首页 > 最新文献

2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)最新文献

英文 中文
PHP vulnerability detection based on taint analysis 基于污染分析的PHP漏洞检测
Kai-duan Cao, Jing He, Wenqing Fan, Wei Huang, Lei Chen, Yue Pan
To detect the vulnerabilities of Web applications which based on the PHP scripting language. This paper proposes a PHP vulnerability detection method based on fine-grained taint analysis algorithm. First of all, this article generates the Abstract Syntax Tree by lexical and grammatical analysis on the PHP, and then produces the corresponding Control Flow Graph. At last, performing taint analysis on the Control Flow Graph. By tracking the program parameters, variables and other external input, marking the input type, propagating to various types of vulnerability function via the taint, and finally according to the tainted types of variable which are outputted to identify the vulnerabilities. We tested 16 programs of Damm Vulnerable Web App and found nine known vulnerabilities.
对基于PHP脚本语言的Web应用程序进行漏洞检测。本文提出了一种基于细粒度污点分析算法的PHP漏洞检测方法。本文首先在PHP上通过词法和语法分析生成抽象语法树,然后生成相应的控制流图。最后,对控制流图进行了污点分析。通过跟踪程序参数、变量等外部输入,标记输入类型,通过污染传播到各种类型的漏洞函数,最后根据输出的变量的污染类型来识别漏洞。我们测试了Damm易受攻击Web App的16个程序,发现了9个已知漏洞。
{"title":"PHP vulnerability detection based on taint analysis","authors":"Kai-duan Cao, Jing He, Wenqing Fan, Wei Huang, Lei Chen, Yue Pan","doi":"10.1109/ICRITO.2017.8342466","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342466","url":null,"abstract":"To detect the vulnerabilities of Web applications which based on the PHP scripting language. This paper proposes a PHP vulnerability detection method based on fine-grained taint analysis algorithm. First of all, this article generates the Abstract Syntax Tree by lexical and grammatical analysis on the PHP, and then produces the corresponding Control Flow Graph. At last, performing taint analysis on the Control Flow Graph. By tracking the program parameters, variables and other external input, marking the input type, propagating to various types of vulnerability function via the taint, and finally according to the tainted types of variable which are outputted to identify the vulnerabilities. We tested 16 programs of Damm Vulnerable Web App and found nine known vulnerabilities.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"63 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126129190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Classic from the outside, smart from the inside: The era of smart buildings 外部经典,内部智能:智能建筑的时代
Nafhath Rasheeda Rafiq, Sadia Fatima Mohammed, Jitendra Pandey, A. Singh
Internet of Things has gained a lot of hype in a very short period and is being adopted by varied sectors in order to attain its potential by bringing advanced level of automation in the respective industry based activities to reap the benefits. The commercial real estate is one such domain that many countries are focusing on transforming their buildings and infrastructure to have the cities contributing towards to become as ‘smarter cities’. The intelligent buildings are where the schools, offices, residential complexes integrate IoT for enhancing the capabilities and efficiency of the building infrastructure. The fundamental drivers that have encouraged for smart buildings in the market place are meeting the goals of corporate social responsibility, revenue growth and improving operational efficiency. With the demand for deployment of smart buildings on the rise, there have been many key trends that have emerged making it a thrust to have revolutionized transformation for digitalizing the commercial buildings, homes, etc. by means of effective smart solutions. The paper critically analyses the role of IoT in smart buildings, the latest trends that are demanding for a shift to smart buildings, and highlights the challenges for smart buildings implementation.
