首页 > 最新文献

2014 IEEE International Conference on Computational Intelligence and Computing Research最新文献

英文 中文
Impact of multiple TCP connections in mobile ad-hoc network considering different network sizes 考虑不同网络规模的移动自组网中多个TCP连接的影响
Samita Rout, M. R. Panda, S. Bisoy, Debapriaya Panda
Performance of routing protocols rely on the node mobility, network size, traffic volume, and connectivity patterns. Increasing number of connections in the wireless network creates more data section and incurs more collision. Therefore, there is a need of identifying efficient routing protocol to provide call services in such network. In this paper, we analyze the performance of routing protocols like dynamic source routing (DSR), ad hoc on demand distance vector (AODV) and Destination-Sequenced Distance-Vector (DSDV) for different network sizes creating multiple TCP connections for different mobile nodes considering random way point (RWP) mobility model. Result shows that AODV protocol achieves higher throughput and packet delivery ratio (PDR) at the cost of more packet loss and routing overhead and DSR achieves lower delay as compared to others.
路由协议的性能取决于节点的移动性、网络大小、流量和连接模式。随着无线网络连接数的增加,产生的数据段越来越多,碰撞也越来越多。因此,需要确定有效的路由协议来提供这种网络中的呼叫服务。本文考虑随机路径点(RWP)移动模型,分析了动态源路由(DSR)、随需应变距离矢量(AODV)和目的序列距离矢量(DSDV)等路由协议在不同网络规模下为不同移动节点创建多个TCP连接的性能。结果表明,与其他协议相比,AODV协议以更高的丢包和路由开销为代价实现了更高的吞吐量和包投递率(PDR), DSR协议实现了更低的延迟。
{"title":"Impact of multiple TCP connections in mobile ad-hoc network considering different network sizes","authors":"Samita Rout, M. R. Panda, S. Bisoy, Debapriaya Panda","doi":"10.1109/ICCIC.2014.7238397","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238397","url":null,"abstract":"Performance of routing protocols rely on the node mobility, network size, traffic volume, and connectivity patterns. Increasing number of connections in the wireless network creates more data section and incurs more collision. Therefore, there is a need of identifying efficient routing protocol to provide call services in such network. In this paper, we analyze the performance of routing protocols like dynamic source routing (DSR), ad hoc on demand distance vector (AODV) and Destination-Sequenced Distance-Vector (DSDV) for different network sizes creating multiple TCP connections for different mobile nodes considering random way point (RWP) mobility model. Result shows that AODV protocol achieves higher throughput and packet delivery ratio (PDR) at the cost of more packet loss and routing overhead and DSR achieves lower delay as compared to others.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114901263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fortification of malicious onslaughts using enhanced fusion centre 使用增强融合中心加强恶意攻击
J. Arun, M. Karthikeyan
Cognitive Radio (CR) is an efficient means to improve the under employment of scarce spectrum resource [1]. The proposed A-BPRS (Altruistic Bit Perk Running Scheme) controller, which in turn detects and terminates the presence of Malicious users and it let the white space to be filled by the neighboring reconfigurable secondary users, thereby maximizing the throughput and minimizing the under employment of scarce spectrum resource [2]. In this paper, in conducive to minimize the communication overhead, only one bit decision is consigned to the Fusion center, when the value exists between the decision threshold levels (0 to 70) thereby utilizing the spectrum holes in an efficient way.
