首页 > 最新文献

2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)最新文献

英文 中文
An effective approach to counter application layer DDoS attacks 一种对抗应用层DDoS攻击的有效方法
S. Devi, P. Yogesh
Distributed Denial of Service (DDoS) attacks are posing major threat to today's essential Internet service because of its ability to create a huge volume of unwanted traffic. It is hard to detect and respond to DDoS attacks due to large and complex network environments. It becomes more serious when such attacks occur during the flash crowd. Both Flash crowds and DDoS attacks have very similar properties in terms of internet traffic; however Flash crowds are legitimate flows and DDoS attacks are illegitimate flows. This paper proposes a scheme to counter application layer DDoS attack and to schedule the flash crowd during DDoS attacks. In this scheme, an Access Matrix is defined to capture the access patterns of the legitimate clients and the normal flash crowd. Dimensionality reduction schemes are applied to reduce the multidimensional Access Matrix. A counter-mechanism consisting of a suspicion assignment mechanism and a scheduler is deployed. The suspicion mechanism assigns a score to each client session, and the scheduler decides whether to forward the session's requests or to drop the request based on the suspicion score.
分布式拒绝服务(DDoS)攻击对当今重要的互联网服务构成了重大威胁,因为它能够产生大量不需要的流量。由于网络环境庞大而复杂,DDoS攻击检测和响应难度较大。当这种攻击发生在快闪人群时,情况会变得更加严重。Flash人群和DDoS攻击在互联网流量方面具有非常相似的属性;然而,Flash人群是合法流,而DDoS攻击是非法流。本文提出了一种抵御应用层DDoS攻击的方案,并对DDoS攻击期间的flash人群进行调度。在该方案中,定义了访问矩阵来捕获合法客户端和正常flash人群的访问模式。采用降维方法对多维访问矩阵进行降维。部署了一个由怀疑分配机制和调度程序组成的反机制。怀疑机制为每个客户端会话分配一个分数,调度器根据怀疑分数决定是转发会话的请求还是放弃请求。
{"title":"An effective approach to counter application layer DDoS attacks","authors":"S. Devi, P. Yogesh","doi":"10.1109/ICCCNT.2012.6395941","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395941","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks are posing major threat to today's essential Internet service because of its ability to create a huge volume of unwanted traffic. It is hard to detect and respond to DDoS attacks due to large and complex network environments. It becomes more serious when such attacks occur during the flash crowd. Both Flash crowds and DDoS attacks have very similar properties in terms of internet traffic; however Flash crowds are legitimate flows and DDoS attacks are illegitimate flows. This paper proposes a scheme to counter application layer DDoS attack and to schedule the flash crowd during DDoS attacks. In this scheme, an Access Matrix is defined to capture the access patterns of the legitimate clients and the normal flash crowd. Dimensionality reduction schemes are applied to reduce the multidimensional Access Matrix. A counter-mechanism consisting of a suspicion assignment mechanism and a scheduler is deployed. The suspicion mechanism assigns a score to each client session, and the scheduler decides whether to forward the session's requests or to drop the request based on the suspicion score.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131801261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Optimization of solar air heater using differential evolution 差分演化法优化太阳能空气加热器
S. Jeyadevi, R. Manikumar, P. Gayathri, B. Mahalakshmi, M. Seethalakshmi
A solar energy application with maximum efficiency is the need of the day to meet out the power demands. Thermal Performance of a flat plate solar air heater is less and several approaches such as Genetic Algorithm, etc., have been attempted to solve this problem. The purpose of this work is to find the advantages of the application of Differential Evolution (DE) for the optimization of a flat plate solar air heater. The thermal efficiency of flat plate solar air heater is tested by optimizing its construction and operating variables such as Reynolds number, tilt angle of the plate, emissivity of the plate and velocity of air etc., The impact of these parameters variation on thermal performance is analyzed. In this work, the climatic data for the city of Hamirpur is considered, which is taken from an already published work in which authors applied Genetic Algorithm (GA). The reported results of GA are also considered for comparison with PSO and DE. Simulation results are quite promising and show that DE performs better than PSO and GA.
