首页 > 最新文献

Advances in Recent Technologies in Communication and Computing最新文献

英文 中文
Ensuring Data Storage Security in Cloud Computing through Two-Way Handshake Based on Token Management 基于令牌管理的双向握手确保云计算数据存储安全
Pub Date : 2010-10-16 DOI: 10.1109/ARTCOM.2010.23
M. Tribhuwan, V. Bhuyar, Shabana Pirzade
Cloud computing technology is enabling IT to do more with the infrastructure that already exists, as well as adding new ways to expand capacity quickly and economically by using external cloud computing resources. This technology is enabling IT managers to treat infrastructure as a common substrate on which they can provide services to users faster, in a much more flexible way and in cost-effective way –without having to re-design or add to the underlying infrastructure. Given the benefits of cloud computing, its broad appeal is not surprising. However, this new approach does raise some concerns. Chief among them is securing stored data in the cloud. In this paper, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users’ data in the cloud, we propose a method by utilizing the homomorphic token with distributed verification of erasure-coded data. Our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s).
云计算技术使IT能够利用现有的基础设施做更多的事情,并通过使用外部云计算资源增加新的方法来快速和经济地扩展容量。这项技术使IT经理能够将基础设施视为一个共同的基础设施,在这个基础设施上,他们可以更快、更灵活、更经济地为用户提供服务,而无需重新设计或添加底层基础设施。考虑到云计算的好处,它的广泛吸引力并不令人惊讶。然而,这种新方法确实引起了一些担忧。其中最主要的是保护存储在云中的数据。在本文中,我们关注云数据存储的安全性,这一直是服务质量的一个重要方面。为了保证云中用户数据的正确性,我们提出了一种利用同态令牌对擦除编码数据进行分布式验证的方法。我们的方案实现了存储正确性保险和数据错误定位的集成,即识别行为不端的服务器。
{"title":"Ensuring Data Storage Security in Cloud Computing through Two-Way Handshake Based on Token Management","authors":"M. Tribhuwan, V. Bhuyar, Shabana Pirzade","doi":"10.1109/ARTCOM.2010.23","DOIUrl":"https://doi.org/10.1109/ARTCOM.2010.23","url":null,"abstract":"Cloud computing technology is enabling IT to do more with the infrastructure that already exists, as well as adding new ways to expand capacity quickly and economically by using external cloud computing resources. This technology is enabling IT managers to treat infrastructure as a common substrate on which they can provide services to users faster, in a much more flexible way and in cost-effective way –without having to re-design or add to the underlying infrastructure. Given the benefits of cloud computing, its broad appeal is not surprising. However, this new approach does raise some concerns. Chief among them is securing stored data in the cloud. In this paper, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users’ data in the cloud, we propose a method by utilizing the homomorphic token with distributed verification of erasure-coded data. Our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s).","PeriodicalId":210885,"journal":{"name":"Advances in Recent Technologies in Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125139681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Short Survey of Energy-Efficient Routing Protocols for Mobile Ad-Hoc Networks 移动Ad-Hoc网络节能路由协议综述
Pub Date : 2010-10-16 DOI: 10.1109/ARTCOM.2010.103
D. Anand, Shiva Prakash
Despite much research activity over the last several decades on wireless communications in general, and ad hoc wireless networks in particular, there remain many significant technical challenges in the design of these networks. As it is not possible to give a significant amount of power to the mobile devices of ad-hoc networks so that it could work for long time, so mobile devices with rechargeable batteries must conserve energy to maximize time between recharging. This article surveys and classifies the energy aware routing protocols proposed for MANETs as well as various matrices responsible for energy (power) optimization by going through different layers of a internet protocol to provide a comprehensive understanding of these routing protocols and better organize existing ideas and work to facilitate energy efficient routing design for MANETs, we present the taxonomy of the energy efficient routing protocols, their properties and design features. This paper aims to aid those MANETs researchers and application developers in selecting appropriate energy efficient routing protocols for their work.