认知无线电(Cognitive Radio, CR)是改善稀缺频谱资源利用不足的有效手段[1]。提出的A-BPRS (Altruistic Bit Perk Running Scheme)控制器,该控制器检测并终止恶意用户的存在,并让相邻的可重构辅助用户填充空白,从而最大化吞吐量并最小化稀缺频谱资源的未充分利用[2]。在本文中,为了使通信开销最小化,当决策阈值(0 ~ 70)之间存在时,仅将1位决策委托给Fusion中心,从而有效地利用了频谱孔。
{"title":"Fortification of malicious onslaughts using enhanced fusion centre","authors":"J. Arun, M. Karthikeyan","doi":"10.1109/ICCIC.2014.7238565","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238565","url":null,"abstract":"Cognitive Radio (CR) is an efficient means to improve the under employment of scarce spectrum resource [1]. The proposed A-BPRS (Altruistic Bit Perk Running Scheme) controller, which in turn detects and terminates the presence of Malicious users and it let the white space to be filled by the neighboring reconfigurable secondary users, thereby maximizing the throughput and minimizing the under employment of scarce spectrum resource [2]. In this paper, in conducive to minimize the communication overhead, only one bit decision is consigned to the Fusion center, when the value exists between the decision threshold levels (0 to 70) thereby utilizing the spectrum holes in an efficient way.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116470482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of electromyography signal using wavelet decomposition method 用小波分解方法对肌电信号进行分类
P. Bhuvaneswari, J. Kumar
Understanding cognitive responses of human brain is one of the significant research fields where electroencephalography plays vital role in analyzing brain functionality with respect to brain signals. Electromyography is another modality to understand cognitive responses with respect to muscle activation. In this research work, a data set consists of healthy and myopathy has been considered from physionet data repository. Signal has been decomposed using wavelet transformation. Features such as Shannon, spectral and approximate entropy have been extracted from decomposed signal. Support vector machine has been used for classification. Result shows that first level and third level coefficient shows better classification accuracy than other components. Spectral entropy has good classification results than Shannon and approximate entropy.
了解人脑的认知反应是一个重要的研究领域,脑电图在分析脑信号的脑功能方面起着至关重要的作用。肌电图是了解与肌肉激活有关的认知反应的另一种方式。在本研究中,从physionet数据库中考虑了健康和肌病数据集。利用小波变换对信号进行分解。从分解后的信号中提取了Shannon、谱和近似熵等特征。支持向量机已被用于分类。结果表明,一级系数和三级系数比其他成分具有更好的分类精度。谱熵比近似熵和香农熵具有更好的分类效果。
{"title":"Classification of electromyography signal using wavelet decomposition method","authors":"P. Bhuvaneswari, J. Kumar","doi":"10.1109/ICCIC.2014.7238555","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238555","url":null,"abstract":"Understanding cognitive responses of human brain is one of the significant research fields where electroencephalography plays vital role in analyzing brain functionality with respect to brain signals. Electromyography is another modality to understand cognitive responses with respect to muscle activation. In this research work, a data set consists of healthy and myopathy has been considered from physionet data repository. Signal has been decomposed using wavelet transformation. Features such as Shannon, spectral and approximate entropy have been extracted from decomposed signal. Support vector machine has been used for classification. Result shows that first level and third level coefficient shows better classification accuracy than other components. Spectral entropy has good classification results than Shannon and approximate entropy.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123489509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Quantitative approach of speckle noise reduction on synthetic Aperture radar images 合成孔径雷达图像散斑降噪的定量方法
R. V. Geetha, S. Kalaivani
Over the past three to four decades the SAR-synthetic Aperture Radar imagery has become a beneficial and important application over the optical Satellite imagery, Because of its ability to operate in all-weather condition and capability of all time data acquisition; The main issue in this imaging technique is presence of grainy noise termed as `speckle', Which will affect the overall quality of image, hence it is highly required to use effective speckle reduction techniques to suppress speckle. Various filtering techniques are available to reduce the speckle noise and to enhance the quality of the image. The main objective of this paper is to present a quantitative approach of de-specking algorithm on SAR images with adequate mathematical parametric analysis.