一个效率最高的太阳能应用是一天的需要,以满足我们的电力需求。平板太阳能空气加热器的热性能较差,人们尝试了遗传算法等方法来解决这一问题。本工作的目的是找出应用微分演化(DE)优化平板太阳能空气加热器的优势。通过优化平板太阳能空气加热器的结构和雷诺数、板的倾斜角、板的发射率、空气速度等运行变量,测试了平板太阳能空气加热器的热效率,分析了这些参数的变化对热性能的影响。在这项工作中,考虑了哈米尔普尔市的气候数据,这是从已经发表的作者应用遗传算法(GA)的工作中提取的。本文还将遗传算法与粒子群算法和遗传算法进行了比较。仿真结果表明,遗传算法的性能优于粒子群算法和遗传算法。
{"title":"Optimization of solar air heater using differential evolution","authors":"S. Jeyadevi, R. Manikumar, P. Gayathri, B. Mahalakshmi, M. Seethalakshmi","doi":"10.1109/ICCCNT.2012.6396057","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396057","url":null,"abstract":"A solar energy application with maximum efficiency is the need of the day to meet out the power demands. Thermal Performance of a flat plate solar air heater is less and several approaches such as Genetic Algorithm, etc., have been attempted to solve this problem. The purpose of this work is to find the advantages of the application of Differential Evolution (DE) for the optimization of a flat plate solar air heater. The thermal efficiency of flat plate solar air heater is tested by optimizing its construction and operating variables such as Reynolds number, tilt angle of the plate, emissivity of the plate and velocity of air etc., The impact of these parameters variation on thermal performance is analyzed. In this work, the climatic data for the city of Hamirpur is considered, which is taken from an already published work in which authors applied Genetic Algorithm (GA). The reported results of GA are also considered for comparison with PSO and DE. Simulation results are quite promising and show that DE performs better than PSO and GA.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127620145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internet banking fraud detection using HMM 基于HMM的网上银行欺诈检测
S. Mhamane, L. Lobo
Internet banking has their separate account for users and is managed by Banks or retail store. The aim of this paper is to detect and prevent fraud in case of internet banking using Hidden Markov Model algorithm. At the same time, we have tried to ensure that genuine transactions are not rejected by making use of one time password that was generated by the Bank server and sent to the particular customers through SMS to their Mobile number which is registered in the system. Banks are seeking to minimize huge losses through fraud detection and prevention systems. Many different advanced fraud technologies are being applied to fraudulent Internet banking transactions detection and prevention. However, they have no effective detection mechanism to identify legitimate users and trace their unlawful activities. We propose a model to overcome all these difficulties using Hidden Markov Model.
网上银行为用户提供单独的账户,由银行或零售商店管理。本文的目的是利用隐马尔可夫模型算法来检测和防止网上银行中的欺诈行为。与此同时,我们通过使用由银行服务器生成的一次性密码,并通过短信发送到系统中注册的特定客户的移动电话号码,努力确保真正的交易不会被拒绝。银行正试图通过欺诈检测和预防系统将巨额损失降到最低。许多不同的先进欺诈技术正被应用于欺诈网上银行交易的检测和预防。但是,它们没有有效的检测机制来识别合法用户并跟踪其非法活动。我们提出了一个利用隐马尔可夫模型来克服这些困难的模型。
{"title":"Internet banking fraud detection using HMM","authors":"S. Mhamane, L. Lobo","doi":"10.1109/ICCCNT.2012.6395910","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395910","url":null,"abstract":"Internet banking has their separate account for users and is managed by Banks or retail store. The aim of this paper is to detect and prevent fraud in case of internet banking using Hidden Markov Model algorithm. At the same time, we have tried to ensure that genuine transactions are not rejected by making use of one time password that was generated by the Bank server and sent to the particular customers through SMS to their Mobile number which is registered in the system. Banks are seeking to minimize huge losses through fraud detection and prevention systems. Many different advanced fraud technologies are being applied to fraudulent Internet banking transactions detection and prevention. However, they have no effective detection mechanism to identify legitimate users and trace their unlawful activities. We propose a model to overcome all these difficulties using Hidden Markov Model.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134506443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An enhanced smart multi-banking integrated system — Service oriented approach 增强型智能多银行综合系统——以服务为导向
P. Iyappan, V. PrasannaVenkatesan, R. Amarnath, L. Noor Mouhammed, A. Selvamani
