首页 > 最新文献

International Conference & Workshop on Emerging Trends in Technology最新文献

英文 中文
Secure authentication using dynamic virtual keyboard layout 使用动态虚拟键盘布局的安全认证
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980087
Mayank Agarwal, Mahendra Mehra, Renuka Pawar, D. Shah
Virtual Keyboard authentication has helped users to protect their username and passwords from being captured by key loggers, spyware and malicious bots. However Virtual Keyboard still suffers from numerous other fallacies that an attacker can take advantage of. These include click based screenshot capturing, over the shoulder spoofing and co-ordinate position noting. To overcome these drawbacks, we have designed a virtual keyboard that is generated dynamically each time the user access the web site. Also after each click event of the user the arrangement of the keys of the virtual keyboard are shuffled. The position of the keys is hidden so that a user standing behind may not be able to see the pressed key. Our proposed approach makes the usage of virtual keyboard even more secure for users and makes it tougher for malware programs to capture authentication details.
虚拟键盘认证帮助用户保护他们的用户名和密码不被键盘记录器、间谍软件和恶意机器人捕获。然而,虚拟键盘仍然存在许多其他的错误,攻击者可以利用这些错误。这些包括基于点击的截图捕捉,过肩欺骗和坐标位置标记。为了克服这些缺点,我们设计了一个虚拟键盘,它在用户每次访问网站时动态生成。在用户的每次点击事件之后,虚拟键盘的键的排列也会被打乱。键的位置是隐藏的,因此站在后面的用户可能无法看到按下的键。我们提出的方法使虚拟键盘的使用对用户来说更加安全,并且使恶意软件程序更难捕获身份验证细节。
{"title":"Secure authentication using dynamic virtual keyboard layout","authors":"Mayank Agarwal, Mahendra Mehra, Renuka Pawar, D. Shah","doi":"10.1145/1980022.1980087","DOIUrl":"https://doi.org/10.1145/1980022.1980087","url":null,"abstract":"Virtual Keyboard authentication has helped users to protect their username and passwords from being captured by key loggers, spyware and malicious bots. However Virtual Keyboard still suffers from numerous other fallacies that an attacker can take advantage of. These include click based screenshot capturing, over the shoulder spoofing and co-ordinate position noting. To overcome these drawbacks, we have designed a virtual keyboard that is generated dynamically each time the user access the web site. Also after each click event of the user the arrangement of the keys of the virtual keyboard are shuffled. The position of the keys is hidden so that a user standing behind may not be able to see the pressed key. Our proposed approach makes the usage of virtual keyboard even more secure for users and makes it tougher for malware programs to capture authentication details.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116047473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Educator's feedback through expression recognition 教育者通过表情识别的反馈
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980407
Aprajita Singh
Evaluating educator's effectiveness is important in nearly every institution of higher education. Assessing the effectiveness with which various functions are performed is essential to a variety of important administration recommendations and decisions. Assessing a faculty member's teaching capabilities constitutes a serious challenge. A facial expression results from one or more motions or positions of the muscles of the face. These movements convey the emotional state of the individual to observers. Facial expression analysis refers to computer systems that attempt to automatically analyze and recognize facial motions from visual information. We are exploring the potential of technology enabled feedback system to provide authentic feedback of the teacher while teaching. Images are captured in the class and feedback is generated by studying the expressions of the students in the class in non intrusive technique. This paper proposes a framework for evaluating the faculty member's feedback through facial expression analysis of the students. It reports on the progress made in the development of a facial expression analysis component for assessing the feedback of teacher in a classroom. Digital camera is used to grab the image of the learner and signal processing techniques such as Wavelet and ANN are employed to extract facial expressions. We have suggested a framework for detecting learner's face and locating permanent facial features such as eyebrow, eyes, and mouth. Facial expression analysis is performed based on both permanent and transient facial features in a nearly frontal-view face image sequence.
