首页 > 最新文献

2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)最新文献

英文 中文
Countering terrorism through dark web analysis 通过暗网分析打击恐怖主义
A. Sachan
Dark Web analysis is an important aspect in field of counter terrorism (CT). In the present scenario terrorist attacks are biggest problem for the mankind and whole world is under constant threat from these well-planned, sophisticated and coordinated terrorist operations. Terrorists anonymously set up various web sites embedded in the public Internet, exchanging ideology, spreading propaganda, and recruiting new members. Dark web is a hotspot where terrorists are communicating and spreading their messages. Now every country is focusing for CT. Dark web analysis can be an efficient proactive method for CT by detecting and avoiding terrorist threats/attacks. In this paper we have proposed dark web analysis model that analyzes dark web forums for CT and connecting the dots to prevent the country from terrorist attacks.
暗网分析是反恐领域的一个重要研究方向。在当前形势下,恐怖袭击是人类面临的最大问题,整个世界不断受到这些精心策划、周密协调的恐怖行动的威胁。恐怖分子在公共互联网上匿名建立各种网站,交换思想,传播宣传,招募新成员。暗网是恐怖分子交流和传播信息的热点。现在每个国家都在关注CT。暗网分析可以成为CT检测和避免恐怖威胁/攻击的一种有效的主动方法。在本文中,我们提出了暗网分析模型,分析暗网论坛的CT和连接点,以防止国家遭受恐怖袭击。
{"title":"Countering terrorism through dark web analysis","authors":"A. Sachan","doi":"10.1109/ICCCNT.2012.6396055","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396055","url":null,"abstract":"Dark Web analysis is an important aspect in field of counter terrorism (CT). In the present scenario terrorist attacks are biggest problem for the mankind and whole world is under constant threat from these well-planned, sophisticated and coordinated terrorist operations. Terrorists anonymously set up various web sites embedded in the public Internet, exchanging ideology, spreading propaganda, and recruiting new members. Dark web is a hotspot where terrorists are communicating and spreading their messages. Now every country is focusing for CT. Dark web analysis can be an efficient proactive method for CT by detecting and avoiding terrorist threats/attacks. In this paper we have proposed dark web analysis model that analyzes dark web forums for CT and connecting the dots to prevent the country from terrorist attacks.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116737426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
HORNS: A semi-perfectly secret homomorphic encryption system 一种半完全保密的同态加密系统
M. Gomathisankaran, K. Namuduri, A. Tyagi
With the increase in computation power and communication bandwidth it has become cheaper to aggregate the computation capabilities. This new model of computation is known as cloud computing. The security of cloud computing model will determine its universal applicability. In this paper we propose a novel homomorphic encryption system which can become a building block of securing the computations performed by cloud. We introduce the notion of semi-perfect secrecy and prove that our system is secure under this setup.
随着计算能力和通信带宽的增加,聚合计算能力变得越来越便宜。这种新的计算模式被称为云计算。云计算模型的安全性将决定其普遍适用性。本文提出了一种新的同态加密系统,它可以成为云计算安全的基石。我们引入了半完全保密的概念,并证明了我们的系统在这种设置下是安全的。
{"title":"HORNS: A semi-perfectly secret homomorphic encryption system","authors":"M. Gomathisankaran, K. Namuduri, A. Tyagi","doi":"10.1109/ICCCNT.2012.6479590","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6479590","url":null,"abstract":"With the increase in computation power and communication bandwidth it has become cheaper to aggregate the computation capabilities. This new model of computation is known as cloud computing. The security of cloud computing model will determine its universal applicability. In this paper we propose a novel homomorphic encryption system which can become a building block of securing the computations performed by cloud. We introduce the notion of semi-perfect secrecy and prove that our system is secure under this setup.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117089539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Stabilization based networked predictive controller design for switched plants 基于镇定的网络化预测控制器设计
A. Routh, Sourav Das, Saptarshi Das, Indranil Pan
Stabilizing state feedback controller has been designed in this paper for a switched DC motor plant, controlled over communication network. The switched system formulation for the networked control system (NCS) with additional switching in a plant parameter along with the switching due to random packet losses, have been formulated as few set of non-strict Linear Matrix Inequalities (LMIs). In order to solve non-strict LMIs using standard LMI solver and to design the stabilizing state feedback controller, the Cone Complementary Linearization (CCL) technique has been adopted. Simulation studies have been carried out for a DC motor plant, operating at two different sampling times with random switching in the moment of inertia, representing sudden jerks.
