首页 > 最新文献

2013 3rd IEEE International Advance Computing Conference (IACC)最新文献

英文 中文
Design and implementation of 4-bit arithmetic logic unit using Quantum Dot Cellular Automata 基于量子点元胞自动机的4位算术逻辑单元设计与实现
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514367
M. Waje, P. Dakhole
Quantum Dot Cellular Automata is one of the six emerging technologies which help us to overcome the limitations of CMOS technology. Design of 4-bit ALU for AND, OR, XOR, and ADD operations using QCA is discussed through this paper. This design of 4-bit ALU using QCA is simple in structure having significantly lesser elements as compared to CMOS design. It also gives better result in terms of speed, area and power. A QCADesigner tool is used for Simulation of different components of 4 bit ALU.
量子点元胞自动机是帮助我们克服CMOS技术局限性的六大新兴技术之一。本文讨论了用QCA实现与、或、异或和加运算的4位ALU的设计。这种使用QCA的4位ALU设计结构简单,与CMOS设计相比,元件明显较少。它在速度,面积和功率方面也提供了更好的结果。利用qcaddesigner工具对4位ALU的不同元件进行仿真。
{"title":"Design and implementation of 4-bit arithmetic logic unit using Quantum Dot Cellular Automata","authors":"M. Waje, P. Dakhole","doi":"10.1109/IADCC.2013.6514367","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514367","url":null,"abstract":"Quantum Dot Cellular Automata is one of the six emerging technologies which help us to overcome the limitations of CMOS technology. Design of 4-bit ALU for AND, OR, XOR, and ADD operations using QCA is discussed through this paper. This design of 4-bit ALU using QCA is simple in structure having significantly lesser elements as compared to CMOS design. It also gives better result in terms of speed, area and power. A QCADesigner tool is used for Simulation of different components of 4 bit ALU.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134057285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
A systematic approach for Cad model generation Of hole features from point cloud data 基于点云数据的孔特征Cad模型生成的系统方法
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514430
S. Kansal, J. Madan, Ashutosh Kumar Singh
One of the most familiar problem in reverse engineering for generating CAD model from point cloud of physical part is presence of deep and narrow holes. Triangulation is one of the important step for generating a CAD model in reverse engineering. Due to formation of incorrect triangulations along the boundary of a hole, reconstruction algorithms are not able to recover the hole boundaries. A systematic approach for CAD model generation of parts with hole features is presented in this paper, which includes three modules of the system: a pre-processing algorithm to reduce the size of point cloud data, surface reconstruction algorithm based on Delaunay triangulation, and post processing algorithm to refine the mesh generated through triangulation. The proposed system is verified on some example parts containing hole features. The results obtained from the proposed system are encouraging and, we intend to implement this on some point cloud data obtained from physically existing parts.
在逆向工程中,利用实物零件的点云生成CAD模型最常见的问题之一是存在深孔和窄孔。三角剖分是逆向工程中生成CAD模型的重要步骤之一。由于沿孔洞边界形成了不正确的三角剖分,重建算法无法恢复孔洞边界。本文提出了一种具有孔特征零件CAD模型生成的系统方法,该系统包括三个模块:减小点云数据大小的预处理算法、基于Delaunay三角剖分的曲面重构算法和对三角剖分生成的网格进行细化的后处理算法。在含有孔特征的零件实例上对该系统进行了验证。从所提出的系统中获得的结果是令人鼓舞的,我们打算在从物理存在的部件中获得的一些点云数据上实现它。
{"title":"A systematic approach for Cad model generation Of hole features from point cloud data","authors":"S. Kansal, J. Madan, Ashutosh Kumar Singh","doi":"10.1109/IADCC.2013.6514430","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514430","url":null,"abstract":"One of the most familiar problem in reverse engineering for generating CAD model from point cloud of physical part is presence of deep and narrow holes. Triangulation is one of the important step for generating a CAD model in reverse engineering. Due to formation of incorrect triangulations along the boundary of a hole, reconstruction algorithms are not able to recover the hole boundaries. A systematic approach for CAD model generation of parts with hole features is presented in this paper, which includes three modules of the system: a pre-processing algorithm to reduce the size of point cloud data, surface reconstruction algorithm based on Delaunay triangulation, and post processing algorithm to refine the mesh generated through triangulation. The proposed system is verified on some example parts containing hole features. The results obtained from the proposed system are encouraging and, we intend to implement this on some point cloud data obtained from physically existing parts.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117279573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Integrating WSN with web services for patient's record management using RFID 将无线传感器网络与web服务集成,使用RFID进行患者记录管理
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514296
M. Ananthi, M. Sumalatha
Web service supports interoperability for collecting, storing, manipulating and retrieving data from heterogeneous environments. The Wireless Sensor Network is a resource-constrained device, which is low cost, low power and small in size and used in various applications such as industrial control & monitoring, environmental sensing, health care, etc. The main intent is to design a middleware that hides the complexity of accessing the sensor network environment and developing an application for sensor web enablement. This concept holds great importance because integrating wireless sensor network into IP-based systems are still a challenging issue. It is very important to collect patient's details during the emergency period. To create a web service to manage patient's personal data with the help of Radio Frequency Identification Tag (RFID), Web Service is dedicated to collecting, storing, manipulating, and making available clinical information. Context-aware services are needed for searching information more accurately and to produce highly impeccable output.