评估教育工作者的工作效能是几乎每一所高等教育机构的重要工作。评估执行各种职能的有效性对于各种重要的行政建议和决定至关重要。评估教师的教学能力是一项严峻的挑战。面部表情是由面部肌肉的一个或多个动作或位置引起的。这些动作向观察者传达了个体的情绪状态。面部表情分析是指试图从视觉信息中自动分析和识别面部动作的计算机系统。我们正在探索技术反馈系统的潜力,以便在教师教学时提供真实的反馈。在课堂上捕捉图像,通过非侵入式技术研究课堂上学生的表情,产生反馈。本文提出了一个通过分析学生的面部表情来评估教师反馈的框架。报告了用于评估教师课堂反馈的面部表情分析组件的开发进展。使用数码相机捕捉学习器的图像,并使用小波和人工神经网络等信号处理技术提取面部表情。我们提出了一个框架,用于检测学习者的面部和定位永久的面部特征,如眉毛,眼睛和嘴。在近正面图像序列中,基于永久和瞬态面部特征进行面部表情分析。
{"title":"Educator's feedback through expression recognition","authors":"Aprajita Singh","doi":"10.1145/1980022.1980407","DOIUrl":"https://doi.org/10.1145/1980022.1980407","url":null,"abstract":"Evaluating educator's effectiveness is important in nearly every institution of higher education. Assessing the effectiveness with which various functions are performed is essential to a variety of important administration recommendations and decisions. Assessing a faculty member's teaching capabilities constitutes a serious challenge. A facial expression results from one or more motions or positions of the muscles of the face. These movements convey the emotional state of the individual to observers. Facial expression analysis refers to computer systems that attempt to automatically analyze and recognize facial motions from visual information. We are exploring the potential of technology enabled feedback system to provide authentic feedback of the teacher while teaching. Images are captured in the class and feedback is generated by studying the expressions of the students in the class in non intrusive technique. This paper proposes a framework for evaluating the faculty member's feedback through facial expression analysis of the students. It reports on the progress made in the development of a facial expression analysis component for assessing the feedback of teacher in a classroom. Digital camera is used to grab the image of the learner and signal processing techniques such as Wavelet and ANN are employed to extract facial expressions. We have suggested a framework for detecting learner's face and locating permanent facial features such as eyebrow, eyes, and mouth. Facial expression analysis is performed based on both permanent and transient facial features in a nearly frontal-view face image sequence.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116580227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bayesian networks in probabilistic relational data mining 概率关系数据挖掘中的贝叶斯网络
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980136
Thakur Village
Bayesian Networks (BN) have been considered to be one of the most widely used probabilistic data modelling and propositional uncertainty processing paradigms. They exploit the underlying conditional independences in the domain by providing compact graphical representations for high-dimensional joint distributions. A BN consists of two components - a directed acyclic graph whose nodes correspond to a pre-specified set of attributes or random variables; and a set of conditional probability distributions (CPDs) over the attributes. The techniques that have been developed for learning BNs from data have been shown to be remarkably effective for some data mining problems, especially probabilistic descriptive data mining.
贝叶斯网络被认为是应用最广泛的概率数据建模和命题不确定性处理范式之一。他们通过为高维联合分布提供紧凑的图形表示来利用域中潜在的条件独立性。BN由两个部分组成:一个有向无环图,其节点对应于预先指定的一组属性或随机变量;以及属性上的一组条件概率分布(cpd)。已经开发的用于从数据中学习bn的技术已被证明对某些数据挖掘问题非常有效,特别是概率描述性数据挖掘。
{"title":"Bayesian networks in probabilistic relational data mining","authors":"Thakur Village","doi":"10.1145/1980022.1980136","DOIUrl":"https://doi.org/10.1145/1980022.1980136","url":null,"abstract":"Bayesian Networks (BN) have been considered to be one of the most widely used probabilistic data modelling and propositional uncertainty processing paradigms. They exploit the underlying conditional independences in the domain by providing compact graphical representations for high-dimensional joint distributions. A BN consists of two components - a directed acyclic graph whose nodes correspond to a pre-specified set of attributes or random variables; and a set of conditional probability distributions (CPDs) over the attributes. The techniques that have been developed for learning BNs from data have been shown to be remarkably effective for some data mining problems, especially probabilistic descriptive data mining.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"32 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116931616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extraction of road network from high resolution satellite images using ANN 基于人工神经网络的高分辨率卫星图像道路网提取
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980215
R. Mangala, S. Bhirud
Road extraction in urban areas from high resolution satellite images helps in creating a database of a city and in cartography. The extraction results are intended to be used for updating a road database. The high dimensionality of aerial and satellite imagery presents a challenge to the human analysis based on the traditional classification algorithms using statistical assumptions. Artificial Neural Networks (ANNs) on the other hand may represent a valuable alternative approach for land cover mapping for such highly dimensional imagery. The urban areas contain roads of different shapes, sizes and lengths. In this paper, the extraction algorithm performs edge detection, morphological reconstruction, feature extraction and classification. The road features are classified using ANNs.