物联网在很短的时间内获得了大量的炒作,并被各个部门采用,以便通过在各自的行业活动中带来先进的自动化水平来实现其潜力,从而获得收益。商业地产就是这样一个领域,许多国家都在专注于改造他们的建筑和基础设施,使城市成为“智慧城市”。智能建筑是学校、办公室、住宅综合体整合物联网以提高建筑基础设施的能力和效率的地方。市场上鼓励智能建筑的根本驱动因素是实现企业社会责任、收入增长和提高运营效率的目标。随着智能建筑部署需求的增加,已经出现了许多关键趋势,使得通过有效的智能解决方案对商业建筑,家庭等进行革命性的转型成为一种推动力。本文批判性地分析了物联网在智能建筑中的作用,要求向智能建筑转变的最新趋势,并强调了智能建筑实施的挑战。
{"title":"Classic from the outside, smart from the inside: The era of smart buildings","authors":"Nafhath Rasheeda Rafiq, Sadia Fatima Mohammed, Jitendra Pandey, A. Singh","doi":"10.1109/ICRITO.2017.8342494","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342494","url":null,"abstract":"Internet of Things has gained a lot of hype in a very short period and is being adopted by varied sectors in order to attain its potential by bringing advanced level of automation in the respective industry based activities to reap the benefits. The commercial real estate is one such domain that many countries are focusing on transforming their buildings and infrastructure to have the cities contributing towards to become as ‘smarter cities’. The intelligent buildings are where the schools, offices, residential complexes integrate IoT for enhancing the capabilities and efficiency of the building infrastructure. The fundamental drivers that have encouraged for smart buildings in the market place are meeting the goals of corporate social responsibility, revenue growth and improving operational efficiency. With the demand for deployment of smart buildings on the rise, there have been many key trends that have emerged making it a thrust to have revolutionized transformation for digitalizing the commercial buildings, homes, etc. by means of effective smart solutions. The paper critically analyses the role of IoT in smart buildings, the latest trends that are demanding for a shift to smart buildings, and highlights the challenges for smart buildings implementation.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126343592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of various techniques of feature extraction on skin lesion images 各种皮肤病变图像特征提取技术的分析
Sudhriti Sengupta, Neetu Mittal
Skin lesions are any abnormal pattern in the skin of a patient occurring due to some disease, accident etc. Skin lesions images are very important for the doctors to diagnosis disease and treat the patients. Image processing techniques are applied on these images to improve the quality of the image in terms of visibility of the different feature in the image. Enhanced images aid the doctors and healthcare provider to provide better treatment to the patients. Feature extraction of skin lesion images is very significant for classification of skin lesion which helps in identification of skin lesions. Many techniques have been proposed for feature extraction of images. This paper provides a brief overview of the feature extraction techniques used in skin lesion images and observes some areas in which further work can be done.
皮肤病变是指由于某种疾病、事故等引起的患者皮肤上的任何异常形态。皮肤病变图像对医生进行疾病诊断和治疗具有重要意义。在这些图像上应用图像处理技术,从图像中不同特征的可见性方面提高图像质量。增强图像有助于医生和医疗保健提供者为患者提供更好的治疗。皮肤病变图像的特征提取对皮肤病变的分类具有重要意义,有助于识别皮肤病变。人们提出了许多图像特征提取技术。本文简要概述了用于皮肤病变图像的特征提取技术,并观察了一些可以进一步开展工作的领域。
{"title":"Analysis of various techniques of feature extraction on skin lesion images","authors":"Sudhriti Sengupta, Neetu Mittal","doi":"10.1109/ICRITO.2017.8342508","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342508","url":null,"abstract":"Skin lesions are any abnormal pattern in the skin of a patient occurring due to some disease, accident etc. Skin lesions images are very important for the doctors to diagnosis disease and treat the patients. Image processing techniques are applied on these images to improve the quality of the image in terms of visibility of the different feature in the image. Enhanced images aid the doctors and healthcare provider to provide better treatment to the patients. Feature extraction of skin lesion images is very significant for classification of skin lesion which helps in identification of skin lesions. Many techniques have been proposed for feature extraction of images. This paper provides a brief overview of the feature extraction techniques used in skin lesion images and observes some areas in which further work can be done.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114184379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Quality assessment and drift analysis of IoT enabled ammonia sensor 物联网氨传感器的质量评估和漂移分析
K. Gupta, K. Kishore, S. C. Jain
Use of sensing technique is now a synonym to industrial work environment and detecting presence of hazardous gases in various industrial processes is nowadays mandatory. This aforementioned fact is realized in this paper, wherein, an integrated IoT server is build using nodejs, utilizing MQTT for M2M communication. The framework is designed for auto connection of sensor nodes as soon as they are powered up and the central server is used for analyzing the incoming sensor data of (CEERIs) ammonia gas sensor. The data collection is made over a period of 4 months with identical gas exposure in two exposure cycle. Here, Raspberry pi3 board is used as a gateway that implements the IoT server and hotspot for device connectivity. Sensors study includes baseline and sensitivity drift, the relative change in response to gas exposure and hysteresis effect together. A correlation of above-mentioned sensor parameters depicts mutual relation and effect of sensor parameters on each other. The industrial safety is also guaranteed by routine sensor health monitoring and possible replacement of the field sensor. The degradation study presented in this paper suggests the possible lifetime of the sensor by utilizing AR and NLRAX prediction models and when it is viable to replace the field sensor.