Web服务支持从异构环境中收集、存储、操作和检索数据的互操作性。无线传感器网络是一种资源受限的设备,具有低成本、低功耗、体积小的特点,可用于工业控制与监测、环境传感、医疗保健等各种应用。其主要目的是设计一个中间件,隐藏访问传感器网络环境和开发传感器网络启用应用程序的复杂性。这个概念非常重要,因为将无线传感器网络集成到基于ip的系统中仍然是一个具有挑战性的问题。在急诊期间收集病人的详细资料是非常重要的。为了创建一个借助射频识别标签(RFID)管理患者个人数据的web服务,web service致力于收集、存储、操作和提供临床信息。上下文感知服务需要更准确地搜索信息并产生高度精确的输出。
{"title":"Integrating WSN with web services for patient's record management using RFID","authors":"M. Ananthi, M. Sumalatha","doi":"10.1109/IADCC.2013.6514296","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514296","url":null,"abstract":"Web service supports interoperability for collecting, storing, manipulating and retrieving data from heterogeneous environments. The Wireless Sensor Network is a resource-constrained device, which is low cost, low power and small in size and used in various applications such as industrial control & monitoring, environmental sensing, health care, etc. The main intent is to design a middleware that hides the complexity of accessing the sensor network environment and developing an application for sensor web enablement. This concept holds great importance because integrating wireless sensor network into IP-based systems are still a challenging issue. It is very important to collect patient's details during the emergency period. To create a web service to manage patient's personal data with the help of Radio Frequency Identification Tag (RFID), Web Service is dedicated to collecting, storing, manipulating, and making available clinical information. Context-aware services are needed for searching information more accurately and to produce highly impeccable output.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115457907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A new SAFR tool for face recognition using EGVLBP-CMI-LDA wrapped with secured DWT based steganography 一个新的SAFR工具,用于人脸识别使用EGVLBP-CMI-LDA包裹与安全的基于DWT隐写术
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514370
S. Jhodge, G. Chiddarwar, G. Shinde
Face recognition technique nowadays is emerging as the most significant and challenging aspects in terms of security for identification of images in various fields viz. banking, police records, biometric etc. other than an individual's thumb and documented identification proofs. Till date for efficient net banking to be initiated, one has to provide the appropriate user name and password for purpose of authentication. This project introduces a vehicle to take a step forward in easy and more reliable authentication of an individual by providing Face Image along with User Name and Password to the system. In this an individual's face is identified by biometric authentication support with which, only a person whose account is, can access it. However while transferring this sensitive data of user image, from client machine to bank server it has to be protected from hackers and intruders from manhandling it, hence it is transferred using covert communication called Wavelet Decomposition based steganography. As face images are affected by different expressions, poses, occlusions, illuminations and aging over a period of time and it differs from the same person than those from different ones is the main difficult task in face recognition. Whenever image information is jointly co-ordinated in three aspects viz. image space, scale and orientation domains they carry much higher clues than seen in each domain individually. In the proposed method combination of Local Binary Pattern (LBP) and Gabor features are used to increase the face recognition performance significantly to compare individual's face presentations. Hence face recognition and representation of Gabor faces are done using E-GV-LBP and CMI-LDA based feature recognition method. Gabor faces uses space, scale and orientation to support accurate face recognition, making net banking easier, authentic, reliable and user friendly.