从高分辨率卫星图像中提取城市地区的道路有助于创建城市数据库和制图。提取结果将用于更新道路数据库。航空和卫星图像的高维性对传统的基于统计假设的分类算法提出了挑战。另一方面,人工神经网络(ANNs)可能代表了一种有价值的替代方法,用于对这种高维图像进行土地覆盖测绘。城市地区包含不同形状、大小和长度的道路。在本文中,提取算法进行边缘检测、形态重建、特征提取和分类。使用人工神经网络对道路特征进行分类。
{"title":"Extraction of road network from high resolution satellite images using ANN","authors":"R. Mangala, S. Bhirud","doi":"10.1145/1980022.1980215","DOIUrl":"https://doi.org/10.1145/1980022.1980215","url":null,"abstract":"Road extraction in urban areas from high resolution satellite images helps in creating a database of a city and in cartography. The extraction results are intended to be used for updating a road database. The high dimensionality of aerial and satellite imagery presents a challenge to the human analysis based on the traditional classification algorithms using statistical assumptions. Artificial Neural Networks (ANNs) on the other hand may represent a valuable alternative approach for land cover mapping for such highly dimensional imagery. The urban areas contain roads of different shapes, sizes and lengths. In this paper, the extraction algorithm performs edge detection, morphological reconstruction, feature extraction and classification. The road features are classified using ANNs.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121325021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network traffic monitoring using protocol analysis tool to achieve QoS 网络流量监控采用协议分析工具实现QoS
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980374
S. Bansode, V. Kaul, P. Nemade, M. Yadav, Swati Singh, Ashutosh Singh
Communication networks are all about providing means to communicate that is for (exchanging the user information). The user information can be viewed as user traffic akin to the traffic on the road that moves across the road network. The fastest growth of data communication Networks over the past decades has resulted in the development of sophisticated tools to diagnose, debug and analyze such networks. We have developed a toolkit called MENeT (Monitor for Ethernet Network Traffic). The toolkit is an extension to the earlier developed utility for Traffic Monitoring. The toolkit is operational on the platform of windows NT/2000 and is developed by programming in Microsoft Visual C++ environment. The MENeT captures and dissembles the packets flowing through a system and extracts TCP/IP (Transmission Control Protocol/Internet Protocol) packets only. MENeT monitors network traffic by partitioning it into a set of classes. The set of classes are defined as Network Traffic, Broadcast Traffic and Workstation Traffic. It measures traffic at a time scale ranging from a few seconds to several minutes. Using the fine-grained information that MENeT exports, proves its effectiveness for monitoring and protocol analysis. The work on presenting the statistics to portray the Network Traffic from every angle is in place.
通信网络就是提供用于(交换用户信息)的通信手段。用户信息可以被视为用户流量,类似于在道路网络中移动的道路上的流量。在过去的几十年里,数据通信网络的快速发展导致了复杂工具的发展,用于诊断、调试和分析这些网络。我们开发了一个名为MENeT(以太网网络流量监视器)的工具包。该工具包是早期开发的流量监控实用程序的扩展。该工具包在windows NT/2000平台上运行,在Microsoft Visual c++环境下编程开发。MENeT捕获并拆解流经系统的数据包,仅提取TCP/IP(传输控制协议/互联网协议)数据包。MENeT通过将网络流量划分为一组类来监视网络流量。这组类被定义为网络流量、广播流量和工作站流量。它以几秒到几分钟的时间尺度测量流量。使用MENeT导出的细粒度信息,证明了它在监视和协议分析方面的有效性。从各个角度描述网络流量的统计数据工作已经到位。
{"title":"Network traffic monitoring using protocol analysis tool to achieve QoS","authors":"S. Bansode, V. Kaul, P. Nemade, M. Yadav, Swati Singh, Ashutosh Singh","doi":"10.1145/1980022.1980374","DOIUrl":"https://doi.org/10.1145/1980022.1980374","url":null,"abstract":"Communication networks are all about providing means to communicate that is for (exchanging the user information). The user information can be viewed as user traffic akin to the traffic on the road that moves across the road network. The fastest growth of data communication Networks over the past decades has resulted in the development of sophisticated