首页 > 最新文献

2015 2nd International Conference on Electronics and Communication Systems (ICECS)最新文献

英文 中文
Enhancing security for multimodal biometric using Hyper Image Encryption Algorithm 利用超图像加密算法提高多模态生物识别的安全性
K. Nivetha, D. Saraswady
The deployment of large-scale biometric systems in both commercial and government applications has served to increase the public's awareness of this technology. This dramatic growth in biometric system has clearly highlighted the challenges associated in designing and integrating these systems. `Multimodal biometrics' is development to great importance wherein the information from three different biometric sources namely finger print, retina, finger vein is used for authentication system. Unlike unibiometric systems, these are sensitive to noise and make spoofing difficult for hackers. As an deployment of multimodal biometric, this project aims to dynamically ensure the performance to provide an enhanced level of security by combining Finger vein, Retina and Fingerprint with Hyper Image Encryption Algorithm (HIEA). Hyper image encryption algorithm is applied to the biometric template and only the transformed template is stored in the database based on secret key in which increases GAR and reduces FAR.
在商业和政府应用中大规模部署生物识别系统,有助于提高公众对这项技术的认识。生物识别系统的急剧增长明显地突出了设计和集成这些系统所面临的挑战。“多模式生物识别技术”的发展非常重要,其中来自三种不同生物识别来源的信息,即指纹,视网膜,手指静脉用于身份验证系统。与单一生物识别系统不同,这些系统对噪音很敏感,黑客很难进行欺骗。作为多模态生物识别技术的一个部署,本项目旨在通过将手指静脉、视网膜和指纹与超图像加密算法(HIEA)相结合,动态确保性能,提供更高的安全性。采用超图像加密算法对生物特征模板进行加密,仅将转换后的模板存储在基于密钥的数据库中,提高了GAR,降低了FAR。
{"title":"Enhancing security for multimodal biometric using Hyper Image Encryption Algorithm","authors":"K. Nivetha, D. Saraswady","doi":"10.1109/ECS.2015.7125053","DOIUrl":"https://doi.org/10.1109/ECS.2015.7125053","url":null,"abstract":"The deployment of large-scale biometric systems in both commercial and government applications has served to increase the public's awareness of this technology. This dramatic growth in biometric system has clearly highlighted the challenges associated in designing and integrating these systems. `Multimodal biometrics' is development to great importance wherein the information from three different biometric sources namely finger print, retina, finger vein is used for authentication system. Unlike unibiometric systems, these are sensitive to noise and make spoofing difficult for hackers. As an deployment of multimodal biometric, this project aims to dynamically ensure the performance to provide an enhanced level of security by combining Finger vein, Retina and Fingerprint with Hyper Image Encryption Algorithm (HIEA). Hyper image encryption algorithm is applied to the biometric template and only the transformed template is stored in the database based on secret key in which increases GAR and reduces FAR.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123093441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Facial expression recognition using feature based techniques and model based techniques: A survey 基于特征和基于模型的面部表情识别技术综述
Bishwas Mishra, S. Fernandes, K. Abhishek, A. Alva, Chaithra Shetty, Chandan V. Ajila, Dhanush Shetty, Harshitha A. Rao, P. Shetty
Facial expression is a way of non-verbal communication. A person depicts his/her feelings through facial expressions. In computer systems facial expressions help in verification, identification and authentication. One popular use of facial expression recognition is automatic feedback capture from customers upon reacting to a particular product. Effective recognition technology is in high demand by the common users of today's gadgets and technologies. Facial expression recognition technique is broadly classified into two techniques: Feature based techniques and Model based techniques. The key contribution of this article is that we have analyzed latest state of the art techniques in Feature based techniques and Model based techniques. These techniques are analyzed using various standard public face databases: GEMEP-FERA, BU-3DFE, CK+, Bosphorous, MMI, JAFFE, LFW, FERET, CMU-PIE, Georgia tech, AR, eNTERFACE 05 and FRGC. From our analysis we found that for Feature based Curvelet approach performed on FRGCv2 database gave an excellent 97.83% recognition rate and Model based textured 3D video technique performed on BU-4DFE database gave an excellent 94.34 % recognition rate.
