首页 > 最新文献

2008 First International Conference on Emerging Trends in Engineering and Technology最新文献

英文 中文
Lifetime Maximization in Wireless Sensor Network Using Cross Layer Design: A Design Review 基于跨层设计的无线传感器网络寿命最大化研究
Manisha S. Masurkar, G. Asutkar, K. Kulat
In our paper we consider the comparison performance of wireless sensor network to optimize the event detection and TDMA schemes using cross layer interaction. We consider the accuracy and lifetime of WSN because accuracy and lifetime are the important parameters of wireless sensor network because working of system depends upon it. Lifetime maximization relates with various factors such as throughput, end to end delay, lifetime parameter such as time, output, packet delivery rates, no. of nodes, nodes efficiency, operating frequency to operate and relate each parameter. It is very difficult to study and compare all the above parameters simultaneously in the Wireless Sensor Network. So throughput is end to end delay or packet delivery of nodes can be verified any improvement in one of the parameter so that it can optimized the operation capability of the whole wireless network. Depending upon the no. of nodes corresponding hoping is developed. Routing through no. of hopes can disturbed the lifetime of WSN.
本文通过比较无线传感器网络的性能来优化事件检测方案和采用跨层交互的TDMA方案。我们考虑了无线传感器网络的精度和寿命,因为精度和寿命是无线传感器网络的重要参数,系统的工作依赖于它。生命周期最大化与各种因素有关,如吞吐量、端到端延迟、生命周期参数(如时间、输出、数据包传输速率、流量)。对节点、节点效率、运行频率进行操作并关联各个参数。在无线传感器网络中,同时研究和比较上述所有参数是非常困难的。因此吞吐量是端到端时延或节点数据包传送的任何一个改进都可以验证的参数,从而可以优化整个无线网络的运行能力。视情况而定。发展相应的节点希望。路由通过no。希望的破灭会扰乱WSN的一生。
{"title":"Lifetime Maximization in Wireless Sensor Network Using Cross Layer Design: A Design Review","authors":"Manisha S. Masurkar, G. Asutkar, K. Kulat","doi":"10.1109/ICETET.2008.142","DOIUrl":"https://doi.org/10.1109/ICETET.2008.142","url":null,"abstract":"In our paper we consider the comparison performance of wireless sensor network to optimize the event detection and TDMA schemes using cross layer interaction. We consider the accuracy and lifetime of WSN because accuracy and lifetime are the important parameters of wireless sensor network because working of system depends upon it. Lifetime maximization relates with various factors such as throughput, end to end delay, lifetime parameter such as time, output, packet delivery rates, no. of nodes, nodes efficiency, operating frequency to operate and relate each parameter. It is very difficult to study and compare all the above parameters simultaneously in the Wireless Sensor Network. So throughput is end to end delay or packet delivery of nodes can be verified any improvement in one of the parameter so that it can optimized the operation capability of the whole wireless network. Depending upon the no. of nodes corresponding hoping is developed. Routing through no. of hopes can disturbed the lifetime of WSN.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124964321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
PATPAN: Power Aware Transport Protocol for Adhoc Networks 自组织网络的功率感知传输协议
P. Ganeshkumar, K. Thyagarajah
The transmission control protocol (TCP) was designed to provide reliable end to end delivery of data over unreliable networks. Ignoring the properties of wireless adhoc networks can lead to poor TCP implementation. Therefore several transport layer protocol have been designed exclusively for adhoc network such as ATCP, ATP, TPA etc. Out of these protocols ATP finds to be more suitable for adhoc network. In ATP, the performance of sending TCP is concentrated but the performance and load of the intermediate node is not taken in to account while designing it. In this paper a simple approach is proposed to address the intermediate node problem by making it to operate in three layers rather than operating in four layers. This enhanced ATP is called as PATPAN.