tools to diagnose, debug and analyze such networks. We have developed a toolkit called MENeT (Monitor for Ethernet Network Traffic). The toolkit is an extension to the earlier developed utility for Traffic Monitoring. The toolkit is operational on the platform of windows NT/2000 and is developed by programming in Microsoft Visual C++ environment. The MENeT captures and dissembles the packets flowing through a system and extracts TCP/IP (Transmission Control Protocol/Internet Protocol) packets only. MENeT monitors network traffic by partitioning it into a set of classes. The set of classes are defined as Network Traffic, Broadcast Traffic and Workstation Traffic. It measures traffic at a time scale ranging from a few seconds to several minutes. Using the fine-grained information that MENeT exports, proves its effectiveness for monitoring and protocol analysis. The work on presenting the statistics to portray the Network Traffic from every angle is in place.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123500884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High performance dual gate GNR fet 高性能双栅GNR场效应管
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980391
N. G. Bheniye, P. Panchal, A. Gajarushi
The scaling of CMOS technology has progressed rapidly for three decades. But CMOS is bound to reach its limits due to certain constraints such as minimum dimensions that can be fabricated, degradation in switching performance, power-dissipation etc. Thus, the technologies that may replace CMOS when the limit is reached need to be investigated. Some of the potential solutions can be use of new materials such as graphene or new structures such as Dual gate and back gate. In this paper we investigate the structural and electronic properties of graphene nano-ribbons when devised into dual gate and back-gate structures. Simulation results have been used to support the paper.
三十年来,CMOS技术的规模化发展迅速。但由于某些限制,如最小尺寸,开关性能下降,功耗等,CMOS必然会达到其极限。因此,当达到极限时,可能取代CMOS的技术需要研究。一些潜在的解决方案可以使用新材料,如石墨烯或新结构,如双栅和后门。本文研究了石墨烯纳米带在双栅和背栅结构下的结构和电子性能。仿真结果支持了本文的研究。
{"title":"High performance dual gate GNR fet","authors":"N. G. Bheniye, P. Panchal, A. Gajarushi","doi":"10.1145/1980022.1980391","DOIUrl":"https://doi.org/10.1145/1980022.1980391","url":null,"abstract":"The scaling of CMOS technology has progressed rapidly for three decades. But CMOS is bound to reach its limits due to certain constraints such as minimum dimensions that can be fabricated, degradation in switching performance, power-dissipation etc. Thus, the technologies that may replace CMOS when the limit is reached need to be investigated. Some of the potential solutions can be use of new materials such as graphene or new structures such as Dual gate and back gate. In this paper we investigate the structural and electronic properties of graphene nano-ribbons when devised into dual gate and back-gate structures. Simulation results have been used to support the paper.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122669658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion detection system in cloud computing environment 云计算环境下的入侵检测系统
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980076
Sudhir N. Dhage, B. Meshram, R. Rawat, S. Padawe, M. Paingaokar, A. Misra
In recent years, with the growing popularity of cloud computing, security in cloud has become an important issue. As "Prevention is better than cure", detecting and blocking an attack is better than responding to an attack after a system has been compromised. This paper proposes architecture capable of detecting intrusions in a distributed cloud computing environment, and safeguarding it from possible security breaches. It deploys a separate instance of IDS for each user and uses a single controller to manage the instances. IDS in this architecture can use signature based as well as learning based method.
