首页 > 最新文献

2014 International Conference on Information Systems and Computer Networks (ISCON)最新文献

英文 中文
Hybrid data fusion using software agents for an event driven application of wireless sensor networks 基于软件代理的无线传感器网络事件驱动应用的混合数据融合
Pub Date : 2014-03-01 DOI: 10.1109/ICISCON.2014.6965228
P. Sethi, D. Juneja, N. Chauhan
Data Fusion using software agents in WSNs is a naive area of interest for researchers belonging to the community of sensors as well as software agents. Data Fusion is one of the most desired processes while dealing with information processing in wireless sensor networks as the requirement of increased lifetime of network, reduced and balanced energy consumption still pre-dominates all other factors affecting the performance of sensors deployed in nondeterministic areas. In fact, data fusion serves as a solution to very common problem known as sensor hole problem. Although there exist various data fusion strategies to address the issue, but all of these suffer from one or the other drawback. Hence, this paper initially begins with a comparative overview of various data fusion strategies exploring the exploitation of software agents and later proposes a hybrid approach integrating the pros of both parallel and serial fusion approaches for achieving the same.
在wsn中使用软件代理进行数据融合是传感器和软件代理研究人员感兴趣的一个幼稚领域。数据融合是无线传感器网络信息处理中最受欢迎的技术之一,因为在不确定区域部署的传感器对网络寿命的延长、能耗的降低和平衡的要求仍然是影响其性能的主要因素。事实上,数据融合是解决传感器孔问题的一种方法。虽然存在各种数据融合策略来解决这个问题,但所有这些策略都有这样或那样的缺点。因此,本文首先对各种数据融合策略进行比较概述,探索软件代理的利用,然后提出一种混合方法,集成并行和串行融合方法的优点,以实现相同的目标。
{"title":"Hybrid data fusion using software agents for an event driven application of wireless sensor networks","authors":"P. Sethi, D. Juneja, N. Chauhan","doi":"10.1109/ICISCON.2014.6965228","DOIUrl":"https://doi.org/10.1109/ICISCON.2014.6965228","url":null,"abstract":"Data Fusion using software agents in WSNs is a naive area of interest for researchers belonging to the community of sensors as well as software agents. Data Fusion is one of the most desired processes while dealing with information processing in wireless sensor networks as the requirement of increased lifetime of network, reduced and balanced energy consumption still pre-dominates all other factors affecting the performance of sensors deployed in nondeterministic areas. In fact, data fusion serves as a solution to very common problem known as sensor hole problem. Although there exist various data fusion strategies to address the issue, but all of these suffer from one or the other drawback. Hence, this paper initially begins with a comparative overview of various data fusion strategies exploring the exploitation of software agents and later proposes a hybrid approach integrating the pros of both parallel and serial fusion approaches for achieving the same.","PeriodicalId":193007,"journal":{"name":"2014 International Conference on Information Systems and Computer Networks (ISCON)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131226793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Estimation in agile environment using resistance factors 基于阻力因子的敏捷环境估计
Pub Date : 2014-03-01 DOI: 10.1109/ICISCON.2014.6965219
R. Popli, N. Chauhan
The estimation of cost and effort is a critical task in Agile environment because of its dynamic nature. It has been observed that the current Agile methods mostly depends on historical data of project for estimation of cost, size, effort and duration and these methods are not efficient in absence of historical data. So there is need of an algorithmic method, which can calculate cost and effort of the project. In our previous work [2] some project-related factors and people-related factors were considered on the basis of which size as well as duration of the project was calculated. However, several other resistance factors may also affects estimation in the Agile dynamic environment. In this work an Algorithmic estimation method is being proposed that calculates more accurate release date, cost, effort and duration for the project by considering various factors. The effectiveness and feasibility of the proposed algorithm has been shown by considering two cases in which different levels of factors are taken and compared.