传输控制协议(TCP)的设计目的是在不可靠的网络上提供可靠的端到端数据传输。忽略无线自组织网络的特性可能导致TCP实现不佳。因此,专门为自组网设计了几种传输层协议,如ATCP、ATP、TPA等。在这些协议中,ATP发现更适合于自组织网络。在ATP中,发送TCP的性能是集中的,但在设计时没有考虑中间节点的性能和负载。本文提出了一种简单的方法来解决中间节点问题,使其在三层而不是四层中运行。这种增强的ATP被称为PATPAN。
{"title":"PATPAN: Power Aware Transport Protocol for Adhoc Networks","authors":"P. Ganeshkumar, K. Thyagarajah","doi":"10.1109/ICETET.2008.210","DOIUrl":"https://doi.org/10.1109/ICETET.2008.210","url":null,"abstract":"The transmission control protocol (TCP) was designed to provide reliable end to end delivery of data over unreliable networks. Ignoring the properties of wireless adhoc networks can lead to poor TCP implementation. Therefore several transport layer protocol have been designed exclusively for adhoc network such as ATCP, ATP, TPA etc. Out of these protocols ATP finds to be more suitable for adhoc network. In ATP, the performance of sending TCP is concentrated but the performance and load of the intermediate node is not taken in to account while designing it. In this paper a simple approach is proposed to address the intermediate node problem by making it to operate in three layers rather than operating in four layers. This enhanced ATP is called as PATPAN.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124797272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design of an Intelligent Answering System Through Agent Based Search Engine Using Grid Technology 基于网格技术的Agent搜索引擎智能应答系统设计
D. Jayalatchumy, D. Kadhirvelu, P. Ramkumar
Agent technology is a software entity with self-adaptation and intelligence that can accomplish a task by means of initiative service on behalf of users. The purpose of this paper is to formulate a functional architecture that supports the e-learning objectives: study individually and cooperatively, anytime and anywhere, guide specific individuals to their most relevant community. In order to make the work more efficient and to improve the performance an answering system is designed that does an intelligent search using algorithms like full text based search, word segmentation and fuzzy search. It displays the result by analyzing the userpsilas profile, experience and users needs so that the he is fully satisfied. It is made possible using case base reasoning (CBR) technique. A decentralized search engine is also built on top of grid technology with the help of software agents that allows the user to search through heterogeneous resources stored in geographically distributed digital collections.
Agent技术是一种具有自适应能力和智能的软件实体,能够代表用户通过主动服务的方式完成任务。本文的目的是制定一个支持电子学习目标的功能体系结构:个人和合作学习,随时随地,指导特定的个人到他们最相关的社区。为了提高工作效率,提高答疑系统的性能,设计了一个基于全文搜索、分词和模糊搜索等算法的智能搜索答疑系统。它通过分析用户的个人资料、体验和用户需求来显示结果,使用户完全满意。这是通过案例推理(CBR)技术实现的。在软件代理的帮助下,分布式搜索引擎也建立在网格技术之上,允许用户搜索存储在地理分布的数字集合中的异构资源。
{"title":"Design of an Intelligent Answering System Through Agent Based Search Engine Using Grid Technology","authors":"D. Jayalatchumy, D. Kadhirvelu, P. Ramkumar","doi":"10.1109/ICETET.2008.29","DOIUrl":"https://doi.org/10.1109/ICETET.2008.29","url":null,"abstract":"Agent technology is a software entity with self-adaptation and intelligence that can accomplish a task by means of initiative service on behalf of users. The purpose of this paper is to formulate a functional architecture that supports the e-learning objectives: study individually and cooperatively, anytime and anywhere, guide specific individuals to their most relevant community. In order to make the work more efficient and to improve the performance an answering system is designed that does an intelligent search using algorithms like full text based search, word segmentation and fuzzy search. It displays the result by analyzing the userpsilas profile, experience and users needs so that the he is fully satisfied. It is made possible using case base reasoning (CBR) technique. A decentralized search engine is also built on top of grid technology with the help of software agents that allows the user to search through heterogeneous resources stored in geographically distributed digital collections.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123844295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Genetic Fuzzy Based Tracking Control of 3 DOF Robot Arm 基于遗传模糊的三自由度机械臂跟踪控制
Srinivasan Alavandar, M. Nigam
The essential problem in controlling robots is to make the manipulator follow a desired trajectory. This paper presents the genetic algorithm tuned fuzzy PID controller (GAFPID) to follow the desired trajectory for a three degree of freedom (DOF) robot arm. Numerical simulation using the dynamic model of three DOF robot arm shows the effectiveness of the approach in trajectory tracking problems. Comparative evaluation with respect to PD, PID and fuzzy PID controls are presented to validate the controller design. The results presented emphasize that a satisfactory tracking precision could be achieved using the proposed controller than conventional controller.
