首页 > 最新文献

2012 Fourth International Conference on Advanced Computing (ICoAC)最新文献

英文 中文
State of the art process in query processing ranking system 查询处理排序系统的最新进展
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416825
Bazeer Ahamed B, S. Hariharan
The World Wide Web (WWW) has become a part of today's human lives. But searching information has become one of the most important aspects. Various search engines like Google, Bing, Yahoo, etc are used to seek information about a topic. Search engines return ranked lists of Web pages in response to queries. However, the performance of these web search engine has increased dramatically. Moreover, for many scenarios a user who has queried a search engine has led to inaccurate results for a particular query. Web users mostly use the services of search engines to fetch information they want to surf. In spite users spend too much time and energy in seeking useful data, improving the retrieval efficiency to meet the users' personalized need becomes critical in text processing domain. The relevance of the search results provided by the search engines are based on different kinds of algorithms used by these search engines. It also becomes tedious and difficult task for search engines to rank search results which satisfy the user's search intention clearly. A variety of ranking algorithms have been proposed and used in many Web search engines. However, these search engines cannot always return good ranked search results which satisfy users' search intentions adequately. This work addresses few novel algorithms suitable for efficient web retrieval process thereby improving the accuracy & precision of searching mechanisms.
万维网(WWW)已经成为当今人类生活的一部分。但搜索信息已成为最重要的方面之一。各种各样的搜索引擎,如谷歌、必应、雅虎等,都被用来寻找有关某个主题的信息。搜索引擎根据查询返回网页排名列表。然而,这些网络搜索引擎的性能却有了惊人的提高。此外,在许多情况下,查询搜索引擎的用户会导致特定查询的不准确结果。网络用户大多使用搜索引擎的服务来获取他们想要浏览的信息。尽管用户花费了大量的时间和精力来寻找有用的数据,但提高检索效率以满足用户的个性化需求成为文本处理领域的关键。搜索引擎提供的搜索结果的相关性基于这些搜索引擎使用的不同类型的算法。如何对满足用户搜索意图的搜索结果进行排序,也成为搜索引擎的一项繁琐而艰巨的任务。许多Web搜索引擎已经提出并使用了各种排序算法。然而,这些搜索引擎并不能总是返回良好排名的搜索结果,以充分满足用户的搜索意图。本文提出了一些适合于高效web检索过程的新算法,从而提高了搜索机制的准确性和精度。
{"title":"State of the art process in query processing ranking system","authors":"Bazeer Ahamed B, S. Hariharan","doi":"10.1109/ICOAC.2012.6416825","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416825","url":null,"abstract":"The World Wide Web (WWW) has become a part of today's human lives. But searching information has become one of the most important aspects. Various search engines like Google, Bing, Yahoo, etc are used to seek information about a topic. Search engines return ranked lists of Web pages in response to queries. However, the performance of these web search engine has increased dramatically. Moreover, for many scenarios a user who has queried a search engine has led to inaccurate results for a particular query. Web users mostly use the services of search engines to fetch information they want to surf. In spite users spend too much time and energy in seeking useful data, improving the retrieval efficiency to meet the users' personalized need becomes critical in text processing domain. The relevance of the search results provided by the search engines are based on different kinds of algorithms used by these search engines. It also becomes tedious and difficult task for search engines to rank search results which satisfy the user's search intention clearly. A variety of ranking algorithms have been proposed and used in many Web search engines. However, these search engines cannot always return good ranked search results which satisfy users' search intentions adequately. This work addresses few novel algorithms suitable for efficient web retrieval process thereby improving the accuracy & precision of searching mechanisms.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129619502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Semantic enrichment in ontology mapping using concept similarity computing 概念相似度计算在本体映射中的语义充实
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416813
V. Shunmughavel, P. Jaganathan
In semantic web ontology heterogeneity is a big bottleneck of ontology application, and ontology mapping is the base for integration of heterogeneous ontology. The ontology mapping model contains several aspects, and concept similarity computing is the most important part. This paper presents a concept similarity computing algorithm combining lexical matching to achieve semantic enrichment and high accuracy results. It has been proved that the evaluation of concept similarity between ontologies is more accurate by considering both semantic similarity and semantic relativity.