使用传感技术现在是工业工作环境的代名词,在各种工业过程中检测有害气体的存在现在是强制性的。本文实现了上述事实,其中使用nodejs构建集成物联网服务器,利用MQTT进行M2M通信。该框架设计用于传感器节点上电后自动连接,中央服务器用于分析(CEERIs)氨气传感器传入的传感器数据。数据收集时间为4个月,在两个暴露周期中进行相同的气体暴露。在这里,树莓pi3板用作网关,实现物联网服务器和设备连接热点。传感器的研究包括基线漂移和灵敏度漂移、气体暴露响应的相对变化和滞后效应。上述传感器参数的相关性描述了传感器参数之间的相互关系和相互影响。通过常规的传感器健康监测和可能的现场传感器更换,也保证了工业安全。本文的退化研究利用AR和NLRAX预测模型提出了传感器的可能寿命,以及何时可以更换现场传感器。
{"title":"Quality assessment and drift analysis of IoT enabled ammonia sensor","authors":"K. Gupta, K. Kishore, S. C. Jain","doi":"10.1109/ICRITO.2017.8342419","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342419","url":null,"abstract":"Use of sensing technique is now a synonym to industrial work environment and detecting presence of hazardous gases in various industrial processes is nowadays mandatory. This aforementioned fact is realized in this paper, wherein, an integrated IoT server is build using nodejs, utilizing MQTT for M2M communication. The framework is designed for auto connection of sensor nodes as soon as they are powered up and the central server is used for analyzing the incoming sensor data of (CEERIs) ammonia gas sensor. The data collection is made over a period of 4 months with identical gas exposure in two exposure cycle. Here, Raspberry pi3 board is used as a gateway that implements the IoT server and hotspot for device connectivity. Sensors study includes baseline and sensitivity drift, the relative change in response to gas exposure and hysteresis effect together. A correlation of above-mentioned sensor parameters depicts mutual relation and effect of sensor parameters on each other. The industrial safety is also guaranteed by routine sensor health monitoring and possible replacement of the field sensor. The degradation study presented in this paper suggests the possible lifetime of the sensor by utilizing AR and NLRAX prediction models and when it is viable to replace the field sensor.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130263627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessment of machine learning algorithms for determining defective classes in an object-oriented software 面向对象软件中用于确定缺陷类的机器学习算法的评估
Prabhpahul Singh, R. Malhotra
Software defect prediction is a well renowned field of software engineering. Determination of defective classes early in the lifecycle of a software product helps software practitioners in effective allocation of resources. More resources are allocated to probable defective classes so that defects can be removed in the initial phases of the software product. Such a practice would lead to a good quality software product. Although, hundreds of defect prediction models have been developed and validated by researchers, there is still a need to develop and evaluate more models to draw generalized conclusions. Literature studies have found Machine Learning (ML) algorithms to be effective classifiers in this domain. Thus, this study evaluates four ML algorithms on data collected from seven open source software projects for developing software defect prediction models. The results indicate superior performance of the Multilayer Perceptron algorithm over all the other investigated algorithms. The results of the study are also statistically evaluated to establish their effectiveness.
