首页 > 最新文献

2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)最新文献

英文 中文
Mining the customer behavior using web usage mining in e-commerce 利用网络使用挖掘技术挖掘电子商务中的客户行为
Mahendra Pratap Yadav
With the explosive growth of information sources available on the WWW, it has become an important tool for users in order to find, extract, filter and evaluate the desired information and resources. The main purpose of this paper is to study the customer's behavior using the Web mining techniques and its application in e-commerce to mine customer behavior. The concept of Web mining describing the process of Web data mining in detail: source data collection, data pre-processing, pattern discovery, pattern analysis and cluster analysis. With the advanced information technologies, server are now able to collect and store mountains of data, describing their numerous contributions and different customer profiles, from which they seek to derive information about their customer's requirements. Conventional methods are no longer appropriate for these business situations to find the customer behavior. The principle of data mining is to cluster customer segments by using K-Means algorithm in which input data comes from web log of various e-commerce websites. Hence, determine the relationship between Web data mining and e-commerce and also to apply Web mining technology in e-commerce.
随着万维网上可用信息源的爆炸式增长,它已成为用户查找、提取、过滤和评估所需信息和资源的重要工具。本文的主要目的是利用Web挖掘技术研究客户行为,并将其应用于电子商务中对客户行为进行挖掘。Web挖掘的概念详细描述了Web数据挖掘的过程:源数据采集、数据预处理、模式发现、模式分析和聚类分析。随着先进的信息技术的发展,服务器现在能够收集和存储大量的数据,这些数据描述了他们的大量贡献和不同的客户档案,从中他们寻求获得有关客户需求的信息。传统的方法不再适合这些业务情况来发现客户的行为。数据挖掘的原理是利用K-Means算法对客户群进行聚类,该算法的输入数据来源于各电子商务网站的web日志。因此,确定了Web数据挖掘与电子商务的关系,并将Web挖掘技术应用于电子商务。
{"title":"Mining the customer behavior using web usage mining in e-commerce","authors":"Mahendra Pratap Yadav","doi":"10.1109/ICCCNT.2012.6395938","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395938","url":null,"abstract":"With the explosive growth of information sources available on the WWW, it has become an important tool for users in order to find, extract, filter and evaluate the desired information and resources. The main purpose of this paper is to study the customer's behavior using the Web mining techniques and its application in e-commerce to mine customer behavior. The concept of Web mining describing the process of Web data mining in detail: source data collection, data pre-processing, pattern discovery, pattern analysis and cluster analysis. With the advanced information technologies, server are now able to collect and store mountains of data, describing their numerous contributions and different customer profiles, from which they seek to derive information about their customer's requirements. Conventional methods are no longer appropriate for these business situations to find the customer behavior. The principle of data mining is to cluster customer segments by using K-Means algorithm in which input data comes from web log of various e-commerce websites. Hence, determine the relationship between Web data mining and e-commerce and also to apply Web mining technology in e-commerce.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130568421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Rule-base data mining systems for customer queries 用于客户查询的基于规则的数据挖掘系统
S. Ravichandran, D. Sathya, R. Shanmugapriya, G. Isvariyaa
The main objective of this paper is to have a best association between customer and organisation. This method is proposed in order to discover knowledge from huge amount of data and to use the data efficiently because of great demand. Banking is the most commonly used application for financial section. In which, Enterprise Resource Planning (ERP) model is most widely used in order to cost control, accounting and e-business & analyses. The request of the customers are routed automatically to the next department when one department finishes their work of the customer's request and each department have access to the single database that holds the customers new request. Customer Relationship Management (CRM) model is responsible for receiving the request and sending responses to the customers quickly and directly. The request includes queries, complaints, suggestions, and orders. These requests are forwarded to inner view ERP through query generator. In this paper, we proposed a model that integrates the customer queries, transactions, databases and all other specifications used in ERP Systems, then use data mining techniques to integrate decision making and forecasting. Using ERP characteristics, data gathered from central database are in cluster format which is based on action taken against the queries generated by customers. Later the clustered data's are used by Apriori algorithm to extract new rules and patterns for the enhancement of an organisation.