Nowadays smart way of doing the work is very familiar among every business oriented enterprise applications. In this paper we propose an enhanced smart multi-banking integrated using service oriented composition model by which using single username and password the user can able to access multiple bank accounts. Every user can have more than one bank accounts and each bank provides different username and passwords. To operate his/her account he/she wants to remember all the user name and password of each bank. This Multi Banking Interface is aimed to enhance the current services of the bank to meet the requirements for future-banking world for the users who is having accounts in multiple banks. By using this interface any user who is having accounts in various banks can directly login to Multiple Banks and make any kind of transactions. By using this interface client can also able to see all various bank account summaries in the single page. He/she can get minimum 10 transaction details of all banks. Even amount can be transacted between the banks in the single interface. In addition to this, the main feature of the paper is, Sometimes the client need a particular amount, but all the banks in which he/she has account is having balance lesser then the required amount. For this we are providing a dynamic service composition interface to overcome this problem. Consider `n' number of banks is going to participate in multi-banking interface. Here one of the banks acts as a primary and remaining are secondary one. Consider the scenario that the user requires the amount of Rs.10000/- but no banks have full-required amount. Now the integrated system checks whether 60% of required amount is available in any of the banks. If so, it takes the amount from the corresponding bank otherwise it checks for 50% of required amount and so on for particular limit. Similarly, the remaining amount is taken from other banks in such criteria. Now the integrated system transfers the amount, which is taken from the secondary banks to primary bank account. Finally From the primary bank account the user can withdraw the required amount. If the client needs to add one more bank he/she can add the bank details and make our system to composite with the existing bank services dynamically.
如今,智能的工作方式在每个面向业务的企业应用程序中都很常见。本文提出了一种基于面向服务的组合模型的增强型智能多银行集成,通过该模型,用户可以使用单个用户名和密码访问多个银行账户。每个用户可以拥有多个银行账户,每个银行提供不同的用户名和密码。为了操作他/她的账户,他/她需要记住每个银行的所有用户名和密码。该多银行接口旨在增强银行的现有服务,以满足在多家银行拥有账户的用户对未来银行世界的需求。通过使用该接口,任何在不同银行拥有账户的用户都可以直接登录到多个银行并进行任何类型的交易。通过使用此接口,客户端还可以在单个页面中查看所有不同的银行帐户摘要。他/她可以获得至少10个所有银行的交易详情。银行间可以在单一界面上进行均匀金额的交易。除此之外,该论文的主要特点是,有时客户需要一笔特定的金额,但他/她有账户的所有银行的余额都低于所需的金额。为此,我们提供了一个动态服务组合接口来克服这个问题。考虑将有n家银行参与多银行接口。其中一家银行是主要银行,其余的都是次要银行。考虑这样一个场景:用户需要的金额为Rs.10000/,但没有银行有足够的金额。现在,集成系统检查在任何一家银行是否有所需金额的60%可用。如果是,它从相应的银行提取金额,否则它将检查所需金额的50%,以此类推,以达到特定的限额。同样,其余的金额也从其他银行提取。现在,综合系统将从二级银行提取的金额转移到一级银行账户。最后,用户可以从主银行账户中提取所需的金额。如果客户需要添加更多的银行,他/她可以添加银行详细信息,并使我们的系统与现有的银行服务动态组合。
{"title":"An enhanced smart multi-banking integrated system — Service oriented approach","authors":"P. Iyappan, V. PrasannaVenkatesan, R. Amarnath, L. Noor Mouhammed, A. Selvamani","doi":"10.1109/ICCCNT.2012.6395858","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395858","url":null,"abstract":"Nowadays smart way of doing the work is very familiar among every business oriented enterprise applications. In this paper we propose an enhanced smart multi-banking integrated using service oriented composition model by which using single username and password the user can able to access multiple bank accounts. Every user can have more than one bank accounts and each bank provides different username and passwords. To operate his/her account he/she wants to remember all the user name and password of each bank. This Multi Banking Interface is aimed to enhance the current services of the bank to meet the requirements for future-banking world for the users who is having accounts in multiple banks. By using this interface any user who is having accounts in various banks can directly login to Multiple Banks and make any kind of transactions. By using this interface client can also able to see all various bank account summaries in the single page. He/she can get minimum 10 transaction details of all banks. Even amount can be transacted between the banks in the single interface. In addition to this, the main feature of the paper is, Sometimes the client need a particular amount, but all the banks in which he/she has account is having balance lesser then the required amount. For this we are providing a dynamic service composition interface