控制机器人的关键问题是使机械手沿着预定的轨迹运动。本文提出了一种遗传算法调谐模糊PID控制器(GAFPID),以使三自由度机械臂沿期望轨迹运动。利用三自由度机械臂的动力学模型进行了数值仿真,验证了该方法在轨迹跟踪问题中的有效性。通过对PD、PID和模糊PID控制的对比评价,验证了控制器的设计。实验结果表明,与传统控制器相比,所提出的控制器可以达到令人满意的跟踪精度。
{"title":"Genetic Fuzzy Based Tracking Control of 3 DOF Robot Arm","authors":"Srinivasan Alavandar, M. Nigam","doi":"10.1109/ICETET.2008.75","DOIUrl":"https://doi.org/10.1109/ICETET.2008.75","url":null,"abstract":"The essential problem in controlling robots is to make the manipulator follow a desired trajectory. This paper presents the genetic algorithm tuned fuzzy PID controller (GAFPID) to follow the desired trajectory for a three degree of freedom (DOF) robot arm. Numerical simulation using the dynamic model of three DOF robot arm shows the effectiveness of the approach in trajectory tracking problems. Comparative evaluation with respect to PD, PID and fuzzy PID controls are presented to validate the controller design. The results presented emphasize that a satisfactory tracking precision could be achieved using the proposed controller than conventional controller.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129566227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Economics of Environment Management System: A Quality Cost Perspective 环境管理系统经济学:质量成本视角
S. Jaju, R. P. Mohanty
There is a growing need for industries to become accountable for their actions towards the environment. In order to make it possible, it is required to develop comprehensive, integrated and progressive environmental policies. These environmental policies would maintain dynamic environmental equilibrium. Today there is requirement by the National and International bodies to have standardised environmental management systems (EMS). These systems would keep the records of all environmental issues pertaining to the organisation. The EMS is made simple through the introduction of the ISO 14000 series. ISO 14000 provides guidelines on how to successfully manage and reduce environmental impacts through management functions, while at the same time allowing for high levels of socioeconomic growth and dedication to sustainable development. The implementation of EMS through ISO 14000 series would involve the expenditure. Every organisation is interested in economic aspects before the implementation of any system. They want that the system should provide the financial benefits, which will motivate to keep going on. This paper discusses economic aspects for the implementation of ISO 14000 an EMS tool in any organization with the help of cost of environment concept. The paper presents the concept of quality cost being applied to justify the implementation of EMS.