在语义web中,本体异构是本体应用的一大瓶颈,而本体映射是实现异构本体集成的基础。本体映射模型包括几个方面,概念相似度计算是其中最重要的部分。本文提出了一种结合词汇匹配的概念相似度计算算法,以实现语义丰富和高精度的结果。事实证明,同时考虑语义相似度和语义相对性对本体间概念相似度的评价更为准确。
{"title":"Semantic enrichment in ontology mapping using concept similarity computing","authors":"V. Shunmughavel, P. Jaganathan","doi":"10.1109/ICOAC.2012.6416813","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416813","url":null,"abstract":"In semantic web ontology heterogeneity is a big bottleneck of ontology application, and ontology mapping is the base for integration of heterogeneous ontology. The ontology mapping model contains several aspects, and concept similarity computing is the most important part. This paper presents a concept similarity computing algorithm combining lexical matching to achieve semantic enrichment and high accuracy results. It has been proved that the evaluation of concept similarity between ontologies is more accurate by considering both semantic similarity and semantic relativity.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124385355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Classification of human age based on Neural Network using FG-NET Aging database and Wavelets 基于FG-NET老化数据库和小波的神经网络人类年龄分类
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416855
J. Nithyashri, G. Kulanthaivel
Face Aging has been an vital area of research for the past few decades. As the age increases, there are some visible changes in the face, making age classification simpler. Based on the facial growth, we can classify the human age into various kinds. Though there are various algorithms existed so far, a more sophisticated method is attempted for classifying facial age. Age Prototypes, Statistical models and Distance based technique have been widely used for classification of human face. The system can be improved by using the Wavelet Transformation (WT) for extracting the face features and Artificial Neural Network to classify the age group. The facial images are pre-processed and then the face features are extracted using Wavelet Transformation. The distance between each of features are evaluated using Euclidean distance and these values were given as input to Adaptive Resonance Network (ART). The Neural Network is trained using FG-NET (Face and Gesture Recognition Research Network) aging database. The human age is classified into four categories as Child (0-12 years), Adolescence (13-18 years), Adult (19-59 years) and Senior Adult (60 years and above) which is discussed in the paper.
在过去的几十年里,面部衰老一直是一个重要的研究领域。随着年龄的增长,面部出现了一些明显的变化,使得年龄分类更加简单。根据面部的生长情况,我们可以把人的年龄分为不同的类型。虽然目前存在各种算法,但我们尝试了一种更为复杂的面部年龄分类方法。年龄原型、统计模型和基于距离的人脸分类技术已被广泛应用于人脸分类。利用小波变换提取人脸特征,利用人工神经网络进行年龄分类,对系统进行了改进。对人脸图像进行预处理,然后利用小波变换提取人脸特征。利用欧几里得距离评估每个特征之间的距离,并将这些值作为自适应共振网络(ART)的输入。神经网络使用FG-NET (Face and Gesture Recognition Research Network)老化数据库进行训练。人类的年龄分为儿童(0-12岁)、青少年(13-18岁)、成人(19-59岁)和老年成人(60岁及以上)四类,本文对此进行了讨论。
{"title":"Classification of human age based on Neural Network using FG-NET Aging database and Wavelets","authors":"J. Nithyashri, G. Kulanthaivel","doi":"10.1109/ICOAC.2012.6416855","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416855","url":null,"abstract":"Face Aging has been an vital area of research for the past few decades. As the age increases, there are some visible changes in the face, making age classification simpler. Based on the facial growth, we can classify the human age into various kinds. Though there are various algorithms existed so far, a more sophisticated method is attempted for classifying facial age. Age Prototypes, Statistical models and Distance based technique have been widely used for classification of human face. The system can be improved by using the Wavelet Transformation (WT) for extracting the face features and Artificial Neural Network to classify the age group. The facial images are pre-processed and then the face features are extracted using Wavelet Transformation. The distance between each of features are evaluated using Euclidean distance and these values were given as input to Adaptive Resonance Network (ART). The Neural Network is trained using FG-NET (Face and Gesture Recognition Research Network) aging database. The human age is classified into four categories as Child (0-12 years), Adolescence (13-18 years), Adult (19-59 years) and Senior Adult (60 years and above) which is discussed in the paper.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"99 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128009068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Mechanism for on demand Tag-Based software testing in virtualized environments 在虚拟化环境中基于标签的随需应变软件测试机制
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416808
Bhanu Prakash Gopularam, C. Yogeesha