尽管在过去的几十年里,人们对一般的无线通信,特别是自组织无线网络进行了大量的研究,但在这些网络的设计中仍然存在许多重大的技术挑战。由于不可能给ad-hoc网络的移动设备提供大量的电力,使其能够长时间工作,因此带有可充电电池的移动设备必须节约能源,以最大限度地延长充电间隔时间。本文调查和分类了为manet提出的能源感知路由协议以及负责能源(电力)优化的各种矩阵,通过互联网协议的不同层来提供对这些路由协议的全面理解,并更好地组织现有的想法和工作,以促进manet的节能路由设计,我们提出了节能路由协议的分类,它们的属性和设计特征。本文旨在帮助manet研究人员和应用开发人员选择适合他们工作的节能路由协议。
{"title":"A Short Survey of Energy-Efficient Routing Protocols for Mobile Ad-Hoc Networks","authors":"D. Anand, Shiva Prakash","doi":"10.1109/ARTCOM.2010.103","DOIUrl":"https://doi.org/10.1109/ARTCOM.2010.103","url":null,"abstract":"Despite much research activity over the last several decades on wireless communications in general, and ad hoc wireless networks in particular, there remain many significant technical challenges in the design of these networks. As it is not possible to give a significant amount of power to the mobile devices of ad-hoc networks so that it could work for long time, so mobile devices with rechargeable batteries must conserve energy to maximize time between recharging. This article surveys and classifies the energy aware routing protocols proposed for MANETs as well as various matrices responsible for energy (power) optimization by going through different layers of a internet protocol to provide a comprehensive understanding of these routing protocols and better organize existing ideas and work to facilitate energy efficient routing design for MANETs, we present the taxonomy of the energy efficient routing protocols, their properties and design features. This paper aims to aid those MANETs researchers and application developers in selecting appropriate energy efficient routing protocols for their work.","PeriodicalId":210885,"journal":{"name":"Advances in Recent Technologies in Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124282768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing of Logic Blocks Using Built-In Self Test Scheme for FPGAs 用fpga内置自测方案测试逻辑块
Pub Date : 2010-10-16 DOI: 10.1109/ARTCOM.2010.101
Putnanjan Sumathi
Any FPGA structure has interconnect cells, configurable logic blocks and I/O pads. The physical path between the blocks form interconnects. The logic blocks may have both combinational and sequential circuits to perform logic functions. Here the logic blocks are assumed to have either combinational or sequential circuits which generate a single minterm or maxterm as the output. The FPGA testing is divided into interconnect and logical testing. In interconnect testing fault models are introduced in the wire connections that exists within logic blocks and these faults are propagated to the output thereby detecting the faults at interconnects. In general 2n test vectors are needed to test the single term logic function with n inputs. Here Walsh code is used to optimize the test vectors. The number of test vectors are optimized as log2(M+2), where M is number of wire connections. The test vectors are the columns of M binary numbers and the successive binary numbers are exchanged to obtain the test vectors
任何FPGA结构都具有互连单元、可配置逻辑块和I/O垫。块之间的物理路径形成互连。逻辑块可以同时具有组合电路和顺序电路来执行逻辑功能。这里假设逻辑块具有组合或顺序电路,这些电路产生单个最小项或最大项作为输出。FPGA测试分为互连测试和逻辑测试。在互连测试中,在存在于逻辑块内的导线连接中引入故障模型,并将这些故障传播到输出,从而检测互连处的故障。一般来说,测试n个输入的单项逻辑函数需要2n个测试向量。这里沃尔什代码是用来优化测试向量。测试向量的个数被优化为log2(M+2),其中M为电线连接数。测试向量为M个二进制数的列,通过交换连续二进制数得到测试向量
{"title":"Testing of Logic Blocks Using Built-In Self Test Scheme for FPGAs","authors":"Putnanjan Sumathi","doi":"10.1109/ARTCOM.2010.101","DOIUrl":"https://doi.org/10.1109/ARTCOM.2010.101","url":null,"abstract":"Any FPGA structure has interconnect cells, configurable logic blocks and I/O pads. The physical path between the blocks form interconnects. The logic blocks may have both combinational and sequential circuits to perform logic functions. Here the logic blocks are assumed to have either combinational or sequential circuits which generate a single minterm or maxterm as the output. The FPGA testing is divided into interconnect and logical testing. In interconnect testing fault models are introduced in the wire connections that exists within logic blocks and these faults are propagated to the output thereby detecting the faults at interconnects. In general 2n test vectors are needed to test the single term logic function with n inputs. Here Walsh code is used to optimize the test vectors. The number of test vectors are optimized as log2(M+2), where M is number of wire connections. The test vectors are the columns of M binary numbers and the successive binary numbers are exchanged to obtain the test vectors","PeriodicalId":210885,"journal":{"name":"Advances in Recent Technologies in Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131212557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Morphological Analyzer for Agglutinative Languages Using Machine Learning Approaches 使用机器学习方法的黏着语言形态分析器