由于敏捷环境的动态性,成本和工作量的估算是一项关键任务。据观察,目前的敏捷方法大多依赖于项目的历史数据来估算成本、规模、工作量和持续时间,这些方法在缺乏历史数据的情况下效率低下。因此,需要一种能够计算工程成本和工作量的算法方法。在我们之前的工作[2]中,我们考虑了一些与项目相关的因素和与人相关的因素,并以此为基础计算了项目的规模和持续时间。然而,其他几个阻力因素也可能影响敏捷动态环境中的评估。在这项工作中,提出了一种算法估计方法,通过考虑各种因素来计算更准确的项目发布日期、成本、工作量和持续时间。通过考虑两种不同程度的因素,并对其进行比较,证明了该算法的有效性和可行性。
{"title":"Estimation in agile environment using resistance factors","authors":"R. Popli, N. Chauhan","doi":"10.1109/ICISCON.2014.6965219","DOIUrl":"https://doi.org/10.1109/ICISCON.2014.6965219","url":null,"abstract":"The estimation of cost and effort is a critical task in Agile environment because of its dynamic nature. It has been observed that the current Agile methods mostly depends on historical data of project for estimation of cost, size, effort and duration and these methods are not efficient in absence of historical data. So there is need of an algorithmic method, which can calculate cost and effort of the project. In our previous work [2] some project-related factors and people-related factors were considered on the basis of which size as well as duration of the project was calculated. However, several other resistance factors may also affects estimation in the Agile dynamic environment. In this work an Algorithmic estimation method is being proposed that calculates more accurate release date, cost, effort and duration for the project by considering various factors. The effectiveness and feasibility of the proposed algorithm has been shown by considering two cases in which different levels of factors are taken and compared.","PeriodicalId":193007,"journal":{"name":"2014 International Conference on Information Systems and Computer Networks (ISCON)","volume":"378 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124720341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Robust watermarking technique using Arnold's transformation and RSA in discrete wavelets 基于Arnold变换和RSA的离散小波鲁棒水印技术
Pub Date : 2014-03-01 DOI: 10.1109/ICISCON.2014.6965223
Bidyut Jyoti Saha, C. Pradhan, K. Kabi, A. K. Bisoi
Copyright protection is a major concern in digital data transmission over public channel. For copyright protection, watermarking technique is extensively used. A robust watermarking scheme using Arnold's transformation and RSA algorithm in the DWT domain has been proposed in our paper. The combined encryption has been taken to provide more security to the watermark before the embedding phase. The PSNR value shows the difference between original cover and embedded cover is minimal. Similarly, NC values show the robustness and resistance capability of the proposed technique from the common attacks such as JPEG compression, scaling etc. Thus, this combined version of Arnold's transformation and RSA algorithm can be used in case of higher security requirement of the watermark signal.
版权保护是公共信道上数字数据传输的一个重要问题。在版权保护方面,水印技术得到了广泛的应用。本文提出了一种基于Arnold变换和RSA算法的DWT域鲁棒水印方案。为了保证水印在嵌入前的安全性,采用了组合加密。PSNR值显示原始覆盖物与嵌入覆盖物之间的差异最小。同样,NC值显示了该技术对JPEG压缩、缩放等常见攻击的鲁棒性和抵抗能力。因此,在对水印信号的安全性要求较高的情况下,可以使用Arnold变换和RSA算法的组合版本。
{"title":"Robust watermarking technique using Arnold's transformation and RSA in discrete wavelets","authors":"Bidyut Jyoti Saha, C. Pradhan, K. Kabi, A. K. Bisoi","doi":"10.1109/ICISCON.2014.6965223","DOIUrl":"https://doi.org/10.1109/ICISCON.2014.6965223","url":null,"abstract":"Copyright protection is a major concern in digital data transmission over public channel. For copyright protection, watermarking technique is extensively used. A robust watermarking scheme using Arnold's transformation and RSA algorithm in the DWT domain has been proposed in our paper. The combined encryption has been taken to provide more security to the watermark before the embedding phase. The PSNR value shows the difference between original cover and embedded cover is minimal. Similarly, NC values show the robustness and resistance capability of the proposed technique from the common attacks such as JPEG compression, scaling etc. Thus, this combined version of Arnold's transformation and RSA algorithm can be used in case of higher security requirement of the watermark signal.","PeriodicalId":193007,"journal":{"name":"2014 International Conference on Information Systems and Computer Networks (ISCON)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127840252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A novel statistical and linguistic features based technique for keyword extraction 一种新的基于统计和语言特征的关键字提取技术
Pub Date : 2014-03-01 DOI: 10.1109/ICISCON.2014.6965218
Ashlesha Gupta, A. Dixit, A. Sharma
WWW is a decentralized, distributed and heterogeneous information resource. With increased availability of information through WWW, it is very difficult to read all documents to retrieve the desired results; therefore there is a need of summarization methods which can help in providing contents of a given document in a precise manner. Keywords of a document may provide a compact representation of a document's content. As a result various algorithms and systems intended to carry out automatic keywords extraction have been proposed in the recent past. However, the existing solutions require either training models or domain specific information for automatic keyword extraction. To cater to these shortcomings an innovative hybrid approach for automatic keyword extraction using statistical and linguistic features of a document has been proposed. This statistical and linguistic technique based keyword extraction works on an individual document without any prior parameter change and takes full advantage of all the features of the document to extract the keywords. The extracted keywords can than assist in domain specific indexing. The performance of the proposed method as compared to existing Keyword Extraction tools such as Dream web design etc. in terms of Precision and Recall are also presented in this paper.
