首页 > 最新文献

2016 2nd International Conference on Next Generation Computing Technologies (NGCT)最新文献

英文 中文
Improved image compression technique using IWT-DCT transformation 利用IWT-DCT变换改进图像压缩技术
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877499
S. Agrwal, M. Sharma, D. Kumari, S. Gupta
Wireless Image Compression is embedding scheme for reducing size of image so that image can be store in less disk space and faster attachment possible in communication. Research issues in Image Compression are to increase efficiency in term of the image quality of decompressed image on higher compression ratio and robustness against visual attacks. Discrete Wavelet transform domain based Image Compression is lossy compression technique. The disadvantage of DWT based compression is fraction loss in embedding which increases mean square error and results decreasing PSNR. Quality of decompressed image is proportional to PSNR. The Proposed compression approach use integer wavelet transforms to overcome above fraction loss. The paper presents Hybrid Integer wavelet transform (IWT) and discrete cosine transform (DCT) based compression technique to obtain increased quality of decompressed image compared to DWT+ DCT based compression technique. The proposed combined IWT + DCT based compression technique reduces the fractional loss compared to DWT based compression so the proposed technique provides better image quality of decompressed image on high compression ratio compared to DWT based and hybrid DWT DCT based image compression techniques.
无线图像压缩是一种减小图像尺寸的嵌入方案,它可以使图像存储在更小的磁盘空间中,并在通信中更快地附加图像。如何在更高的压缩比和抗视觉攻击的鲁棒性条件下提高图像压缩后的图像质量,是图像压缩领域的研究课题。基于离散小波变换域的图像压缩是一种有损压缩技术。基于小波变换的压缩方法的缺点是嵌入过程中存在分数损失,导致均方误差增大,信噪比降低。解压缩图像的质量与PSNR成正比。所提出的压缩方法采用整数小波变换克服上述分数损失。本文提出了基于整数小波变换(IWT)和离散余弦变换(DCT)的混合压缩技术,与基于DWT+ DCT的压缩技术相比,得到了更高质量的解压缩图像。与基于DWT的压缩相比,基于IWT + DCT的组合压缩技术减少了分数损失,因此与基于DWT和混合基于DWT DCT的图像压缩技术相比,该技术在高压缩比下提供了更好的解压缩图像质量。
{"title":"Improved image compression technique using IWT-DCT transformation","authors":"S. Agrwal, M. Sharma, D. Kumari, S. Gupta","doi":"10.1109/NGCT.2016.7877499","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877499","url":null,"abstract":"Wireless Image Compression is embedding scheme for reducing size of image so that image can be store in less disk space and faster attachment possible in communication. Research issues in Image Compression are to increase efficiency in term of the image quality of decompressed image on higher compression ratio and robustness against visual attacks. Discrete Wavelet transform domain based Image Compression is lossy compression technique. The disadvantage of DWT based compression is fraction loss in embedding which increases mean square error and results decreasing PSNR. Quality of decompressed image is proportional to PSNR. The Proposed compression approach use integer wavelet transforms to overcome above fraction loss. The paper presents Hybrid Integer wavelet transform (IWT) and discrete cosine transform (DCT) based compression technique to obtain increased quality of decompressed image compared to DWT+ DCT based compression technique. The proposed combined IWT + DCT based compression technique reduces the fractional loss compared to DWT based compression so the proposed technique provides better image quality of decompressed image on high compression ratio compared to DWT based and hybrid DWT DCT based image compression techniques.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115301367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An efficient system using item & user-based CF techniques to improve recommendation 一个有效的系统,使用基于项目和用户的CF技术来改进推荐
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877479
Celine Michael Rodrigues, S. Rathi, Ganesh V. Patil
Nowadays large portion of web-based businesses, research projects, and scientist use recommendation systems to help their business to thrive & flourish. Standard recommendation system utilises either user CF, item CF or content based recommendation system, these furthermore confront issues like item cold start, user cold start and real-time prediction problem. In the perspective of these challenges, cluster based hybrid CF approach is proposed in this paper which uses item-based CF algorithm combined with user demographic based CF algorithm in clusters weighted mechanism. The proposed system is adaptable and extendable which is fruitful in addressing not only user cold start issues but also item cold start issues along with sparsity problem, with lower MAE enhancing the structure to give better suggestion progressively.