Software development life cycle consists of various stages like requirements, design, implementation, testing and maintenance. In a typical enterprise level project number of testcases to be executed for each release would be in thousands. One known way of segregating the testcases is using component or module names and one can also classify them based on level of importance like unit testing, functional, sanity etc. With iterative development models like Agile, the release cycle is short and it is prudent to execute the testcase selectively majorly concentrating on impacting components. In this paper we provide a generic way to manage the tests and provide an efficient mechanism to run the tests selectively. In our approach we make use of well-known build management tool called Jenkins for running the tests on-demand. One unique benefit of our approach is that the input is a single comma-separated-value (CSV) file and it is very easy to add/modify existing tests. The tests are tagged using well known keywords (viz. database-layer, configuration, regression). When some particular tests need to be run, the user enters `Tag' in the job parameter and testsuite will be generated dynamically. In this paper we also describe an end-to-end test management system that supports running selective tests with help of jobs created in Jenkins environment. The proposed model of Tests execution is highly useful in high demanding environments like agile software development model, Test driven development model where feature development is many times faster than traditional water fall model. The approach suggested in this paper makes optimum use of cloud resources by distributing the jobs, so this can be utilized specially for testing under virtualized environment.
软件开发生命周期由需求、设计、实现、测试和维护等不同阶段组成。在一个典型的企业级项目中,要为每个版本执行的测试用例的数量将达到数千个。分离测试用例的一种已知方法是使用组件或模块名称,也可以根据重要性级别(如单元测试、功能、完整性等)对它们进行分类。使用像敏捷这样的迭代开发模型,发布周期很短,并且有选择地执行测试用例是明智的,主要集中在影响组件上。在本文中,我们提供了一种通用的方法来管理测试,并提供了一种有效的机制来选择性地运行测试。在我们的方法中,我们使用了著名的构建管理工具Jenkins来按需运行测试。我们的方法的一个独特的好处是输入是单个逗号分隔值(CSV)文件,并且很容易添加/修改现有的测试。测试使用众所周知的关键字(即数据库层、配置、回归)进行标记。当需要运行某些特定的测试时,用户在作业参数中输入“Tag”,测试套件将动态生成。在本文中,我们还描述了一个端到端测试管理系统,该系统支持在Jenkins环境中创建的作业的帮助下运行选择性测试。提出的测试执行模型在高要求的环境中非常有用,比如敏捷软件开发模型、测试驱动开发模型,其中功能开发比传统的瀑布模型快很多倍。本文提出的方法通过分配作业来优化利用云资源,因此可以专门用于虚拟化环境下的测试。
{"title":"Mechanism for on demand Tag-Based software testing in virtualized environments","authors":"Bhanu Prakash Gopularam, C. Yogeesha","doi":"10.1109/ICOAC.2012.6416808","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416808","url":null,"abstract":"Software development life cycle consists of various stages like requirements, design, implementation, testing and maintenance. In a typical enterprise level project number of testcases to be executed for each release would be in thousands. One known way of segregating the testcases is using component or module names and one can also classify them based on level of importance like unit testing, functional, sanity etc. With iterative development models like Agile, the release cycle is short and it is prudent to execute the testcase selectively majorly concentrating on impacting components. In this paper we provide a generic way to manage the tests and provide an efficient mechanism to run the tests selectively. In our approach we make use of well-known build management tool called Jenkins for running the tests on-demand. One unique benefit of our approach is that the input is a single comma-separated-value (CSV) file and it is very easy to add/modify existing tests. The tests are tagged using well known keywords (viz. database-layer, configuration, regression). When some particular tests need to be run, the user enters `Tag' in the job parameter and testsuite will be generated dynamically. In this paper we also describe an end-to-end test management system that supports running selective tests with help of jobs created in Jenkins environment. The proposed model of Tests execution is highly useful in high demanding environments like agile software development model, Test driven development model where feature development is many times faster than traditional water fall model. The approach suggested in this paper makes optimum use of cloud resources by distributing the jobs, so this can be utilized specially for testing under virtualized environment.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132495542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Ant colony optimization of semantic query routing in Peer to Peer networks 点对点网络语义查询路由的蚁群优化
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416847
U. V. Arivazhagu, S. Srinivasan
Peer-to-Peer systems implement a new environment in decentralized model. In the previous work, to process a single query searching of neighbor nodes is difficult. During query processing we need to search all the nodes in a network for retrieving the appropriate answer for the queries in a particular peer. Hence in this paper we proposed an ant colony optimization technique for query routing and relevance ranking methodology for the selection of peers with good accuracy. Secured way of routing is very important in order to extract efficient resources from the peers. Clustered based approach can be used to overcome the high overhead and delay. By simulation results, we show that our approach improves the efficiency of P2P networks.
