首页 > 最新文献

2018 IEEE 8th International Advance Computing Conference (IACC)最新文献

英文 中文
Machine learning approach for segmenting glands in colon histology images using local intensity and texture features 利用局部强度和纹理特征分割结肠组织学图像中腺体的机器学习方法
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692135
Rupali Khatun, S. Chatterjee
Colon Cancer is one of the most common types of cancer. The treatment is planned to depend on the grade or stage of cancer. One of the preconditions for grading of colon cancer is to segment the glandular structures of tissues. Manual segmentation method is very time-consuming, and it leads to life risk for the patients. The principal objective of this project is to assist the pathologist to accurate detection of colon cancer. In this paper, the authors have proposed an algorithm for an automatic segmentation of glands in colon histology using local intensity and texture features. Here the dataset images are cropped into patches with different window sizes and taken the intensity of those patches, and also calculated texture-based features. Random forest classifier has been used to classify this patch into different labels. A multilevel random forest technique in a hierarchical way is proposed. This solution is fast, accurate and it is very much applicable in a clinical setup.
结肠癌是最常见的癌症之一。治疗计划取决于癌症的等级或阶段。结肠癌分级的先决条件之一是组织腺结构的分割。人工分割的方法非常耗时,而且会给患者带来生命风险。该项目的主要目的是协助病理学家准确检测结肠癌。本文提出了一种利用局部强度和纹理特征对结肠组织腺体进行自动分割的算法。在这里,数据集图像被裁剪成不同窗口大小的补丁,并获取这些补丁的强度,并计算基于纹理的特征。使用随机森林分类器将该贴片分类为不同的标签。提出了一种分层的多层随机森林技术。该解决方案快速,准确,非常适用于临床设置。
{"title":"Machine learning approach for segmenting glands in colon histology images using local intensity and texture features","authors":"Rupali Khatun, S. Chatterjee","doi":"10.1109/IADCC.2018.8692135","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692135","url":null,"abstract":"Colon Cancer is one of the most common types of cancer. The treatment is planned to depend on the grade or stage of cancer. One of the preconditions for grading of colon cancer is to segment the glandular structures of tissues. Manual segmentation method is very time-consuming, and it leads to life risk for the patients. The principal objective of this project is to assist the pathologist to accurate detection of colon cancer. In this paper, the authors have proposed an algorithm for an automatic segmentation of glands in colon histology using local intensity and texture features. Here the dataset images are cropped into patches with different window sizes and taken the intensity of those patches, and also calculated texture-based features. Random forest classifier has been used to classify this patch into different labels. A multilevel random forest technique in a hierarchical way is proposed. This solution is fast, accurate and it is very much applicable in a clinical setup.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121121154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power and Resource-Aware VM Placement in Cloud Environment 云环境中的电源和资源感知虚拟机放置
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692118
Neha Garg, Damanpreet Singh, Major Singh Goraya
Cloud computing provides various services to the cloud consumers based on demand and pay per use basis. To improve the system performance (such as energy efficiency, resource utilization (RU), etc.) more than one virtual machine (VM) can be deployed on a server. Efficient VM placement policy increases the system performance by utilizing all the computing resources at their maximum threshold limit and reduce the probability to become a server overloaded/underloaded. Overloaded/underloaded servers consume more energy and increase the number of VM migration in comparison to the server which is in a normal state. In this paper, Energy and Resource-Aware VM Placement (ERAP) algorithm is presented. This algorithm considers both, energy as well as central processing unit (CPU) utilization to deploy the VMs on the servers. CloudSim toolkit is used to analyze the behavior of the ERAP algorithm. The effectiveness of the ERAP algorithm is tested on real workload traces of Planet Lab. Results show that ERAP algorithm performs better in comparison to the existing algorithm on the account of the number of VM migrations, total energy consumption, number of servers shutdowns, and average service level agreement (SLA) violation rate. Results show that on average 13.12% energy consumption is minimized in contrast to the existing algorithm.