如今,人脸识别技术正在成为银行、警察记录、生物识别等各个领域图像识别安全方面最重要和最具挑战性的方面,而不是个人的拇指和文件身份证明。到目前为止,为了有效的网上银行业务,用户必须提供适当的用户名和密码以进行身份验证。该项目引入了一种车辆,通过向系统提供人脸图像以及用户名和密码,使个人身份验证向前迈进了一步。在这种情况下,个人的面部识别是通过生物识别认证支持,只有一个人的帐户是,可以访问它。然而,在将这些用户图像的敏感数据从客户端机器传输到银行服务器时,必须防止黑客和入侵者对其进行人为处理,因此使用基于小波分解的隐写术进行隐蔽通信。人脸图像在一段时间内会受到不同表情、姿势、遮挡、光照、年龄等因素的影响,且同一个人的人脸图像不同于不同人的人脸图像是人脸识别的主要难点。当图像信息在图像空间、尺度和方向三个方面进行协调时,它们所承载的线索要比在单个领域中看到的线索要高得多。该方法将局部二值模式(LBP)和Gabor特征相结合,显著提高了人脸识别性能。因此,采用基于E-GV-LBP和CMI-LDA的特征识别方法对Gabor人脸进行识别和表示。Gabor faces利用空间、规模和方向来支持准确的人脸识别,使网上银行更容易、真实、可靠和用户友好。
{"title":"A new SAFR tool for face recognition using EGVLBP-CMI-LDA wrapped with secured DWT based steganography","authors":"S. Jhodge, G. Chiddarwar, G. Shinde","doi":"10.1109/IADCC.2013.6514370","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514370","url":null,"abstract":"Face recognition technique nowadays is emerging as the most significant and challenging aspects in terms of security for identification of images in various fields viz. banking, police records, biometric etc. other than an individual's thumb and documented identification proofs. Till date for efficient net banking to be initiated, one has to provide the appropriate user name and password for purpose of authentication. This project introduces a vehicle to take a step forward in easy and more reliable authentication of an individual by providing Face Image along with User Name and Password to the system. In this an individual's face is identified by biometric authentication support with which, only a person whose account is, can access it. However while transferring this sensitive data of user image, from client machine to bank server it has to be protected from hackers and intruders from manhandling it, hence it is transferred using covert communication called Wavelet Decomposition based steganography. As face images are affected by different expressions, poses, occlusions, illuminations and aging over a period of time and it differs from the same person than those from different ones is the main difficult task in face recognition. Whenever image information is jointly co-ordinated in three aspects viz. image space, scale and orientation domains they carry much higher clues than seen in each domain individually. In the proposed method combination of Local Binary Pattern (LBP) and Gabor features are used to increase the face recognition performance significantly to compare individual's face presentations. Hence face recognition and representation of Gabor faces are done using E-GV-LBP and CMI-LDA based feature recognition method. Gabor faces uses space, scale and orientation to support accurate face recognition, making net banking easier, authentic, reliable and user friendly.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient signcryption scheme based on ECC with forward secrecy and encrypted message authentication 基于前向保密和加密消息认证的高效ECC签名加密方案
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514258
M. Dutta, A. K. Singh, A. Kumar
In this paper, an efficient signcryption scheme based on elliptic curve cryptosystem is going to be proposed which can effectively combine the functionalities of digital signature and encryption and also takes a comparable amount of computational cost and communication overhead. The proposed scheme provides confidentiality, integrity, unforgeability and nonrepudiation, along with encrypted message authentication, forward secrecy of message confidentiality and public verification. By forward secrecy of message confidentiality function we mean, although the private key of the sender is divulged inattentively, it does not affect the confidentiality of the previously stored messages. By the public verification function we mean, any third party can verify directly the signature of the sender of the original message without the sender's private key when dispute occurs. It enhances the justice of judge. In addition, proposed scheme will save great amount of computational cost. The proposed scheme can be applied to the lower computational power devices, like smart card based applications, e-voting and many more, due to their lower computational cost. The Proposed Scheme is discussed in this paper and is compared with the existing schemes with respect to computational cost and the security functions it provides.