点对点系统在去中心化模式下实现了一种新的环境。在以往的工作中,处理邻居节点的单个查询搜索比较困难。在查询处理期间,我们需要搜索网络中的所有节点,以便为特定对等点中的查询检索适当的答案。因此,本文提出了一种蚁群优化查询路由技术和相关度排序方法,用于选择精度较高的节点。为了从对等体中提取有效的资源,安全的路由方式非常重要。基于集群的方法可以克服高开销和延迟。仿真结果表明,该方法提高了P2P网络的效率。
{"title":"Ant colony optimization of semantic query routing in Peer to Peer networks","authors":"U. V. Arivazhagu, S. Srinivasan","doi":"10.1109/ICOAC.2012.6416847","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416847","url":null,"abstract":"Peer-to-Peer systems implement a new environment in decentralized model. In the previous work, to process a single query searching of neighbor nodes is difficult. During query processing we need to search all the nodes in a network for retrieving the appropriate answer for the queries in a particular peer. Hence in this paper we proposed an ant colony optimization technique for query routing and relevance ranking methodology for the selection of peers with good accuracy. Secured way of routing is very important in order to extract efficient resources from the peers. Clustered based approach can be used to overcome the high overhead and delay. By simulation results, we show that our approach improves the efficiency of P2P networks.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115727039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An optimized fast vertical handover strategy for heterogeneous wireless access networks based on IEEE 802.21 media independent handover standard 基于IEEE 802.21媒体独立切换标准的异构无线接入网快速垂直切换优化策略
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416817
R. Tamijetchelvy, G. Sivaradje
Owing to ubiquity of wireless technologies, user satisfaction is greatly affected by the factor such as terminal mobility, guaranteeing quality of service, continuous connectivity to access the world anywhere, anytime and any service has gained a significant importance. Hence, the future generation wireless networks have projected as the integration of various wireless access networks. Seamless internetworking of heterogeneous network is still a stimulating assignment and requires interconnectivity at all layers of network architecture. In mobile communication, seamless vertical handover is one of the most challenging issues. The worst case may cause communication interruption, delays and packet losses which affect the real time communication performance. To resolve the problem of prevailing schemes, a marginal fast vertical handover Mobile IP (MIP) protocol using IEEE 802.21 Media Independent Handover (MIH) standard is proposed. In this paper optimized vertical handover functionality is illustrated for heterogeneous WLAN/WiMAX networks based on IEEE 802.21 Media Independent Handover which combines network functionality from all different access technologies into common set of Commands, Events and Services. The proposed handover scenario is used to evaluate the vertical handover performance involving multimode terminal with WLAN/WiMAX interfaces and IEEE 802.21 entities. This capability proves an efficient solution for mobility, multihoming and routing for integrating heterogeneous networks. In addition, the proposed scheme can reduce considerably traffic overhead between WLAN/WiMAX networks, handover latency and base station scanning interval time. The presented handover scenario concludes by presenting service continuity during and after vertical handover.