近年来,随着云计算的日益普及,云中的安全已成为一个重要的问题。正如“防患于未然”,检测和阻止攻击比在系统被破坏后响应攻击更好。本文提出了一种能够检测分布式云计算环境中的入侵并保护其免受可能的安全破坏的体系结构。它为每个用户部署一个单独的IDS实例,并使用单个控制器来管理这些实例。该体系结构中的入侵检测既可以使用基于签名的方法,也可以使用基于学习的方法。
{"title":"Intrusion detection system in cloud computing environment","authors":"Sudhir N. Dhage, B. Meshram, R. Rawat, S. Padawe, M. Paingaokar, A. Misra","doi":"10.1145/1980022.1980076","DOIUrl":"https://doi.org/10.1145/1980022.1980076","url":null,"abstract":"In recent years, with the growing popularity of cloud computing, security in cloud has become an important issue. As \"Prevention is better than cure\", detecting and blocking an attack is better than responding to an attack after a system has been compromised. This paper proposes architecture capable of detecting intrusions in a distributed cloud computing environment, and safeguarding it from possible security breaches. It deploys a separate instance of IDS for each user and uses a single controller to manage the instances. IDS in this architecture can use signature based as well as learning based method.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128586424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Medical image segmentation for brain tumor detection 医学图像分割用于脑肿瘤检测
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980035
D. Gaikwad, P. Abhang, P. Bedekar
The objective of segmentation of medical image is to extract and characterize anatomical structures from the images. Segmentation of medical is quiet difficult task because most images contain large noise. Canny operator has decent anti-noise ability. However Edge based canny operator is not consecutive and applying the canny operator on total image make reduces the performance of the system. In this paper, a new method of segmentation by the integration of 2D Otsu method with Canny edge detector and Region Growing is proposed. Here the first the low pass filter to reduce the noise and then Otsu thresholding method is used to extract the region of interest. In this system, Region Growing and Edge detection algorithm are executed parallel. This parallel executing system is used to get the edge map of image. This system is used to identify the Brain tumor. It is also used for Bone Fracture identification and Classification of Blood Cells. Experiments have shown that this system gives best segmentation results for brain tumor identification.
医学图像分割的目的是从图像中提取和表征解剖结构。医学图像的分割是一项非常困难的任务,因为大多数图像都含有较大的噪声。精明的操作员具有良好的抗噪声能力。然而,基于边缘的canny算子不是连续的,对整个图像应用canny算子会降低系统的性能。本文提出了一种将二维Otsu法与Canny边缘检测器和区域生长相结合的分割方法。本文首先采用低通滤波降低噪声,然后采用Otsu阈值法提取感兴趣区域。在该系统中,区域生长算法和边缘检测算法并行执行。该并行执行系统用于获取图像的边缘映射。该系统用于识别脑肿瘤。它也用于骨折鉴定和血细胞分类。实验结果表明,该系统在脑肿瘤识别中具有较好的分割效果。
{"title":"Medical image segmentation for brain tumor detection","authors":"D. Gaikwad, P. Abhang, P. Bedekar","doi":"10.1145/1980022.1980035","DOIUrl":"https://doi.org/10.1145/1980022.1980035","url":null,"abstract":"The objective of segmentation of medical image is to extract and characterize anatomical structures from the images. Segmentation of medical is quiet difficult task because most images contain large noise. Canny operator has decent anti-noise ability. However Edge based canny operator is not consecutive and applying the canny operator on total image make reduces the performance of the system. In this paper, a new method of segmentation by the integration of 2D Otsu method with Canny edge detector and Region Growing is proposed. Here the first the low pass filter to reduce the noise and then Otsu thresholding method is used to extract the region of interest. In this system, Region Growing and Edge detection algorithm are executed parallel. This parallel executing system is used to get the edge map of image. This system is used to identify the Brain tumor. It is also used for Bone Fracture identification and Classification of Blood Cells. Experiments have shown that this system gives best segmentation results for brain tumor identification.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128966314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reduction and estimation of hyperspectral imagery using dual tree wavelet filter bank analysis with an orthogonal subspace projection approach 基于正交子空间投影法的对偶树小波滤波器组分析高光谱图像的约简与估计
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980228
S. Swamy, B. Patel
Hyperspectral imagery provides richer information about materials than multispectral imagery. The new larger data volumes from hyperspectral sensors present a challenge for traditional processing techniques. Principal component analysis (PCA) has been the technique of choice for dimension reduction. Spectral data reduction and estimation using wavelet filter bank with perfect reconstruction can be considered for better results.
高光谱图像提供了比多光谱图像更丰富的材料信息。来自高光谱传感器的新的更大数据量对传统处理技术提出了挑战。主成分分析(PCA)已成为降维的首选技术。可以考虑使用重构良好的小波滤波器组进行光谱数据的约简和估计,以获得较好的效果。
{"title":"Reduction and estimation of hyperspectral imagery using dual tree wavelet filter bank analysis with an orthogonal subspace projection approach","authors":"S. Swamy, B. Patel","doi":"10.1145/1980022.1980228","DOIUrl":"https://doi.org/10.1145/1980022.1980228","url":null,"abstract":"Hyperspectral imagery provides richer information about materials than multispectral imagery. The new larger data volumes from hyperspectral sensors present a challenge for traditional processing techniques. Principal component analysis (PCA) has been the technique of choice for dimension reduction. Spectral data reduction and estimation using wavelet filter bank with perfect reconstruction can be considered for better results.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129023750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agile principles as a leadership value system in the software development: are we ready to be unleashed? 敏捷原则作为软件开发中的领导价值体系:我们准备好被释放了吗?