面部表情是非语言交流的一种方式。一个人通过面部表情来表达他/她的感情。在计算机系统中,面部表情有助于验证、鉴定和认证。面部表情识别的一个流行用途是自动捕捉顾客对特定产品的反应反馈。有效的识别技术是当今小工具和技术的普通用户的高需求。面部表情识别技术大致分为两类:基于特征的技术和基于模型的技术。本文的主要贡献是我们分析了基于特征的技术和基于模型的技术的最新技术状态。这些技术使用各种标准的公共人脸数据库进行分析:GEMEP-FERA、BU-3DFE、CK+、Bosphorous、MMI、JAFFE、LFW、FERET、CMU-PIE、Georgia tech、AR、eNTERFACE 05和FRGC。通过分析发现,基于Feature的Curvelet方法在FRGCv2数据库上的识别率为97.83%,基于模型的纹理3D视频技术在BU-4DFE数据库上的识别率为94.34%。
{"title":"Facial expression recognition using feature based techniques and model based techniques: A survey","authors":"Bishwas Mishra, S. Fernandes, K. Abhishek, A. Alva, Chaithra Shetty, Chandan V. Ajila, Dhanush Shetty, Harshitha A. Rao, P. Shetty","doi":"10.1109/ECS.2015.7124976","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124976","url":null,"abstract":"Facial expression is a way of non-verbal communication. A person depicts his/her feelings through facial expressions. In computer systems facial expressions help in verification, identification and authentication. One popular use of facial expression recognition is automatic feedback capture from customers upon reacting to a particular product. Effective recognition technology is in high demand by the common users of today's gadgets and technologies. Facial expression recognition technique is broadly classified into two techniques: Feature based techniques and Model based techniques. The key contribution of this article is that we have analyzed latest state of the art techniques in Feature based techniques and Model based techniques. These techniques are analyzed using various standard public face databases: GEMEP-FERA, BU-3DFE, CK+, Bosphorous, MMI, JAFFE, LFW, FERET, CMU-PIE, Georgia tech, AR, eNTERFACE 05 and FRGC. From our analysis we found that for Feature based Curvelet approach performed on FRGCv2 database gave an excellent 97.83% recognition rate and Model based textured 3D video technique performed on BU-4DFE database gave an excellent 94.34 % recognition rate.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123167572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A novel approach on Cuckoo search algorithm using Gamma distribution 一种基于伽马分布的布谷鸟搜索算法
Sourya Roy, Arijit Mallick, Sheli Sinha Chowdhury, Sangita Roy
Cuckoo search algorithm (CS) is one of the most efficient optimization techniques developed so far. Several attempts have been made in past in order to improve the efficiency of CSO algorithm. In this paper we have tried to exploit the fundamental step length distribution function of the CS algorithm in order to increase its efficiency. Cuckoo search is a metaheuristic optimization technique. In place of conventional Levy distribution, Gamma distribution has been used. We will represent the increased efficiency of the Gamma distribution aided CSO algorithm in the following paper.
布谷鸟搜索算法(CS)是目前发展起来的最有效的优化技术之一。为了提高CSO算法的效率,前人已经做了一些尝试。本文试图利用CS算法的基本步长分布函数来提高算法的效率。布谷鸟搜索是一种元启发式优化技术。用Gamma分布代替了传统的Levy分布。在下一篇文章中,我们将介绍伽马分布辅助CSO算法提高的效率。
{"title":"A novel approach on Cuckoo search algorithm using Gamma distribution","authors":"Sourya Roy, Arijit Mallick, Sheli Sinha Chowdhury, Sangita Roy","doi":"10.1109/ECS.2015.7124948","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124948","url":null,"abstract":"Cuckoo search algorithm (CS) is one of the most efficient optimization techniques developed so far. Several attempts have been made in past in order to improve the efficiency of CSO algorithm. In this paper we have tried to exploit the fundamental step length distribution function of the CS algorithm in order to increase its efficiency. Cuckoo search is a metaheuristic optimization technique. In place of conventional Levy distribution, Gamma distribution has been used. We will represent the increased efficiency of the Gamma distribution aided CSO algorithm in the following paper.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125062719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Enhanced stego-crypto techniques of data hiding through geometrical figures in an image 通过图像中的几何图形隐藏数据的增强隐密码技术
C. Geetha, C. Puttamadappa
Cryptography is a technique for secret communication where as obscuring the secret communication using for different data is Steganography. The secret communication is carried through many sources like image, audio & video files. Our work is mainly proposing data hiding by embedding the message of interest using geometric style of cryptographic algorithm, thus providing high security. Wavelet and curvelet transform algorithms are used to perform preprocessing of images. Even if the image carrying embedded data i.e., Stego image undergoes a reverse operation and data cannot be extracted if the receiver is unaware of the exact coordinates of the geometric shape. Hence retrieving secret image for an attacker becomes a hard task. Our Experimental results are verified for both the properties of Cryptography and Steganography it may be applicable for kind of multimedia applications.