Pub Date : 2009-10-27 DOI: 10.1109/ARTCom.2009.184
V. Dhanalakshmi, M. A. Kumar, R. Rekha, C. Kumar, K. Soman, S. Rajendran
This paper is based on morphological analyzer using machine learning approach for complex agglutinative natural languages. Morphological analysis is concerned with retrieving the structure, the syntactic and morphological properties or the meaning of a morphologically complex word. The morphology structure of agglutinative language is unique and capturing its complexity in a machine analyzable and generatable format is a challenging job. Generally rule based approaches are used for building morphological analyzer system. In rule based approaches what works in the forward direction may not work in the backward direction. This new and state of the art machine learning approach based on sequence labeling and training by kernel methods captures the non-linear relationships in the different aspect of morphological features of natural languages in a better and simpler way. The overall accuracy obtained for the morphologically rich agglutinative language (Tamil) was really encouraging.
本文研究了基于机器学习方法的复杂黏着性自然语言形态分析仪。词形分析是指检索一个词形复杂的词的结构、句法和词形特征或意义。黏着语言的形态结构是独特的,将其复杂性以机器可分析和可生成的形式捕获是一项具有挑战性的工作。形态学分析系统的构建一般采用基于规则的方法。在基于规则的方法中,在前进方向上起作用的方法可能在后退方向上不起作用。这种基于序列标记和核方法训练的新型机器学习方法以一种更好、更简单的方式捕获了自然语言形态特征不同方面的非线性关系。对于形态丰富的黏着语言(泰米尔语),获得的总体准确性确实令人鼓舞。
{"title":"Morphological Analyzer for Agglutinative Languages Using Machine Learning Approaches","authors":"V. Dhanalakshmi, M. A. Kumar, R. Rekha, C. Kumar, K. Soman, S. Rajendran","doi":"10.1109/ARTCom.2009.184","DOIUrl":"https://doi.org/10.1109/ARTCom.2009.184","url":null,"abstract":"This paper is based on morphological analyzer using machine learning approach for complex agglutinative natural languages. Morphological analysis is concerned with retrieving the structure, the syntactic and morphological properties or the meaning of a morphologically complex word. The morphology structure of agglutinative language is unique and capturing its complexity in a machine analyzable and generatable format is a challenging job. Generally rule based approaches are used for building morphological analyzer system. In rule based approaches what works in the forward direction may not work in the backward direction. This new and state of the art machine learning approach based on sequence labeling and training by kernel methods captures the non-linear relationships in the different aspect of morphological features of natural languages in a better and simpler way. The overall accuracy obtained for the morphologically rich agglutinative language (Tamil) was really encouraging.","PeriodicalId":210885,"journal":{"name":"Advances in Recent Technologies in Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123802725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
A Novel Time and Energy Efficient Cubing Circuit Using Vedic Mathematics for Finite Field Arithmetic 一种利用吠陀数学求解有限域算法的新型省时节能立方电路
Pub Date : 2009-10-27 DOI: 10.1109/ARTCOM.2009.227
R. Marimuthu, K. Thanushkodi, K. Dayalan, P. Dharani
Cubing plays a vital role in secure communication systems, Signal Processing Applications, Finite Field Arithmetic etc. As the radix of the number used for cubing increases the process gets complicated which in turn increases the delay and power consumption. Vedic mathematics is an ancient mathematics concept that provides a fast and a reliable approach to perform arithmetic operations using sixteen Sutras or word- formulae. In this paper the Anurupya Vedic sutra is used for cubing operations with two different multiplier architectures - One array structured and one tree structure. The performance of these multipliers for cubing applications is compared on the basis of their delay, power consumption and area utilization and it is proved that Anurupya Sutra improves the performance tremendously
