首页 > 最新文献

2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)最新文献

英文 中文
Multi agent based audio steganography 基于多智能体的音频隐写
T. Kartheeswaran, V. Senthooran, T. D. D. L. Pemadasa
Today's Information Technology grows rapidly with new technologies and need more security for the data transmission over the internet. Steganography is one of the solutions to ensure the data secure over the internet. An audio steganography is a method to transfer concealed information by changing the cover audio file without degrading the quality of the original file. The cover medium before steganography and stego medium after steganography should have the same characteristics of a good steganographic system. The Agent technology involves distributing the services with flexible manner. As most of the applications are created as services in present computing scenario and data security also can be served as a service. Agent-based steganography will improve the efficiency of the secure steganographic system and it will be more convenient in terms of flexibility and availability. In this research paper, we present a trusted communication platform for multi-agents that are able to hide the confidential message in the cover audio stream according to the user request and retrieve the hidden information from the stego audio file. This system provides high availability and flexibility in this context and a more feasible way to trust the message transmission. This work is currently being done and designing part of this work has been done successfully with satisfied results.
当今的信息技术随着新技术的发展而迅速发展,对互联网上数据传输的安全性要求更高。隐写术是确保互联网上数据安全的解决方案之一。音频隐写是一种在不降低原始文件质量的情况下通过改变覆盖音频文件来传输隐藏信息的方法。隐写前的覆盖介质和隐写后的隐写介质应具有良好的隐写系统的相同特征。Agent技术涉及到以灵活的方式分配业务。由于在当前的计算场景中,大多数应用程序都是作为服务创建的,数据安全也可以作为服务来提供。基于代理的隐写技术将提高安全隐写系统的效率,在灵活性和可用性方面更加方便。在本文中,我们提出了一种基于多智能体的可信通信平台,该平台能够根据用户的请求隐藏隐藏在隐藏音频流中的机密信息,并从隐藏音频文件中检索隐藏信息。该系统在这种情况下提供了高可用性和灵活性,并提供了一种更可行的消息信任传输方式。这项工作目前正在进行中,设计部分工作已经成功完成,效果令人满意。
{"title":"Multi agent based audio steganography","authors":"T. Kartheeswaran, V. Senthooran, T. D. D. L. Pemadasa","doi":"10.1109/ICCIC.2015.7435706","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435706","url":null,"abstract":"Today's Information Technology grows rapidly with new technologies and need more security for the data transmission over the internet. Steganography is one of the solutions to ensure the data secure over the internet. An audio steganography is a method to transfer concealed information by changing the cover audio file without degrading the quality of the original file. The cover medium before steganography and stego medium after steganography should have the same characteristics of a good steganographic system. The Agent technology involves distributing the services with flexible manner. As most of the applications are created as services in present computing scenario and data security also can be served as a service. Agent-based steganography will improve the efficiency of the secure steganographic system and it will be more convenient in terms of flexibility and availability. In this research paper, we present a trusted communication platform for multi-agents that are able to hide the confidential message in the cover audio stream according to the user request and retrieve the hidden information from the stego audio file. This system provides high availability and flexibility in this context and a more feasible way to trust the message transmission. This work is currently being done and designing part of this work has been done successfully with satisfied results.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"32 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114097308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Non-invasive tracking and monitoring glucose content using near infrared spectroscopy 使用近红外光谱法无创跟踪和监测葡萄糖含量
M. Tamilselvi, G. Ramkumar
Diabetes is deliberate as one of the major contributors of crystallize infirmity and death in non-infectious diseases. Common method for determination of blood glucose concentration is using a self-monitoring glucose meter. This process requires pricking the finger and pry out the blood from the forearm and doing the chemical analysis with the help of disposable test strips. The pain and difficulty caused by this method have lead to the evolution of a noninvasive method. This method makes use of a near infrared sensor for transmission and reception of rays from fingertip. Near-infrared (NIR) is passing through the fingertip, before and after obstructing the flow of blood. By explicate the variation in received signal intensity achieved after reflection in both the cases, glucose present in blood can be predicted and wirelessly transmitted to a remote PC. The results show the potential of glucose measurement using Near-infrared.