越来越多的行业需要对他们的环境行为负责。为了实现这一目标,需要制定全面、综合和渐进的环境政策。这些环境政策将维持动态的环境平衡。今天,国家和国际机构要求有标准化的环境管理系统(EMS)。这些系统将保存与组织有关的所有环境问题的记录。通过引入ISO 14000系列,使环境管理体系变得简单。ISO 14000提供了如何通过管理职能成功管理和减少环境影响的指导方针,同时允许高水平的社会经济增长和致力于可持续发展。通过iso14000系列实施环境管理体系将涉及开支。在实施任何制度之前,每个组织都对经济方面感兴趣。他们希望该系统能够提供经济利益,这将激励他们继续下去。本文在环境成本概念的帮助下,讨论了在任何组织中实施ISO 14000环境管理体系工具的经济方面。本文提出了应用质量成本的概念来证明实施环境管理体系的合理性。
{"title":"Economics of Environment Management System: A Quality Cost Perspective","authors":"S. Jaju, R. P. Mohanty","doi":"10.1109/ICETET.2008.100","DOIUrl":"https://doi.org/10.1109/ICETET.2008.100","url":null,"abstract":"There is a growing need for industries to become accountable for their actions towards the environment. In order to make it possible, it is required to develop comprehensive, integrated and progressive environmental policies. These environmental policies would maintain dynamic environmental equilibrium. Today there is requirement by the National and International bodies to have standardised environmental management systems (EMS). These systems would keep the records of all environmental issues pertaining to the organisation. The EMS is made simple through the introduction of the ISO 14000 series. ISO 14000 provides guidelines on how to successfully manage and reduce environmental impacts through management functions, while at the same time allowing for high levels of socioeconomic growth and dedication to sustainable development. The implementation of EMS through ISO 14000 series would involve the expenditure. Every organisation is interested in economic aspects before the implementation of any system. They want that the system should provide the financial benefits, which will motivate to keep going on. This paper discusses economic aspects for the implementation of ISO 14000 an EMS tool in any organization with the help of cost of environment concept. The paper presents the concept of quality cost being applied to justify the implementation of EMS.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129333738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Applications of Rough Sets in the Field of Data Mining 粗糙集在数据挖掘领域中的应用
A. Butalia, M. Dhore, Geetika Tewani
The issues of Real World are Very large data sets, Mixed types of data (continuous valued, symbolic data), Uncertainty (noisy data), Incompleteness (missing, incomplete data), Data change, Use of background knowledge etc. The main goal of the rough set analysis is induction of approximations of concepts [4]. Rough sets constitute a sound basis for KDD. It offers mathematical tools to discover patterns hidden in data [4] and hence used in the field of data mining. Rough Sets does not require any preliminary information as Fuzzy sets require membership values or probability is required in statistics. Hence this is its specialty. Two novel algorithms to find optimal reducts of condition attributes based on the relative attribute dependency are implemented using Java 1.5, out of which the first algorithms gives simple reduct whereas the second one gives the reduct with minimum attributes, The presented implementation serves as a prototype system for extracting decision rules, which is the first module. Second module gives positive regions for dependencies. Third module is reducts for calculating the minimum attributes to decide decision, with two techniques, first with brute force backward elimination which simply selects the attributes in the given order to check if they should be eliminated, and the second technique is the information entropy-based algorithm which calculates the information entropy conveyed in each attribute and selects the one with the maximum information gain for elimination. Fourth modules describes the Equivalence classes for Classification including lower and upper approximation for implementing hard computing and soft computing respectively and last module is the discernibility matrix and functions which is used that stores the differences between attribute values for each pair of data tuples. Rather than searching on the entire training set, the matrix is instead searched to detect redundant attributes. All these ultimately constitute the modules of the system. The implemented system is tested on a small sized application first to verity the mathematical calculations involved which is not practically feasible with large database. It is also tested on a medium sized application example to illustrate the usefulness of the system and the incorporated language.