本文的主要目标是在客户和组织之间建立最好的联系。该方法是为了从海量数据中发现知识,并有效利用海量数据而提出的。银行是金融板块最常用的应用。其中,企业资源计划(ERP)模型在成本控制、会计核算和电子商务分析中应用最为广泛。当一个部门完成客户请求的工作时,客户的请求自动路由到下一个部门,并且每个部门都可以访问保存客户新请求的单个数据库。客户关系管理(CRM)模型负责接收请求并快速直接地向客户发送响应。请求包括查询、投诉、建议和命令。这些请求通过查询生成器转发到内部视图ERP。在本文中,我们提出了一个模型,将ERP系统中使用的客户查询、事务、数据库和所有其他规范集成在一起,然后使用数据挖掘技术集成决策和预测。利用ERP的特点,从中央数据库收集的数据是基于对客户产生的查询所采取的行动的集群格式。然后利用聚类后的数据通过Apriori算法提取新的规则和模式来增强组织。
{"title":"Rule-base data mining systems for customer queries","authors":"S. Ravichandran, D. Sathya, R. Shanmugapriya, G. Isvariyaa","doi":"10.1109/ICCCNT.2012.6395967","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395967","url":null,"abstract":"The main objective of this paper is to have a best association between customer and organisation. This method is proposed in order to discover knowledge from huge amount of data and to use the data efficiently because of great demand. Banking is the most commonly used application for financial section. In which, Enterprise Resource Planning (ERP) model is most widely used in order to cost control, accounting and e-business & analyses. The request of the customers are routed automatically to the next department when one department finishes their work of the customer's request and each department have access to the single database that holds the customers new request. Customer Relationship Management (CRM) model is responsible for receiving the request and sending responses to the customers quickly and directly. The request includes queries, complaints, suggestions, and orders. These requests are forwarded to inner view ERP through query generator. In this paper, we proposed a model that integrates the customer queries, transactions, databases and all other specifications used in ERP Systems, then use data mining techniques to integrate decision making and forecasting. Using ERP characteristics, data gathered from central database are in cluster format which is based on action taken against the queries generated by customers. Later the clustered data's are used by Apriori algorithm to extract new rules and patterns for the enhancement of an organisation.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130718432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On proposing automobile accident prevention system (A2PS) using wireless sensors and zigbee technology 提出基于无线传感器和zigbee技术的汽车事故预防系统(A2PS)
M. Rajesh, D. Muruganandam
A disaster is a deviation from planned or expected behavior or a course of event that endangers or adversely affects people, property, or the environment. This paper proposes a realtime accident prevention system combining signal processing and zigbee technique, that gets triggered by rash driving. The objective is to detect speed patterns in the driver's driving and alert the guard if certain patterns repeatedly occur. Several patterns are identified which are linked to irresponsible driving. The fluctuations in acceleration and deceleration for a period of time is measured by a sensor attached to the accelerator and the footbrake. This sensor gives inputs to the microcontroller kit, based on the amount of pressure on the accelerator / brake. The microcontroller in the system ascertains the traffic conditions, based on these variations in speed. Once the driving pattern matches the pre-defined pattern of rash driving in heavy or low traffic region, an alarm is sent to the driver along with the speed recommended. If the vehicle continues to travel in the same manner as before, an Zbee module in a Zigbee network sends an alert, giving details of the vehicle, the date and time of violation to the nearest control room. This will allow early response and rescue of accidents.