在非传染性疾病中,糖尿病被认为是晶状体弱和死亡的主要原因之一。常用的测定血糖浓度的方法是使用自我监测血糖仪。这个过程需要刺破手指,从前臂中取出血液,并借助一次性试纸进行化学分析。这种方法带来的痛苦和困难导致了一种无创方法的发展。这种方法利用近红外传感器来传输和接收来自指尖的射线。近红外(NIR)是通过指尖,前后阻碍血液流动。通过解释两种情况下反射后接收信号强度的变化,可以预测血液中的葡萄糖并将其无线传输到远程PC。结果显示了近红外测量葡萄糖的潜力。
{"title":"Non-invasive tracking and monitoring glucose content using near infrared spectroscopy","authors":"M. Tamilselvi, G. Ramkumar","doi":"10.1109/ICCIC.2015.7435728","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435728","url":null,"abstract":"Diabetes is deliberate as one of the major contributors of crystallize infirmity and death in non-infectious diseases. Common method for determination of blood glucose concentration is using a self-monitoring glucose meter. This process requires pricking the finger and pry out the blood from the forearm and doing the chemical analysis with the help of disposable test strips. The pain and difficulty caused by this method have lead to the evolution of a noninvasive method. This method makes use of a near infrared sensor for transmission and reception of rays from fingertip. Near-infrared (NIR) is passing through the fingertip, before and after obstructing the flow of blood. By explicate the variation in received signal intensity achieved after reflection in both the cases, glucose present in blood can be predicted and wirelessly transmitted to a remote PC. The results show the potential of glucose measurement using Near-infrared.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114158540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Design of experimental test bed to evaluate effectiveness of software protection mechanisms against buffer overflow attacks through emulation 设计了实验测试平台,通过仿真来评估软件保护机制对缓冲区溢出攻击的有效性
V. Srikanth, N. R. Kisore
To date a number of comprehensive techniques have been proposed to defend against buffer overflow attacks. While in theory these techniques aim to detect and defend against all forms of buffer overflows, in practice attackers constantly find techniques to bypass these protection mechanisms. In addition quite many of the mechanisms proposed in literature are never absorbed into a production system as these techniques suffer from performance issues such as high operational overhead in terms of system memory and/or CPU cycles and incompatibility with legacy systems. Further, none of the proposed security mechanisms guarantee 100% assurance against an attacker. On the other hand with the increase in the amount of digital data and the number of devices connected to the internet, the amount of information lost in the event of a large scale cyber attack is ever increasing. While often theoretical study of security is sufficient to identify the weakness of IT systems, an empirical evaluation is necessary to perform cost benefit benefit between the number computer hijacked (is an indirect measure of amount of information lost) in the event of a large scale cyber attack and the buffer overflow protection mechanism adopted. In this paper we propose an architecture for creation of an experimental test bed to evaluate the effectiveness of a buffer overflow protection mechanism by measuring overhead incurred versus it's effectiveness in defending against a large scale cyber attack.
迄今为止,已经提出了许多全面的技术来防御缓冲区溢出攻击。虽然理论上这些技术的目的是检测和防御所有形式的缓冲区溢出,但实际上攻击者不断找到绕过这些保护机制的技术。此外,文献中提出的许多机制从未被吸收到生产系统中,因为这些技术受到性能问题的影响,例如系统内存和/或CPU周期方面的高操作开销以及与遗留系统的不兼容性。此外,所建议的安全机制都不能100%保证不受攻击者的攻击。另一方面,随着数字数据量的增加和连接到互联网的设备数量的增加,在大规模网络攻击事件中丢失的信息量也在不断增加。虽然通常对安全的理论研究足以识别IT系统的弱点,但有必要进行经验评估,以便在大规模网络攻击事件中被劫持的计算机数量(是信息丢失量的间接衡量标准)与所采用的缓冲区溢出保护机制之间进行成本效益评估。在本文中,我们提出了一个用于创建实验测试平台的架构,通过测量所产生的开销与防御大规模网络攻击的有效性来评估缓冲区溢出保护机制的有效性。
{"title":"Design of experimental test bed to evaluate effectiveness of software protection mechanisms against buffer overflow attacks through emulation","authors":"V. Srikanth, N. R. Kisore","doi":"10.1109/ICCIC.2015.7435701","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435701","url":null,"abstract":"To date a number of comprehensive techniques have been proposed to defend against buffer overflow attacks. While in theory these techniques aim to detect and defend against all forms of buffer overflows, in practice attackers constantly find techniques to bypass these protection mechanisms. In addition quite many of the mechanisms proposed in literature are never absorbed into a production system as these techniques suffer from performance issues such as high operational overhead in terms of system memory and/or CPU cycles and incompatibility with legacy systems. Further, none of the proposed security mechanisms guarantee 100% assurance against an attacker. On the other hand with the increase in the amount of digital data and the number of devices connected to the internet, the amount of information lost in the event of a large scale cyber attack is ever increasing. While often theoretical study of security is sufficient to identify the weakness of IT systems, an empirical evaluation is necessary to perform cost benefit benefit between the number computer hijacked (is an indirect measure of amount of information lost) in the event of a large scale cyber attack and the buffer overflow protection mechanism adopted. In this paper we propose an architecture for creation of an experimental test bed to evaluate the effectiveness of a buffer overflow protection mechanism by measuring overhead incurred versus it's effectiveness in defending against a large scale cyber attack.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120953220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LSB based image steganography using PN sequence & GCD transform 基于LSB的PN序列和GCD变换图像隐写
R. K. Pathak, S. Meena
This paper has been proposed for the image steganography. It is based on a modification of LSB (least significant bit) of pixels and this modification is the replacement of LSB bits of the cover image (CI) pixels that carries the most significant bits (MSB) of data image (DI). This makes the algorithm modest. In steganography of image, security is also a major concern. Here, key based PN (Pseudo Number) sequence is generated. It is used to provide security to algorithm against the stegano-analytic attack. The algorithm also has been improved to detect and locate tampering done by malicious attackers. This is obtained by conversion of image into a fixed point image using GCD (Gaussian convolution and de-convolution) transform.