密码学是一种用于秘密通信的技术,其中对不同数据使用隐写术来掩盖秘密通信。秘密通信通过图像、音频和视频文件等多种来源进行。我们的工作主要是通过使用几何风格的加密算法嵌入感兴趣的消息来实现数据隐藏,从而提供高安全性。采用小波变换和曲线变换算法对图像进行预处理。如果接收方不知道几何形状的确切坐标,即使图像中嵌入了数据,如Stego图像,经过反向操作,数据也无法提取。因此,为攻击者检索秘密图像成为一项艰巨的任务。我们的实验结果验证了密码学和隐写术的特性,可以适用于各种多媒体应用。
{"title":"Enhanced stego-crypto techniques of data hiding through geometrical figures in an image","authors":"C. Geetha, C. Puttamadappa","doi":"10.1109/ECS.2015.7124766","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124766","url":null,"abstract":"Cryptography is a technique for secret communication where as obscuring the secret communication using for different data is Steganography. The secret communication is carried through many sources like image, audio & video files. Our work is mainly proposing data hiding by embedding the message of interest using geometric style of cryptographic algorithm, thus providing high security. Wavelet and curvelet transform algorithms are used to perform preprocessing of images. Even if the image carrying embedded data i.e., Stego image undergoes a reverse operation and data cannot be extracted if the receiver is unaware of the exact coordinates of the geometric shape. Hence retrieving secret image for an attacker becomes a hard task. Our Experimental results are verified for both the properties of Cryptography and Steganography it may be applicable for kind of multimedia applications.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125074149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the PDF of the square of constrained minimal singular value for robust signal recovery analysis 基于约束最小奇异值平方的鲁棒信号恢复分析
O. James
In compressed sensing, the l1-constrained minimal singular value (l1-CMSV) of an encoder is used for analyzing (theoretically) the robustness of decoders against noise. In this paper, we show that for random encoders, the square of the l1-CMSV (S-CMSV) is a random variable. And, for the Gaussian encoders, the S-CMSV admits a simple, closed-form probability and a cumulative distribution functions. We illustrate the benefits of these distributions for analyzing the robustness of various decoders. In particular, we interpret the existing theoretical robustness results of the decoders such as the basis pursuit in terms of the maximum possible undersampling.