灾难是一种偏离计划或预期的行为或事件的过程,危及或对人、财产或环境产生不利影响。提出了一种结合信号处理和zigbee技术的交通事故实时预防系统。目的是检测驾驶员驾驶中的速度模式,并在某些模式重复出现时向警卫发出警报。发现了几种与不负责任驾驶有关的模式。在一段时间内,加速和减速的波动是由附着在加速器和脚制动器上的传感器测量的。该传感器根据加速器/制动器上的压力量向微控制器套件提供输入。系统中的微控制器根据这些速度变化来确定交通状况。一旦驾驶模式符合预先设定的在繁忙或低交通区域的鲁莽驾驶模式,就会向驾驶员发送警报并建议速度。如果车辆继续以同样的方式行驶,Zigbee网络中的Zbee模块将发送警报,向最近的控制室提供车辆的详细信息、违规日期和时间。这将有助于事故的早期反应和救援。
{"title":"On proposing automobile accident prevention system (A2PS) using wireless sensors and zigbee technology","authors":"M. Rajesh, D. Muruganandam","doi":"10.1109/ICCCNT.2012.6396066","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396066","url":null,"abstract":"A disaster is a deviation from planned or expected behavior or a course of event that endangers or adversely affects people, property, or the environment. This paper proposes a realtime accident prevention system combining signal processing and zigbee technique, that gets triggered by rash driving. The objective is to detect speed patterns in the driver's driving and alert the guard if certain patterns repeatedly occur. Several patterns are identified which are linked to irresponsible driving. The fluctuations in acceleration and deceleration for a period of time is measured by a sensor attached to the accelerator and the footbrake. This sensor gives inputs to the microcontroller kit, based on the amount of pressure on the accelerator / brake. The microcontroller in the system ascertains the traffic conditions, based on these variations in speed. Once the driving pattern matches the pre-defined pattern of rash driving in heavy or low traffic region, an alarm is sent to the driver along with the speed recommended. If the vehicle continues to travel in the same manner as before, an Zbee module in a Zigbee network sends an alert, giving details of the vehicle, the date and time of violation to the nearest control room. This will allow early response and rescue of accidents.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129670993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Gain scheduling adaptive model predictive controller for two conical tank interacting level system 双锥槽交互液位系统增益调度自适应模型预测控制器
V. Ravi, T. Thyagarajan, S. Y. Priyadharshni
Model predictive control (MPC) has become the leading form of advanced multivariable control in the chemical process industry. The objective of this work is to introduce a gain scheduling control strategy for multivariable MPC. The method of approach is to design multiple linear MPC controllers. This strategy maintains performance of multiple linear MPC controllers over a wide range of operating levels. One important contribution is that the strategy combines several multiple linear MPC controllers, each with their own linear state space model describing process dynamics at a specific level of operation. One of the linear MPC controller output is selected as gain scheduling adaptive controller's output based on the current value of the measured process variable. The tuning parameters for the MPC controller are obtained using real coded Genetic Algorithm (GA). The capabilities of the gain scheduling adaptive (GSA) control strategy for MPC controller are investigated on Two Conical Tank Interacting Level System (TCTILS) through computer simulation.
模型预测控制(MPC)已成为化工过程中先进多变量控制的主要形式。本文的目的是介绍一种多变量MPC的增益调度控制策略。方法是设计多个线性MPC控制器。该策略在广泛的操作水平范围内保持多个线性MPC控制器的性能。一个重要的贡献是该策略结合了几个多个线性MPC控制器,每个控制器都有自己的线性状态空间模型,描述特定操作级别的过程动态。根据测量过程变量的当前值,选择线性MPC控制器的一个输出作为增益调度自适应控制器的输出。采用实数编码遗传算法获得了MPC控制器的整定参数。通过计算机仿真研究了增益调度自适应(GSA) MPC控制器控制策略在双锥槽相互作用液位系统(TCTILS)上的性能。
{"title":"Gain scheduling adaptive model predictive controller for two conical tank interacting level system","authors":"V. Ravi, T. Thyagarajan, S. Y. Priyadharshni","doi":"10.1109/ICCCNT.2012.6396058","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396058","url":null,"abstract":"Model predictive control (MPC) has become the leading form of advanced multivariable control in the chemical process industry. The objective of this work is to introduce a gain scheduling control strategy for multivariable MPC. The method of approach is to design multiple linear MPC controllers. This strategy maintains performance of multiple linear MPC controllers over a wide range of operating levels. One important contribution is that the strategy combines several multiple linear MPC controllers, each with their own linear state space model describing process dynamics at a specific level of operation. One of the linear MPC controller output is selected as gain scheduling adaptive controller's output based on the current value of the measured process variable. The tuning parameters for the MPC controller are obtained using real coded Genetic Algorithm (GA). The capabilities of the gain scheduling adaptive (GSA) control strategy for MPC controller are investigated on Two Conical Tank Interacting Level System (TCTILS) through computer simulation.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124284770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Detecting salient regions in static images 检测静态图像中的显著区域
G. Cheng, E. Ayeh, Ziming Zhang
Computational visual attention systems, which aim at detecting salient regions in images, have been the subject of research for more than two decades. In this paper, we propose a novel approach (SEC) to detect salient regions in static images. This method is composed of two modules: segmentation-based entropy computation to determine the information content of clusters and local color contrast computation to enhance the saliency. DBSCAN is used first to segment the image. Then, the entropies of the resulting segments are computed. Spatial information of each segment size and cohesion is employed to adjust the entropy in terms of distinctiveness. Color contrast between adjacent segments is then computed and combined with spatial information to determine the most salient regions within the input image. We conducted two types of experiments, and compared visually and quantitatively with existing methods.