本文设计了一种基于通信网络控制的开关直流电动机稳定状态反馈控制器。网络控制系统(NCS)的交换系统的公式,在一个额外的交换在一个工厂参数和交换由于随机丢包,已经被表述为几组非严格的线性矩阵不等式(lmi)。为了使用标准LMI求解器求解非严格LMI,并设计稳定状态反馈控制器,采用了锥互补线性化(CCL)技术。对一个直流电机装置进行了仿真研究,该装置在两个不同的采样时间运行,在惯性矩中随机切换,代表突然的抽搐。
{"title":"Stabilization based networked predictive controller design for switched plants","authors":"A. Routh, Sourav Das, Saptarshi Das, Indranil Pan","doi":"10.1109/ICCCNT.2012.6396001","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396001","url":null,"abstract":"Stabilizing state feedback controller has been designed in this paper for a switched DC motor plant, controlled over communication network. The switched system formulation for the networked control system (NCS) with additional switching in a plant parameter along with the switching due to random packet losses, have been formulated as few set of non-strict Linear Matrix Inequalities (LMIs). In order to solve non-strict LMIs using standard LMI solver and to design the stabilizing state feedback controller, the Cone Complementary Linearization (CCL) technique has been adopted. Simulation studies have been carried out for a DC motor plant, operating at two different sampling times with random switching in the moment of inertia, representing sudden jerks.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129571849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Target detecting defence humanoid sniper 目标探测防御类人狙击手
J. A. Shajahan, J. Sushmita Jain, C. Joseph, A. Amodkumar, V. Chauhan, G. Keerthipriya, P. C. Kishore Raja
In this paper, a new method of defence system using image processing has been implemented. It is mainly focussed on bringing out the best target tracking technology. The defence humanoid is designed to overcome foreign attacks at the country border. The defence system consists of two modules- control unit and humanoid unit. The control unit has a laptop in which Graphical User Interface (GUI) using MATLAB has been implemented. Image processing is done and the control signal is transmitted. The humanoid unit receives the signal from the control unit, at a remote location and responds according to the processed control signal. The control signal has been processed by image processing technique. The humanoid does image processing by the combination of edge detection, scale space analysis, thermal image processing and virtual 3D sizing in 2D image processing and colour detection. The humanoid, works in three modes- (1) Auto Targeting and Auto Shooting (Fully Autonomous).(2)Auto Targeting and Manual Shooting.(Semi-Autonomous).(3)Manual Targeting and Manual Shooting (User Oriented).