在过去的三、四十年中,sar合成孔径雷达成像以其全天候工作能力和全天候数据采集能力成为光学卫星成像的重要应用领域;这种成像技术的主要问题是存在被称为“斑点”的粒状噪声,这将影响图像的整体质量,因此高度要求使用有效的斑点减少技术来抑制斑点。各种滤波技术可用于降低散斑噪声和提高图像质量。本文的主要目的是在充分的数学参数分析的基础上,提出一种定量的SAR图像去斑点算法。
{"title":"Quantitative approach of speckle noise reduction on synthetic Aperture radar images","authors":"R. V. Geetha, S. Kalaivani","doi":"10.1109/ICCIC.2014.7238423","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238423","url":null,"abstract":"Over the past three to four decades the SAR-synthetic Aperture Radar imagery has become a beneficial and important application over the optical Satellite imagery, Because of its ability to operate in all-weather condition and capability of all time data acquisition; The main issue in this imaging technique is presence of grainy noise termed as `speckle', Which will affect the overall quality of image, hence it is highly required to use effective speckle reduction techniques to suppress speckle. Various filtering techniques are available to reduce the speckle noise and to enhance the quality of the image. The main objective of this paper is to present a quantitative approach of de-specking algorithm on SAR images with adequate mathematical parametric analysis.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123960490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identification and classification of fungal disease affected on agriculture/horticulture crops using image processing techniques 利用图像处理技术鉴定和分类影响农业/园艺作物的真菌病
J. Pujari, Rajesh Yakkundimath, A. S. Byadgi
This paper presents a study on the image processing techniques used to identify and classify fungal disease symptoms affected on different agriculture/horticulture crops. Many diseases exhibit general symptoms that are be caused by different pathogens produced by leaves, roots etc. Images Often do not possess sufficient details to assist in diagnosis, resulting in waste of time, misshaping the diagnostician to arrive at incorrect diagnosis. Farmers experience great difficulties and also in changing from one disease control policy to another i.e. intensive use of pesticides. Farmers are also concerned about the huge costs involved in these activities and severe loss. The cost intensity, automatic correct identification and classification of diseases based on their particular symptoms is very useful to farmers and also agriculture scientists. Early detection of diseases is a major challenge in horticulture / agriculture science. Development of proper methodology, certainly of use in these areas. Plant diseases are caused by bacteria, fungi, virus, nematodes, etc., of which fungi is the main disease causing organism. The present study has been focused on early detection and classification of fungal disease and its related symptoms.
本文介绍了用于识别和分类不同农业/园艺作物真菌病症状的图像处理技术的研究。许多疾病表现出一般症状,这些症状是由叶子、根等产生的不同病原体引起的。图像通常没有足够的细节来帮助诊断,导致时间的浪费,使诊断医师做出错误的诊断。农民在从一种疾病控制政策转变为另一种疾病控制政策(即密集使用杀虫剂)时遇到了很大的困难。农民还担心这些活动所涉及的巨大成本和严重损失。成本强度、基于特定症状的疾病自动正确识别和分类对农民和农业科学家非常有用。早期发现疾病是园艺/农业科学的一个主要挑战。开发适当的方法,当然可以在这些领域使用。植物病害是由细菌、真菌、病毒、线虫等引起的,其中真菌是主要的致病生物。目前的研究重点是真菌疾病及其相关症状的早期检测和分类。
{"title":"Identification and classification of fungal disease affected on agriculture/horticulture crops using image processing techniques","authors":"J. Pujari, Rajesh Yakkundimath, A. S. Byadgi","doi":"10.1109/ICCIC.2014.7238283","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238283","url":null,"abstract":"This paper presents a study on the image processing techniques used to identify and classify fungal disease symptoms affected on different agriculture/horticulture crops. Many diseases exhibit general symptoms that are be caused by different pathogens produced by leaves, roots etc. Images Often do not possess sufficient details to assist in diagnosis, resulting in waste of time, misshaping the diagnostician to arrive at incorrect diagnosis. Farmers experience great difficulties and also in changing from one disease control policy to another i.e. intensive use of pesticides. Farmers are also concerned about the huge costs involved in these activities and severe loss. The cost intensity, automatic correct identification and classification of diseases based on their particular symptoms is very useful to farmers and also agriculture scientists. Early detection of diseases is a major challenge in horticulture / agriculture science. Development of proper methodology, certainly of use in these areas. Plant diseases are caused by bacteria, fungi, virus, nematodes, etc., of which fungi is the main disease causing organism. The present study has been focused on early detection and classification of fungal disease and its related symptoms.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126012667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Controlling a robot using brain waves 用脑电波控制机器人
K. Sudarsanan, S. Sasipriya
The aim of this project is to control a robot using a Brain Machine Interface (BMI). The electrophysiological signals generated from the brain are used to command different devices. The signals generated can be processed and conditioned by the BMI to perform the specific work for which they are generated. The research in BMI can naturally improve the quality of life of the disabled persons. BMI gives neural response which helps controlling a robot with one's mind. The BMI used here is NeuroSky Mindwave which is a three electrode system as compared to the previous BMI's which has a complex twenty four electrodes and is very clumsy to handle. The main advantage of the BMI used in this paper is that it uses dry electrodes over the traditional wet electrodes which makes the user very uncomfortable which decreases the accuracy of the neural response recorded.
