析将缺陷与背景区分开来。在提出的工作中,我们打算采用基于共现矩阵的纹理特征在块内计算,图像的一个小区域。最后通过聚类分析检测出缺陷部分,并通过!分水岭分割。几个实验证明了所提出的模型在发现伪装缺陷方面的适用性。在合成图像和真实图像上的实验证实了该方法的潜力。
{"title":"Camouflage Defect Identification: A Novel Approach","authors":"Nagappa U. Bhajantri, P. Nagabhushan","doi":"10.1109/ICIT.2006.34","DOIUrl":"https://doi.org/10.1109/ICIT.2006.34","url":null,"abstract":"Camouflaging is an attempt to obscure the signature of a target and sublimate the target in its background frame in terms of co-occurrence matrix texture properties. The objective of this research work is to detect such camouflaged defect. Since the texture similarity between the background and the defect is the premise for accomplishing camouflage, an intensive texture analysis should be able to discriminate defect from its background. In the proposed work we intended to employ Co-occurrence matrix based texture features are computed within the block, a small region of the image. Finally defective portions are detected by cluster analysis and identified through!. Watershed segmentation. Several experiments have been conducted to demonstrate the suitability of the proposed model to spot camouflaged defects. Experimentation on the synthetic and real images corroborates the potential of the method.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"2230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130187233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Seamless Network Management in Presence of Heterogeneous Management Protocols for Next Generation Networks 下一代网络异构管理协议下的无缝网络管理
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.80
B. Karthik, M. Jaiswal, V. Menon, Vidhya Kannan, Shobha Venkobarao, Madan Pande, A. Talukder, D. Das
Addition of different service requirements by users and advent of new access networks have increased the complexity to manage these networks uniformly. However, there are many management protocols available today like SNMP, JMX, WBEM, etc, which are being used to manage networks. Because of complexity and heterogeneity of these management protocols it has become very difficult for a network manager to manage different network elements (NE) since these may be instrumented using different such protocols. One critical example of such a complex network is IP Multimedia Subsystem (IMS). 3GPP does not specify the management protocol to be used to manage network elements in IMS. In this paper, the authors have proposed a novel network management solution, which can be used to manage IMS components independent of heterogeneous management protocols like WBEM, SNMP, JMX etc. Moreover, authors have developed a prototype resource adapter to test the suitability of the protocol.
用户不同业务需求的增加和新型接入网的出现,增加了统一管理这些网络的复杂性。然而,现在有许多可用的管理协议,如SNMP、JMX、WBEM等,它们被用来管理网络。由于这些管理协议的复杂性和异构性,网络管理员管理不同的网元(NE)变得非常困难,因为这些网元可能使用不同的此类协议进行检测。这种复杂网络的一个关键示例是IP多媒体子系统(IMS)。3GPP没有指定用于管理IMS网元的管理协议。本文提出了一种新的网络管理方案,可以独立于WBEM、SNMP、JMX等异构管理协议对IMS组件进行管理。此外,作者还开发了一个原型资源适配器来测试协议的适用性。
{"title":"Seamless Network Management in Presence of Heterogeneous Management Protocols for Next Generation Networks","authors":"B. Karthik, M. Jaiswal, V. Menon, Vidhya Kannan, Shobha Venkobarao, Madan Pande, A. Talukder, D. Das","doi":"10.1109/ICIT.2006.80","DOIUrl":"https://doi.org/10.1109/ICIT.2006.80","url":null,"abstract":"Addition of different service requirements by users and advent of new access networks have increased the complexity to manage these networks uniformly. However, there are many management protocols available today like SNMP, JMX, WBEM, etc, which are being used to manage networks. Because of complexity and heterogeneity of these management protocols it has become very difficult for a network manager to manage different network elements (NE) since these may be instrumented using different such protocols. One critical example of such a complex network is IP Multimedia Subsystem (IMS). 3GPP does not specify the management protocol to be used to manage network elements in IMS. In this paper, the authors have proposed a novel network management solution, which can be used to manage IMS components independent of heterogeneous management protocols like WBEM, SNMP, JMX etc. Moreover, authors have developed a prototype resource adapter to test the suitability of the protocol.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116662799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Version Control using Cryptographic Access Control 使用加密访问控制的版本控制
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.91
K. Ganesan, R. Anandan
In this paper, using cryptographic access control techniques, we demonstrate that a client can store various versions of a file in a secure way at the (remote) server and control its access. The proposed mechanism also permits different users (clients) to store simultaneously their files with the same name at the server in a common storage area, without any name conflict. This will be very useful for mobile clients with limited storage.