本文提出了一种基于图像处理的防御系统新方法。重点是提出最佳的目标跟踪技术。这款防御类人机器人的设计目的是为了抵御来自边境的外来攻击。该防御系统由控制单元和人形单元两个模块组成。控制单元有一台笔记本电脑,其中使用MATLAB实现了图形用户界面(GUI)。完成图像处理并传输控制信号。人形单元在远程位置接收来自控制单元的信号,并根据处理后的控制信号作出响应。采用图像处理技术对控制信号进行处理。在二维图像处理和色彩检测中,结合边缘检测、尺度空间分析、热图像处理和虚拟三维定尺进行图像处理。该机器人有三种工作模式:(1)自动瞄准和自动射击(完全自主);(2)自动瞄准和手动射击(半自主);(3)手动瞄准和手动射击(用户导向)。
{"title":"Target detecting defence humanoid sniper","authors":"J. A. Shajahan, J. Sushmita Jain, C. Joseph, A. Amodkumar, V. Chauhan, G. Keerthipriya, P. C. Kishore Raja","doi":"10.1109/ICCCNT.2012.6396045","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396045","url":null,"abstract":"In this paper, a new method of defence system using image processing has been implemented. It is mainly focussed on bringing out the best target tracking technology. The defence humanoid is designed to overcome foreign attacks at the country border. The defence system consists of two modules- control unit and humanoid unit. The control unit has a laptop in which Graphical User Interface (GUI) using MATLAB has been implemented. Image processing is done and the control signal is transmitted. The humanoid unit receives the signal from the control unit, at a remote location and responds according to the processed control signal. The control signal has been processed by image processing technique. The humanoid does image processing by the combination of edge detection, scale space analysis, thermal image processing and virtual 3D sizing in 2D image processing and colour detection. The humanoid, works in three modes- (1) Auto Targeting and Auto Shooting (Fully Autonomous).(2)Auto Targeting and Manual Shooting.(Semi-Autonomous).(3)Manual Targeting and Manual Shooting (User Oriented).","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128454262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A low-power dual threshold voltage-voltage scaling technique for domino logic circuits 一种用于多米诺逻辑电路的低功耗双阈值电压缩放技术
I. S, A. P
As domino logic design offers smaller area and higher speed than complementary CMOS design, it has been very commonly used for high-performance processors; however, the average power consumption of the domino circuits is larger than that of the static circuit. This power dissipation problem needs to be solved for the domino circuits. The power consumption of conventional CMOS circuits is composed of dynamic and static parts. The static (leakage) power of domino logic increases exponentially with the scaling of the threshold voltage (Vt) and gate oxide thickness (tox), the dual threshold voltage technique (DTV) is one of most popular techniques to suppress leakage power. Dynamic power of the circuit is greatly reduced by Voltage Scaling (VS) technique. By merging the above techniques a new technique called Dual Threshold Voltage - Voltage Scaling (DTVS) technique which further reduces total power consumption of domino circuits. To verify the above technique, the basic gates and adder circuit has been implemented with DTVS, with DTV alone and without any technique. The power consumption was analyzed by implementing the circuit in UMC 90nm CMOS technology. The 67% of power reduction is possible with DTVS technique. Mentor Graphics ELDO and EZ-wave are used for simulations.
由于多米诺逻辑设计比互补的CMOS设计提供更小的面积和更高的速度,它已经非常普遍地用于高性能处理器;然而,多米诺骨牌电路的平均功耗比静态电路大。这种功耗问题需要解决的多米诺电路。传统CMOS电路的功耗由动态和静态两部分组成。随着阈值电压(Vt)和栅极氧化层厚度(tox)的增大,多米诺逻辑的静态(泄漏)功率呈指数级增长,双阈值电压技术(DTV)是目前常用的抑制泄漏功率的技术之一。电压缩放技术大大降低了电路的动态功率。通过合并上述技术,一种称为双阈值电压-电压缩放(DTVS)的新技术进一步降低了多米诺电路的总功耗。为了验证上述技术,在数字电视上实现了基本门和加法器电路,单独使用数字电视,不使用任何技术。通过在UMC 90nm CMOS工艺上实现该电路,分析了电路的功耗。使用dtv技术可以降低67%的功耗。使用Mentor Graphics ELDO和EZ-wave进行模拟。
{"title":"A low-power dual threshold voltage-voltage scaling technique for domino logic circuits","authors":"I. S, A. P","doi":"10.1109/ICCCNT.2012.6395896","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395896","url":null,"abstract":"As domino logic design offers smaller area and higher speed than complementary CMOS design, it has been very commonly used for high-performance processors; however, the average power consumption of the domino circuits is larger than that of the static circuit. This power dissipation problem needs to be solved for the domino circuits. The power consumption of conventional CMOS circuits is composed of dynamic and static parts. The static (leakage) power of domino logic increases exponentially with the scaling of the threshold voltage (Vt) and gate oxide thickness (tox), the dual threshold voltage technique (DTV) is one of most popular techniques to suppress leakage power. Dynamic power of the circuit is greatly reduced by Voltage Scaling (VS) technique. By merging the above techniques a new technique called Dual Threshold Voltage - Voltage Scaling (DTVS) technique which further reduces total power consumption of domino circuits. To verify the above technique, the basic gates and adder circuit has been implemented with DTVS, with DTV alone and without any technique. The power consumption was analyzed by implementing the circuit in UMC 90nm CMOS technology. The 67% of power reduction is possible with DTVS technique. Mentor Graphics ELDO and EZ-wave are used for simulations.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128474026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Lab VIEW based noise removal and baseline correction for doppler ultrasound blood flow applications 多普勒超声血流应用的基于实验室视图的噪声去除和基线校正