如今,很大一部分基于网络的企业、研究项目和科学家使用推荐系统来帮助他们的业务蓬勃发展。标准推荐系统采用用户CF、项目CF或基于内容的推荐系统,进一步面临项目冷启动、用户冷启动和实时预测等问题。针对这些挑战,本文提出了基于聚类的混合CF方法,该方法将基于项目的CF算法与基于用户人口统计的CF算法结合在聚类加权机制中。该系统具有较强的适应性和可扩展性,不仅解决了用户冷启动问题,而且解决了项目冷启动问题和稀疏性问题,并通过较低的MAE逐步增强了结构,给出了更好的建议。
{"title":"An efficient system using item & user-based CF techniques to improve recommendation","authors":"Celine Michael Rodrigues, S. Rathi, Ganesh V. Patil","doi":"10.1109/NGCT.2016.7877479","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877479","url":null,"abstract":"Nowadays large portion of web-based businesses, research projects, and scientist use recommendation systems to help their business to thrive & flourish. Standard recommendation system utilises either user CF, item CF or content based recommendation system, these furthermore confront issues like item cold start, user cold start and real-time prediction problem. In the perspective of these challenges, cluster based hybrid CF approach is proposed in this paper which uses item-based CF algorithm combined with user demographic based CF algorithm in clusters weighted mechanism. The proposed system is adaptable and extendable which is fruitful in addressing not only user cold start issues but also item cold start issues along with sparsity problem, with lower MAE enhancing the structure to give better suggestion progressively.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121081797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Physical telepresence: Growth trends of Tangible User Interface and its future 物理远程呈现:有形用户界面的增长趋势及其未来
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877420
Vikas Kumar, T. Choudhury, S. Sabitha
Tangible User Interface (TUI) started with the invention of mouse and keyboard. Since the last two decades, TUI has experienced tremendous growth and has provided us with a link between the physical and the digital world. Even though, MIT Tangible Lab develops several tangible interface models every year, the research work in TUI is still in its infancy and extensive work is required to fully understand the potential of Tangible User Interfaces. This paper describes a brief history and some landmark Tangible User Interface models. It first acknowledges the existing work in TUI. Then, it is followed by the comparison between several TUI models. The paper brings out methods and technologies which are used in building TUI. It also aims at finding the advantages, disadvantages and applications of some TUI models. The paper concludes with finding those factors which are responsible for the growth of TUI.
有形用户界面(TUI)始于鼠标和键盘的发明。在过去的二十年中,途易经历了巨大的发展,并为我们提供了连接物理世界和数字世界的纽带。尽管MIT有形实验室每年都会开发几个有形界面模型,但TUI的研究工作仍处于起步阶段,需要大量的工作来充分了解有形用户界面的潜力。本文简要介绍了有形用户界面的发展历史和一些具有里程碑意义的模型。它首先承认TUI的现有工作。然后,对几种TUI模型进行了比较。本文提出了构建TUI的方法和技术。同时也找出了一些TUI模型的优缺点和应用。最后,找出了导致交通流量增长的因素。
{"title":"Physical telepresence: Growth trends of Tangible User Interface and its future","authors":"Vikas Kumar, T. Choudhury, S. Sabitha","doi":"10.1109/NGCT.2016.7877420","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877420","url":null,"abstract":"Tangible User Interface (TUI) started with the invention of mouse and keyboard. Since the last two decades, TUI has experienced tremendous growth and has provided us with a link between the physical and the digital world. Even though, MIT Tangible Lab develops several tangible interface models every year, the research work in TUI is still in its infancy and extensive work is required to fully understand the potential of Tangible User Interfaces. This paper describes a brief history and some landmark Tangible User Interface models. It first acknowledges the existing work in TUI. Then, it is followed by the comparison between several TUI models. The paper brings out methods and technologies which are used in building TUI. It also aims at finding the advantages, disadvantages and applications of some TUI models. The paper concludes with finding those factors which are responsible for the growth of TUI.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114377972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Coverage and connectivity aware data gathering protocol for wireless sensor networks 无线传感器网络覆盖和连接感知数据采集协议