WWW是一种分散的、分布式的、异构的信息资源。随着WWW信息可用性的增加,阅读所有文档以检索所需结果变得非常困难;因此,需要一种能够帮助以精确的方式提供给定文件内容的摘要方法。文档的关键字可以提供文档内容的紧凑表示。因此,在最近的过去已经提出了各种旨在进行自动关键字提取的算法和系统。然而,现有的解决方案要么需要训练模型,要么需要特定领域的信息来自动提取关键字。为了克服这些缺点,提出了一种利用统计和语言特征自动提取关键字的创新混合方法。这种基于统计和语言技术的关键字提取在没有任何先前参数更改的情况下对单个文档进行提取,并充分利用文档的所有特征来提取关键字。提取的关键字可以帮助特定领域的索引。本文还比较了该方法与现有关键字提取工具(如Dream web design等)在查全率和查全率方面的性能。
{"title":"A novel statistical and linguistic features based technique for keyword extraction","authors":"Ashlesha Gupta, A. Dixit, A. Sharma","doi":"10.1109/ICISCON.2014.6965218","DOIUrl":"https://doi.org/10.1109/ICISCON.2014.6965218","url":null,"abstract":"WWW is a decentralized, distributed and heterogeneous information resource. With increased availability of information through WWW, it is very difficult to read all documents to retrieve the desired results; therefore there is a need of summarization methods which can help in providing contents of a given document in a precise manner. Keywords of a document may provide a compact representation of a document's content. As a result various algorithms and systems intended to carry out automatic keywords extraction have been proposed in the recent past. However, the existing solutions require either training models or domain specific information for automatic keyword extraction. To cater to these shortcomings an innovative hybrid approach for automatic keyword extraction using statistical and linguistic features of a document has been proposed. This statistical and linguistic technique based keyword extraction works on an individual document without any prior parameter change and takes full advantage of all the features of the document to extract the keywords. The extracted keywords can than assist in domain specific indexing. The performance of the proposed method as compared to existing Keyword Extraction tools such as Dream web design etc. in terms of Precision and Recall are also presented in this paper.","PeriodicalId":193007,"journal":{"name":"2014 International Conference on Information Systems and Computer Networks (ISCON)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116868634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A genetic algorithm approach to release planning in agile environment 敏捷环境下发布计划的遗传算法研究
Pub Date : 2014-03-01 DOI: 10.1109/ICISCON.2014.6965230
Arvind Kumar, Reetika Nagar, A. Baghel
Agile software development methodology, got importance in recent years. The agile philosophy promotes incremental and iterative design and implementation. Each iterations, delivers one or more product features. Release planning is a main activity in any of Agile approach. Main factors that need to be considered are the technical precedence inherent in the requirements; the feature's business value perceived by project stake holders, team capacity and required effort to complete the requirement. There are multiple tools available in industry to manage project but they are lacking to provide planning while considering all these factors. Genetic algorithms (GA) have arisen from concepts, introduced from the natural process of biological evolution. GA uses selection, crossover and mutation to evolve a solution to the given problem. In this paper an attempt has been made to formalize the release planning. Then an approach is proposed to do Release planning using genetic algorithms.