立方体在保密通信系统、信号处理应用、有限域算法等方面起着至关重要的作用。随着用于立方的数的基数增加,过程变得复杂,这反过来又增加了延迟和功耗。吠陀数学是一种古老的数学概念,它提供了一种快速可靠的方法来执行算术运算,使用十六经或字公式。在本文中,阿努鲁毗耶吠陀经被用于两种不同乘数结构的立方运算-一种是数组结构,一种是树结构。从时延、功耗和面积利用率等方面比较了这些乘数器在立方体应用中的性能,证明了《阿鲁梵经》极大地提高了乘数器的性能
{"title":"A Novel Time and Energy Efficient Cubing Circuit Using Vedic Mathematics for Finite Field Arithmetic","authors":"R. Marimuthu, K. Thanushkodi, K. Dayalan, P. Dharani","doi":"10.1109/ARTCOM.2009.227","DOIUrl":"https://doi.org/10.1109/ARTCOM.2009.227","url":null,"abstract":"Cubing plays a vital role in secure communication systems, Signal Processing Applications, Finite Field Arithmetic etc. As the radix of the number used for cubing increases the process gets complicated which in turn increases the delay and power consumption. Vedic mathematics is an ancient mathematics concept that provides a fast and a reliable approach to perform arithmetic operations using sixteen Sutras or word- formulae. In this paper the Anurupya Vedic sutra is used for cubing operations with two different multiplier architectures - One array structured and one tree structure. The performance of these multipliers for cubing applications is compared on the basis of their delay, power consumption and area utilization and it is proved that Anurupya Sutra improves the performance tremendously","PeriodicalId":210885,"journal":{"name":"Advances in Recent Technologies in Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122090750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Image Fusion Based on Overcomplete Rational Wavelet Transform with an Improved IHS Method 基于超完备有理小波变换的改进IHS图像融合
Pub Date : 2009-10-27 DOI: 10.1109/ARTCom.2009.199
M. K., Soman K
This paper introduces a new hybrid fusion method which is comprised of fast intensity–hue-saturation (FIHS) and over complete discrete wavelet transform with rational dilation factors. Apart from speed, this hybrid fusion method can help to overcome the problems inherent in IHS and wavelet based methods. This method can also be used to extract the spatial information from the difference image of the panchromatic (PAN) and intensity images.
本文介绍了一种新的混合融合方法,该方法由快速强度-色调-饱和度(FIHS)和带合理膨胀因子的过完备离散小波变换组成。除了速度之外,这种混合融合方法还有助于克服基于IHS和小波的方法固有的问题。该方法还可用于从全色图像和强度图像的差分图像中提取空间信息。
{"title":"Image Fusion Based on Overcomplete Rational Wavelet Transform with an Improved IHS Method","authors":"M. K., Soman K","doi":"10.1109/ARTCom.2009.199","DOIUrl":"https://doi.org/10.1109/ARTCom.2009.199","url":null,"abstract":"This paper introduces a new hybrid fusion method which is comprised of fast intensity–hue-saturation (FIHS) and over complete discrete wavelet transform with rational dilation factors. Apart from speed, this hybrid fusion method can help to overcome the problems inherent in IHS and wavelet based methods. This method can also be used to extract the spatial information from the difference image of the panchromatic (PAN) and intensity images.","PeriodicalId":210885,"journal":{"name":"Advances in Recent Technologies in Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122816845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing Intrusion Detection System for Multicore Processor 多核处理器入侵检测系统的实现
Pub Date : 2009-10-27 DOI: 10.1109/ARTCom.2009.44
G. Rajeswari, B. Nithya
Multi-core processors represent a major evolution in computing hardware technology. Multi-core provides a network security application with more processing power from the hardware perspective. However, there are still significant software design challenges that must be overcome. In this paper, we present new architecture for multi-core supported Intrusion Detection System, which aims at providing network security processing without causing performance penalty to normal network operations. While hardware-based parallelisms have shown their advantage on throughput performance, parallelisms based multi-core provides more flexible, high performance, comprehensive, intelligent, and scalable solutions to network security applications. The Intrusion Detection System that we presented in this paper also protect the multi core systems from Real Time attacks and Packet Filtrations with high performance without any penalty.