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877455
Vishakha Tomar, D. Singh
Wireless sensor networks (WSNS) is a collection of sensor nodes whose basic functionality is to monitor the region in which they are deployed. Main research issues in designing a protocol for WSNs is, how to minimize energy consumption and prolong the network lifetime, while ensuring the required coverage as well as connectivity. In this paper, we present a coverage and connectivity aware data gathering protocol to provide sufficient coverage and connectivity in the network. The proposed protocol reduces the energy consumption of a network using a sleep scheduling scheme to periodically turn on and off the communication radios. A backbone of relay nodes and independent nodes is maintained for ensuring the connectivity in the network and this is also periodically rebuild the backbone setup. Each node transmits its sensory data to its closest independent node and an independent node forwards the sensed data via relay nodes toward the sink. The proposed protocol does not use any geographic information and is a fully distributed. Simulation results show that the proposed protocol consumes less energy consumption compare to existing protocol and also prolong the network life time, while maintaining connectivity and coverage.
无线传感器网络(WSNS)是传感器节点的集合,其基本功能是监测其部署的区域。无线传感器网络协议设计的主要研究问题是如何在保证网络覆盖和连通性的前提下,最大限度地降低网络能耗,延长网络寿命。在本文中,我们提出了一个覆盖和连通性感知的数据采集协议,以提供足够的网络覆盖和连通性。该协议利用休眠调度机制周期性地打开和关闭通信无线电,降低了网络的能耗。维护由中继节点和独立节点组成的骨干网,以确保网络中的连通性,并定期重建骨干网设置。每个节点将其感测数据发送到最近的独立节点,独立节点通过中继节点将感测数据转发到接收器。该协议不使用任何地理信息,是完全分布式的。仿真结果表明,与现有协议相比,该协议能耗更低,在保持网络连通性和网络覆盖的同时,延长了网络寿命。
{"title":"Coverage and connectivity aware data gathering protocol for wireless sensor networks","authors":"Vishakha Tomar, D. Singh","doi":"10.1109/NGCT.2016.7877455","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877455","url":null,"abstract":"Wireless sensor networks (WSNS) is a collection of sensor nodes whose basic functionality is to monitor the region in which they are deployed. Main research issues in designing a protocol for WSNs is, how to minimize energy consumption and prolong the network lifetime, while ensuring the required coverage as well as connectivity. In this paper, we present a coverage and connectivity aware data gathering protocol to provide sufficient coverage and connectivity in the network. The proposed protocol reduces the energy consumption of a network using a sleep scheduling scheme to periodically turn on and off the communication radios. A backbone of relay nodes and independent nodes is maintained for ensuring the connectivity in the network and this is also periodically rebuild the backbone setup. Each node transmits its sensory data to its closest independent node and an independent node forwards the sensed data via relay nodes toward the sink. The proposed protocol does not use any geographic information and is a fully distributed. Simulation results show that the proposed protocol consumes less energy consumption compare to existing protocol and also prolong the network life time, while maintaining connectivity and coverage.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"94 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128699534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An improved approach for denoising MRI using non local means filter 一种改进的非局部均值滤波去噪方法
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877492
N. Joshi, Sarika Jain, Amit Agarwal
Various types of noise affect Magnetic Resonance Images and consequently interrupt in correct diagnosis. Thus, noise reduction is a major task while working with Magnetic Resonance (MR) Images. The process of denoising reduces the undesirable noise, but at the same time the denoising process needs to preserve the image features as well. Various techniques are available for noise removal from MR Images. Non local means filtering approach is a popular denoising technique for MR images. Modifications have been performed on the original Non Local Means algorithm to apply it on numerous applications. The aim of this paper is to denoise MRI by a novel approach, making use of a median and wiener filter in conjunction with the Non local means filtering technique.