to overcome this problem. Consider `n' number of banks is going to participate in multi-banking interface. Here one of the banks acts as a primary and remaining are secondary one. Consider the scenario that the user requires the amount of Rs.10000/- but no banks have full-required amount. Now the integrated system checks whether 60% of required amount is available in any of the banks. If so, it takes the amount from the corresponding bank otherwise it checks for 50% of required amount and so on for particular limit. Similarly, the remaining amount is taken from other banks in such criteria. Now the integrated system transfers the amount, which is taken from the secondary banks to primary bank account. Finally From the primary bank account the user can withdraw the required amount. If the client needs to add one more bank he/she can add the bank details and make our system to composite with the existing bank services dynamically.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134620291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An implementation for dynamic combination of frequent items in HCFPMINETREE HCFPMINETREE中频繁项动态组合的实现
A. Meenakshi, K. Alagarsamy
Modern digital databases are immersed with massive collection of data. The proliferation, ubiquity and increasing power of computer technology have increased data collection and storage. As datasets have grown in size and complexity, direct hands-on data analysis has increasingly been augmented in-direct, automatic data processing. There are so many existing algorithms to find frequent itemsets in Association Rule Mining. In this paper, we have modified FPtree algorithm as HCFPMine frequency of tree (Horizontal Compact Frequent Pattern Mining) combines all the maximum occurrence of frequent itemsets before converting into the tree structure. We have also used median value for finding same frequency of items and inserted it as node in the tree structure. We have explained it with an algorithm and illustrated with examples and also depicted the runtime and memory space for the construction of the tree structure.
现代数字数据库中充斥着海量的数据。计算机技术的普及、普及和日益增强的能力增加了数据的收集和存储。随着数据集的规模和复杂性的增长,直接动手的数据分析越来越多地被直接、自动的数据处理所增强。在关联规则挖掘中,现有的频繁项集查找算法很多。在本文中,我们将FPtree算法改进为HCFPMine frequency of tree (Horizontal Compact frequency Pattern Mining),将所有频繁项集的最大出现次数组合在一起,然后转换为树结构。我们还使用中值来查找相同频率的项目,并将其作为树结构中的节点插入。我们用一个算法解释了它,用例子说明了它,还描述了构建树形结构的运行时和内存空间。
{"title":"An implementation for dynamic combination of frequent items in HCFPMINETREE","authors":"A. Meenakshi, K. Alagarsamy","doi":"10.1109/ICCCNT.2012.6396074","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396074","url":null,"abstract":"Modern digital databases are immersed with massive collection of data. The proliferation, ubiquity and increasing power of computer technology have increased data collection and storage. As datasets have grown in size and complexity, direct hands-on data analysis has increasingly been augmented in-direct, automatic data processing. There are so many existing algorithms to find frequent itemsets in Association Rule Mining. In this paper, we have modified FPtree algorithm as HCFPMine frequency of tree (Horizontal Compact Frequent Pattern Mining) combines all the maximum occurrence of frequent itemsets before converting into the tree structure. We have also used median value for finding same frequency of items and inserted it as node in the tree structure. We have explained it with an algorithm and illustrated with examples and also depicted the runtime and memory space for the construction of the tree structure.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124378797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scheduling in high level synthesis using discrete evolutionary programming 基于离散进化规划的高级综合调度
K. Shilpa, C. Lakshminarayana, M. K. Singh
Scheduling is very important and critical part of high level synthesis. Quality of schedule rules the performance of chip in terms of cost and speed. Define Optimal schedule is a challenging and tedious task. This paper has proposed the concept of Integer Evolutionary Programming (IEP) which is extension and discrete version of Evolution Programming (EP) to handle the scheduling as a constraint optimization problem over the Integer Linear Programming (ILP) formulation of problem. Proposed method can apply over any complexity of problem easily and efficiently. Verification of developed algorithm has given over benchmark problem.