计算视觉注意系统,旨在检测图像中的显著区域,已经被研究了二十多年。在本文中,我们提出了一种新的方法(SEC)来检测静态图像中的显著区域。该方法由两个模块组成:基于分割的熵计算来确定聚类的信息含量和局部颜色对比计算来增强显著性。首先使用DBSCAN对图像进行分割。然后,计算结果段的熵。利用每个片段的空间信息大小和内聚来调整熵的显著性。然后计算相邻部分之间的颜色对比度,并结合空间信息来确定输入图像中最显著的区域。我们进行了两类实验,并与现有方法进行了直观和定量的比较。
{"title":"Detecting salient regions in static images","authors":"G. Cheng, E. Ayeh, Ziming Zhang","doi":"10.1109/ICCCNT.2012.6477848","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6477848","url":null,"abstract":"Computational visual attention systems, which aim at detecting salient regions in images, have been the subject of research for more than two decades. In this paper, we propose a novel approach (SEC) to detect salient regions in static images. This method is composed of two modules: segmentation-based entropy computation to determine the information content of clusters and local color contrast computation to enhance the saliency. DBSCAN is used first to segment the image. Then, the entropies of the resulting segments are computed. Spatial information of each segment size and cohesion is employed to adjust the entropy in terms of distinctiveness. Color contrast between adjacent segments is then computed and combined with spatial information to determine the most salient regions within the input image. We conducted two types of experiments, and compared visually and quantitatively with existing methods.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114077274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Patient monitoring system using Wireless Sensor based Mesh Network 基于Mesh网络的无线传感器病人监护系统
B. Vijayalakshmi, C. Ram Kumar
Wireless Sensor Networks (WSN) is a significant technology that has a considerable attraction in many areas, particularly in health sector. On the other hand Wireless Mesh Networks (WMN), which are an extension of LAN, have far better range and also reduce the amount of cabling needed to connect to the backbone network. In this paper a scheme that is Wireless Sensor based Mesh Networks, which is an integration of the above two technologies has been used for monitoring the patients status as follows: The patient's temperature, heart beat and pressure is monitored automatically using a bio-medical kit that is connected with the patient. A LCD is provided with the kit that is used to notify the nurse about the patient's health status. The information is then sent to a mesh node through Zigbee technology. The mesh node is generally a PC that helps the duty doctor to monitor all the wards that are present in the hospital. This ensures that the patient's health status is monitored even in the absence of the nurse. From the mesh node, a SMS is sent to specified doctors through GSM connection. With the help of the information got through SMS, the doctors can be able to attend the patient very quickly. Since the monitoring is done automatically there is no need for any person to look after the patient.