各种类型的噪声影响磁共振图像,从而中断正确的诊断。因此,在处理磁共振(MR)图像时,降噪是一项主要任务。去噪的过程在去除不需要的噪声的同时,又要保持图像的特征。有多种技术可用于去除MR图像中的噪声。非局部均值滤波方法是一种常用的核磁共振图像去噪方法。对原有的非局部均值算法进行了改进,使之适用于多种应用场合。本文的目的是通过一种新颖的方法去噪MRI,利用中值和维纳滤波器结合非局部均值滤波技术。
{"title":"An improved approach for denoising MRI using non local means filter","authors":"N. Joshi, Sarika Jain, Amit Agarwal","doi":"10.1109/NGCT.2016.7877492","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877492","url":null,"abstract":"Various types of noise affect Magnetic Resonance Images and consequently interrupt in correct diagnosis. Thus, noise reduction is a major task while working with Magnetic Resonance (MR) Images. The process of denoising reduces the undesirable noise, but at the same time the denoising process needs to preserve the image features as well. Various techniques are available for noise removal from MR Images. Non local means filtering approach is a popular denoising technique for MR images. Modifications have been performed on the original Non Local Means algorithm to apply it on numerous applications. The aim of this paper is to denoise MRI by a novel approach, making use of a median and wiener filter in conjunction with the Non local means filtering technique.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124695065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Designing and implementaion of smart LPG trolley with home safety 智能家用安全LPG小车的设计与实现
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877412
Ajay Mahaputra Kumar, Mukesh Kumar, Balwinder Singh
LPG cylinders have become an integral part of every home. Our kitchens are occupied with LPG cylinders which help us make delicious food. But it can be dangerous and life threatening. Therefore, it requires constant vigilance to reduce the danger. The aim of this paper is to design a safety oriented system which will alert the user about any threat in the kitchen through mobile and also capable of performing required action immediately. This system will detect leakage of LPG and send an alert message to the user, at the same time it will switch off the mains power supply and a mechanical design attached with it, can switch off regulator too. It ensures safety from any gas leakage accident like suffocation and explosion. As an additional advantage, this system has a weighing sensor which can measure the weight of the cylinder and regularly update user about gas left in the cylinder. This system will also help customers to know whether they are being cheated by gas agency by providing less amount of LPG. In the present time, everyone is busy in their daily life and it is difficult to know the status of the gas cylinder. Further, it will register your booking through GSM technology by sending SMS to the distributor company and also send an alert to user at the same time. It will be helpful for those aged people who live alone and are dependent on others, by making them independent and secure them from any kitchen hazardous.
液化石油气气瓶已成为每个家庭不可或缺的一部分。我们的厨房里装满了液化石油气气瓶,帮助我们制作美味的食物。但它可能很危险,危及生命。因此,需要时刻保持警惕,减少危险。本文的目的是设计一个以安全为导向的系统,该系统将通过移动设备提醒用户厨房中的任何威胁,并能够立即执行所需的操作。该系统可以检测到LPG泄漏并向用户发送报警信息,同时关闭主电源,并附带一个机械设计,可以关闭调节器。确保安全,避免窒息、爆炸等气体泄漏事故。作为一个额外的优点,该系统有一个称重传感器,可以测量钢瓶的重量,并定期向用户更新钢瓶中剩余的气体。该制度还可以减少LPG的供给量,从而使顾客知道自己是否受到了煤气公司的欺骗。在现在这个时代,每个人的日常生活都很繁忙,很难知道气瓶的状态。此外,它将通过GSM技术向分销商公司发送短信登记您的预订,并同时向用户发送警报。这将有助于那些独居和依赖他人的老年人,使他们独立,并确保他们远离任何厨房危险。
{"title":"Designing and implementaion of smart LPG trolley with home safety","authors":"Ajay Mahaputra Kumar, Mukesh Kumar, Balwinder Singh","doi":"10.1109/NGCT.2016.7877412","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877412","url":null,"abstract":"LPG cylinders have become an integral part of every home. Our kitchens are occupied with LPG cylinders which help us make delicious food. But it can be dangerous and life threatening. Therefore, it requires constant vigilance to reduce the danger. The aim of this paper is to design a safety oriented system which will alert the user about any threat in the kitchen through mobile and also capable of performing required action immediately. This system will detect leakage of LPG and send an alert message to the user, at the same time it will switch off the mains power supply and a mechanical design attached with it, can switch off regulator too. It ensures safety from any gas leakage accident like suffocation and explosion. As an additional advantage, this system has a weighing sensor which can measure the weight of the cylinder and regularly update user about gas left in the cylinder. This system will also help customers to know whether they are being cheated by gas agency by providing less amount of LPG. In the present time, everyone is busy in their daily life and it is difficult to know the status of the gas cylinder. Further, it will register your booking through GSM technology by sending SMS to the distributor company and also send an alert to user at the same time. It will be helpful for those aged people who live alone and are dependent on others, by making them independent and secure them from any kitchen hazardous.