敏捷软件开发方法,近年来得到重视。敏捷哲学提倡增量式和迭代式的设计和实现。每个迭代交付一个或多个产品特性。发布计划是任何敏捷方法中的主要活动。需要考虑的主要因素是要求所固有的技术优先性;项目涉众感知到的功能的业务价值、团队能力和完成需求所需的努力。在工业中有多种可用的工具来管理项目,但它们缺乏在考虑所有这些因素时提供规划。遗传算法(GA)是从生物进化的自然过程中引入的概念。遗传算法使用选择、交叉和变异来进化出给定问题的解决方案。本文试图将发布计划形式化。然后提出了一种利用遗传算法进行放行计划的方法。
{"title":"A genetic algorithm approach to release planning in agile environment","authors":"Arvind Kumar, Reetika Nagar, A. Baghel","doi":"10.1109/ICISCON.2014.6965230","DOIUrl":"https://doi.org/10.1109/ICISCON.2014.6965230","url":null,"abstract":"Agile software development methodology, got importance in recent years. The agile philosophy promotes incremental and iterative design and implementation. Each iterations, delivers one or more product features. Release planning is a main activity in any of Agile approach. Main factors that need to be considered are the technical precedence inherent in the requirements; the feature's business value perceived by project stake holders, team capacity and required effort to complete the requirement. There are multiple tools available in industry to manage project but they are lacking to provide planning while considering all these factors. Genetic algorithms (GA) have arisen from concepts, introduced from the natural process of biological evolution. GA uses selection, crossover and mutation to evolve a solution to the given problem. In this paper an attempt has been made to formalize the release planning. Then an approach is proposed to do Release planning using genetic algorithms.","PeriodicalId":193007,"journal":{"name":"2014 International Conference on Information Systems and Computer Networks (ISCON)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134371118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multilanguage voice dictionary for ubiquitous environment 多语言语音字典,无处不在的环境
Pub Date : 2014-03-01 DOI: 10.1109/ICISCON.2014.6965216
Ashutosh Rai, U. Shrawankar
Languages in India play an important role as a communication medium. As the person is traveling from one state to another s/he faces difficulty to communicate in other language with other community. So, the Multilanguage Voice Dictionary is applying for developing Indian language Machine Translation system. This application comprises of two algorithms. The word based translation model with the rule-based model is used as the main technique. The word based translation model is implementing for verb and other type of words. The rule based method is particularly used for Out Of Vocabulary (OOV) words which have to be used as it can't be translated. This is performing by extending a lexicon and writing a set of sample words. The translation is doing through templates associated with the lexicon with the word in other language. The speech processing such as input and output in voice form is to be implemented using speech simulator. For the alphabets of a language, the language word library is using in this application.
在印度,语言作为交流媒介发挥着重要作用。当一个人从一个州旅行到另一个州时,他/她面临着用其他语言与其他社区交流的困难。因此,多语言语音词典正在申请开发印度语言机器翻译系统。该应用程序由两个算法组成。采用基于词的翻译模型和基于规则的翻译模型作为主要技术。基于词的翻译模型是针对动词和其他类型的词实现的。基于规则的方法特别适用于由于无法翻译而不得不使用的Out Of Vocabulary (OOV)单词。这是通过扩展词典并编写一组示例单词来实现的。翻译是通过与词汇和其他语言中的单词相关联的模板来完成的。使用语音模拟器实现语音形式的输入和输出等语音处理。对于一种语言的字母,在这个应用程序中使用的语言词库。
{"title":"Multilanguage voice dictionary for ubiquitous environment","authors":"Ashutosh Rai, U. Shrawankar","doi":"10.1109/ICISCON.2014.6965216","DOIUrl":"https://doi.org/10.1109/ICISCON.2014.6965216","url":null,"abstract":"Languages in India play an important role as a communication medium. As the person is traveling from one state to another s/he faces difficulty to communicate in other language with other community. So, the Multilanguage Voice Dictionary is applying for developing Indian language Machine Translation system. This application comprises of two algorithms. The word based translation model with the rule-based model is used as the main technique. The word based translation model is implementing for verb and other type of words. The rule based method is particularly used for Out Of Vocabulary (OOV) words which have to be used as it can't be translated. This is performing by extending a lexicon and writing a set of sample words. The translation is doing through templates associated with the lexicon with the word in other language. The speech processing such as input and output in voice form is to be implemented using speech simulator. For the alphabets of a language, the language word library is using in this application.","PeriodicalId":193007,"journal":{"name":"2014 International Conference on Information Systems and Computer Networks (ISCON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125941044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectrum sensing for cognitive radio using quantized data fusion and Hidden Markov model 基于量化数据融合和隐马尔可夫模型的认知无线电频谱感知
Pub Date : 2014-03-01 DOI: 10.1109/ICISCON.2014.6965233
A. Mukherjee, Anand Maheshwari, Satyabrata Maiti, A. Datta
Most of the radio frequency spectrum is not being utilized efficiently. The utilization can be improved by including unlicensed users to exploit the radio frequency spectrum by not creating any interference to the primary users. For Cognitive Radio, the main issue is to sense and then identify all spectrum holes present in the environment. In this paper, we are proposing the Quantized data fusion sensing which is applied through the Hidden Markov Model (HMM). It does not need any kind of synchronizing signals from the Primary user as well as with the secondary transmitter in a working condition. Simulation results with error rates are improved by the activity of Primary User (PU) and have been presented.