该项目的目标是使用脑机接口(BMI)控制机器人。大脑产生的电生理信号被用来指挥不同的设备。产生的信号可以由BMI进行处理和调节,以执行产生它们的特定工作。BMI的研究自然可以改善残疾人的生活质量。BMI提供神经反应,帮助人们用意念控制机器人。这里使用的BMI是NeuroSky Mindwave,它是一个三电极系统,而之前的BMI有复杂的24个电极,操作起来非常笨拙。本文中使用的BMI的主要优点是它使用干电极而不是传统的湿电极,这使得用户非常不舒服,从而降低了记录神经反应的准确性。
{"title":"Controlling a robot using brain waves","authors":"K. Sudarsanan, S. Sasipriya","doi":"10.1109/ICCIC.2014.7238512","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238512","url":null,"abstract":"The aim of this project is to control a robot using a Brain Machine Interface (BMI). The electrophysiological signals generated from the brain are used to command different devices. The signals generated can be processed and conditioned by the BMI to perform the specific work for which they are generated. The research in BMI can naturally improve the quality of life of the disabled persons. BMI gives neural response which helps controlling a robot with one's mind. The BMI used here is NeuroSky Mindwave which is a three electrode system as compared to the previous BMI's which has a complex twenty four electrodes and is very clumsy to handle. The main advantage of the BMI used in this paper is that it uses dry electrodes over the traditional wet electrodes which makes the user very uncomfortable which decreases the accuracy of the neural response recorded.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126114776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An approach to maintain the stroage of contentious image in the form of descriptor 一种以描述符形式保持争议图像存储的方法
Nilesh Kawale, Shubhangi Patil
Child pornography is increasingly faster in all over the world. This crime is regarded as being extremely harmful; its prosecution is of the highest priority for police forces and law enforcement organizations around the world. As child pornography is considered as criminal activity therefore the law of possession and distribution of Child Pornography images not only applies to regular citizens, but also to police units that they not allowed to gather and catalogue evidence for future reference. Due to this problem, this paper presents an innovative solution in such a way that it provides a system for cataloguing metadata of the evidence material and also provide fast and accurate search to recover such evidence from suspected file system. As it provides the relation between previous cases and current cases therefore it is also helpful in capturing offenders and provides protection to victims.
儿童色情在世界各地的传播速度越来越快。这种罪行被认为是极其有害的;对其进行起诉是世界各地警察部队和执法机构的最高优先事项。由于儿童色情被视为犯罪活动,因此拥有和传播儿童色情图像的法律不仅适用于普通公民,也适用于警察部队,他们不允许收集和编目证据以供将来参考。针对这一问题,本文提出了一种创新的解决方案,既提供了一个对证据材料元数据进行编目的系统,又提供了快速、准确的检索,从而从可疑的文件系统中恢复证据。由于它提供了以前的案件和当前案件之间的关系,因此它也有助于捕获罪犯并为受害者提供保护。
{"title":"An approach to maintain the stroage of contentious image in the form of descriptor","authors":"Nilesh Kawale, Shubhangi Patil","doi":"10.1109/ICCIC.2014.7238487","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238487","url":null,"abstract":"Child pornography is increasingly faster in all over the world. This crime is regarded as being extremely harmful; its prosecution is of the highest priority for police forces and law enforcement organizations around the world. As child pornography is considered as criminal activity therefore the law of possession and distribution of Child Pornography images not only applies to regular citizens, but also to police units that they not allowed to gather and catalogue evidence for future reference. Due to this problem, this paper presents an innovative solution in such a way that it provides a system for cataloguing metadata of the evidence material and also provide fast and accurate search to recover such evidence from suspected file system. As it provides the relation between previous cases and current cases therefore it is also helpful in capturing offenders and provides protection to victims.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124851428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Differential evolution approach for localization in wireless sensor networks 无线传感器网络定位的差分进化方法
R. Harikrishnan, V. Kumar, P. Ponmalar
In several traditional algorithms for optimization, the complexity of algorithm increases with expansion of system infrastructure. Resource constraint, cost and energy availability of wireless sensor network (WSN) demand a better node localization algorithm that doesn't require extra hardware as well as has better accuracy with good convergence. Sensor node localization is the ability of an individual node to determine the location information. The location information is the fundamental requirement for several WSN monitoring applications. Moreover the location information supports network management as well as enhances the performance of the network. This paper introduces differential evolution computation, gives an overview about minimization equation of wireless sensor networks localization error problem and then discusses an approach of differential evolution for minimization of localization error in wireless sensor networks.