软件缺陷预测是软件工程中一个非常著名的领域。在软件产品生命周期的早期确定有缺陷的类有助于软件从业者有效地分配资源。将更多的资源分配给可能有缺陷的类,以便在软件产品的初始阶段消除缺陷。这样的实践将产生高质量的软件产品。尽管研究人员已经开发和验证了数百个缺陷预测模型,但是仍然需要开发和评估更多的模型来得出一般化的结论。文献研究发现,机器学习(ML)算法是该领域有效的分类器。因此,本研究评估了从七个开源软件项目收集的数据上的四种ML算法,用于开发软件缺陷预测模型。结果表明,多层感知器算法的性能优于所有其他研究算法。对研究结果进行了统计评估,以确定其有效性。
{"title":"Assessment of machine learning algorithms for determining defective classes in an object-oriented software","authors":"Prabhpahul Singh, R. Malhotra","doi":"10.1109/ICRITO.2017.8342425","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342425","url":null,"abstract":"Software defect prediction is a well renowned field of software engineering. Determination of defective classes early in the lifecycle of a software product helps software practitioners in effective allocation of resources. More resources are allocated to probable defective classes so that defects can be removed in the initial phases of the software product. Such a practice would lead to a good quality software product. Although, hundreds of defect prediction models have been developed and validated by researchers, there is still a need to develop and evaluate more models to draw generalized conclusions. Literature studies have found Machine Learning (ML) algorithms to be effective classifiers in this domain. Thus, this study evaluates four ML algorithms on data collected from seven open source software projects for developing software defect prediction models. The results indicate superior performance of the Multilayer Perceptron algorithm over all the other investigated algorithms. The results of the study are also statistically evaluated to establish their effectiveness.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131235322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementation of artificial intelligence cognitive neuroscience neuron cell using adaptive velocity threshold particle swarm optimization (AVT-PSO) on FPGA 基于自适应速度阈值粒子群算法(AVT-PSO)在FPGA上实现人工智能认知神经神经细胞
Divya Singh, Sunita Prasad, Sandeep Srivastava
This paper presents the hardware development and implementation of artificial intelligence based neuron cell using swarm intelligence based algorithm (AVT-PSO) where the functionality of the architecture is tested by implementing four bit addition based on cognitive science neural network employing five neuron cell (sort of a model emulating function of a neuron cell in the brain) trained using an adaptive velocity threshold particle swarm optimization on Spartan-3e XC3S100E Field Programmable Gate Arrays (FPGA). Each neuron cell represents a processing element which is trained using swarm intelligence. Adaptive velocity threshold PSO algorithm is used in evolving threshold values to train the weights of neural cells. Implemented system is flexible in design, allowing the possibility to add or remove neurons to generate new network architectures.
本文介绍了使用基于群智能算法(AVT-PSO)的基于人工智能的神经元细胞的硬件开发和实现,其中通过在spartan3e XC3S100E Field Programmable上使用自适应速度阈值粒子群优化训练的五个神经元细胞(一种模拟大脑神经元细胞功能的模型)实现基于认知科学神经网络的四位加法来测试该架构的功能门阵列(FPGA)。每个神经元细胞代表一个处理单元,该处理单元使用群体智能进行训练。采用自适应速度阈值粒子群算法对阈值进行演化,训练神经细胞的权值。实现的系统设计灵活,允许添加或删除神经元以生成新的网络架构。
{"title":"Implementation of artificial intelligence cognitive neuroscience neuron cell using adaptive velocity threshold particle swarm optimization (AVT-PSO) on FPGA","authors":"Divya Singh, Sunita Prasad, Sandeep Srivastava","doi":"10.1109/ICRITO.2017.8342488","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342488","url":null,"abstract":"This paper presents the hardware development and implementation of artificial intelligence based neuron cell using swarm intelligence based algorithm (AVT-PSO) where the functionality of the architecture is tested by implementing four bit addition based on cognitive science neural network employing five neuron cell (sort of a model emulating function of a neuron cell in the brain) trained using an adaptive velocity threshold particle swarm optimization on Spartan-3e XC3S100E Field Programmable Gate Arrays (FPGA). Each neuron cell represents a processing element which is trained using swarm intelligence. Adaptive velocity threshold PSO algorithm is used in evolving threshold values to train the weights of neural cells. Implemented system is flexible in design, allowing the possibility to add or remove neurons to generate new network architectures.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123762478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of evolutionary algorithms to improve software defect prediction 分析改进软件缺陷预测的进化算法
R. Malhotra, Anshul Khurana