多核处理器代表了计算硬件技术的重大发展。多核从硬件的角度为网络安全应用程序提供了更强的处理能力。然而,仍然有重要的软件设计挑战必须克服。在本文中,我们提出了一种新的多核支持入侵检测系统架构,旨在提供网络安全处理,而不会对正常的网络操作造成性能损失。虽然基于硬件的并行已经在吞吐量性能上显示出优势,但基于并行的多核为网络安全应用程序提供了更灵活、高性能、全面、智能和可扩展的解决方案。本文提出的入侵检测系统能够有效地保护多核系统免受实时攻击和数据包过滤的侵害,并且性能良好。
{"title":"Implementing Intrusion Detection System for Multicore Processor","authors":"G. Rajeswari, B. Nithya","doi":"10.1109/ARTCom.2009.44","DOIUrl":"https://doi.org/10.1109/ARTCom.2009.44","url":null,"abstract":"Multi-core processors represent a major evolution in computing hardware technology. Multi-core provides a network security application with more processing power from the hardware perspective. However, there are still significant software design challenges that must be overcome. In this paper, we present new architecture for multi-core supported Intrusion Detection System, which aims at providing network security processing without causing performance penalty to normal network operations. While hardware-based parallelisms have shown their advantage on throughput performance, parallelisms based multi-core provides more flexible, high performance, comprehensive, intelligent, and scalable solutions to network security applications. The Intrusion Detection System that we presented in this paper also protect the multi core systems from Real Time attacks and Packet Filtrations with high performance without any penalty.","PeriodicalId":210885,"journal":{"name":"Advances in Recent Technologies in Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122259290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Wood Species Recognition Using GLCM and Correlation 基于GLCM和相关性的木材树种识别
Pub Date : 2009-10-27 DOI: 10.1109/ARTCom.2009.10
R. Bremananth, B. Nithya, R. Saipriya
The proposed system identifies the species of the wood using the textural features present in its barks. Each species of a wood has its own unique patterns in its bark, which enabled the proposed system to identify it accurately. Automatic wood recognition system has not yet been well established mainly due to lack of research in this area and the difficulty in obtaining the wood database. In our work, a wood recognition system has been designed based on pre-processing techniques, feature extraction and by correlating the features of those wood species for their classification. Texture classification is a problem that has been studied and tested using different methods due to its valuable usage in various pattern recognition problems, such as wood recognition, rock classification. The most popular technique used for the textural classification is Gray-level Co-occurrence Matrices (GLCM). The features from the enhanced images are thus extracted using the GLCM is correlated, which determines the classification between the various wood species. The result thus obtained shows a high rate of recognition accuracy proving that the techniques used in suitable to be implemented for commercial purposes.
该系统通过树皮的纹理特征来识别木材的种类。每一种木材的树皮都有自己独特的图案,这使得所提出的系统能够准确地识别它。木材自动识别系统尚未建立,主要原因是该领域的研究较少,木材数据库获取困难。在我们的工作中,我们设计了一个基于预处理技术和特征提取的木材识别系统,并通过将这些木材物种的特征关联起来进行分类。由于纹理分类在木材识别、岩石分类等各种模式识别问题中具有重要的应用价值,因此人们对纹理分类进行了不同方法的研究和测试。最常用的纹理分类技术是灰度共生矩阵(GLCM)。因此,从增强图像中提取的特征使用GLCM是相关的,这决定了不同树种之间的分类。结果表明,该方法具有较高的识别准确率,适合商业应用。
{"title":"Wood Species Recognition Using GLCM and Correlation","authors":"R. Bremananth, B. Nithya, R. Saipriya","doi":"10.1109/ARTCom.2009.10","DOIUrl":"https://doi.org/10.1109/ARTCom.2009.10","url":null,"abstract":"The proposed system identifies the species of the wood using the textural features present in its barks. Each species of a wood has its own unique patterns in its bark, which enabled the proposed system to identify it accurately. Automatic wood recognition system has not yet been well established mainly due to lack of research in this area and the difficulty in obtaining the wood database. In our work, a wood recognition system has been designed based on pre-processing techniques, feature extraction and by correlating the features of those wood species for their classification. Texture classification is a problem that has been studied and tested using different methods due to its valuable usage in various pattern recognition problems, such as wood recognition, rock classification. The most popular technique used for the textural classification is Gray-level Co-occurrence Matrices (GLCM). The features from the enhanced images are thus extracted using the GLCM is correlated, which determines the classification between the various wood species. The result thus obtained shows a high rate of recognition accuracy proving that the techniques used in suitable to be implemented for commercial purposes.","PeriodicalId":210885,"journal":{"name":"Advances in Recent Technologies in Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117088572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Adjacency Matrix Based Objects Representation for Human Identification in Images 基于邻接矩阵的图像中人体识别对象表示
Pub Date : 2009-10-27 DOI: 10.1109/ARTCom.2009.70
S. Saravanakumar, A. Vadivel
In this paper the human object present in images are identified. K-means clustering algorithm is used for segmenting the images and Connected Component Analysis is used as post-processing step. Initially, templates are created from human posture in idle and various angles. The adjacency matrix is constructed from objects and it is matched with templates. A similarity measure has been proposed for estimating the matching.