在一些传统的优化算法中,算法的复杂度随着系统基础结构的扩展而增加。无线传感器网络(WSN)的资源约束、成本和能源可用性要求一种不需要额外硬件、精度高、收敛性好的节点定位算法。传感器节点定位是指单个节点确定位置信息的能力。位置信息是许多WSN监控应用的基本需求。此外,位置信息不仅可以支持网络管理,还可以提高网络的性能。介绍了差分进化计算,概述了无线传感器网络定位误差问题的最小化方程,讨论了一种用于无线传感器网络定位误差最小化的差分进化方法。
{"title":"Differential evolution approach for localization in wireless sensor networks","authors":"R. Harikrishnan, V. Kumar, P. Ponmalar","doi":"10.1109/ICCIC.2014.7238536","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238536","url":null,"abstract":"In several traditional algorithms for optimization, the complexity of algorithm increases with expansion of system infrastructure. Resource constraint, cost and energy availability of wireless sensor network (WSN) demand a better node localization algorithm that doesn't require extra hardware as well as has better accuracy with good convergence. Sensor node localization is the ability of an individual node to determine the location information. The location information is the fundamental requirement for several WSN monitoring applications. Moreover the location information supports network management as well as enhances the performance of the network. This paper introduces differential evolution computation, gives an overview about minimization equation of wireless sensor networks localization error problem and then discusses an approach of differential evolution for minimization of localization error in wireless sensor networks.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129391121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An approach to merging of two community subgraphs to form a community graph using graph mining techniques 一种利用图挖掘技术将两个社区子图合并形成社区图的方法
B. Rao, A. Mitra
Data mining is known for discovering frequent sub-structures. After finding certain similarity, it is easy to merge the sub-structures to form a larger structure for proper information extraction. To carry out this process, we have proposed new algorithms which merge two community subgraphs in an efficient and simpler way. For our work, we have followed graph matching technique by matching one-to-one correspondence. The three algorithms that have been proposed in this paper are, the first algorithm explains about finding the order of merged communities and to make available of initial form of merged community matrix. The second algorithm explains about creation of adjacency matrix community graph and the third algorithm uses the adjacency matrices of community graph and explains about creation of merged community adjacency matrix. Further, we have verified our proposed approach by implementing it. An appropriate example with the set of input and obtained outputs has been explained. The obtained results are satisfactory. The results were obtained after execution of our programs. Snap-shot of the program output have been included in the paper.