Defect prediction of software is necessary to determine defective parts of software. Defect prediction models are elaborated with the help of software metrics when combined with defective data to predict the classes that are defective. In this paper we have used datasets that statistically resolve the relationship among software metrics and defect vulnerability. The main intent of this paper are 1) Feature selection for defect prediction using proposed evolutionary algorithm 2) Comparing machine learning techniques 3) Use of precision and recall as performance measure for defect prediction 4) 10- fold validation is performed on every model. In this discourse, we predict defective class using 5 machine learning techniques and 2 evolutionary techniques for feature selection. In this work, we have applied evolutionary algorithms for feature selection suitable for each of the classification techniques applied on five open source android packages. Finally, for validation of calculated results, 10-fold validation is used. The results show that using evolutionary algorithms for feature selection can improve precision and recall for RF, DT and SVM. Precision and recall have best rise using SVM model. The use of evolutionary algorithms don't effect precision and recall for statistical classifier. The results obtained from evaluation thus confirm about the prediction of default classes using evolutionary algorithms is better than using only machine learning techniques. The analyzed and calculated results gave us the view about the usage of evolutionary algorithm with statistical classifier is of no use.
软件缺陷预测是确定软件缺陷部分的必要条件。当与有缺陷的数据相结合时,缺陷预测模型在软件度量的帮助下被详细阐述,以预测有缺陷的类。在本文中,我们使用数据集来统计地解决软件度量和缺陷脆弱性之间的关系。本文的主要目的是:1)使用提出的进化算法进行缺陷预测的特征选择;2)比较机器学习技术;3)使用精度和召回率作为缺陷预测的性能度量;4)对每个模型进行10倍验证。在本文中,我们使用5种机器学习技术和2种进化技术进行特征选择来预测缺陷类。在这项工作中,我们应用进化算法进行特征选择,适用于五个开源android软件包上应用的每种分类技术。最后,对计算结果进行10倍验证。结果表明,使用进化算法进行特征选择可以提高RF、DT和SVM的查全率和查全率。支持向量机模型的准确率和召回率均有较好的提高。进化算法的使用不影响统计分类器的准确率和召回率。因此,从评估中获得的结果证实了使用进化算法预测默认类比仅使用机器学习技术更好。分析和计算的结果使我们认识到使用统计分类器的进化算法是无用的。
{"title":"Analysis of evolutionary algorithms to improve software defect prediction","authors":"R. Malhotra, Anshul Khurana","doi":"10.1109/ICRITO.2017.8342442","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342442","url":null,"abstract":"Defect prediction of software is necessary to determine defective parts of software. Defect prediction models are elaborated with the help of software metrics when combined with defective data to predict the classes that are defective. In this paper we have used datasets that statistically resolve the relationship among software metrics and defect vulnerability. The main intent of this paper are 1) Feature selection for defect prediction using proposed evolutionary algorithm 2) Comparing machine learning techniques 3) Use of precision and recall as performance measure for defect prediction 4) 10- fold validation is performed on every model. In this discourse, we predict defective class using 5 machine learning techniques and 2 evolutionary techniques for feature selection. In this work, we have applied evolutionary algorithms for feature selection suitable for each of the classification techniques applied on five open source android packages. Finally, for validation of calculated results, 10-fold validation is used. The results show that using evolutionary algorithms for feature selection can improve precision and recall for RF, DT and SVM. Precision and recall have best rise using SVM model. The use of evolutionary algorithms don't effect precision and recall for statistical classifier. The results obtained from evaluation thus confirm about the prediction of default classes using evolutionary algorithms is better than using only machine learning techniques. The analyzed and calculated results gave us the view about the usage of evolutionary algorithm with statistical classifier is of no use.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127840055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Genetic approach based image retrieval by using CCM and textual features 基于CCM和文本特征的遗传图像检索方法
P. Shrivas, U. Lilhore, Nitin Agrawal
As the quantity of web clients are expanding every day. This work concentrate on the retrieval of pictures by using the visual and annotation characteristics of the images. In this work two kind of features are utilized for the bunching of the picture dataset. So Based on the comparability of content and CCM components of the picture bunches are made. For bunching here genetic approach is utilized. Two phase learning genetic algorithm named as teacher learning based optimization was utilized for clustring. Here client pass two kind of queries first was content while other is image, this assistance in choosing suitable cluster for retrieval of picture. Analysis was done on genuine and artificial set of pictures. Result demonstrates that proposed work is better on various assessment parameters as contrast with existing strategies.