由于无线技术的普及,用户满意度受到终端移动性等因素的极大影响,保证服务质量、随时随地、随时随地接入世界的持续连接等服务变得尤为重要。因此,未来一代无线网络已被预测为各种无线接入网络的集成。异构网络的无缝互联仍然是一项令人兴奋的任务,它要求网络体系结构各层的互连性。在移动通信中,无缝垂直切换是最具挑战性的问题之一。最坏的情况下,可能会导致通信中断、延迟、丢包,影响实时通信性能。为了解决现有方案存在的问题,提出了一种基于IEEE 802.21媒体独立切换(MIH)标准的边缘快速垂直切换移动IP (MIP)协议。本文阐述了基于IEEE 802.21媒体独立切换的异构WLAN/WiMAX网络的优化垂直切换功能,该切换将来自所有不同接入技术的网络功能组合成通用的命令、事件和服务集。该切换场景用于评估具有WLAN/WiMAX接口和IEEE 802.21实体的多模终端的垂直切换性能。这种能力被证明是集成异构网络的移动性、多宿主和路由的有效解决方案。此外,该方案可以显著降低WLAN/WiMAX网络间的业务开销、切换延迟和基站扫描间隔时间。本文给出的移交场景最后展示了垂直移交期间和之后的服务连续性。
{"title":"An optimized fast vertical handover strategy for heterogeneous wireless access networks based on IEEE 802.21 media independent handover standard","authors":"R. Tamijetchelvy, G. Sivaradje","doi":"10.1109/ICOAC.2012.6416817","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416817","url":null,"abstract":"Owing to ubiquity of wireless technologies, user satisfaction is greatly affected by the factor such as terminal mobility, guaranteeing quality of service, continuous connectivity to access the world anywhere, anytime and any service has gained a significant importance. Hence, the future generation wireless networks have projected as the integration of various wireless access networks. Seamless internetworking of heterogeneous network is still a stimulating assignment and requires interconnectivity at all layers of network architecture. In mobile communication, seamless vertical handover is one of the most challenging issues. The worst case may cause communication interruption, delays and packet losses which affect the real time communication performance. To resolve the problem of prevailing schemes, a marginal fast vertical handover Mobile IP (MIP) protocol using IEEE 802.21 Media Independent Handover (MIH) standard is proposed. In this paper optimized vertical handover functionality is illustrated for heterogeneous WLAN/WiMAX networks based on IEEE 802.21 Media Independent Handover which combines network functionality from all different access technologies into common set of Commands, Events and Services. The proposed handover scenario is used to evaluate the vertical handover performance involving multimode terminal with WLAN/WiMAX interfaces and IEEE 802.21 entities. This capability proves an efficient solution for mobility, multihoming and routing for integrating heterogeneous networks. In addition, the proposed scheme can reduce considerably traffic overhead between WLAN/WiMAX networks, handover latency and base station scanning interval time. The presented handover scenario concludes by presenting service continuity during and after vertical handover.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115756430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Constraint Frequent Motif Detection in sequence datasets 序列数据集的约束频繁基序检测
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416844
Mr. E. Ramanujam, Dr. S. Padmavathi
The Subsequence Motif mining problem has large class of applications in the field of Bioinformatics, such as protein-protein interaction, protein Motif mining, DNA classification, web log analysis and the like. Existing algorithms detects contiguous exact and approximate patterns by restricting the user in pattern length. Though many algorithms have been solved for the related problem with poor scalability, time inefficiency, some algorithms have extracted only non-contiguous exact patterns without noise in adapting to other applications. In this paper, Constraint Frequent Motif Detection (CFMD) an algorithm is used in extracting both contiguous, non-contiguous patterns of short or long sequences of any length in biological database. CFMD combines data mining techniques such as TRIE like Frequent Pattern (FP-Tree) in constructing the patterns in such a way that most commonly occurring patterns from root to leaf node, Constraints to restrict the growth of FP-Tree and to reduce the search space of the FP-Tree. The efficiency of the proposed CFMD is fast, scalable to extract patterns from both contiguous and non-contiguous sequences. The performance of the proposed approach is proved using both real and synthetic datasets.