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"930 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127017668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A novel way to classify passenger data using Naïve Bayes algorithm (A real time anti-terrorism approach) 一种基于Naïve贝叶斯算法的乘客数据分类新方法(一种实时反恐方法)
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877433
Saurabh Singh, Shashikant Verma, Akhilesh Tiwari, Aditya Tiwari
Terrorist Data Mining basically means to encounter all the data of terrorism from the huge amount of data. In a more intricate way we all know that terrorist set their foot into any predominant place through railway station, bus stands or airport. Usually to communicate they use their cell phones and network. Now if these areas are well equipped with LAN or WAN, that is the Wi-Fi connections surely these terrorist would avail themselves. Then with the help of data used by terrorists their presence can be spotted easily and their information can be collected. This paper describes a novel work to counter the presence of terrorist at public place in a well-defined manner.
恐怖主义数据挖掘基本上就是从海量的数据中挖掘出恐怖主义的所有数据。以一种更复杂的方式,我们都知道恐怖分子通过火车站、汽车站或机场进入任何主要场所。他们通常使用手机和网络进行交流。现在,如果这些地区配备了局域网或广域网,也就是Wi-Fi连接,这些恐怖分子肯定会利用自己。然后在恐怖分子使用的数据的帮助下,他们的存在可以很容易地被发现,他们的信息可以被收集。本文描述了一种以明确定义的方式对抗公共场所恐怖分子存在的新颖工作。
{"title":"A novel way to classify passenger data using Naïve Bayes algorithm (A real time anti-terrorism approach)","authors":"Saurabh Singh, Shashikant Verma, Akhilesh Tiwari, Aditya Tiwari","doi":"10.1109/NGCT.2016.7877433","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877433","url":null,"abstract":"Terrorist Data Mining basically means to encounter all the data of terrorism from the huge amount of data. In a more intricate way we all know that terrorist set their foot into any predominant place through railway station, bus stands or airport. Usually to communicate they use their cell phones and network. Now if these areas are well equipped with LAN or WAN, that is the Wi-Fi connections surely these terrorist would avail themselves. Then with the help of data used by terrorists their presence can be spotted easily and their information can be collected. This paper describes a novel work to counter the presence of terrorist at public place in a well-defined manner.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116209244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An agent based architecture using ontology for intrusion detection system 基于本体的智能体入侵检测系统
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877481
M. Bist, A. P. Panwar, Vishwas Kumar
Intrusion Detection Systems is one of the most useful tools which are used nowadays to identify the attacks happening on the network. But the high false positive and false negative rates are major limitations in Intrusion detection System. To overcome these limitations new techniques should be introduced. In our research we used Ontology in Intrusion Detection System. As Ontology describes the semantic relations between entities, we used this technique in our system to describe the attacks by their behavior. Our proposed Intrusion Detection System contains multiple agents like Sniffer agent, Analysis Agent, communication agent and manager agent. They work collectively to detect the intrusion in a much efficient way. Analysis agent uses ontology to identify the attack. Protege is software which creates ontology. Our system semantically analyses various fields of the packet and infer to a solution about attack. To identify complex attacks occurs in distributed environment that are not identified by the existing systems we are using complex attack ontology. So overall Ontology based Intrusion Detection Systems are much advanced as compared to other IDS as these are reliable, scalable, interoperable and helpful for finding new attacks.