本文提出了一种用于图像隐写的方法。它基于像素的LSB(最低有效位)的修改,这种修改是替换包含数据图像(DI)的最高有效位(MSB)的覆盖图像(CI)像素的LSB位。这使得算法适度。在图像隐写术中,安全性也是一个重要的问题。在这里,生成基于密钥的PN(伪数字)序列。它用于为算法提供抗隐写分析攻击的安全性。该算法还改进了检测和定位恶意攻击者所做的篡改。这是通过使用GCD(高斯卷积和反卷积)变换将图像转换为定点图像而获得的。
{"title":"LSB based image steganography using PN sequence & GCD transform","authors":"R. K. Pathak, S. Meena","doi":"10.1109/ICCIC.2015.7435692","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435692","url":null,"abstract":"This paper has been proposed for the image steganography. It is based on a modification of LSB (least significant bit) of pixels and this modification is the replacement of LSB bits of the cover image (CI) pixels that carries the most significant bits (MSB) of data image (DI). This makes the algorithm modest. In steganography of image, security is also a major concern. Here, key based PN (Pseudo Number) sequence is generated. It is used to provide security to algorithm against the stegano-analytic attack. The algorithm also has been improved to detect and locate tampering done by malicious attackers. This is obtained by conversion of image into a fixed point image using GCD (Gaussian convolution and de-convolution) transform.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116071384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection and localization of text from natural scene images using texture features 利用纹理特征从自然场景图像中检测和定位文本
T. Kumuda, L. Basavaraj
Text in camera captured images contains important and useful information. Text in images can be used for identification, indexing and retrieval. Detection and localization of text from camera captured images is still a challenging task due to high variability of text appearance. In this paper we propose an efficient algorithm, for detecting and localizing text in natural scene images. The method is based on texture feature extraction using first and second order statistics. The entire work is divided into two stages. Text regions are detected in the first stage using texture features. Discriminative functions are used to filter out non-text regions. In the second stage the detected text regions are merged and localized. An experimental results obtained shows that the proposed approach detects and localizes texts of various sizes, fonts, orientations and languages efficiently.