在压缩感知中,编码器的l1约束最小奇异值(l1-CMSV)用于(理论上)分析解码器对噪声的鲁棒性。本文证明了对于随机编码器,11 - cmsv (S-CMSV)的平方是一个随机变量。并且,对于高斯编码器,S-CMSV允许一个简单的,封闭形式的概率和累积分布函数。我们说明了这些分布对分析各种解码器的鲁棒性的好处。特别是,我们根据最大可能欠采样来解释解码器的现有理论鲁棒性结果,例如基追踪。
{"title":"On the PDF of the square of constrained minimal singular value for robust signal recovery analysis","authors":"O. James","doi":"10.1109/ECS.2015.7124876","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124876","url":null,"abstract":"In compressed sensing, the l1-constrained minimal singular value (l1-CMSV) of an encoder is used for analyzing (theoretically) the robustness of decoders against noise. In this paper, we show that for random encoders, the square of the l1-CMSV (S-CMSV) is a random variable. And, for the Gaussian encoders, the S-CMSV admits a simple, closed-form probability and a cumulative distribution functions. We illustrate the benefits of these distributions for analyzing the robustness of various decoders. In particular, we interpret the existing theoretical robustness results of the decoders such as the basis pursuit in terms of the maximum possible undersampling.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125971338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Categorize the video server in P2P networks based on seasonal and normal popularity videos using machine learning approach 利用机器学习方法对P2P网络中基于季节性和正常流行视频的视频服务器进行分类
M. Narayanan, C. Arun
There is a wide-ranging use of Peer-to-Peer (P2P) computing and applications in majority of the key areas of Engineering and Technology. Devoid of any centralized server, they can share their content since peers are linked with each other. This is the reason why P2P computing gives enhanced communication among peers. It is essential for the video server to maintain the data content link in cache memory so the cache memory sizes will be enlarged to a definite level and also the cache needs to be securely sustained by each and every peers. By utilizing the Machine Learning method, the proposed method centers its concentration on classifying the video server depending on seasonal and non seasonal popularity. Two supervised Machine Learning algorithms are utilized in this paper and are explained as follows. The Case-Based Reasoning algorithm is utilized in order to sort out well-liked videos and the Averaged One-Dependence Estimators (AODE) algorithm is utilized to sort out video server into seasonal and non-seasonal. The first algorithm is based on Retrieve, Reuse, Revise and Retain methods and the latter algorithm sorts out the video server into seasonal and non-seasonal based video servers. The work simulated by Java programming language.
在工程和技术的大多数关键领域中,点对点(P2P)计算和应用被广泛使用。没有任何集中式服务器,它们可以共享自己的内容,因为对等体是相互链接的。这就是P2P计算增强对等体之间通信的原因。视频服务器必须在缓存中保持数据内容链接,这样才能将缓存大小扩大到一定的水平,并且缓存需要每个对等体安全维护。该方法利用机器学习方法,将注意力集中在根据季节性和非季节性流行度对视频服务器进行分类上。本文使用了两种监督式机器学习算法,解释如下。采用基于案例的推理算法对用户喜爱的视频进行分类,采用平均一相关估计(AODE)算法对视频服务器进行季节性和非季节性分类。前一种算法基于检索、重用、修改和保留方法,后一种算法将视频服务器分为季节性和非季节性视频服务器。本工作采用Java编程语言进行模拟。
{"title":"Categorize the video server in P2P networks based on seasonal and normal popularity videos using machine learning approach","authors":"M. Narayanan, C. Arun","doi":"10.1109/ECS.2015.7124778","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124778","url":null,"abstract":"There is a wide-ranging use of Peer-to-Peer (P2P) computing and applications in majority of the key areas of Engineering and Technology. Devoid of any centralized server, they can share their content since peers are linked with each other. This is the reason why P2P computing gives enhanced communication among peers. It is essential for the video server to maintain the data content link in cache memory so the cache memory sizes will be enlarged to a definite level and also the cache needs to be securely sustained by each and every peers. By utilizing the Machine Learning method, the proposed method centers its concentration on classifying the video server depending on seasonal and non seasonal popularity. Two supervised Machine Learning algorithms are utilized in this paper and are explained as follows. The Case-Based Reasoning algorithm is utilized in order to sort out well-liked videos and the Averaged One-Dependence Estimators (AODE) algorithm is utilized to sort out video server into seasonal and non-seasonal. The first algorithm is based on Retrieve, Reuse, Revise and Retain methods and the latter algorithm sorts out the video server into seasonal and non-seasonal based video servers. The work simulated by Java programming language.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123336115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NRZ encoded pilots for Semi Blind Channel estimation 用于半盲信道估计的NRZ编码导频
K. Deepak, B. Malarkodi, K. Sagar
This paper introduces a new pilot pattern which is obtained by using NRZ Encoder. By using the proposed NRZ Encoded Pilots for Semi Blind Channel estimation (in which the channel response is obtained by interpolating the subsequent channel estimations) in MIMO-OFDM, reduces the Mean Square Error for moderately varying channels and reduces complexity. This method perfectly utilizes the bandwidth and improves the system performance by accurate channel estimation compared to pilot based channel estimation.