本文提出了一种基于椭圆曲线密码系统的有效的签名加密方案,该方案能有效地将数字签名和加密的功能结合起来,并且计算成本和通信开销相当。该方案具有机密性、完整性、不可伪造性和不可否认性,同时具有消息加密认证、消息机密性的前向保密和公开验证。消息保密功能的前向保密是指虽然发送方的私钥在无意中泄露,但并不影响先前存储的消息的机密性。我们所说的公开验证功能,是指当发生争议时,任何第三方都可以直接验证原始消息发送方的签名,而不需要发送方的私钥。提高了法官的公正性。此外,所提出的方案将节省大量的计算成本。由于其较低的计算成本,所提出的方案可以应用于计算能力较低的设备,如基于智能卡的应用程序、电子投票等。本文讨论了所提出的方案,并在计算成本和提供的安全功能方面与现有方案进行了比较。
{"title":"An efficient signcryption scheme based on ECC with forward secrecy and encrypted message authentication","authors":"M. Dutta, A. K. Singh, A. Kumar","doi":"10.1109/IADCC.2013.6514258","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514258","url":null,"abstract":"In this paper, an efficient signcryption scheme based on elliptic curve cryptosystem is going to be proposed which can effectively combine the functionalities of digital signature and encryption and also takes a comparable amount of computational cost and communication overhead. The proposed scheme provides confidentiality, integrity, unforgeability and nonrepudiation, along with encrypted message authentication, forward secrecy of message confidentiality and public verification. By forward secrecy of message confidentiality function we mean, although the private key of the sender is divulged inattentively, it does not affect the confidentiality of the previously stored messages. By the public verification function we mean, any third party can verify directly the signature of the sender of the original message without the sender's private key when dispute occurs. It enhances the justice of judge. In addition, proposed scheme will save great amount of computational cost. The proposed scheme can be applied to the lower computational power devices, like smart card based applications, e-voting and many more, due to their lower computational cost. The Proposed Scheme is discussed in this paper and is compared with the existing schemes with respect to computational cost and the security functions it provides.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123381640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
BioHash code generation from electrocardiogram features 从心电图特征生成BioHash代码
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514317
N. Dey, B. Nandi, M. Dey, D. Biswas, A. Das, S. S. Chaudhuri
Biometric Authentication System used for verifying identity of a person is getting highly popularized. In today's world when online communication and transactions are a widespread reality, verification of user's identity has become all the more challenging. Biometric Authentication provides a secured and robust system for verification purpose. This paper proposes a cancelable biometric approach called BioHashing. The method uses ECG features and Tokenized Random Number to generate an inner product. The obtained products which are above a previously defined threshold are coded as 1, and the rest 0, thus generating the BioHash Code.
用于验证个人身份的生物识别认证系统正在得到高度普及。在当今世界,当在线交流和交易是一个普遍的现实,用户的身份验证变得更加具有挑战性。生物特征认证为验证目的提供了一个安全可靠的系统。本文提出了一种可取消的生物识别方法,称为生物哈希。该方法利用心电特征和标记化随机数生成内积。获得的高于先前定义阈值的产品编码为1,其余产品编码为0,从而生成BioHash Code。
{"title":"BioHash code generation from electrocardiogram features","authors":"N. Dey, B. Nandi, M. Dey, D. Biswas, A. Das, S. S. Chaudhuri","doi":"10.1109/IADCC.2013.6514317","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514317","url":null,"abstract":"Biometric Authentication System used for verifying identity of a person is getting highly popularized. In today's world when online communication and transactions are a widespread reality, verification of user's identity has become all the more challenging. Biometric Authentication provides a secured and robust system for verification purpose. This paper proposes a cancelable biometric approach called BioHashing. The method uses ECG features and Tokenized Random Number to generate an inner product. The obtained products which are above a previously defined threshold are coded as 1, and the rest 0, thus generating the BioHash Code.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122088484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
DGS based microstrip patch antennas for UWB systems 超宽带系统中基于DGS的微带贴片天线
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514462
R. K. Yadav, S. Das, R. L. Yadava
This paper presents design and optimization of DGS based Pentagonal and Circular patch antennas suitable for wireless communication systems. The obtained results are impressive due to its improved bandwidth which covers wide frequency range having return loss less than -10 dB. Also found that Pentagonal antennas have better BW compare to Circular antennas.