相机捕获的图像中的文本包含重要和有用的信息。图像中的文本可用于识别、索引和检索。由于文本外观的高度可变性,从相机捕获的图像中检测和定位文本仍然是一项具有挑战性的任务。本文提出了一种有效的自然场景图像文本检测和定位算法。该方法基于一阶和二阶统计量提取纹理特征。整个工作分为两个阶段。在第一阶段使用纹理特征检测文本区域。判别函数用于过滤掉非文本区域。在第二阶段,对检测到的文本区域进行合并和定位。实验结果表明,该方法能够有效地检测和定位不同大小、字体、方向和语言的文本。
{"title":"Detection and localization of text from natural scene images using texture features","authors":"T. Kumuda, L. Basavaraj","doi":"10.1109/ICCIC.2015.7435688","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435688","url":null,"abstract":"Text in camera captured images contains important and useful information. Text in images can be used for identification, indexing and retrieval. Detection and localization of text from camera captured images is still a challenging task due to high variability of text appearance. In this paper we propose an efficient algorithm, for detecting and localizing text in natural scene images. The method is based on texture feature extraction using first and second order statistics. The entire work is divided into two stages. Text regions are detected in the first stage using texture features. Discriminative functions are used to filter out non-text regions. In the second stage the detected text regions are merged and localized. An experimental results obtained shows that the proposed approach detects and localizes texts of various sizes, fonts, orientations and languages efficiently.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127745924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A novel sparse ensemble pruning algorithm using a new diversity measure 基于新分集度量的稀疏集合剪枝算法
Sanyam Shukla, Jivitesh Sharma, Shankul Khare, Samruddhi Kochkar, Vanya Dharni
Extreme learning machine is state of art supervised machine learning technique for classification and regression. A single ELM classifier can however generate faulty or skewed results due to random initialization of weights between input and hidden layer. To overcome this instability problem ensemble methods can be employed. Ensemble methods may have problem of redundancy i.e. ensemble may contain several redundant classifiers which can be weak or highly correlated classifiers. Ensemble pruning can be used to remove these redundant classifiers. The pruned ensemble should not only be accurate but diverse as well in order to correctly classify boundary instances. This work proposes an ensemble pruning algorithm which tries to establish a tradeoff between accuracy and diversity. The paper also proposes a metric which scores classifiers based on their diversity and contribution towards the ensemble. The results show that the pruned ensemble performs equally well or in some cases even better as compared to the unpruned set in terms of accuracy and diversity. The results of the experiments show that the proposed algorithm performs better than VELM. The proposed algorithm reduces the ensemble size to less than 60 % of the original ensemble size (original ensemble size is set to 50).
极限学习机是目前最先进的用于分类和回归的监督机器学习技术。然而,由于输入层和隐藏层之间的权重随机初始化,单个ELM分类器可能会产生错误或倾斜的结果。为了克服这种不稳定性问题,可以采用集成方法。集成方法可能存在冗余问题,即集成可能包含多个冗余分类器,这些分类器可以是弱分类器,也可以是高度相关的分类器。集成修剪可以用来删除这些冗余的分类器。为了对边界实例进行正确的分类,剪枝集合不仅要精确而且要多样化。这项工作提出了一种集成剪枝算法,它试图在准确性和多样性之间建立一种权衡。本文还提出了一种基于分类器的多样性和对整体贡献的评分指标。结果表明,在准确性和多样性方面,与未修剪的集合相比,修剪后的集合表现同样好,在某些情况下甚至更好。实验结果表明,该算法的性能优于VELM算法。该算法将集合大小减小到小于原始集合大小的60%(原始集合大小设置为50)。
{"title":"A novel sparse ensemble pruning algorithm using a new diversity measure","authors":"Sanyam Shukla, Jivitesh Sharma, Shankul Khare, Samruddhi Kochkar, Vanya Dharni","doi":"10.1109/ICCIC.2015.7435815","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435815","url":null,"abstract":"Extreme learning machine is state of art supervised machine learning technique for classification and regression. A single ELM classifier can however generate faulty or skewed results due to random initialization of weights between input and hidden layer. To overcome this instability problem ensemble methods can be employed. Ensemble methods may have problem of redundancy i.e. ensemble may contain several redundant classifiers which can be weak or highly correlated classifiers. Ensemble pruning can be used to remove these redundant classifiers. The pruned ensemble should not only be accurate but diverse as well in order to correctly classify boundary instances. This work proposes an ensemble pruning algorithm which tries to establish a tradeoff between accuracy and diversity. The paper also proposes a metric which scores classifiers based on their diversity and contribution towards the ensemble. The results show that the pruned ensemble performs equally well or in some cases even better as compared to the unpruned set in terms of accuracy and diversity. The results of the experiments show that the proposed algorithm performs better than VELM. The proposed algorithm reduces the ensemble size to less than 60 % of the original ensemble size (original ensemble size is set to 50).","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127768826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative study of Mamdani & Takagi-Sugeno models for spectrum access in cognitive radio networks 认知无线电网络中频谱接入的Mamdani和Takagi-Sugeno模型的比较研究
Deepak Kumar, Pankaj Verma
Rapid growth of wireless services demands more and more spectrum, but spectrum is limited resource. Recent studies show that the spectrum which is allocated to licensed users or primary users (PUs) is not fully utilized. To address this problem Cognitive Radio (CR) comes into the picture, which will detect the vacant spectrum and use it when the same is available. But in the scenario of multiple unlicensed users or secondary users (SUs), which SU will access the spectrum is an issue in the cognitive radio networks. In this paper, two Fuzzy Logic Models i.e. Mamdani and Takagi-Sugeno are used for the selection of SU to access the spectrum based upon the input parameters: spectrum efficiency, mobility of SU and distance between PU & SU. On the basis of these input parameters, 27 fuzzy rules are framed. Based upon these rules, output is obtained which shows the selection possibility of a SU to access the spectrum. A comparison is shown between two models by computing the correlation value for each of the inputs parameter.