大多数无线电频谱没有得到有效利用。通过不对主要用户产生任何干扰,包括未经许可的用户来利用无线电频谱,可以改进利用。对于认知无线电,主要问题是感知并识别环境中存在的所有频谱漏洞。本文提出了一种基于隐马尔可夫模型的量化数据融合感知方法。它不需要来自主用户的任何类型的同步信号,也不需要与处于工作状态的辅助发射机同步信号。通过主用户(PU)的活动改善了错误率的仿真结果。
{"title":"Spectrum sensing for cognitive radio using quantized data fusion and Hidden Markov model","authors":"A. Mukherjee, Anand Maheshwari, Satyabrata Maiti, A. Datta","doi":"10.1109/ICISCON.2014.6965233","DOIUrl":"https://doi.org/10.1109/ICISCON.2014.6965233","url":null,"abstract":"Most of the radio frequency spectrum is not being utilized efficiently. The utilization can be improved by including unlicensed users to exploit the radio frequency spectrum by not creating any interference to the primary users. For Cognitive Radio, the main issue is to sense and then identify all spectrum holes present in the environment. In this paper, we are proposing the Quantized data fusion sensing which is applied through the Hidden Markov Model (HMM). It does not need any kind of synchronizing signals from the Primary user as well as with the secondary transmitter in a working condition. Simulation results with error rates are improved by the activity of Primary User (PU) and have been presented.","PeriodicalId":193007,"journal":{"name":"2014 International Conference on Information Systems and Computer Networks (ISCON)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121573984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance analysis of hierarchical agglomerative clustering in a wireless sensor network using quantitative data 基于定量数据的无线传感器网络分层聚类性能分析
Pub Date : 2014-03-01 DOI: 10.1109/ICISCON.2014.6965226
T. Jain, D. Saini, S. Bhooshan
Clustering is a useful mechanism in wireless sensor networks which helps to cope with scalability and data transmission problems. The motivation of our research is to provide efficient clustering using Hierarchical agglomerative clustering (HAC). If the distance between the sensing nodes is calculated using their location then it's quantitative HAC. This paper compares the various agglomerative clustering techniques applied in a wireless sensor network using the quantitative data. The simulations are done in MATLAB and the comparisons are made between the different protocols using dendrograms.
聚类是无线传感器网络中一种有用的机制,有助于解决可扩展性和数据传输问题。我们研究的动机是利用层次聚类(HAC)提供高效的聚类。如果感知节点之间的距离是使用它们的位置计算的,那么它就是定量的HAC。本文用定量数据比较了无线传感器网络中应用的各种聚类技术。在MATLAB中进行了仿真,并利用树形图对不同协议进行了比较。
{"title":"Performance analysis of hierarchical agglomerative clustering in a wireless sensor network using quantitative data","authors":"T. Jain, D. Saini, S. Bhooshan","doi":"10.1109/ICISCON.2014.6965226","DOIUrl":"https://doi.org/10.1109/ICISCON.2014.6965226","url":null,"abstract":"Clustering is a useful mechanism in wireless sensor networks which helps to cope with scalability and data transmission problems. The motivation of our research is to provide efficient clustering using Hierarchical agglomerative clustering (HAC). If the distance between the sensing nodes is calculated using their location then it's quantitative HAC. This paper compares the various agglomerative clustering techniques applied in a wireless sensor network using the quantitative data. The simulations are done in MATLAB and the comparisons are made between the different protocols using dendrograms.","PeriodicalId":193007,"journal":{"name":"2014 International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116608522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Comparative study of image encryption using 2D chaotic map 二维混沌映射图像加密的比较研究
Pub Date : 2014-03-01 DOI: 10.1109/ICISCON.2014.6965227
Kunal Kumar Kabi, C. Pradhan, Bidyut Jyoti Saha, Ajay Kumar Bisoi
Securing digital image during transmission is very much important in the current era. For this purpose, cryptographic techniques as well as chaotic maps can be applicable. In this paper, we have given a detailed study of the image encryption using different 2D chaotic maps such as Arnold 2D cat map, Baker map, Henon map, Cross chaos map and 2D logistic map. The security analysis of these techniques has been done by the help of NPCR (Number of Pixels Change Rate) and UACI (Unified Average Changing Intensity) values. The experimental results of NPCR and UACI show the effectiveness of the encryption processes of different techniques.