现实世界的问题是非常大的数据集,混合类型的数据(连续值,符号数据),不确定性(噪声数据),不完整性(缺失,不完整的数据),数据更改,背景知识的使用等。粗糙集分析的主要目标是对概念的近似进行归纳[4]。粗糙集构成了KDD的良好基础。它提供了数学工具来发现隐藏在数据中的模式[4],因此用于数据挖掘领域。粗糙集不需要任何初步信息,模糊集需要隶属度值或统计中需要概率。因此这是它的特色。利用Java 1.5实现了两种基于相对属性依赖的条件属性最优约简算法,其中第一种算法为简单约简,第二种算法为最小属性约简,该算法作为决策规则提取的原型系统,是第一个模块。第二个模块给出了依赖项的正区域。第三个模块是约简,用于计算最小属性来决定决策,采用两种技术,一种是简单地按给定的顺序选择属性来检查是否需要消除,另一种是基于信息熵的算法,计算每个属性所传递的信息熵,并选择信息增益最大的属性进行消除。第四个模块分别描述了用于分类的等价类,包括用于实现硬计算和软计算的下近似和上近似;最后一个模块是用于存储每对数据元组属性值之间差异的可辨矩阵和函数。不是在整个训练集上搜索,而是搜索矩阵以检测冗余属性。所有这些最终构成了系统的模块。所实现的系统首先在一个小型应用程序上进行测试,以验证所涉及的数学计算在大型数据库中是不可行的。它还在一个中等规模的应用程序示例中进行了测试,以说明系统和合并语言的有用性。
{"title":"Applications of Rough Sets in the Field of Data Mining","authors":"A. Butalia, M. Dhore, Geetika Tewani","doi":"10.1109/ICETET.2008.143","DOIUrl":"https://doi.org/10.1109/ICETET.2008.143","url":null,"abstract":"The issues of Real World are Very large data sets, Mixed types of data (continuous valued, symbolic data), Uncertainty (noisy data), Incompleteness (missing, incomplete data), Data change, Use of background knowledge etc. The main goal of the rough set analysis is induction of approximations of concepts [4]. Rough sets constitute a sound basis for KDD. It offers mathematical tools to discover patterns hidden in data [4] and hence used in the field of data mining. Rough Sets does not require any preliminary information as Fuzzy sets require membership values or probability is required in statistics. Hence this is its specialty. Two novel algorithms to find optimal reducts of condition attributes based on the relative attribute dependency are implemented using Java 1.5, out of which the first algorithms gives simple reduct whereas the second one gives the reduct with minimum attributes, The presented implementation serves as a prototype system for extracting decision rules, which is the first module. Second module gives positive regions for dependencies. Third module is reducts for calculating the minimum attributes to decide decision, with two techniques, first with brute force backward elimination which simply selects the attributes in the given order to check if they should be eliminated, and the second technique is the information entropy-based algorithm which calculates the information entropy conveyed in each attribute and selects the one with the maximum information gain for elimination. Fourth modules describes the Equivalence classes for Classification including lower and upper approximation for implementing hard computing and soft computing respectively and last module is the discernibility matrix and functions which is used that stores the differences between attribute values for each pair of data tuples. Rather than searching on the entire training set, the matrix is instead searched to detect redundant attributes. All these ultimately constitute the modules of the system. The implemented system is tested on a small sized application first to verity the mathematical calculations involved which is not practically feasible with large database. It is also tested on a medium sized application example to illustrate the usefulness of the system and the incorporated language.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129477687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Color Traits Transfer to Grayscale Images 颜色特征转移到灰度图像
H. B. Kekre, Sudeep D. Thepade
Here we are presenting some novel techniques for squirting colors in grayscale images. The problem of coloring grayscale images has no exact solution. Here we are attempting to minimize the human efforts needed in manually coloring the grayscale images. We need human interaction only to find a reference color image, then the job of transferring color traits from reference color image to grayscale image is done by proposed techniques. In these techniques, the color palette is prepared using pixel windows of some degrees taken from reference color image. Then the grayscale image is divided into pixel windows with same degrees. For every window of grayscale image the palette is searched for equivalent color values, which could be used to color grayscale window. In the whole process the luminance values of reference color image and target grayscale image are only matched and based on best possible match the respective chromaticity values of color image are transferred to grayscale image. For palette preparation first we used RGB color space and then Kekre's LUV color space[9]. Results with Kekre's LUV color space were comparatively better. To improve the searching time through color palette the exhaustive and Kekre's fast search are used.