无线业务的快速发展对频谱的需求越来越大,而频谱是一种有限的资源。最近的研究表明,分配给授权用户或主用户(pu)的频谱没有得到充分利用。为了解决这个问题,认知无线电(CR)出现了,它将检测空频谱并在可用时使用它。但在多个未授权用户或辅助用户(SU)的情况下,哪些SU将访问频谱是认知无线网络中的一个问题。本文采用Mamdani和Takagi-Sugeno两种模糊逻辑模型,根据输入参数:频谱效率、SU的迁移率和PU与SU之间的距离来选择SU接入频谱,并根据这些输入参数构建了27条模糊规则。根据这些规则得到的输出显示了一个SU接入频谱的选择可能性。通过计算每个输入参数的相关值,可以对两个模型进行比较。
{"title":"Comparative study of Mamdani & Takagi-Sugeno models for spectrum access in cognitive radio networks","authors":"Deepak Kumar, Pankaj Verma","doi":"10.1109/ICCIC.2015.7435712","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435712","url":null,"abstract":"Rapid growth of wireless services demands more and more spectrum, but spectrum is limited resource. Recent studies show that the spectrum which is allocated to licensed users or primary users (PUs) is not fully utilized. To address this problem Cognitive Radio (CR) comes into the picture, which will detect the vacant spectrum and use it when the same is available. But in the scenario of multiple unlicensed users or secondary users (SUs), which SU will access the spectrum is an issue in the cognitive radio networks. In this paper, two Fuzzy Logic Models i.e. Mamdani and Takagi-Sugeno are used for the selection of SU to access the spectrum based upon the input parameters: spectrum efficiency, mobility of SU and distance between PU & SU. On the basis of these input parameters, 27 fuzzy rules are framed. Based upon these rules, output is obtained which shows the selection possibility of a SU to access the spectrum. A comparison is shown between two models by computing the correlation value for each of the inputs parameter.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132216206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance analysis of MIMO-based transmission techniques for image quality in 4G wireless network 基于mimo的4G无线网络图像质量传输技术性能分析
Deepak N R, S. Balaji
The use of Multiple Inputs Multiple Outputs (MIMO) over the wireless network is increasing rapidly in present years and is expected to be more in future too. The multiple transmit antennas and receive antennas can be introduced in the next generation of wireless network standards for image communication in real time. The image communication has the requirement of large bandwidth. The image data representation requires large information that leads data at high rates and it in turns the high communication energy with distortions in the transmitted image. Various competing MIMO transmission techniques, namely, ODQ, BST, OBST, RO and CO are used to improve the image quality. The paper discussed the few transmission techniques of MIMO for image quality over the 4G wireless network.
多输入多输出(MIMO)在无线网络上的使用近年来迅速增加,预计未来也会更多。在下一代无线网络标准中可以引入多发射天线和多接收天线,实现实时图像通信。图像通信对带宽有较大的要求。图像数据表示需要大量的信息以高速率传输数据,这反过来又需要传输图像中的高通信能量和失真。各种相互竞争的MIMO传输技术,即ODQ、BST、OBST、RO和CO被用来提高图像质量。本文讨论了4G无线网络中MIMO图像质量的几种传输技术。
{"title":"Performance analysis of MIMO-based transmission techniques for image quality in 4G wireless network","authors":"Deepak N R, S. Balaji","doi":"10.1109/ICCIC.2015.7435774","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435774","url":null,"abstract":"The use of Multiple Inputs Multiple Outputs (MIMO) over the wireless network is increasing rapidly in present years and is expected to be more in future too. The multiple transmit antennas and receive antennas can be introduced in the next generation of wireless network standards for image communication in real time. The image communication has the requirement of large bandwidth. The image data representation requires large information that leads data at high rates and it in turns the high communication energy with distortions in the transmitted image. Various competing MIMO transmission techniques, namely, ODQ, BST, OBST, RO and CO are used to improve the image quality. The paper discussed the few transmission techniques of MIMO for image quality over the 4G wireless network.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124291380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards development of U-conferencing facility in learning management system 学习管理系统中u -会议设施的开发
Kalaivani Ravisekaran, Sivakumar Ramakrishnan
Learning Management System (LMS) has been becoming an unavoidable component in virtual learning system. It offers various facilities to enrich the learning process in a virtual environment. However, it is understood that existing Learning Management Systems need to be extended with ubiquitous additional functionalities. Hence this paper proposes a framework for LMS to support U-conferencing facility in order to make the LMS rich in ubiquitous nature. This framework ensures no latency and support for visually disabled learners in ubiquitous Learning Management System environment.