无线传感器网络(WSN)是一项重要的技术,在许多领域,特别是在卫生部门具有相当大的吸引力。另一方面,无线网状网络(WMN)是局域网的一种扩展,它的覆盖范围要大得多,而且还减少了连接到骨干网络所需的电缆数量。本文采用基于Mesh网络的无线传感器方案,将上述两种技术相结合,实现了对患者状态的监测:通过与患者连接的生物医疗包,自动监测患者的体温、心跳和血压。整套设备配有液晶显示器,用于通知护士患者的健康状况。然后通过Zigbee技术将信息发送到网状节点。网状节点通常是一台PC,帮助值班医生监控医院里的所有病房。这确保了即使在护士不在的情况下也能监测病人的健康状况。在mesh节点上,通过GSM连接向指定的医生发送短信。有了通过短信获得的信息的帮助,医生可以非常迅速地照顾病人。由于监测是自动完成的,所以不需要任何人来照顾病人。
{"title":"Patient monitoring system using Wireless Sensor based Mesh Network","authors":"B. Vijayalakshmi, C. Ram Kumar","doi":"10.1109/ICCCNT.2012.6396102","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396102","url":null,"abstract":"Wireless Sensor Networks (WSN) is a significant technology that has a considerable attraction in many areas, particularly in health sector. On the other hand Wireless Mesh Networks (WMN), which are an extension of LAN, have far better range and also reduce the amount of cabling needed to connect to the backbone network. In this paper a scheme that is Wireless Sensor based Mesh Networks, which is an integration of the above two technologies has been used for monitoring the patients status as follows: The patient's temperature, heart beat and pressure is monitored automatically using a bio-medical kit that is connected with the patient. A LCD is provided with the kit that is used to notify the nurse about the patient's health status. The information is then sent to a mesh node through Zigbee technology. The mesh node is generally a PC that helps the duty doctor to monitor all the wards that are present in the hospital. This ensures that the patient's health status is monitored even in the absence of the nurse. From the mesh node, a SMS is sent to specified doctors through GSM connection. With the help of the information got through SMS, the doctors can be able to attend the patient very quickly. Since the monitoring is done automatically there is no need for any person to look after the patient.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"89 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120870761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Data repliation techniques in MANETS MANETS中的数据复制技术
M. Qayyum, M. Husamuddin
Data Replication Techniques in Mobile Adhoc Networks is presented in this paper and discussed about the Data Replication Technique for Real-Time Ad Hoc Mobile Databases (DREAM); Collaborative Allocation and Deallocation of Replicas with Efficiency (CADRE); Consistency and Load Based Efficicient Allocation of Replicas (CLEAR); Expanding Ring Replication; Distributed Hash Table Replication (DHTR); Hara's Data Replication Schemes; An Economic Model for Effcient Dynamic Replication in Mobile-P2P networks (EcoRep).
介绍了移动自组织网络中的数据复制技术,讨论了实时自组织移动数据库(DREAM)的数据复制技术;基于效率的副本协同分配与回收(CADRE)基于一致性和负载的副本高效分配(CLEAR)扩展环复制;分布式哈希表复制;Hara的数据复制方案;移动p2p网络(EcoRep)中高效动态复制的经济模型。
{"title":"Data repliation techniques in MANETS","authors":"M. Qayyum, M. Husamuddin","doi":"10.1109/ICCCNT.2012.6395988","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395988","url":null,"abstract":"Data Replication Techniques in Mobile Adhoc Networks is presented in this paper and discussed about the Data Replication Technique for Real-Time Ad Hoc Mobile Databases (DREAM); Collaborative Allocation and Deallocation of Replicas with Efficiency (CADRE); Consistency and Load Based Efficicient Allocation of Replicas (CLEAR); Expanding Ring Replication; Distributed Hash Table Replication (DHTR); Hara's Data Replication Schemes; An Economic Model for Effcient Dynamic Replication in Mobile-P2P networks (EcoRep).","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"29 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120978709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure steganography using hybrid domain technique 使用混合域技术的安全隐写
H. Reddy, N. Sathisha, A. Kumari, K. Raja
The steganography is used to hide information and communicate in secure way to the destination. In this paper we propose Secure Steganography using Hybrid Domain Technique (SSHDT). The cover image of different formats and sizes are considered and resized to dimensions of power of 2. The Daubechies Lifting Wavelet Transforms (LWT) is applied on cover image to generate four sub bands XA, XH, XV and XD. The XD band is considered and divided into two equal blocks say upper and lower for payload embedding. The payload of different formats are considered and resized to dimensions of power of 2. The payload is fragmented into four equal blocks. The integer Haar LWT is applied on two diagonal sub bands to generate F1 and F2 blocks and remaining two diagonal sub bands are retained in the spatial domain itself say S1 and S2. The S1, S2. F1 and F2 matrix are converted into single columns. The bit reversal is applied on each element of a column to scramble the payload index bit positions. The cube root is applied on coefficient of index value to scale down the magnitudes. The integer part is considered for embedding in XD band only of cover image to generate stego object. The Decision Factor Based Manipulation (DFBM) is used to scramble further stego object to improve security to the payload. Dubechies Inverse LWT (ILWT) is applied on XA, XH, XV and XD stego object to obtain stego image in spatial domain. it is observed that PSNR and embedding capacity of the proposed algorithm is better compared to the existing algorithm.