本文对图像中存在的人体目标进行了识别。采用K-means聚类算法对图像进行分割,后处理步骤采用连通分量分析。最初,模板是由人的姿势在空闲和各种角度创建的。邻接矩阵由对象构造,并与模板匹配。提出了一种相似性测度来估计匹配。
{"title":"Adjacency Matrix Based Objects Representation for Human Identification in Images","authors":"S. Saravanakumar, A. Vadivel","doi":"10.1109/ARTCom.2009.70","DOIUrl":"https://doi.org/10.1109/ARTCom.2009.70","url":null,"abstract":"In this paper the human object present in images are identified. K-means clustering algorithm is used for segmenting the images and Connected Component Analysis is used as post-processing step. Initially, templates are created from human posture in idle and various angles. The adjacency matrix is constructed from objects and it is matched with templates. A similarity measure has been proposed for estimating the matching.","PeriodicalId":210885,"journal":{"name":"Advances in Recent Technologies in Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122770916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visualizing Sequence of Algorithms for Searching and Sorting 搜索和排序算法的可视化序列
Pub Date : 2009-10-27 DOI: 10.1109/ARTCom.2009.20
R. Bremananth, V. Radhika, S. Thenmozhi
In this paper sequence of execution of algorithms are explained visually in an interactive manner. It helps to realize the fundamental concept of algorithms such as searching and sorting method in a simple manner. Visualization gains more attention than theoretical study and it is an easy way of learning process. We propose methods for finding runtime of each algorithm and aims to overcome the drawbacks of the existing character systems. System illustrates each and every step clearly using text and animation. Comparisons of its time complexity have been carried out and results show that our approach provides better perceptive of algorithms.
本文以交互的方式直观地解释了算法的执行顺序。它有助于以简单的方式实现搜索和排序方法等算法的基本概念。可视化比理论学习更受关注,而且是一种简单的学习方法。我们提出了寻找每个算法运行时的方法,旨在克服现有字符系统的缺点。系统说明了每一个步骤,清楚地使用文字和动画。对其时间复杂度进行了比较,结果表明我们的方法提供了更好的算法感知。
{"title":"Visualizing Sequence of Algorithms for Searching and Sorting","authors":"R. Bremananth, V. Radhika, S. Thenmozhi","doi":"10.1109/ARTCom.2009.20","DOIUrl":"https://doi.org/10.1109/ARTCom.2009.20","url":null,"abstract":"In this paper sequence of execution of algorithms are explained visually in an interactive manner. It helps to realize the fundamental concept of algorithms such as searching and sorting method in a simple manner. Visualization gains more attention than theoretical study and it is an easy way of learning process. We propose methods for finding runtime of each algorithm and aims to overcome the drawbacks of the existing character systems. System illustrates each and every step clearly using text and animation. Comparisons of its time complexity have been carried out and results show that our approach provides better perceptive of algorithms.","PeriodicalId":210885,"journal":{"name":"Advances in Recent Technologies in Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121411029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Advances in Recent Technologies in Communication and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1