调度是高级综合的重要组成部分。进度的质量决定了芯片在成本和速度方面的性能。制定最佳时间表是一项具有挑战性且乏味的任务。本文提出了整数进化规划(IEP)的概念,它是进化规划(EP)的扩展和离散版本,将调度问题作为整数线性规划(ILP)问题表述上的约束优化问题来处理。该方法可以简单有效地应用于任何复杂的问题。所开发算法的验证克服了基准问题。
{"title":"Scheduling in high level synthesis using discrete evolutionary programming","authors":"K. Shilpa, C. Lakshminarayana, M. K. Singh","doi":"10.1109/ICCCNT.2012.6396007","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396007","url":null,"abstract":"Scheduling is very important and critical part of high level synthesis. Quality of schedule rules the performance of chip in terms of cost and speed. Define Optimal schedule is a challenging and tedious task. This paper has proposed the concept of Integer Evolutionary Programming (IEP) which is extension and discrete version of Evolution Programming (EP) to handle the scheduling as a constraint optimization problem over the Integer Linear Programming (ILP) formulation of problem. Proposed method can apply over any complexity of problem easily and efficiently. Verification of developed algorithm has given over benchmark problem.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114353755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and modeling of a continuous-time delta-sigma modulator for biopotential signal acquisition: Simulink vs. Verilog-AMS perspective 用于生物电位信号采集的连续时间δ - σ调制器的设计和建模:Simulink与Verilog-AMS的对比
Geng Zheng, S. Mohanty, E. Kougianos
In the current trend of short time-to-market and complex circuits and systems containing billions of nanoscale transistor, fast and accurate time-domain simulations are crucial for analog and mixed-signal (AMS) design and verification. This will ensure reduction in the non-recurrent cost and make electronics cheaper. In this paper, in order to investigate the options for fast and accurate simulations, two popular modeling tools and languages (Simulink and Verilog-AMS) capable of constructing behavioral models are evaluated. A delta-sigma modulator design with biomedical applications is used as a case study. The system-level design of a third-order, feedforward continuous-time (CT) delta-sigma modulator (DSM) with a signal-to-noise ratio (SNR) of 87.3 dB and 20 kHz input bandwidth is presented. This CT DSM is to be employed in an analog-to-digital converter (ADC) targeting several portable biomedical applications which require a 10 kHz signal bandwidth and higher than 10-bit resolution. Simulink and Verilog-AMS were used throughout the design. The efficiency are compared in terms of modeling effort, simulation performance, and accuracy.