本文介绍了利用NRZ编码器获得的一种新的导频模式。通过在MIMO-OFDM中使用所提出的NRZ编码导频进行半盲信道估计(其中信道响应通过插值后续信道估计获得),降低了中等变化信道的均方误差并降低了复杂度。与基于导频的信道估计相比,该方法充分利用了带宽,并通过精确的信道估计提高了系统性能。
{"title":"NRZ encoded pilots for Semi Blind Channel estimation","authors":"K. Deepak, B. Malarkodi, K. Sagar","doi":"10.1109/ECS.2015.7124924","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124924","url":null,"abstract":"This paper introduces a new pilot pattern which is obtained by using NRZ Encoder. By using the proposed NRZ Encoded Pilots for Semi Blind Channel estimation (in which the channel response is obtained by interpolating the subsequent channel estimations) in MIMO-OFDM, reduces the Mean Square Error for moderately varying channels and reduces complexity. This method perfectly utilizes the bandwidth and improves the system performance by accurate channel estimation compared to pilot based channel estimation.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"379 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123710068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on fault tolerant — Load balancing algorithmsin cloud computing 云计算中容错-负载均衡算法研究综述
G. P. Sarmila, N. Gnanambigai, P. Dinadayalan
The cloud computing is an emerging paradigm over the internet which provides applications and services based on the concept of abstraction and virtualization for a fraction of the cost. The number of cloud user increases day by day to utilize the available resources. Most of the cloud applications are run at remote nodes where many clients may request for the server at a time. This causes overloading in server which results in fault. Load balancing is the networking technique that distributes load to the nodes to optimize resource utilization, throughput, response time and overload. The need of load balancing increases with increase in the demand for computing resources. Fault-tolerance is the ability of system to continue to work even in the presence of fault. This is a critical issue to be addressed to ensure reliability and availability in cloud computing. By effectively balancing the incoming load, fault tolerance can be achieved in cloud. This paper aims to compare the efficient load balancing algorithms that are fault tolerant.
云计算是互联网上的一种新兴范例,它以很少的成本提供基于抽象和虚拟化概念的应用程序和服务。云用户的数量日益增加,以利用可用的资源。大多数云应用程序都在远程节点上运行,在这些节点上,许多客户机可能同时请求服务器。这会导致服务器过载,从而导致故障。负载均衡是将负载分配给节点以优化资源利用率、吞吐量、响应时间和过载的网络技术。随着计算资源需求的增加,负载平衡的需求也在增加。容错是指系统在出现故障时仍能继续工作的能力。为了确保云计算的可靠性和可用性,这是一个需要解决的关键问题。通过有效地平衡传入负载,可以实现云中的容错。本文旨在比较具有容错能力的高效负载均衡算法。
{"title":"Survey on fault tolerant — Load balancing algorithmsin cloud computing","authors":"G. P. Sarmila, N. Gnanambigai, P. Dinadayalan","doi":"10.1109/ECS.2015.7124879","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124879","url":null,"abstract":"The cloud computing is an emerging paradigm over the internet which provides applications and services based on the concept of abstraction and virtualization for a fraction of the cost. The number of cloud user increases day by day to utilize the available resources. Most of the cloud applications are run at remote nodes where many clients may request for the server at a time. This causes overloading in server which results in fault. Load balancing is the networking technique that distributes load to the nodes to optimize resource utilization, throughput, response time and overload. The need of load balancing increases with increase in the demand for computing resources. Fault-tolerance is the ability of system to continue to work even in the presence of fault. This is a critical issue to be addressed to ensure reliability and availability in cloud computing. By effectively balancing the incoming load, fault tolerance can be achieved in cloud. This paper aims to compare the efficient load balancing algorithms that are fault tolerant.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116459929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Unsupervised feature selection using binary bat algorithm 基于二进制bat算法的无监督特征选择
A. Rani, R. Rajalaxmi
Feature selection is selecting a subset of optimal features. Feature selection is being used in high dimensional data reduction and it is being used in several applications like medical, image processing, text mining, etc. Several methods were introduced for unsupervised feature selection. Among those methods some are based on filter approach and some are based on wrapper approach. In the existing work, unsupervised feature selection methods using Genetic Algorithm, Particle Swarm Optimization with Relative Reduct, Quick Reduct and Ant Colony Optimization have been introduced. These methods yield better performance for unsupervised feature selection. In this paper we proposed a novel method to select subset of features from unlabeled data using binary bat algorithm with sum of squared error as the fitness function. The proposed method is then tested with various classification algorithms like decision tree, multilayer perceptron, support vector machine and clustering quality measures like sum of squared error. The results show that our proposed method gives more accuracy when compared with other optimization algorithm.