Abijith Rajan, S. Logeshwaran, S. P. Kumar, Geethanjali
Doppler Ultrasound has been widely used in the measurement of blood flow parameters such as blood velocity, blood pressure etc. Success of the automated quantification algorithms for these variables depends on the interference or noise free strength of the signal and position of the base line with respect to zero. Preprocessing and baseline correction techniques suitable for accurate measurement of these parameters are compared in this work. A 1 KHz calibration signal from the vascular Doppler recorder is used as a reference signal for this purpose. Performances of Butterworth low pass filters with different orders and detrending methods employing different wavelets are compared in terms of mean square error (MSE) in this paper. This has resulted in successful measurements of blood velocity of brachial, DorsalisPedis and post tibial vein.
多普勒超声已广泛应用于血流参数的测量,如血流速度、血压等。这些变量的自动量化算法的成功取决于信号的无干扰或无噪声强度以及基线相对于零的位置。本文比较了适用于这些参数精确测量的预处理技术和基线校正技术。来自血管多普勒记录仪的1khz校准信号被用作参考信号。本文从均方误差(MSE)的角度比较了不同阶数的巴特沃斯低通滤波器和采用不同小波的去趋势方法的性能。这种方法成功地测量了肱静脉、足背静脉和胫后静脉的血流速度。
{"title":"Lab VIEW based noise removal and baseline correction for doppler ultrasound blood flow applications","authors":"Abijith Rajan, S. Logeshwaran, S. P. Kumar, Geethanjali","doi":"10.1109/ICCCNT.2012.6396025","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396025","url":null,"abstract":"Doppler Ultrasound has been widely used in the measurement of blood flow parameters such as blood velocity, blood pressure etc. Success of the automated quantification algorithms for these variables depends on the interference or noise free strength of the signal and position of the base line with respect to zero. Preprocessing and baseline correction techniques suitable for accurate measurement of these parameters are compared in this work. A 1 KHz calibration signal from the vascular Doppler recorder is used as a reference signal for this purpose. Performances of Butterworth low pass filters with different orders and detrending methods employing different wavelets are compared in terms of mean square error (MSE) in this paper. This has resulted in successful measurements of blood velocity of brachial, DorsalisPedis and post tibial vein.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128796826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Object detection and tracking in video using particle filter 基于粒子滤波的视频目标检测与跟踪
T. Kumar, S. Sivanandam
Deployment of effective surveillance and security measures is important in these days. The system must be able to provide access and track movement of different types of vehicles and people entering the secured premises, to avoid any mishap from happening.The paper proposes a system that recognizes the car with 3 different features namely license plate, logo and colour of the car. Existing systems perform recognition mainly by using license plate alone. Addition of features will increase the security of the system. Initially car region is extracted using frame subtraction method. On the extracted car region, License plate search and logo identification is being performed. Average colour of the car forms the third feature that helps in classification of cars. Finally with the extracted features, classification of cars into two categories is performed i.e. Authenticated and Non Authenticated The spatial segmentation and the temporal segmentation yields the moving objects. However, in practice, a moving object may suddenly cease motion or moves very slowly during several frames, which results in its corresponding intensity differences to be insignificant. Object in video are tracked and detected using particle filter. The particle filter is a Bayesian sequential importance sampling technique. It consists of essentially two steps: prediction and update. The paper analyzes applying of particle filter for tracking the object. The approach can further be combined with the training model developed using features for detecting and tracking cars in real time.