在当前短时间上市和包含数十亿纳米级晶体管的复杂电路和系统的趋势下,快速准确的时域仿真对于模拟和混合信号(AMS)的设计和验证至关重要。这将确保减少非经常性成本,使电子产品更便宜。在本文中,为了研究快速和准确的模拟选项,两种流行的建模工具和语言(Simulink和Verilog-AMS)能够构建行为模型进行评估。以生物医学应用的δ - σ调制器设计为例进行研究。提出了一种三阶前馈连续时间(CT) delta-sigma调制器(DSM)的系统级设计,该调制器信噪比为87.3 dB,输入带宽为20khz。该CT DSM将用于模数转换器(ADC),目标是几种需要10khz信号带宽和高于10位分辨率的便携式生物医学应用。在整个设计过程中使用了Simulink和Verilog-AMS。在建模工作量、仿真性能和精度方面对效率进行了比较。
{"title":"Design and modeling of a continuous-time delta-sigma modulator for biopotential signal acquisition: Simulink vs. Verilog-AMS perspective","authors":"Geng Zheng, S. Mohanty, E. Kougianos","doi":"10.1109/ICCCNT.2012.6396103","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396103","url":null,"abstract":"In the current trend of short time-to-market and complex circuits and systems containing billions of nanoscale transistor, fast and accurate time-domain simulations are crucial for analog and mixed-signal (AMS) design and verification. This will ensure reduction in the non-recurrent cost and make electronics cheaper. In this paper, in order to investigate the options for fast and accurate simulations, two popular modeling tools and languages (Simulink and Verilog-AMS) capable of constructing behavioral models are evaluated. A delta-sigma modulator design with biomedical applications is used as a case study. The system-level design of a third-order, feedforward continuous-time (CT) delta-sigma modulator (DSM) with a signal-to-noise ratio (SNR) of 87.3 dB and 20 kHz input bandwidth is presented. This CT DSM is to be employed in an analog-to-digital converter (ADC) targeting several portable biomedical applications which require a 10 kHz signal bandwidth and higher than 10-bit resolution. Simulink and Verilog-AMS were used throughout the design. The efficiency are compared in terms of modeling effort, simulation performance, and accuracy.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114970279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Human action recognition using accumulated motion and gradient of motion from video 基于累积运动和视频运动梯度的人体动作识别
V. Thanikachalam, K. Thyagharajan
This paper presents a method to recognize the action being performed by a human in a video. Applications like video surveillance, highlight extraction and video summarization require the recognition of the activities occurring in the video. The analysis of human activities in video is an area with increasingly important consequences from security and surveillance to entertainment and personal archiving. We propose an action recognition scheme based on accumulated motion and gradient of motion, in which the former is motion based and the latter is appearance based. Firstly, we define an Accumulated Motion Image (AMI) with which energy histograms are built and normalized for extracting features. Then we compute DFT from the energy histograms so that features like mean and variance are obtained. Secondly, we try finding out gradient direction and magnitude by taking a key frame from the video. Again, we extract mean and variance from histogram giving out few more feature vectors. Finally with all the extracted features, we train the system using Dynamic Time Warping(DTW) to recognize the various actions.Public dataset is used for Evaluation.
本文提出了一种识别视频中人类动作的方法。视频监控、亮点提取和视频摘要等应用需要识别视频中发生的活动。从安全和监控到娱乐和个人存档,对视频中人类活动的分析是一个越来越重要的领域。提出了一种基于累积运动和运动梯度的动作识别方案,其中前者基于运动,后者基于外观。首先,我们定义了一个累加运动图像(AMI),利用该图像构建能量直方图并进行归一化以提取特征;然后从能量直方图中计算DFT,得到均值和方差等特征。其次,我们尝试找出梯度方向和大小,从视频的关键帧。同样,我们从直方图中提取均值和方差,给出更多的特征向量。最后,利用提取的所有特征,我们使用动态时间翘曲(DTW)训练系统识别各种动作。公共数据集用于评估。
{"title":"Human action recognition using accumulated motion and gradient of motion from video","authors":"V. Thanikachalam, K. Thyagharajan","doi":"10.1109/ICCCNT.2012.6395973","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395973","url":null,"abstract":"This paper presents a method to recognize the action being performed by a human in a video. Applications like video surveillance, highlight extraction and video summarization require the recognition of the activities occurring in the video. The analysis of human activities in video is an area with increasingly important consequences from security and surveillance to entertainment and personal archiving. We propose an action recognition scheme based on accumulated motion and gradient of motion, in which the former is motion based and the latter is appearance based. Firstly, we define an Accumulated Motion Image (AMI) with which energy histograms are built and normalized for extracting features. Then we compute DFT from the energy histograms so that features like mean and variance are obtained. Secondly, we try finding out gradient direction and magnitude by taking a key frame from the video. Again, we extract mean and variance from histogram giving out few more feature vectors. Finally with all the extracted features, we train the system using Dynamic Time Warping(DTW) to recognize the various actions.Public dataset is used for Evaluation.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114995638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Power competent health monitoring system for a Disaster hit area 某灾区电力健康监测系统
R. K. Megalingam, S. Sugunan, Abishek Thekkeyil Kunnath
Quick advancement in wireless communication devices and systems like mobile phone technology has had a significant impact on the health care industry. One such important application is to monitor patient's health status at anytime and anywhere [1]. In this paper we propose an emergency medical service system which can be used for DHA (Disaster hit areas). The proposed system can measure the vital parameters of the patient without the requirement of an elaborate patient monitoring system which consumes a lot of power, time and space, also need experts to setup the system. The system is designed such that it is easily portable, power efficient and user-friendly mode of operation for the ease of usage in a disaster hit area. Also for the communication with far away expert doctors the system needs wireless network connection (WNC) namely GSM (Global System for Mobile Communication). One of the paramount considerations in the design is to make the device compact and portable as well as to minimize power consumption.