在这里,我们将介绍一些在灰度图像中喷射颜色的新技术。灰度图像的上色问题没有精确的解决方案。在这里,我们试图尽量减少人工为灰度图像上色所需的人力。我们只需要人工交互就可以找到参考彩色图像,然后利用该技术完成将参考彩色图像的颜色特征转移到灰度图像的工作。在这些技术中,调色板是使用取自参考彩色图像的一定程度的像素窗口来准备的。然后将灰度图像划分为相同度的像素窗口。对于灰度图像的每个窗口,在调色板上搜索等效的颜色值,这些值可用于灰度窗口的上色。在整个过程中,只匹配参考彩色图像和目标灰度图像的亮度值,并在尽可能匹配的基础上将彩色图像各自的色度值转换为灰度图像。对于调色板的准备,我们首先使用RGB色彩空间,然后使用Kekre的LUV色彩空间[9]。Kekre’s LUV色彩空间效果相对较好。为了提高调色板的搜索速度,采用了穷举搜索和Kekre快速搜索。
{"title":"Color Traits Transfer to Grayscale Images","authors":"H. B. Kekre, Sudeep D. Thepade","doi":"10.1109/ICETET.2008.107","DOIUrl":"https://doi.org/10.1109/ICETET.2008.107","url":null,"abstract":"Here we are presenting some novel techniques for squirting colors in grayscale images. The problem of coloring grayscale images has no exact solution. Here we are attempting to minimize the human efforts needed in manually coloring the grayscale images. We need human interaction only to find a reference color image, then the job of transferring color traits from reference color image to grayscale image is done by proposed techniques. In these techniques, the color palette is prepared using pixel windows of some degrees taken from reference color image. Then the grayscale image is divided into pixel windows with same degrees. For every window of grayscale image the palette is searched for equivalent color values, which could be used to color grayscale window. In the whole process the luminance values of reference color image and target grayscale image are only matched and based on best possible match the respective chromaticity values of color image are transferred to grayscale image. For palette preparation first we used RGB color space and then Kekre's LUV color space[9]. Results with Kekre's LUV color space were comparatively better. To improve the searching time through color palette the exhaustive and Kekre's fast search are used.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128858319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Watermark Image Recognition Using Principal Component Analysis 基于主成分分析的水印图像识别
Amol R. Madane, M. M. Shah
In this paper, the algorithm of digital image watermarking is proposed using discrete wavelet transform (DWT) for copyright protection. The detail coefficients of second level host image after taking DWT is used as a watermark key for the watermark logo insertion or addition and extraction process. We have proposed the learning of low dimensional representation in the context of image recognition using principle component analysis (PCA). It is based on the second order statistics of image set. The PCA aims to find second order correlation of patterns. The effectiveness of PCA is tested on original watermark logo, extracted watermark logo. We were able to design a prototype system, which provides user authentication. The proposed system of watermark image recognition may be applied in identification systems, document control and access control.
提出了一种基于离散小波变换(DWT)的数字图像水印算法。采用小波变换后的二级主图像细节系数作为水印密钥进行水印标识的插入或添加和提取。我们提出了在图像识别中使用主成分分析(PCA)学习低维表示的方法。它基于图像集的二阶统计量。主成分分析的目的是寻找模式的二阶相关性。测试了PCA对原始水印的有效性,提取了水印。我们能够设计一个原型系统,它提供用户身份验证。所提出的水印图像识别系统可以应用于身份识别系统、文件控制和访问控制中。
{"title":"Watermark Image Recognition Using Principal Component Analysis","authors":"Amol R. Madane, M. M. Shah","doi":"10.1109/ICETET.2008.86","DOIUrl":"https://doi.org/10.1109/ICETET.2008.86","url":null,"abstract":"In this paper, the algorithm of digital image watermarking is proposed using discrete wavelet transform (DWT) for copyright protection. The detail coefficients of second level host image after taking DWT is used as a watermark key for the watermark logo insertion or addition and extraction process. We have proposed the learning of low dimensional representation in the context of image recognition using principle component analysis (PCA). It is based on the second order statistics of image set. The PCA aims to find second order correlation of patterns. The effectiveness of PCA is tested on original watermark logo, extracted watermark logo. We were able to design a prototype system, which provides user authentication. The proposed system of watermark image recognition may be applied in identification systems, document control and access control.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125559137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modelling and Pre-Assessment of Traffic Transitions in Dynamic Optical Networks 动态光网络中流量转换的建模与预评估
T. Indumathi, V. Patel
Keeping in mind the emerging consumer demand based network traffic scenario wherein assortment of traffics and resulting traffic conditions, we propose a generalized analytical method to assess network traffic first with resulting connections that follows. That is, we model traffic to embody two fundamental components transitions and transfer rates that helps us understand, establish, evaluate, qualify and quantify traffic patterns and hence traffic dynamics in optical networks.