在当今时代,数字图像在传输过程中的安全是非常重要的。为此,密码技术和混沌映射都可以适用。在本文中,我们详细研究了使用Arnold 2D cat图、Baker图、Henon图、Cross混沌图和2D logistic图等不同的二维混沌图进行图像加密。利用NPCR (Number of Pixels Change Rate)和UACI (Unified Average Change Intensity)值对这些技术进行了安全性分析。NPCR和UACI的实验结果表明了不同技术加密过程的有效性。
{"title":"Comparative study of image encryption using 2D chaotic map","authors":"Kunal Kumar Kabi, C. Pradhan, Bidyut Jyoti Saha, Ajay Kumar Bisoi","doi":"10.1109/ICISCON.2014.6965227","DOIUrl":"https://doi.org/10.1109/ICISCON.2014.6965227","url":null,"abstract":"Securing digital image during transmission is very much important in the current era. For this purpose, cryptographic techniques as well as chaotic maps can be applicable. In this paper, we have given a detailed study of the image encryption using different 2D chaotic maps such as Arnold 2D cat map, Baker map, Henon map, Cross chaos map and 2D logistic map. The security analysis of these techniques has been done by the help of NPCR (Number of Pixels Change Rate) and UACI (Unified Average Changing Intensity) values. The experimental results of NPCR and UACI show the effectiveness of the encryption processes of different techniques.","PeriodicalId":193007,"journal":{"name":"2014 International Conference on Information Systems and Computer Networks (ISCON)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128866536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Using parallel approach in pre-processing to improve frequent pattern growth algorithm 在预处理中采用并行方法改进频繁模式增长算法
Pub Date : 2014-03-01 DOI: 10.1109/ICISCON.2014.6965221
S. Rathi, C. A. Dhote
Mining frequent itemset is an important step in association rule mining process. In this paper we are applying a parallel approach in the pre-processing step itself to make the dataset favorable for mining frequent itemsets and hence improve the speed and computation power. Due to data explosion, it is necessary to develop a system that can handle scalable data. Many efficient sequential and parallel algorithms were proposed in the recent years. We first explore some major algorithms proposed for mining frequent itemsets. Sorting the dataset in the pre-processing step parallely and pruning the infrequent itemsets improves the efficiency of our algorithm. Due to the drastic improvement in computer architectures and computer performance over the years, high performance computing is gaining importance and we are using one such technique in our implementation: CUDA.
频繁项集的挖掘是关联规则挖掘过程中的一个重要步骤。在本文中,我们在预处理步骤本身采用并行方法,使数据集有利于挖掘频繁项集,从而提高速度和计算能力。由于数据爆炸,有必要开发一种能够处理可扩展数据的系统。近年来,人们提出了许多高效的顺序和并行算法。我们首先探讨了挖掘频繁项集的一些主要算法。在预处理步骤中对数据集进行并行排序,并对不频繁的项集进行修剪,提高了算法的效率。由于多年来计算机体系结构和计算机性能的急剧改进,高性能计算变得越来越重要,我们在实现中使用了一种这样的技术:CUDA。
{"title":"Using parallel approach in pre-processing to improve frequent pattern growth algorithm","authors":"S. Rathi, C. A. Dhote","doi":"10.1109/ICISCON.2014.6965221","DOIUrl":"https://doi.org/10.1109/ICISCON.2014.6965221","url":null,"abstract":"Mining frequent itemset is an important step in association rule mining process. In this paper we are applying a parallel approach in the pre-processing step itself to make the dataset favorable for mining frequent itemsets and hence improve the speed and computation power. Due to data explosion, it is necessary to develop a system that can handle scalable data. Many efficient sequential and parallel algorithms were proposed in the recent years. We first explore some major algorithms proposed for mining frequent itemsets. Sorting the dataset in the pre-processing step parallely and pruning the infrequent itemsets improves the efficiency of our algorithm. Due to the drastic improvement in computer architectures and computer performance over the years, high performance computing is gaining importance and we are using one such technique in our implementation: CUDA.","PeriodicalId":193007,"journal":{"name":"2014 International Conference on Information Systems and Computer Networks (ISCON)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133335275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2014 International Conference on Information Systems and Computer Networks (ISCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1