子序列Motif挖掘问题在生物信息学领域有着广泛的应用,如蛋白质相互作用、蛋白质Motif挖掘、DNA分类、网络日志分析等。现有算法通过限制用户的模式长度来检测连续的精确模式和近似模式。虽然许多算法解决了可扩展性差、时间效率低的问题,但在适应其他应用时,有些算法只提取了非连续的精确模式,没有噪声。本文将约束频繁基序检测(CFMD)算法用于提取生物数据库中任意长度的短序列或长序列的连续或非连续模式。CFMD结合了TRIE等数据挖掘技术,如频繁模式(FP-Tree),以一种从根节点到叶节点的最常见模式的方式构建模式,约束FP-Tree的生长并减少FP-Tree的搜索空间。该方法具有快速、可扩展的特点,可以从连续和非连续序列中提取模式。用真实数据集和合成数据集验证了该方法的性能。
{"title":"Constraint Frequent Motif Detection in sequence datasets","authors":"Mr. E. Ramanujam, Dr. S. Padmavathi","doi":"10.1109/ICOAC.2012.6416844","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416844","url":null,"abstract":"The Subsequence Motif mining problem has large class of applications in the field of Bioinformatics, such as protein-protein interaction, protein Motif mining, DNA classification, web log analysis and the like. Existing algorithms detects contiguous exact and approximate patterns by restricting the user in pattern length. Though many algorithms have been solved for the related problem with poor scalability, time inefficiency, some algorithms have extracted only non-contiguous exact patterns without noise in adapting to other applications. In this paper, Constraint Frequent Motif Detection (CFMD) an algorithm is used in extracting both contiguous, non-contiguous patterns of short or long sequences of any length in biological database. CFMD combines data mining techniques such as TRIE like Frequent Pattern (FP-Tree) in constructing the patterns in such a way that most commonly occurring patterns from root to leaf node, Constraints to restrict the growth of FP-Tree and to reduce the search space of the FP-Tree. The efficiency of the proposed CFMD is fast, scalable to extract patterns from both contiguous and non-contiguous sequences. The performance of the proposed approach is proved using both real and synthetic datasets.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128312138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile agent based security enhancements in ad hoc grid environment 在临时网格环境中基于移动代理的安全性增强
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416846
K. Jeyakumar, L. Nithya
The mobile agent paradigm and security issues in the grid has been successfully used in large number of research areas separately, and specifically contributes to the research endeavors. The proposed paper combines both the technologies and provides avenues for further research. Particularly in ad hoc grid environment, resources are not always available as the nodes can spontaneously connect and disconnect at any time. Thus, these environments demand the correct execution of process for improving the performance criteria. However, there are some intruders that affect the normal operation of ad hoc grids. Therefore, it is essential to use punishment procedures based on trust models. The existing work has proven that the RETENTION a reactive trust based mechanism detected and punished malicious nodes in ad hoc grid environments, without generating any false-positives. We propose a mobile agent based trust model in ad hoc grid environment for improving the performance considerations and security issues. Simulation results demonstrate the effectiveness of the proposed work, to detect and punish nodes having malicious behavior, such as selfish nodes, injected nodes and so on. We observe that the behavior of the proposed model is comparatively good in a scenario where the types of attack implemented in different nodes.