学习管理系统(LMS)已成为虚拟学习系统中不可缺少的组成部分。它提供了各种设施来丰富虚拟环境中的学习过程。然而,我们知道,现有的学习管理系统需要扩展无处不在的附加功能。为此,本文提出了一个支持u -会议的LMS框架,以使LMS具有泛在性。该框架确保无延迟和支持视障学习者在泛在学习管理系统环境。
{"title":"Towards development of U-conferencing facility in learning management system","authors":"Kalaivani Ravisekaran, Sivakumar Ramakrishnan","doi":"10.1109/ICCIC.2015.7435743","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435743","url":null,"abstract":"Learning Management System (LMS) has been becoming an unavoidable component in virtual learning system. It offers various facilities to enrich the learning process in a virtual environment. However, it is understood that existing Learning Management Systems need to be extended with ubiquitous additional functionalities. Hence this paper proposes a framework for LMS to support U-conferencing facility in order to make the LMS rich in ubiquitous nature. This framework ensures no latency and support for visually disabled learners in ubiquitous Learning Management System environment.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134535712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stepping towards a semantic web search engine for accurate outcomes in favor of user queries: Using RDF and ontology technologies 为用户查询提供准确结果的语义web搜索引擎:使用RDF和本体技术
D. Suryanarayana, S. M. Hussain, Prathyusha Kanakam, S. Gupta
Creating the Semantic Web (SW) practicality comprises numerous tasks to lead the way in the current computer technology. It can't carry out without a human intervention, but a master is capable to accomplish with the moderate training to a machine. The semantic search seeks out for the actual context of a particular search query given by the user based on the meaning rather than content matching. However, a few search engines provide a mass list of the results based on the user intentions using their semantic properties of Web representations. This paper shows the significance of Web knowledge representations and application integration, which are the two basic aspects of semantic programming to retrieve the information of a user's intentions. A comparative study and analysis of various popular search engines which are unsuccessful to retrieve relevant information for a test of queries given by the users is provided. Therefore, this paper presents an effective determination of the information by navigating the semantic Web using the Resource Description Framework (RDF) and Web ontology language (OWL).
创建语义网(SW)的实用性包括引领当前计算机技术的许多任务。如果没有人类的干预,它是无法完成的,但一个主人可以通过对机器的适度训练来完成。语义搜索根据含义而不是内容匹配来寻找用户给出的特定搜索查询的实际上下文。然而,一些搜索引擎使用其Web表示的语义属性,根据用户意图提供大量的结果列表。本文阐述了Web知识表示和应用集成是语义编程检索用户意图信息的两个基本方面。对各种流行的搜索引擎进行比较研究和分析,这些搜索引擎无法检索用户提供的查询的相关信息。因此,本文提出了一种利用资源描述框架(RDF)和Web本体语言(OWL)在语义Web中导航的有效信息确定方法。
{"title":"Stepping towards a semantic web search engine for accurate outcomes in favor of user queries: Using RDF and ontology technologies","authors":"D. Suryanarayana, S. M. Hussain, Prathyusha Kanakam, S. Gupta","doi":"10.1109/ICCIC.2015.7435628","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435628","url":null,"abstract":"Creating the Semantic Web (SW) practicality comprises numerous tasks to lead the way in the current computer technology. It can't carry out without a human intervention, but a master is capable to accomplish with the moderate training to a machine. The semantic search seeks out for the actual context of a particular search query given by the user based on the meaning rather than content matching. However, a few search engines provide a mass list of the results based on the user intentions using their semantic properties of Web representations. This paper shows the significance of Web knowledge representations and application integration, which are the two basic aspects of semantic programming to retrieve the information of a user's intentions. A comparative study and analysis of various popular search engines which are unsuccessful to retrieve relevant information for a test of queries given by the users is provided. Therefore, this paper presents an effective determination of the information by navigating the semantic Web using the Resource Description Framework (RDF) and Web ontology language (OWL).","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134382692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1