考虑到新兴的基于消费者需求的网络流量场景,其中各种流量和由此产生的流量条件,我们提出了一种通用的分析方法,首先评估网络流量,然后再评估由此产生的连接。也就是说,我们对流量进行建模,以体现两个基本组件转换和传输速率,这有助于我们理解、建立、评估、限定和量化流量模式,从而实现光网络中的流量动态。
{"title":"Modelling and Pre-Assessment of Traffic Transitions in Dynamic Optical Networks","authors":"T. Indumathi, V. Patel","doi":"10.1109/ICETET.2008.88","DOIUrl":"https://doi.org/10.1109/ICETET.2008.88","url":null,"abstract":"Keeping in mind the emerging consumer demand based network traffic scenario wherein assortment of traffics and resulting traffic conditions, we propose a generalized analytical method to assess network traffic first with resulting connections that follows. That is, we model traffic to embody two fundamental components transitions and transfer rates that helps us understand, establish, evaluate, qualify and quantify traffic patterns and hence traffic dynamics in optical networks.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126389282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Attack Pattern Analysis and Signature Extraction for Web Services Using Honeypots 基于蜜罐的Web服务入侵攻击模式分析与签名提取
N. Dagdee, Urjita Thakar
With the increasing popularity of Web services, attackers are getting attracted to hack the Web services and the servers on which they run. One of the major threats is that of intruders which may maliciously try to access the data or services. Thus there is a need to protect the servers on which Web services are running from intruders. Therefore, intrusion detection systems need to be employed. Signature based IDS are popularly being used. Honeypots are a highly flexible security tool with differing applications for security. They are a security resource that does not have any production or authorized activity but have an important use in intrusion prevention, detection and information gathering. Honeypot collects very little data and what it collects is normally of high value. This information can be used in extraction of intrusion detection signature. In this paper we have proposed a method to analyze the attacks and generate signatures for Web services.
随着Web服务的日益普及,攻击者越来越倾向于攻击Web服务及其运行的服务器。其中一个主要威胁是入侵者可能会恶意尝试访问数据或服务。因此,需要保护运行Web服务的服务器免受入侵者的攻击。因此,需要采用入侵检测系统。基于签名的入侵检测被广泛使用。蜜罐是一种高度灵活的安全工具,具有不同的安全应用程序。它们是一种没有任何生产或授权活动,但在入侵防御、检测和信息收集等方面具有重要用途的安全资源。Honeypot收集的数据很少,而它收集的数据通常具有很高的价值。该信息可用于入侵检测签名的提取。本文提出了一种针对Web服务的攻击分析和签名生成方法。
{"title":"Intrusion Attack Pattern Analysis and Signature Extraction for Web Services Using Honeypots","authors":"N. Dagdee, Urjita Thakar","doi":"10.1109/ICETET.2008.192","DOIUrl":"https://doi.org/10.1109/ICETET.2008.192","url":null,"abstract":"With the increasing popularity of Web services, attackers are getting attracted to hack the Web services and the servers on which they run. One of the major threats is that of intruders which may maliciously try to access the data or services. Thus there is a need to protect the servers on which Web services are running from intruders. Therefore, intrusion detection systems need to be employed. Signature based IDS are popularly being used. Honeypots are a highly flexible security tool with differing applications for security. They are a security resource that does not have any production or authorized activity but have an important use in intrusion prevention, detection and information gathering. Honeypot collects very little data and what it collects is normally of high value. This information can be used in extraction of intrusion detection signature. In this paper we have proposed a method to analyze the attacks and generate signatures for Web services.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127437993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
2008 First International Conference on Emerging Trends in Engineering and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1