在这些日子里,部署有效的监视和安全措施非常重要。该系统必须能够提供通道和跟踪不同类型的车辆和进入安全场所的人的运动,以避免任何事故的发生。本文提出了一种基于车牌、车标、颜色三种不同特征的汽车识别系统。现有的系统主要通过单独使用车牌进行识别。增加功能将增加系统的安全性。首先采用帧减法提取汽车区域。在提取的汽车区域上,进行车牌搜索和标识识别。汽车的平均颜色构成了第三个特征,有助于对汽车进行分类。最后,利用提取的特征,将车辆分为两类,即已认证和未认证,空间分割和时间分割得到运动目标。然而,在实践中,一个运动的物体可能会在几帧内突然停止运动或移动得非常慢,这导致其相应的强度差异微不足道。利用粒子滤波技术对视频中的目标进行跟踪和检测。粒子滤波是一种贝叶斯顺序重要采样技术。它主要包括两个步骤:预测和更新。分析了粒子滤波在目标跟踪中的应用。该方法可以进一步与利用特征开发的训练模型相结合,用于实时检测和跟踪车辆。
{"title":"Object detection and tracking in video using particle filter","authors":"T. Kumar, S. Sivanandam","doi":"10.1109/ICCCNT.2012.6395921","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395921","url":null,"abstract":"Deployment of effective surveillance and security measures is important in these days. The system must be able to provide access and track movement of different types of vehicles and people entering the secured premises, to avoid any mishap from happening.The paper proposes a system that recognizes the car with 3 different features namely license plate, logo and colour of the car. Existing systems perform recognition mainly by using license plate alone. Addition of features will increase the security of the system. Initially car region is extracted using frame subtraction method. On the extracted car region, License plate search and logo identification is being performed. Average colour of the car forms the third feature that helps in classification of cars. Finally with the extracted features, classification of cars into two categories is performed i.e. Authenticated and Non Authenticated The spatial segmentation and the temporal segmentation yields the moving objects. However, in practice, a moving object may suddenly cease motion or moves very slowly during several frames, which results in its corresponding intensity differences to be insignificant. Object in video are tracked and detected using particle filter. The particle filter is a Bayesian sequential importance sampling technique. It consists of essentially two steps: prediction and update. The paper analyzes applying of particle filter for tracking the object. The approach can further be combined with the training model developed using features for detecting and tracking cars in real time.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128668507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Stability analysis of aperiodic messages scheduled in the dynamic segment of Flexray protocol Flexray协议动态段非周期消息调度的稳定性分析
P. S. Sunil Kumar, L. Jenkins
In a cyber physical system like vehicles number of signals to be communicated in a network system has an increasing trend. More and more mechanical and hydraulic parts are replaced by electronic control units and infotainment and multimedia applications has increased in vehicles. Safety critical hard real time messages and aperiodic messages communicated between electronic control units have been increased in recent times. Flexray is a high bandwidth protocol consisting of static segment for supporting hard real time messages and a dynamic segment for transmitting soft and non real time messages. In this paper, a method to obtain the stability region for the random arrival of messages in each electronic control units which is scheduled in the dynamic segment of Flexray protocol is presented. Number of mini slots available in the dynamic segment of Flexray restricts the arrival rate of tasks to the micro controllers or the number of micro controllers connected to the Flexray bus. Stability region of mathematical model of the system is compared with the Flexray protocol simulation results.