随着网络客户端的数量每天都在扩大。这项工作主要是利用图像的视觉特征和注释特征来检索图像。在这项工作中,两种特征被用于图像数据集的聚类。因此,基于内容和CCM的可比性,对图片进行了分组。这里的聚束采用遗传方法。采用基于教师学习的两阶段学习遗传算法对聚类进行优化。客户端通过两种查询,一种是内容查询,另一种是图像查询,这有助于选择合适的聚类进行图像检索。对真品和仿品进行了分析。结果表明,与现有的评估策略相比,本文所提出的工作在各评估参数上都有较好的效果。
{"title":"Genetic approach based image retrieval by using CCM and textual features","authors":"P. Shrivas, U. Lilhore, Nitin Agrawal","doi":"10.1109/ICRITO.2017.8342453","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342453","url":null,"abstract":"As the quantity of web clients are expanding every day. This work concentrate on the retrieval of pictures by using the visual and annotation characteristics of the images. In this work two kind of features are utilized for the bunching of the picture dataset. So Based on the comparability of content and CCM components of the picture bunches are made. For bunching here genetic approach is utilized. Two phase learning genetic algorithm named as teacher learning based optimization was utilized for clustring. Here client pass two kind of queries first was content while other is image, this assistance in choosing suitable cluster for retrieval of picture. Analysis was done on genuine and artificial set of pictures. Result demonstrates that proposed work is better on various assessment parameters as contrast with existing strategies.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"8 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126041088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Code based threshold scheme on group key transfer protocol for WSN's 基于代码的WSN组密钥传输协议阈值方案
Naina Arya, Sonam Devgan Kaul
A wireless sensor network is a gathering of particular transducers with an interchange framework for checking and recording conditions at differing areas. As there is limited data storage and computational power in sensor nodes henceforth special outlines are required for cryptographic schemes in WSN's. In the existing protocols of group key transfer, all the nodes m jointly generate their secret, but a group of Λ (k < m) nodes can't generate its group key. In this paper, we have given this characteristic to all the nodes so that m or less nodes can generate their group key only after giving successful key generation request to the server. We have implemented the code based threshold scheme in the proposed group key transfer mechanism for wireless sensor environment and our proposed group key protocol is based upon linear secret sharing scheme, Vandermonde matrix, factoring problem and one-way hash function. The proposed scheme allows the implementation of threshold operations for the both group key generation and secret distribution and can also oppose potential assaults and furthermore essentially diminish the computational cost of the framework.