提出了一种适用于无线通信系统的基于DGS的五边形和圆形贴片天线的设计与优化。所获得的结果令人印象深刻,因为它改善了带宽,覆盖了宽的频率范围,回波损耗小于-10 dB。还发现五角形天线比圆形天线有更好的BW。
{"title":"DGS based microstrip patch antennas for UWB systems","authors":"R. K. Yadav, S. Das, R. L. Yadava","doi":"10.1109/IADCC.2013.6514462","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514462","url":null,"abstract":"This paper presents design and optimization of DGS based Pentagonal and Circular patch antennas suitable for wireless communication systems. The obtained results are impressive due to its improved bandwidth which covers wide frequency range having return loss less than -10 dB. Also found that Pentagonal antennas have better BW compare to Circular antennas.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122540253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Novel intrusion detection system integrating layered framework with neural network 将分层框架与神经网络相结合的入侵检测系统
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514309
N. Srivastav, R. Challa
The threat from spammers, attackers and criminal enterprises has grown with the expansion of Internet, thus, intrusion detection systems (IDS)have become a core component of computer network due to prevalence of such threats. In this paper, we present layered framework integrated with neural network to build an effective intrusion detection system. This system has experimented with Knowledge Discovery & Data Mining(KDD) 1999 dataset. The systems are compared with existing approaches of intrusion detection which either uses neural network or based on layered framework. The results show that the proposed system has high attack detection accuracy and less false alarm rate.
随着互联网的发展,来自垃圾邮件发送者、攻击者和犯罪企业的威胁越来越大,入侵检测系统(IDS)也因此成为计算机网络的核心组成部分。本文提出了结合神经网络的分层框架来构建有效的入侵检测系统。该系统以知识发现与数据挖掘(KDD) 1999数据集为实验对象。将该系统与现有的基于神经网络和分层框架的入侵检测方法进行了比较。结果表明,该系统具有较高的攻击检测准确率和较低的虚警率。
{"title":"Novel intrusion detection system integrating layered framework with neural network","authors":"N. Srivastav, R. Challa","doi":"10.1109/IADCC.2013.6514309","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514309","url":null,"abstract":"The threat from spammers, attackers and criminal enterprises has grown with the expansion of Internet, thus, intrusion detection systems (IDS)have become a core component of computer network due to prevalence of such threats. In this paper, we present layered framework integrated with neural network to build an effective intrusion detection system. This system has experimented with Knowledge Discovery & Data Mining(KDD) 1999 dataset. The systems are compared with existing approaches of intrusion detection which either uses neural network or based on layered framework. The results show that the proposed system has high attack detection accuracy and less false alarm rate.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130182283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
A distributed dynamic grid scheduler for mixed tasks 用于混合任务的分布式动态网格调度程序
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514204
Ramanathan Mohan, Rao Kovvur, S. Ramachandram, Vijayakumar Kadappa, A. Govardhan
We consider scheduling of bag of independent mixed tasks (Hard, firm and soft) in a distributed dynamic grid environment. Recently, a general distributed scalable grid scheduler (GDS) for independent tasks was proposed to maximize successful schedule percent in an error-free grid environment. However, GDS did not consider constraint failure of task during execution due to resource overload, which leads to limited successful schedule percent. In this paper, we propose a novel distributed dynamic grid scheduler for mixed tasks (DDGS-MT), which takes into consideration the constraint failure of task during execution due to resource overload. The proposed scheduler incorporates migration and resume fault tolerant mechanisms for computational and communication intensive tasks respectively. The proposed scheduler shows improved performance in terms of successful schedule percent and makespan in comparison with GDS. The results of our exhaustive simulations experiments demonstrate the superiority of DDGS over GDS scheduler.
研究了分布式动态网格环境下独立混合任务包(硬、硬、软)的调度问题。为了在无差错的网格环境中最大限度地提高独立任务的调度成功率,最近提出了一种通用的分布式可伸缩网格调度程序。然而,GDS没有考虑任务在执行过程中由于资源过载而导致的约束失败,导致调度成功率有限。本文提出了一种新的混合任务分布式动态网格调度程序(DDGS-MT),该调度程序考虑了任务在执行过程中由于资源过载而导致的约束失效。该调度器分别为计算密集型任务和通信密集型任务集成了迁移和恢复容错机制。与GDS相比,所建议的调度器在成功调度百分比和完工时间方面表现出更高的性能。详尽的仿真实验结果表明,DDGS调度程序优于GDS调度程序。