在像车辆这样的网络物理系统中,需要在网络系统中通信的信号数量有增加的趋势。越来越多的机械和液压部件被电子控制单元所取代,信息娱乐和多媒体应用在车辆中有所增加。近年来,电子控制单元之间通信的安全关键信息、实时信息和非周期性信息越来越多。Flexray是一个高带宽协议,由支持硬实时消息的静态段和传输软、非实时消息的动态段组成。本文给出了Flexray协议动态段中各电子控制单元随机到达消息的稳定区域的求解方法。Flexray动态段中可用的迷你插槽数量限制了微控制器任务的到达率或连接到Flexray总线的微控制器数量。将系统数学模型的稳定区域与Flexray协议的仿真结果进行了比较。
{"title":"Stability analysis of aperiodic messages scheduled in the dynamic segment of Flexray protocol","authors":"P. S. Sunil Kumar, L. Jenkins","doi":"10.1109/ICCCNT.2012.6395866","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395866","url":null,"abstract":"In a cyber physical system like vehicles number of signals to be communicated in a network system has an increasing trend. More and more mechanical and hydraulic parts are replaced by electronic control units and infotainment and multimedia applications has increased in vehicles. Safety critical hard real time messages and aperiodic messages communicated between electronic control units have been increased in recent times. Flexray is a high bandwidth protocol consisting of static segment for supporting hard real time messages and a dynamic segment for transmitting soft and non real time messages. In this paper, a method to obtain the stability region for the random arrival of messages in each electronic control units which is scheduled in the dynamic segment of Flexray protocol is presented. Number of mini slots available in the dynamic segment of Flexray restricts the arrival rate of tasks to the micro controllers or the number of micro controllers connected to the Flexray bus. Stability region of mathematical model of the system is compared with the Flexray protocol simulation results.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130357015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of speech characteristics of neurological diseases and their classification 神经系统疾病的语音特征及其分类分析
K. Uma Rani, M. Holi
The characteristics of speech and voice in neurological diseases, such as, Parkinson's disease (PD), cerebellar demyelination, senile disease and stroke, have a realistic potential to provide information for early detection of onset, progression, and severity of these diseases. There are no risks involved in capturing and analysis of voice signals as it is noninvasive by nature and in carefully controlled circumstances, it can provide a large amount of meaningful data. The data collected in the present work consist of 136 sustained vowel phonations (/ah/), among them 83 phonations are from patients suffering from different neurological diseases and 53 phonations from controlled subjects including both male and female subjects. A total of 16 features were extracted from the voice data and significant differences between the two group `means' were evaluated using student's t-test. Significant findings in measurements were found in all types of shimmers and jitters features, except in measures of pitch. Further, all the 16 features were used as input to the artificial neural network (ANN) for classification. Two types of ANN are used for classification, the multilayer perceptron (MLP) network and radial basis function (RBF) network. 112 phonations were used to train the network and 24 phonations for testing. The RBF network gave a better classification with 90.12% for training set and 87.5% for test set compared to MLP with 86.66% for training set and 83.33% for test set.
帕金森病(PD)、小脑脱髓鞘、老年病和中风等神经系统疾病的语言和声音特征,具有为早期检测这些疾病的发病、进展和严重程度提供信息的现实潜力。语音信号的捕捉和分析不存在任何风险,因为它本质上是非侵入性的,在严格控制的情况下,它可以提供大量有意义的数据。本研究收集的数据包括 136 个持续元音发音(/ah/),其中 83 个发音来自不同的神经系统疾病患者,53 个发音来自受试者(包括男性和女性)。从语音数据中共提取了 16 个特征,并使用学生 t 检验法评估了两组 "平均值 "之间的显著差异。除音调测量外,所有类型的颤音和抖动特征都有显著的测量结果。此外,所有 16 个特征都被用作人工神经网络(ANN)分类的输入。有两种类型的人工神经网络用于分类,即多层感知器(MLP)网络和径向基函数(RBF)网络。112 个音素用于训练网络,24 个音素用于测试。与 MLP(训练集 86.66%,测试集 83.33%)相比,RBF 网络的分类效果更好,训练集为 90.12%,测试集为 87.5%。