入侵检测系统是当今用于识别网络攻击的最有用的工具之一。但是高的假阳性和假阴性率是入侵检测系统的主要限制。为了克服这些限制,应该引进新技术。在我们的研究中,我们将本体应用于入侵检测系统。由于本体描述了实体之间的语义关系,我们在系统中使用了这种技术来描述攻击的行为。我们提出的入侵检测系统包含多个代理,如嗅探代理、分析代理、通信代理和管理代理。他们共同努力,以一种更有效的方式检测入侵。分析代理使用本体来识别攻击。Protege是一个创建本体的软件。我们的系统对数据包的各个字段进行语义分析,并推断出攻击的解决方案。为了识别分布式环境中现有系统无法识别的复杂攻击,我们使用了复杂攻击本体。因此,与其他入侵检测系统相比,基于本体的入侵检测系统要先进得多,因为它们可靠、可扩展、可互操作,并且有助于发现新的攻击。
{"title":"An agent based architecture using ontology for intrusion detection system","authors":"M. Bist, A. P. Panwar, Vishwas Kumar","doi":"10.1109/NGCT.2016.7877481","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877481","url":null,"abstract":"Intrusion Detection Systems is one of the most useful tools which are used nowadays to identify the attacks happening on the network. But the high false positive and false negative rates are major limitations in Intrusion detection System. To overcome these limitations new techniques should be introduced. In our research we used Ontology in Intrusion Detection System. As Ontology describes the semantic relations between entities, we used this technique in our system to describe the attacks by their behavior. Our proposed Intrusion Detection System contains multiple agents like Sniffer agent, Analysis Agent, communication agent and manager agent. They work collectively to detect the intrusion in a much efficient way. Analysis agent uses ontology to identify the attack. Protege is software which creates ontology. Our system semantically analyses various fields of the packet and infer to a solution about attack. To identify complex attacks occurs in distributed environment that are not identified by the existing systems we are using complex attack ontology. So overall Ontology based Intrusion Detection Systems are much advanced as compared to other IDS as these are reliable, scalable, interoperable and helpful for finding new attacks.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124061302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT-based real time signature authentication and transfer from document to document with DNA encryption 基于物联网的实时签名认证和DNA加密文件之间的传输
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877380
Sharon A. Zachariah, D. Rajasekar, L. Agilandeeswari, M. Prabukumar
The main idea of this paper is to suggest a way in which, by using the Internet of Things (IoT), a person can sign a document in a particular place, and have it reflect simultaneously on a similar document elsewhere, in real time. The primary user (authenticator) uses a digital pen to sign the paper document. The signature area of the document contains a particular dot pattern which helps the digital pen track the movements as the signature is created. While the paper is being signed, the digital pen also records the user's fingerprint for later verification. The obtained information is then converted to binary bits and is encoded using DNA encryption. This cipher data is transmitted to the secondary user (receiver) where the cipher is decoded and printed on the second copy of the document. Thus, the signature is securely transferred from one paper to the other.