移动智能体范式和网格中的安全问题已经分别成功地应用于大量的研究领域,并对研究工作做出了具体的贡献。本文结合了这两种技术,并为进一步的研究提供了途径。特别是在临时网格环境中,资源并不总是可用的,因为节点可以随时自发地连接和断开。因此,这些环境要求正确执行流程以改进性能标准。然而,有一些入侵者会影响自组织网格的正常运行。因此,使用基于信任模型的惩罚程序是必要的。现有的工作已经证明,基于响应式信任的RETENTION机制能够在特定的网格环境中检测和惩罚恶意节点,而不会产生任何误报。提出了一种基于移动代理的自组织网格环境下的信任模型,以改善性能考虑和安全问题。仿真结果验证了所提工作的有效性,可以检测和惩罚具有恶意行为的节点,如自私节点、注入节点等。我们观察到,在不同节点上实现攻击类型的场景中,所提出的模型的行为相对较好。
{"title":"Mobile agent based security enhancements in ad hoc grid environment","authors":"K. Jeyakumar, L. Nithya","doi":"10.1109/ICOAC.2012.6416846","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416846","url":null,"abstract":"The mobile agent paradigm and security issues in the grid has been successfully used in large number of research areas separately, and specifically contributes to the research endeavors. The proposed paper combines both the technologies and provides avenues for further research. Particularly in ad hoc grid environment, resources are not always available as the nodes can spontaneously connect and disconnect at any time. Thus, these environments demand the correct execution of process for improving the performance criteria. However, there are some intruders that affect the normal operation of ad hoc grids. Therefore, it is essential to use punishment procedures based on trust models. The existing work has proven that the RETENTION a reactive trust based mechanism detected and punished malicious nodes in ad hoc grid environments, without generating any false-positives. We propose a mobile agent based trust model in ad hoc grid environment for improving the performance considerations and security issues. Simulation results demonstrate the effectiveness of the proposed work, to detect and punish nodes having malicious behavior, such as selfish nodes, injected nodes and so on. We observe that the behavior of the proposed model is comparatively good in a scenario where the types of attack implemented in different nodes.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128588378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A simulation based study to implement Intelligent Transport Systems concepts in VANETs using AODV routing protocol in NS2 在NS2中使用AODV路由协议在VANETs中实现智能交通系统概念的仿真研究
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416854
N. Arulkumar, E. Raj
The wireless medium plays a vital role in communication era in sharing information from one mobile device to another. These wireless devices (nodes) can form a temporary network called Ad-hoc network or they can use existing cellular network. Vehicular Ad-hoc Networks (VANETs) is a type of Ad-hoc network in which vehicles acts as nodes and communicates with the roadside units. VANETs are more helpful in implementing the Intelligent Transport Systems concepts to provide traffic situation, weather conditions and to perform safety warnings by using authentication mechanisms. In this paper, AODV routing protocol is used to implement the Intelligent Transport Systems (ITS) concepts in VANET. A simulation is performed using AODV routing protocol in NS2 to study the hurdles involved in providing a secure and trustworthy data transfer between the vehicular nodes. The data analysis is done based on the results collected from the simulation environment. The data's are traced out to find the absolute details of the network. Finally, the graphs are plotted for Throughput of dropped packets and Throughput of packets generated.
在通信时代,无线媒体在从一个移动设备到另一个移动设备之间共享信息方面发挥着至关重要的作用。这些无线设备(节点)可以组成一个临时网络,称为Ad-hoc网络,也可以使用现有的蜂窝网络。车辆自组织网络(VANETs)是一种车辆作为节点与路边单元通信的自组织网络。vanet更有助于实施智能交通系统概念,提供交通状况、天气状况,并通过使用认证机制执行安全警告。本文采用AODV路由协议在VANET中实现智能交通系统(ITS)的概念。在NS2中使用AODV路由协议进行了仿真,以研究在车辆节点之间提供安全可靠的数据传输所涉及的障碍。数据分析是基于从仿真环境中收集的结果完成的。对数据进行追踪,以找出网络的绝对细节。最后,绘制了丢包吞吐量和生成包吞吐量的图。
{"title":"A simulation based study to implement Intelligent Transport Systems concepts in VANETs using AODV routing protocol in NS2","authors":"N. Arulkumar, E. Raj","doi":"10.1109/ICOAC.2012.6416854","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416854","url":null,"abstract":"The wireless medium plays a vital role in communication era in sharing information from one mobile device to another. These wireless devices (nodes) can form a temporary network called Ad-hoc network or they can use existing cellular network. Vehicular Ad-hoc Networks (VANETs) is a type of Ad-hoc network in which vehicles acts as nodes and communicates with the roadside units. VANETs are more helpful in implementing the Intelligent Transport Systems concepts to provide traffic situation, weather conditions and to perform safety warnings by using authentication mechanisms. In this paper, AODV routing protocol is used to implement the Intelligent Transport Systems (ITS) concepts in VANET. A simulation is performed using AODV routing protocol in NS2 to study the hurdles involved in providing a secure and trustworthy data transfer between the vehicular nodes. The data analysis is done based on the results collected from the simulation environment. The data's are traced out to find the absolute details of the network. Finally, the graphs are plotted for Throughput of dropped packets and Throughput of packets generated.