Pub Date : 2011-02-25 DOI: 10.1145/1980022.1980188
S. Patil, Srikantha Rao, Preeti S. Patil
Agile methods generally promote a disciplined project management process that encourages frequent inspection and adaptation, a leadership philosophy that encourages teamwork, self-organization and accountability, a set of engineering best practices that allow for rapid delivery of high-quality software, and a business approach that aligns development with customer needs and company goals. When it is considered Agile Principles as a leadership value System in the Software Development then the question arise that are one is ready to be unleashed? As criticisms include several issues regarding the same like Agile Principles often used as a means to bleed money from customers through lack of defining a deliverable, Lack of structure and necessary documentation, Only works with senior-level developers Incorporates insufficient software design, Requires meetings at frequent intervals at enormous expense to customers, Requires too much cultural change to adopt, Can lead to more difficult contractual negotiations?, Can be very inefficient---if the requirements for one area of code change through various iterations, the same programming may need to be done several times over. Impossible to develop realistic estimates of work effort needed to provide a quote, because at the beginning of the project no one knows the entire scope/requirements and can increase the risk of scope due to the lack of detailed requirements documentation? Here it is observed and surveyed the various categories of Projects for different kind of group members to adopt and follow the agile principles. It proposes the strength and weaknesses of all 12 Agile Principles based on Indian scenario.
敏捷方法通常促进一个鼓励频繁检查和调整的有纪律的项目管理过程,一种鼓励团队合作、自组织和责任的领导哲学,一组允许快速交付高质量软件的工程最佳实践,以及一种使开发与客户需求和公司目标保持一致的业务方法。当敏捷原则被认为是软件开发中的领导价值系统时,问题就来了,准备好释放了吗?批评包括几个问题,比如敏捷原则经常被用作从客户那里榨钱的手段,因为缺乏对可交付成果的定义,缺乏结构和必要的文档,只适用于高级开发人员,合并了不充分的软件设计,需要频繁的会议,对客户造成巨大的损失,需要太多的文化变革来采用,可能导致更困难的合同谈判?,可能非常低效——如果一个代码区域的需求通过各种迭代而改变,那么相同的编程可能需要多次重复。不可能对提供报价所需的工作量进行现实的估计,因为在项目开始时没有人知道整个范围/需求,并且由于缺乏详细的需求文档而增加了范围的风险?这里观察和调查了不同类别的项目,以便不同类型的团队成员采用和遵循敏捷原则。它根据印度的情况提出了所有12条敏捷原则的优缺点。
{"title":"Agile principles as a leadership value system in the software development: are we ready to be unleashed?","authors":"S. Patil, Srikantha Rao, Preeti S. Patil","doi":"10.1145/1980022.1980188","DOIUrl":"https://doi.org/10.1145/1980022.1980188","url":null,"abstract":"Agile methods generally promote a disciplined project management process that encourages frequent inspection and adaptation, a leadership philosophy that encourages teamwork, self-organization and accountability, a set of engineering best practices that allow for rapid delivery of high-quality software, and a business approach that aligns development with customer needs and company goals. When it is considered Agile Principles as a leadership value System in the Software Development then the question arise that are one is ready to be unleashed? As criticisms include several issues regarding the same like Agile Principles often used as a means to bleed money from customers through lack of defining a deliverable, Lack of structure and necessary documentation, Only works with senior-level developers Incorporates insufficient software design, Requires meetings at frequent intervals at enormous expense to customers, Requires too much cultural change to adopt, Can lead to more difficult contractual negotiations?, Can be very inefficient---if the requirements for one area of code change through various iterations, the same programming may need to be done several times over. Impossible to develop realistic estimates of work effort needed to provide a quote, because at the beginning of the project no one knows the entire scope/requirements and can increase the risk of scope due to the lack of detailed requirements documentation?\u0000 Here it is observed and surveyed the various categories of Projects for different kind of group members to adopt and follow the agile principles. It proposes the strength and weaknesses of all 12 Agile Principles based on Indian scenario.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129422904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
International Conference & Workshop on Emerging Trends in Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1