{"title":"Analysis of speech characteristics of neurological diseases and their classification","authors":"K. Uma Rani, M. Holi","doi":"10.1109/ICCCNT.2012.6395886","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395886","url":null,"abstract":"The characteristics of speech and voice in neurological diseases, such as, Parkinson's disease (PD), cerebellar demyelination, senile disease and stroke, have a realistic potential to provide information for early detection of onset, progression, and severity of these diseases. There are no risks involved in capturing and analysis of voice signals as it is noninvasive by nature and in carefully controlled circumstances, it can provide a large amount of meaningful data. The data collected in the present work consist of 136 sustained vowel phonations (/ah/), among them 83 phonations are from patients suffering from different neurological diseases and 53 phonations from controlled subjects including both male and female subjects. A total of 16 features were extracted from the voice data and significant differences between the two group `means' were evaluated using student's t-test. Significant findings in measurements were found in all types of shimmers and jitters features, except in measures of pitch. Further, all the 16 features were used as input to the artificial neural network (ANN) for classification. Two types of ANN are used for classification, the multilayer perceptron (MLP) network and radial basis function (RBF) network. 112 phonations were used to train the network and 24 phonations for testing. The RBF network gave a better classification with 90.12% for training set and 87.5% for test set compared to MLP with 86.66% for training set and 83.33% for test set.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126890289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A new model for privacy preserving sensitive Data Mining 一种新的隐私保护敏感数据挖掘模型
M. Prakash, G. Singaravel
Data Mining and Knowledge Discovery is an indispensable technology for business and researches in many fields such as statistics, machine learning, pattern recognition, databases and high performance computing. In which Privacy Preserving Data Mining has the potential to increase the reach and benefits of data mining technology. This allows publishing a microdata without disclosing private information. Publishing data about individuals without revealing sensitive information about them is an important problem. k-anonymity and l-Diversity has been proposed as a mechanism for protecting privacy in microdata publishing. But both the mechanisms are insufficient to protect the privacy issues like Homogeneity attack, Skewness Attack, Similarity attack and Background Knowledge Attack. A new privacy measure called “(n, t)-proximity” is proposed which is more flexible model. Here first introduction about data mining is presented, and then research challenges are given. Followed by privacy preservation measures and problems with k-anonymity and l-Diversity are discussed. The rest of the paper is organised as (n, t)-proximity model, experimental results and analysis followed by conclusion.
数据挖掘和知识发现在统计学、机器学习、模式识别、数据库和高性能计算等许多领域都是商业和研究中不可或缺的技术。其中,保护隐私的数据挖掘有可能增加数据挖掘技术的范围和收益。这允许在不泄露私有信息的情况下发布微数据。在不泄露个人敏感信息的情况下发布个人数据是一个重要问题。k-匿名和l-多样性被提出作为微数据发布中的隐私保护机制。但这两种机制都不足以保护同质性攻击、偏度攻击、相似性攻击和背景知识攻击等隐私问题。提出了一种更灵活的隐私度量模型“(n, t)-接近度”。本文首先介绍了数据挖掘的相关知识,然后指出了数据挖掘研究面临的挑战。然后讨论了隐私保护措施以及k-匿名和l-多样性问题。本文的其余部分组织为(n, t)-接近模型,实验结果和分析,然后是结论。
{"title":"A new model for privacy preserving sensitive Data Mining","authors":"M. Prakash, G. Singaravel","doi":"10.1109/ICCCNT.2012.6396017","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396017","url":null,"abstract":"Data Mining and Knowledge Discovery is an indispensable technology for business and researches in many fields such as statistics, machine learning, pattern recognition, databases and high performance computing. In which Privacy Preserving Data Mining has the potential to increase the reach and benefits of data mining technology. This allows publishing a microdata without disclosing private information. Publishing data about individuals without revealing sensitive information about them is an important problem. k-anonymity and l-Diversity has been proposed as a mechanism for protecting privacy in microdata publishing. But both the mechanisms are insufficient to protect the privacy issues like Homogeneity attack, Skewness Attack, Similarity attack and Background Knowledge Attack. A new privacy measure called “(n, t)-proximity” is proposed which is more flexible model. Here first introduction about data mining is presented, and then research challenges are given. Followed by privacy preservation measures and problems with k-anonymity and l-Diversity are discussed. The rest of the paper is organised as (n, t)-proximity model, experimental results and analysis followed by conclusion.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130569107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1