隐写术用于隐藏信息,以安全的方式传输到目的地。本文提出了使用混合域技术(SSHDT)的安全隐写。考虑不同格式和大小的封面图像,并将其调整为2的幂次尺寸。对封面图像进行多道提升小波变换(Daubechies Lifting Wavelet transform, LWT),生成XA、XH、XV和XD四个子带。考虑了XD波段,并将其划分为上下两个相等的块,用于有效载荷嵌入。考虑不同格式的有效负载,并将其调整为2的幂维度。有效载荷被分成四个相等的块。在两个对角子带上应用整数Haar LWT生成F1和F2块,其余两个对角子带保留在空间域本身,即S1和S2。S1 S2。将F1和F2矩阵转换成单列。位反转应用于列的每个元素,以打乱有效负载索引位位置。对指标值的系数进行立方根,使数值按比例缩小。考虑将整数部分只嵌入到覆盖图像的XD波段,生成隐写目标。采用基于决策因子的操作(DFBM)对进一步的隐写对象进行置乱,以提高有效载荷的安全性。将Dubechies Inverse LWT (ILWT)应用于XA、XH、XV、XD四种隐写对象,得到空间域的隐写图像。结果表明,该算法的PSNR和嵌入容量均优于现有算法。
{"title":"Secure steganography using hybrid domain technique","authors":"H. Reddy, N. Sathisha, A. Kumari, K. Raja","doi":"10.1109/ICCCNT.2012.6396010","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396010","url":null,"abstract":"The steganography is used to hide information and communicate in secure way to the destination. In this paper we propose Secure Steganography using Hybrid Domain Technique (SSHDT). The cover image of different formats and sizes are considered and resized to dimensions of power of 2. The Daubechies Lifting Wavelet Transforms (LWT) is applied on cover image to generate four sub bands XA, XH, XV and XD. The XD band is considered and divided into two equal blocks say upper and lower for payload embedding. The payload of different formats are considered and resized to dimensions of power of 2. The payload is fragmented into four equal blocks. The integer Haar LWT is applied on two diagonal sub bands to generate F1 and F2 blocks and remaining two diagonal sub bands are retained in the spatial domain itself say S1 and S2. The S1, S2. F1 and F2 matrix are converted into single columns. The bit reversal is applied on each element of a column to scramble the payload index bit positions. The cube root is applied on coefficient of index value to scale down the magnitudes. The integer part is considered for embedding in XD band only of cover image to generate stego object. The Decision Factor Based Manipulation (DFBM) is used to scramble further stego object to improve security to the payload. Dubechies Inverse LWT (ILWT) is applied on XA, XH, XV and XD stego object to obtain stego image in spatial domain. it is observed that PSNR and embedding capacity of the proposed algorithm is better compared to the existing algorithm.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Power control with QoS constraints in WSN using game theoretic approach 基于博弈论的无线传感器网络QoS约束功率控制
R. Valli, P. Dananjayan
The major issue in wireless sensor network (WSN) is the power control since it is impossible to recharge or replace the batteries of the sensors. The sensors transmit at high power to make its transmission successful. Transmitting at high power not only reduces the lifetime of the nodes and that of the network, it also introduces excessive interference. Therefore, every node should transmit at minimal power while satisfying the quality of service (QoS) requirements. This paper proposes a power control game with error control coding (ECC) while considering the QoS requirements. The performance of the power control game satisfying QoS delay constraints with Reed Solomon (RS) and Multivariate Interpolation Decoded RS code (MIDRS) code for WSN is evaluated in terms of bit error rate (BER), throughput and delay.