在本文中,我们使用加密访问控制技术,证明了客户端可以在(远程)服务器上以安全的方式存储文件的各种版本并控制其访问。所提议的机制还允许不同的用户(客户机)在服务器的公共存储区域中以相同的名称同时存储他们的文件,而不会产生任何名称冲突。这对于存储空间有限的移动客户端非常有用。
{"title":"Version Control using Cryptographic Access Control","authors":"K. Ganesan, R. Anandan","doi":"10.1109/ICIT.2006.91","DOIUrl":"https://doi.org/10.1109/ICIT.2006.91","url":null,"abstract":"In this paper, using cryptographic access control techniques, we demonstrate that a client can store various versions of a file in a secure way at the (remote) server and control its access. The proposed mechanism also permits different users (clients) to store simultaneously their files with the same name at the server in a common storage area, without any name conflict. This will be very useful for mobile clients with limited storage.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128461496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognition of Handwritten Kannada Numerals 手写体卡纳达数字的识别
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.77
N. Sharma, U. Pal, F. Kimura
This paper deals with a quadratic classifier based scheme for the recognition of off-line handwritten numerals of Kannada, an important Indian script. The features used in the classifier are obtained from the directional chain code information of the contour points of the characters. The bounding box of a character is segmented into blocks and the chain code histogram is computed in each of the blocks. Here we have used 64 dimensional and 100 dimensional features for a comparative study on the recognition accuracy of our proposed system. This chain code features are fed to the quadratic classifier for recognition. We tested our scheme on 2300 data samples and obtained 97.87% and 98.45% recognition accuracy using 64 dimensional and 100 dimensional features respectively, from the proposed scheme using five-fold cross-validation technique.
本文研究了一种基于二次分类器的脱机手写体数字识别方法。分类器使用的特征是从字符轮廓点的方向链编码信息中获得的。将字符的边界框分割成块,并在每个块中计算链码直方图。在这里,我们使用64维和100维特征对我们提出的系统的识别精度进行了比较研究。该链码特征被送入二次型分类器进行识别。我们对2300个数据样本进行了测试,采用五重交叉验证技术,对64维和100维特征分别获得了97.87%和98.45%的识别准确率。
{"title":"Recognition of Handwritten Kannada Numerals","authors":"N. Sharma, U. Pal, F. Kimura","doi":"10.1109/ICIT.2006.77","DOIUrl":"https://doi.org/10.1109/ICIT.2006.77","url":null,"abstract":"This paper deals with a quadratic classifier based scheme for the recognition of off-line handwritten numerals of Kannada, an important Indian script. The features used in the classifier are obtained from the directional chain code information of the contour points of the characters. The bounding box of a character is segmented into blocks and the chain code histogram is computed in each of the blocks. Here we have used 64 dimensional and 100 dimensional features for a comparative study on the recognition accuracy of our proposed system. This chain code features are fed to the quadratic classifier for recognition. We tested our scheme on 2300 data samples and obtained 97.87% and 98.45% recognition accuracy using 64 dimensional and 100 dimensional features respectively, from the proposed scheme using five-fold cross-validation technique.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127242612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Color Image Compression with Modified Forward-Only Counterpropagation Neural Network: Improvement of the Quality using Different Distance Measures 基于改进前向反传播神经网络的彩色图像压缩:使用不同距离度量提高图像质量
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.37
D. Mishra, N. Bose, A. Tolambiya, A. Dwivedi, P. Kandula, Ashiwani Kumar, P. Kalra
A modified forward-only counterpropagation neural network (MFO-CPN) for color image compression is proposed. It uses several higher-order distance measures for calculating winning node. It also incorporates nonlinear adjustment of learning rates in both the layers. Results with these distance functions are compared. Proposed modifications leads to improvement in the image quality and faster convergence of network.
提出了一种改进的纯前向反传播神经网络(MFO-CPN)用于彩色图像压缩。它使用几个高阶距离度量来计算获胜节点。它还结合了两层学习率的非线性调整。比较了这些距离函数的计算结果。改进后的图像质量得到改善,网络收敛速度加快。
{"title":"Color Image Compression with Modified Forward-Only Counterpropagation Neural Network: Improvement of the Quality using Different Distance Measures","authors":"D. Mishra, N. Bose, A. Tolambiya, A. Dwivedi, P. Kandula, Ashiwani Kumar, P. Kalra","doi":"10.1109/ICIT.2006.37","DOIUrl":"https://doi.org/10.1109/ICIT.2006.37","url":null,"abstract":"A modified forward-only counterpropagation neural network (MFO-CPN) for color image compression is proposed. It uses several higher-order distance measures for calculating winning node. It also incorporates nonlinear adjustment of learning rates in both the layers. Results with these distance functions are compared. Proposed modifications leads to improvement in the image quality and faster convergence of network.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115105742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
9th International Conference on Information Technology (ICIT'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1