特征选择是选择最优特征的子集。特征选择被用于高维数据约简,并被用于医学、图像处理、文本挖掘等多个应用中。介绍了几种无监督特征选择方法。在这些方法中,有些是基于过滤器的方法,有些是基于包装器的方法。在现有的工作中,介绍了基于遗传算法、基于相对约简的粒子群优化、快速约简和蚁群优化的无监督特征选择方法。这些方法对无监督特征选择产生了更好的性能。本文提出了一种以误差平方和为适应度函数的二元蝙蝠算法从未标记数据中选择特征子集的新方法。然后用决策树、多层感知器、支持向量机等分类算法和误差平方和等聚类质量度量对该方法进行了测试。结果表明,与其他优化算法相比,该方法具有更高的精度。
{"title":"Unsupervised feature selection using binary bat algorithm","authors":"A. Rani, R. Rajalaxmi","doi":"10.1109/ECS.2015.7124945","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124945","url":null,"abstract":"Feature selection is selecting a subset of optimal features. Feature selection is being used in high dimensional data reduction and it is being used in several applications like medical, image processing, text mining, etc. Several methods were introduced for unsupervised feature selection. Among those methods some are based on filter approach and some are based on wrapper approach. In the existing work, unsupervised feature selection methods using Genetic Algorithm, Particle Swarm Optimization with Relative Reduct, Quick Reduct and Ant Colony Optimization have been introduced. These methods yield better performance for unsupervised feature selection. In this paper we proposed a novel method to select subset of features from unlabeled data using binary bat algorithm with sum of squared error as the fitness function. The proposed method is then tested with various classification algorithms like decision tree, multilayer perceptron, support vector machine and clustering quality measures like sum of squared error. The results show that our proposed method gives more accuracy when compared with other optimization algorithm.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"29 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122944169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Streaming high definition video over heterogeneous wireless networks(HWN) 在异构无线网络(HWN)上流式传输高清视频
D. Poornima, S. Vijayashaarathi
Video transmission over the heterogeneous networks faces many challenges due to available bandwidth, link delay, frame lost, throughput, reliability, network congestion. In video streaming it is important that the video stream must reach the users within allocated time and also without errors in video frames which leads to packet loss. Hence to avoid the packet loss and to enhance the Packet Delivery Ratio(PDR) and Throughput of the networks a modified Forward Error Correction mechanism was proposed by considering the feedback information(frame count, buffer status, round trip time(RTT)). Simulation results compares the performance in terms of packet delivery ratio(PDR), throughput and handover delay under various video packet rate and packet intervals.
异构网络视频传输面临着可用带宽、链路延迟、丢帧、吞吐量、可靠性、网络拥塞等诸多挑战。在视频流中,视频流必须在指定的时间内到达用户,并且视频帧中没有导致丢包的错误是很重要的。因此,为了避免丢包,提高网络的PDR和吞吐量,提出了一种改进的前向纠错机制,该机制考虑了反馈信息(帧数、缓冲状态、往返时间)。仿真结果比较了不同视频包速率和包间隔下的包投递率(PDR)、吞吐量和切换延迟。
{"title":"Streaming high definition video over heterogeneous wireless networks(HWN)","authors":"D. Poornima, S. Vijayashaarathi","doi":"10.1109/ECS.2015.7124892","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124892","url":null,"abstract":"Video transmission over the heterogeneous networks faces many challenges due to available bandwidth, link delay, frame lost, throughput, reliability, network congestion. In video streaming it is important that the video stream must reach the users within allocated time and also without errors in video frames which leads to packet loss. Hence to avoid the packet loss and to enhance the Packet Delivery Ratio(PDR) and Throughput of the networks a modified Forward Error Correction mechanism was proposed by considering the feedback information(frame count, buffer status, round trip time(RTT)). Simulation results compares the performance in terms of packet delivery ratio(PDR), throughput and handover delay under various video packet rate and packet intervals.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129301957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2015 2nd International Conference on Electronics and Communication Systems (ICECS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1