无线传感器网络(WSN)的主要问题是功率控制,因为传感器的电池无法充电或更换。传感器以高功率传输,使其传输成功。高功率传输不仅会降低节点和网络的寿命,还会引入过多的干扰。因此,每个节点都应在满足服务质量(QoS)要求的情况下,以最小的功率进行传输。在考虑QoS要求的情况下,提出了一种带有错误控制编码(ECC)的功率控制对策。从误码率(BER)、吞吐量和延迟三个方面对满足QoS延迟约束的无线传感器网络功率控制博弈的性能进行了评价。
{"title":"Power control with QoS constraints in WSN using game theoretic approach","authors":"R. Valli, P. Dananjayan","doi":"10.1109/ICCCNT.2012.6396104","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396104","url":null,"abstract":"The major issue in wireless sensor network (WSN) is the power control since it is impossible to recharge or replace the batteries of the sensors. The sensors transmit at high power to make its transmission successful. Transmitting at high power not only reduces the lifetime of the nodes and that of the network, it also introduces excessive interference. Therefore, every node should transmit at minimal power while satisfying the quality of service (QoS) requirements. This paper proposes a power control game with error control coding (ECC) while considering the QoS requirements. The performance of the power control game satisfying QoS delay constraints with Reed Solomon (RS) and Multivariate Interpolation Decoded RS code (MIDRS) code for WSN is evaluated in terms of bit error rate (BER), throughput and delay.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129209151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimization of hybrid final adder for the high performance multiplier 高性能乘法器混合最终加法器的优化
V. Dandu, B. Ramkumar, H. Kittur
In this work we evaluated arrival profile of the HPM based multiplier partial products reduction tree in two ways: 1.manual delay, area calculation through logical effort, 2.ASIC implementation. Based on the arrival profile, we worked with some recently proposed optimal adders and finally we proposed an optimal hybrid adder for the final addition in HPM based parallel multiplier. This work derives some mathematical expressions to find the size of different regions in the partial product arrival profile which helps to design optimal adder for each region. This work evaluates the performance of proposed hybrid adder in terms of area, power and delay using 90nm technology. This work deals with manual calculation for 8-b and ASIC simulation of different adder designs for 8-b, 16-b, 32-b and 64-b multiplier bit sizes.
在这项工作中,我们从两个方面评估了基于乘数部分产品约简树的HPM到达轮廓:1。2.手动延迟,通过逻辑努力计算面积;ASIC实现。在此基础上,对最近提出的几种最优加法器进行了分析,最后提出了一种基于HPM并行乘法器的最优混合加法器。本文导出了部分产品到达轮廓中不同区域大小的数学表达式,从而为每个区域设计最优加法器。本工作从面积、功率和延迟方面评估了采用90nm技术的混合加法器的性能。这项工作涉及8-b的手动计算和8-b, 16-b, 32-b和64-b乘法器位大小的不同加法器设计的ASIC模拟。
{"title":"Optimization of hybrid final adder for the high performance multiplier","authors":"V. Dandu, B. Ramkumar, H. Kittur","doi":"10.1109/ICCCNT.2012.6396061","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396061","url":null,"abstract":"In this work we evaluated arrival profile of the HPM based multiplier partial products reduction tree in two ways: 1.manual delay, area calculation through logical effort, 2.ASIC implementation. Based on the arrival profile, we worked with some recently proposed optimal adders and finally we proposed an optimal hybrid adder for the final addition in HPM based parallel multiplier. This work derives some mathematical expressions to find the size of different regions in the partial product arrival profile which helps to design optimal adder for each region. This work evaluates the performance of proposed hybrid adder in terms of area, power and delay using 90nm technology. This work deals with manual calculation for 8-b and ASIC simulation of different adder designs for 8-b, 16-b, 32-b and 64-b multiplier bit sizes.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132613765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1