本文的主要思想是提出一种方法,通过使用物联网(IoT),一个人可以在特定的地方签署一份文件,并让它同时反映在其他地方的类似文件上,实时的。主用户(验证者)使用数字笔对纸质文档进行签名。文档的签名区域包含一个特殊的点图案,帮助数字笔在创建签名时跟踪签名的移动。在签署文件的同时,数字笔还会记录用户的指纹,以供以后验证。然后将获得的信息转换为二进制位并使用DNA加密进行编码。该密码数据被传输到第二用户(接收者),在那里密码被解码并打印在文件的第二份副本上。这样,签名就可以安全地从一张纸转移到另一张纸上。
{"title":"IoT-based real time signature authentication and transfer from document to document with DNA encryption","authors":"Sharon A. Zachariah, D. Rajasekar, L. Agilandeeswari, M. Prabukumar","doi":"10.1109/NGCT.2016.7877380","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877380","url":null,"abstract":"The main idea of this paper is to suggest a way in which, by using the Internet of Things (IoT), a person can sign a document in a particular place, and have it reflect simultaneously on a similar document elsewhere, in real time. The primary user (authenticator) uses a digital pen to sign the paper document. The signature area of the document contains a particular dot pattern which helps the digital pen track the movements as the signature is created. While the paper is being signed, the digital pen also records the user's fingerprint for later verification. The obtained information is then converted to binary bits and is encoded using DNA encryption. This cipher data is transmitted to the secondary user (receiver) where the cipher is decoded and printed on the second copy of the document. Thus, the signature is securely transferred from one paper to the other.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125493103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Global aerosol single scattering albedo characteristics 全球气溶胶单次散射反照率特征
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877406
V. K. Sarma, Manu Mehta
Single Scattering Albedo (SSA) is one of the most important parameters in deciding the type of aerosols present in the atmosphere. This study mainly aims to study the characteristics of SSA at 388nm wavelength (UV region) at global scale using Ozone Monitoring Instrument (OMI) (level-3) data which is on board the NASA Aura. The study is carried out for the period 2014 December to 2015 November. The Global region is divided into six sub-regions i.e., North-West, South-West, North, South, North-East and South-East. The SSA values for these sub-regions are averaged and analyzed on a seasonal basis. Four seasons have been chosen and the mean SSA of the sub-regions is calculated with respect to them. The sub-region seasonal approach gave a better inference on the aerosol SSA values. The decrease in the SSA values has been observed over the regions where biomass burning generally takes place. The Southern region is showing low SSA values in almost all the seasons than other regions because of the dust activities and biomass burning activities in the African sub-continent. The Californian and Indonesian forest fires also constitute high absorbing aerosols causing low SSA values.
单散射反照率(SSA)是确定大气中气溶胶类型的最重要参数之一。本研究主要利用NASA Aura搭载的臭氧监测仪器(OMI) (level-3)数据,在全球尺度上研究388nm波长(UV区)的SSA特征。该研究在2014年12月至2015年11月期间进行。全球区域分为六个分区域,即西北、西南、北部、南部、东北部和东南部。这些分区域的SSA值按季节进行平均和分析。选取四个季节,计算各分区域的平均SSA。分区域季节性方法对气溶胶SSA值的推断效果较好。在通常发生生物质燃烧的地区,观测到SSA值的下降。由于非洲次大陆的沙尘活动和生物质燃烧活动,南部地区几乎所有季节的SSA值都比其他地区低。加利福尼亚和印度尼西亚的森林火灾也构成了高吸收气溶胶,造成低SSA值。
{"title":"Global aerosol single scattering albedo characteristics","authors":"V. K. Sarma, Manu Mehta","doi":"10.1109/NGCT.2016.7877406","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877406","url":null,"abstract":"Single Scattering Albedo (SSA) is one of the most important parameters in deciding the type of aerosols present in the atmosphere. This study mainly aims to study the characteristics of SSA at 388nm wavelength (UV region) at global scale using Ozone Monitoring Instrument (OMI) (level-3) data which is on board the NASA Aura. The study is carried out for the period 2014 December to 2015 November. The Global region is divided into six sub-regions i.e., North-West, South-West, North, South, North-East and South-East. The SSA values for these sub-regions are averaged and analyzed on a seasonal basis. Four seasons have been chosen and the mean SSA of the sub-regions is calculated with respect to them. The sub-region seasonal approach gave a better inference on the aerosol SSA values. The decrease in the SSA values has been observed over the regions where biomass burning generally takes place. The Southern region is showing low SSA values in almost all the seasons than other regions because of the dust activities and biomass burning activities in the African sub-continent. The Californian and Indonesian forest fires also constitute high absorbing aerosols causing low SSA values.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122224284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 2nd International Conference on Next Generation Computing Technologies (NGCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1