{"title":"A distributed dynamic grid scheduler for mixed tasks","authors":"Ramanathan Mohan, Rao Kovvur, S. Ramachandram, Vijayakumar Kadappa, A. Govardhan","doi":"10.1109/IADCC.2013.6514204","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514204","url":null,"abstract":"We consider scheduling of bag of independent mixed tasks (Hard, firm and soft) in a distributed dynamic grid environment. Recently, a general distributed scalable grid scheduler (GDS) for independent tasks was proposed to maximize successful schedule percent in an error-free grid environment. However, GDS did not consider constraint failure of task during execution due to resource overload, which leads to limited successful schedule percent. In this paper, we propose a novel distributed dynamic grid scheduler for mixed tasks (DDGS-MT), which takes into consideration the constraint failure of task during execution due to resource overload. The proposed scheduler incorporates migration and resume fault tolerant mechanisms for computational and communication intensive tasks respectively. The proposed scheduler shows improved performance in terms of successful schedule percent and makespan in comparison with GDS. The results of our exhaustive simulations experiments demonstrate the superiority of DDGS over GDS scheduler.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129680448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of clustering tendency through progressive random sampling and graph-based clustering results 通过渐进式随机抽样和基于图的聚类结果评估聚类倾向
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514316
K. R. Prasad, B. E. Reddy
Clustering analysis is widely used technique in many emerging applications. Assessment of clustering tendency is generally done by Visual Access Tendency (VAT) algorithm. VAT detects the clustering tendency by reordering the indices of objects from the dissimilarity matrix, according to logic of Prim's algorithm. Therefore, VAT demands high computational cost for large datasets. The contribution of proposed work is to develop best sampling technique for obtaining good representative of entire dataset in the form of sub-dissimilarity matrix in VAT, it provides accessing of prior tendency visually by detecting number of square shaped dark blocks along with diagonal in sample based VAT image. This proposed work gives same clustering tendency results when we compare with simple VAT, and it has an advantage of less processing time since it uses only sampled dissimilarity matrix. This sample based VAT (PSVAT) uses set of distinguished features for random selection of progressive sample representatives. Finally, known clustering tendency is used in graph-based clustering technique (Minimum Spanning Tree based clustering) for achieving efficient clustering results. Comparative runtime values of PSVAT and VAT on several datasets are presented in this paper for showing that PSVAT is better than VAT in respect of runtime performance and clustering validity is also tested by Dunn's Index for sampled data.
聚类分析技术在许多新兴应用中得到了广泛的应用。聚类倾向的评价一般采用VAT (Visual Access tendency)算法。根据Prim算法的逻辑,VAT通过从不相似矩阵中重新排序对象的索引来检测聚类趋势。因此,对于大型数据集,VAT要求较高的计算成本。本文的贡献在于开发了一种最佳的采样技术,以VAT中的子不相似矩阵的形式获得整个数据集的良好代表,它通过检测基于样本的VAT图像中沿对角线的方形暗块的数量来直观地访问先验趋势。当我们与简单的VAT进行比较时,提出的工作给出了相同的聚类倾向结果,并且由于它只使用采样的不相似矩阵,因此具有较少的处理时间的优点。这种基于样本的增值税(PSVAT)使用一组显著特征来随机选择渐进样本代表。最后,将已知的聚类倾向用于基于图的聚类技术(基于最小生成树的聚类),以获得高效的聚类结果。本文给出了PSVAT和VAT在多个数据集上的运行时比较值,表明PSVAT在运行时性能上优于VAT,并通过Dunn's Index对采样数据进行了聚类有效性检验。
{"title":"Assessment of clustering tendency through progressive random sampling and graph-based clustering results","authors":"K. R. Prasad, B. E. Reddy","doi":"10.1109/IADCC.2013.6514316","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514316","url":null,"abstract":"Clustering analysis is widely used technique in many emerging applications. Assessment of clustering tendency is generally done by Visual Access Tendency (VAT) algorithm. VAT detects the clustering tendency by reordering the indices of objects from the dissimilarity matrix, according to logic of Prim's algorithm. Therefore, VAT demands high computational cost for large datasets. The contribution of proposed work is to develop best sampling technique for obtaining good representative of entire dataset in the form of sub-dissimilarity matrix in VAT, it provides accessing of prior tendency visually by detecting number of square shaped dark blocks along with diagonal in sample based VAT image. This proposed work gives same clustering tendency results when we compare with simple VAT, and it has an advantage of less processing time since it uses only sampled dissimilarity matrix. This sample based VAT (PSVAT) uses set of distinguished features for random selection of progressive sample representatives. Finally, known clustering tendency is used in graph-based clustering technique (Minimum Spanning Tree based clustering) for achieving efficient clustering results. Comparative runtime values of PSVAT and VAT on several datasets are presented in this paper for showing that PSVAT is better than VAT in respect of runtime performance and clustering validity is also tested by Dunn's Index for sampled data.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128028143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2013 3rd IEEE International Advance Computing Conference (IACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1