数据挖掘以发现频繁的子结构而闻名。在找到一定的相似性后,很容易将子结构合并形成一个更大的结构,以便进行适当的信息提取。为了实现这一过程,我们提出了一种新的算法,以一种高效和简单的方式合并两个社区子图。在我们的工作中,我们通过匹配一对一的对应关系来遵循图匹配技术。本文提出的三种算法是:第一种算法解释了如何找到合并社团的顺序,并给出合并社团矩阵的初始形式。第二种算法解释邻接矩阵社区图的创建,第三种算法使用社区图的邻接矩阵并解释合并社区邻接矩阵的创建。此外,我们已通过实施我们所提议的方法来验证它。已经解释了一个适当的示例,其中包含一组输入和获得的输出。所得结果令人满意。在程序执行后得到了结果。本文还提供了程序输出的快照。
{"title":"An approach to merging of two community subgraphs to form a community graph using graph mining techniques","authors":"B. Rao, A. Mitra","doi":"10.1109/ICCIC.2014.7238392","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238392","url":null,"abstract":"Data mining is known for discovering frequent sub-structures. After finding certain similarity, it is easy to merge the sub-structures to form a larger structure for proper information extraction. To carry out this process, we have proposed new algorithms which merge two community subgraphs in an efficient and simpler way. For our work, we have followed graph matching technique by matching one-to-one correspondence. The three algorithms that have been proposed in this paper are, the first algorithm explains about finding the order of merged communities and to make available of initial form of merged community matrix. The second algorithm explains about creation of adjacency matrix community graph and the third algorithm uses the adjacency matrices of community graph and explains about creation of merged community adjacency matrix. Further, we have verified our proposed approach by implementing it. An appropriate example with the set of input and obtained outputs has been explained. The obtained results are satisfactory. The results were obtained after execution of our programs. Snap-shot of the program output have been included in the paper.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129424298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A vary approach to face recognition veritable mechanisms for Android mobile against spoofing 一种针对Android移动设备的人脸识别机制
V. Ravibabu, N. Krishnan
Authentication is the process of identifying and verifying someone, who it claims to be known as user. The increasing popularity of smart mobile phones provides user to store personal data and user information. It is necessary to ensure the confidential access of the mobile phone to its user. Currently, Face Unlock is the biometric user authenticating system widely available in mobile phone. However, user's face image for authentication could not be considered as a secure. Since we faced the problem of 2D face spoofing attacks by displaying user photo in front of the camera. In this paper, we analyze on current methods of face recognition for authentication on mobile phone and present a novel approach for Face Recognition system to be more secure and convenient use. We perform by acquiring with various angular of face information from user and analyze the liveness detection of user by comparing with biometric template of data acquired in a database. The results to the user face recognition are promising in liveness detection and reliable against spoofing.
身份验证是识别和验证自称为用户的人的过程。智能手机的日益普及为用户提供了存储个人数据和用户信息的工具。有必要确保手机对其用户的机密访问。人脸解锁是目前广泛应用于手机的生物识别用户认证系统。然而,用户的人脸图像进行身份验证不能被认为是安全的。由于我们面临着通过在相机前显示用户照片来进行2D人脸欺骗攻击的问题。本文对现有的手机人脸识别认证方法进行了分析,提出了一种新的方法,使手机人脸识别系统更加安全、方便使用。我们从用户身上获取不同角度的面部信息,并通过与数据库中获取的数据的生物特征模板进行比较,分析用户的活度检测。结果表明,用户人脸识别在动态检测和抗欺骗方面具有良好的应用前景。
{"title":"A vary approach to face recognition veritable mechanisms for Android mobile against spoofing","authors":"V. Ravibabu, N. Krishnan","doi":"10.1109/ICCIC.2014.7238290","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238290","url":null,"abstract":"Authentication is the process of identifying and verifying someone, who it claims to be known as user. The increasing popularity of smart mobile phones provides user to store personal data and user information. It is necessary to ensure the confidential access of the mobile phone to its user. Currently, Face Unlock is the biometric user authenticating system widely available in mobile phone. However, user's face image for authentication could not be considered as a secure. Since we faced the problem of 2D face spoofing attacks by displaying user photo in front of the camera. In this paper, we analyze on current methods of face recognition for authentication on mobile phone and present a novel approach for Face Recognition system to be more secure and convenient use. We perform by acquiring with various angular of face information from user and analyze the liveness detection of user by comparing with biometric template of data acquired in a database. The results to the user face recognition are promising in liveness detection and reliable against spoofing.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128541108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2014 IEEE International Conference on Computational Intelligence and Computing Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1