无线传感器网络是具有交换框架的特定传感器的集合,用于检查和记录不同区域的条件。由于传感器节点的数据存储和计算能力有限,因此无线传感器网络中的加密方案需要特殊的轮廓。在现有的组密钥传输协议中,所有节点m共同生成自己的密钥,但一组Λ (k < m)个节点无法生成自己的组密钥。在本文中,我们将这一特性赋予所有节点,使得m个或更少的节点只有在向服务器发出成功的密钥生成请求后才能生成自己的组密钥。我们在提出的无线传感器环境下的组密钥传输机制中实现了基于代码的阈值方案,提出的组密钥协议基于线性秘密共享方案、Vandermonde矩阵、因式分解问题和单向哈希函数。提出的方案允许对组密钥生成和秘密分发实施阈值操作,还可以防止潜在的攻击,并且从根本上降低框架的计算成本。
{"title":"Code based threshold scheme on group key transfer protocol for WSN's","authors":"Naina Arya, Sonam Devgan Kaul","doi":"10.1109/ICRITO.2017.8342472","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342472","url":null,"abstract":"A wireless sensor network is a gathering of particular transducers with an interchange framework for checking and recording conditions at differing areas. As there is limited data storage and computational power in sensor nodes henceforth special outlines are required for cryptographic schemes in WSN's. In the existing protocols of group key transfer, all the nodes m jointly generate their secret, but a group of Λ (k < m) nodes can't generate its group key. In this paper, we have given this characteristic to all the nodes so that m or less nodes can generate their group key only after giving successful key generation request to the server. We have implemented the code based threshold scheme in the proposed group key transfer mechanism for wireless sensor environment and our proposed group key protocol is based upon linear secret sharing scheme, Vandermonde matrix, factoring problem and one-way hash function. The proposed scheme allows the implementation of threshold operations for the both group key generation and secret distribution and can also oppose potential assaults and furthermore essentially diminish the computational cost of the framework.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115300096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Need and scope of Private Cloud Technology for public authority for radio & television in Oman 阿曼广播电视公共机构私有云技术的需求和范围
Mohammed Abdullah Al Rasbi, A. Singh
Radio and Television have become the first platform for people to get information and plays a very important role in development of country and building of a society. On the other hand, an increase in the number of audience and media contents are creating many challenges related to broadcast and live streaming services such as Broadcasting Bandwidth, Media Storage, Quality of Services (QoS) and Resources Components like (Memory Usage, CPU load and Network traffic). Therefore, we are looking for platform for delivering scalable streaming services and provide better utilization with cut down both capital and operating costs. This paper talks about the needs and scope of Private Cloud Technology for Public Authority of Radio (PART) benefits and advantage of cloud computing adoption. The aim of this paper is to deliver private cloud technology platform based on streaming services. The proposed solution can be better for utilization of resources, increase Quality of Service and deliver improvement in overall performance, scalability and capacity with minimum cost.
广播电视已经成为人们获取信息的第一平台,在国家发展和社会建设中发挥着非常重要的作用。另一方面,观众数量和媒体内容的增加给广播和直播服务带来了许多挑战,如广播带宽、媒体存储、服务质量(QoS)和资源组件(内存使用、CPU负载和网络流量)。因此,我们正在寻找提供可扩展流媒体服务的平台,并在降低资本和运营成本的同时提供更好的利用率。本文讨论了公共无线电管理局(Public Authority of Radio, PART)采用私有云技术的需求和范围,以及采用云计算的好处和优势。本文旨在提供基于流媒体服务的私有云技术平台。建议的解决方案可以更好地利用资源,提高服务质量,并以最小的成本提供总体性能、可伸缩性和容量方面的改进。
{"title":"Need and scope of Private Cloud Technology for public authority for radio & television in Oman","authors":"Mohammed Abdullah Al Rasbi, A. Singh","doi":"10.1109/ICRITO.2017.8342484","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342484","url":null,"abstract":"Radio and Television have become the first platform for people to get information and plays a very important role in development of country and building of a society. On the other hand, an increase in the number of audience and media contents are creating many challenges related to broadcast and live streaming services such as Broadcasting Bandwidth, Media Storage, Quality of Services (QoS) and Resources Components like (Memory Usage, CPU load and Network traffic). Therefore, we are looking for platform for delivering scalable streaming services and provide better utilization with cut down both capital and operating costs. This paper talks about the needs and scope of Private Cloud Technology for Public Authority of Radio (PART) benefits and advantage of cloud computing adoption. The aim of this paper is to deliver private cloud technology platform based on streaming services. The proposed solution can be better for utilization of resources, increase Quality of Service and deliver improvement in overall performance, scalability and capacity with minimum cost.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128448495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1