移动电话技术等无线通信设备和系统的快速发展对医疗保健行业产生了重大影响。其中一个重要的应用就是随时随地监测患者的健康状况[1]。本文提出了一种适用于灾区的应急医疗服务系统。该系统可以测量患者的重要参数,而不需要一个复杂的患者监护系统,该系统消耗大量的精力、时间和空间,也不需要专家来设置系统。该系统的设计使其易于携带,节能和用户友好的操作模式,便于在受灾地区使用。此外,为了与远程专家医生进行通信,系统需要无线网络连接(WNC),即GSM(全球移动通信系统)。设计中最重要的考虑因素之一是使设备紧凑便携,并尽量减少功耗。
{"title":"Power competent health monitoring system for a Disaster hit area","authors":"R. K. Megalingam, S. Sugunan, Abishek Thekkeyil Kunnath","doi":"10.1109/ICCCNT.2012.6396072","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396072","url":null,"abstract":"Quick advancement in wireless communication devices and systems like mobile phone technology has had a significant impact on the health care industry. One such important application is to monitor patient's health status at anytime and anywhere [1]. In this paper we propose an emergency medical service system which can be used for DHA (Disaster hit areas). The proposed system can measure the vital parameters of the patient without the requirement of an elaborate patient monitoring system which consumes a lot of power, time and space, also need experts to setup the system. The system is designed such that it is easily portable, power efficient and user-friendly mode of operation for the ease of usage in a disaster hit area. Also for the communication with far away expert doctors the system needs wireless network connection (WNC) namely GSM (Global System for Mobile Communication). One of the paramount considerations in the design is to make the device compact and portable as well as to minimize power consumption.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116954722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bayesian Classifier and Snort based network intrusion detection system in cloud computing 云计算中基于贝叶斯分类器和Snort的网络入侵检测系统
Chirag N. Modi, D. Patel, Avi Patel, R. Muttukrishnan
One of the major security issues in cloud computing is to protect against network intrusions that affect confidentiality, availability and integrity of Cloud resources and offered services. To address this issue, we design and integrate Bayesian Classifier and Snort based network intrusion detection system (NIDS) in Cloud. This framework aims to detect network intrusions in Cloud environment with low false positives and affordable computational cost. To ensure feasibility of our NIDS module in Cloud, we evaluate performance and quality results on KDD'99 experimental dataset.
云计算中的主要安全问题之一是防止影响云资源和所提供服务的机密性、可用性和完整性的网络入侵。为了解决这个问题,我们设计并集成了基于贝叶斯分类器和Snort的云网络入侵检测系统(NIDS)。该框架旨在以低误报和可承受的计算成本检测云环境下的网络入侵。为了确保我们的NIDS模块在Cloud中的可行性,我们在KDD'99实验数据集上评估了性能和质量结果。
{"title":"Bayesian Classifier and Snort based network intrusion detection system in cloud computing","authors":"Chirag N. Modi, D. Patel, Avi Patel, R. Muttukrishnan","doi":"10.1109/ICCCNT.2012.6396086","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396086","url":null,"abstract":"One of the major security issues in cloud computing is to protect against network intrusions that affect confidentiality, availability and integrity of Cloud resources and offered services. To address this issue, we design and integrate Bayesian Classifier and Snort based network intrusion detection system (NIDS) in Cloud. This framework aims to detect network intrusions in Cloud environment with low false positives and affordable computational cost. To ensure feasibility of our NIDS module in Cloud, we evaluate performance and quality results on KDD'99 experimental dataset.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116328986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
期刊
2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1