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128626185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Probabilistic Neural Network based attack traffic classification 基于概率神经网络的攻击流量分类
Pub Date : 2012-12-01 DOI: 10.1109/ICOAC.2012.6416848
V. Akilandeswari, S. Shalinie
This paper surveys with the emerging research on various methods to identify the legitimate/illegitimate traffic on the network. Here, the focus is on the effective early detection scheme for distinguishing Distributed Denial of Service (DDoS) attack traffic from normal flash crowd traffic. The basic characteristics used to distinguish Distributed Denial of Service (DDoS) attacks from flash crowds are access intents, client request rates, cluster overlap, distribution of source IP address, distribution of clients and speed of traffic. Various techniques related to these metrics are clearly illustrated and corresponding limitations are listed out with their justification. A new method is proposed in this paper which builds a reliable identification model for flash crowd and DDoS attacks. The proposed Probabilistic Neural Network based traffic pattern classification method is used for effective classification of attack traffic from legitimate traffic. The proposed technique uses the normal traffic profile for their classification process which consists of single and joint distribution of various packet attributes. The normal profile contains uniqueness in traffic distribution and also hard for the attackers to mimic as legitimate flow. The proposed method achieves highest classification accuracy for DDoS flooding attacks with less than 1% of false positive rate.
本文综述了各种识别网络中合法/非法流量的方法的研究进展。在这里,重点是有效的早期检测方案,以区分分布式拒绝服务(DDoS)攻击流量和正常的flash人群流量。用于区分分布式拒绝服务(DDoS)攻击和flash crowd攻击的基本特征是访问意图、客户端请求速率、集群重叠、源IP地址分布、客户端分布和流量速度。与这些指标相关的各种技术被清楚地说明,并列出了相应的限制及其理由。本文提出了一种针对flash人群和DDoS攻击建立可靠的识别模型的方法。提出了基于概率神经网络的流量模式分类方法,对攻击流量和正常流量进行了有效的分类。该方法采用常规的流量轮廓进行分类,该分类过程由各种数据包属性的单一分布和联合分布组成。正常配置文件包含流量分布的唯一性,并且攻击者很难将其模仿为合法流量。该方法对DDoS洪水攻击的分类准确率最高,误报率小于1%。
{"title":"Probabilistic Neural Network based attack traffic classification","authors":"V. Akilandeswari, S. Shalinie","doi":"10.1109/ICOAC.2012.6416848","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416848","url":null,"abstract":"This paper surveys with the emerging research on various methods to identify the legitimate/illegitimate traffic on the network. Here, the focus is on the effective early detection scheme for distinguishing Distributed Denial of Service (DDoS) attack traffic from normal flash crowd traffic. The basic characteristics used to distinguish Distributed Denial of Service (DDoS) attacks from flash crowds are access intents, client request rates, cluster overlap, distribution of source IP address, distribution of clients and speed of traffic. Various techniques related to these metrics are clearly illustrated and corresponding limitations are listed out with their justification. A new method is proposed in this paper which builds a reliable identification model for flash crowd and DDoS attacks. The proposed Probabilistic Neural Network based traffic pattern classification method is used for effective classification of attack traffic from legitimate traffic. The proposed technique uses the normal traffic profile for their classification process which consists of single and joint distribution of various packet attributes. The normal profile contains uniqueness in traffic distribution and also hard for the attackers to mimic as legitimate flow. The proposed method achieves highest classification accuracy for DDoS flooding attacks with less than 1% of false positive rate.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126384711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
2012 Fourth International Conference on Advanced Computing (ICoAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1