云计算根据需求和按使用付费的方式向云消费者提供各种服务。为了提高系统的性能(如能效、RU等),一台服务器上可以部署多个虚拟机。高效的虚拟机放置策略通过最大限度地利用所有计算资源来提高系统性能,降低服务器过载/欠载的概率。与正常状态的服务器相比,过载/负载不足的服务器消耗更多的能量,并且增加了虚拟机迁移的数量。提出了一种基于能量和资源感知的虚拟机布局算法。该算法同时考虑了能源和中央处理器(CPU)利用率,以便在服务器上部署虚拟机。CloudSim工具包用于分析ERAP算法的行为。在Planet Lab的实际工作负载轨迹上验证了ERAP算法的有效性。结果表明,ERAP算法在虚拟机迁移次数、总能耗、服务器关闭次数和平均违反SLA (service level agreement)率等方面都优于现有算法。结果表明,与现有算法相比,该算法的平均能耗降低了13.12%。
{"title":"Power and Resource-Aware VM Placement in Cloud Environment","authors":"Neha Garg, Damanpreet Singh, Major Singh Goraya","doi":"10.1109/IADCC.2018.8692118","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692118","url":null,"abstract":"Cloud computing provides various services to the cloud consumers based on demand and pay per use basis. To improve the system performance (such as energy efficiency, resource utilization (RU), etc.) more than one virtual machine (VM) can be deployed on a server. Efficient VM placement policy increases the system performance by utilizing all the computing resources at their maximum threshold limit and reduce the probability to become a server overloaded/underloaded. Overloaded/underloaded servers consume more energy and increase the number of VM migration in comparison to the server which is in a normal state. In this paper, Energy and Resource-Aware VM Placement (ERAP) algorithm is presented. This algorithm considers both, energy as well as central processing unit (CPU) utilization to deploy the VMs on the servers. CloudSim toolkit is used to analyze the behavior of the ERAP algorithm. The effectiveness of the ERAP algorithm is tested on real workload traces of Planet Lab. Results show that ERAP algorithm performs better in comparison to the existing algorithm on the account of the number of VM migrations, total energy consumption, number of servers shutdowns, and average service level agreement (SLA) violation rate. Results show that on average 13.12% energy consumption is minimized in contrast to the existing algorithm.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121221231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
MIS, MVC and MDS in Cyclic Layered Graphs 循环分层图中的MIS、MVC和MDS
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692140
Bhadrachalam Chitturi, S. Balachander, S. Satheesh, Krithic Puthiyoppil
Graphs are discrete objects with myriad applications in science and engineering. Several graph theoretic problems are shown to be hard. However, for restricted versions of graphs based on the type of restriction the problems that are hard to solve for a general graph become tractable. Layered graphs have been defined and are shown to have applications in social networks and computational molecular biology. We define a new class of graphs called cyclic layered graphs that are related to layered graphs. We pose three problems that can be modeled as graph theoretic problems on cyclic layered graphs. We design efficient algorithms for these problems.
图是离散的对象,在科学和工程中有着无数的应用。几个图论问题被证明是困难的。然而,对于基于限制类型的图的限制版本,对于一般图来说难以解决的问题变得容易处理。分层图已经被定义,并被证明在社会网络和计算分子生物学中有应用。我们定义了与层图相关的一类新的图,称为循环层图。我们提出了三个可以建模为循环层图的图论问题。我们为这些问题设计了有效的算法。
{"title":"MIS, MVC and MDS in Cyclic Layered Graphs","authors":"Bhadrachalam Chitturi, S. Balachander, S. Satheesh, Krithic Puthiyoppil","doi":"10.1109/IADCC.2018.8692140","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692140","url":null,"abstract":"Graphs are discrete objects with myriad applications in science and engineering. Several graph theoretic problems are shown to be hard. However, for restricted versions of graphs based on the type of restriction the problems that are hard to solve for a general graph become tractable. Layered graphs have been defined and are shown to have applications in social networks and computational molecular biology. We define a new class of graphs called cyclic layered graphs that are related to layered graphs. We pose three problems that can be modeled as graph theoretic problems on cyclic layered graphs. We design efficient algorithms for these problems.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125521673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel hybrid Quantum Protocol to enhance secured dual party Computation over Cloud Networks 一种新型混合量子协议增强云网络上安全的双方计算
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692128
N. Sudhakar Reddy, V. L. Padmalatha, A. Sujith
Enhancing the security of the dual party computation is considered as primitive to establish a secured multiparty computation in the geographically distributed networks. With the advent of variously distributed paradigms like Cloud computing, IoT and Fog computing, securing ubiquitous computation that involves multiparty collaboration is considered an open research area that attains the attention of the researchers to develop novel protocols. Addressing the problem of secured computation over the network this paper presents a novel and hybrid quantum protocol in with Quantum key distribution is integrated with 3DES to enhance the secure computations through a quantum channel within the cloud infrastructure. Simulation results of the proposed protocol show that it outperforms many security protocols developed based on quantum resources.
增强双方计算的安全性被认为是在地理分布式网络中建立安全的多方计算的基础。随着云计算、物联网和雾计算等各种分布式范式的出现,涉及多方协作的无处不在计算的安全被认为是一个开放的研究领域,引起了研究人员对开发新协议的关注。针对网络上安全计算的问题,本文提出了一种新型的混合量子协议,将量子密钥分发与3DES集成,通过云基础设施内的量子通道增强安全计算。仿真结果表明,该协议优于许多基于量子资源的安全协议。
{"title":"A Novel hybrid Quantum Protocol to enhance secured dual party Computation over Cloud Networks","authors":"N. Sudhakar Reddy, V. L. Padmalatha, A. Sujith","doi":"10.1109/IADCC.2018.8692128","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692128","url":null,"abstract":"Enhancing the security of the dual party computation is considered as primitive to establish a secured multiparty computation in the geographically distributed networks. With the advent of variously distributed paradigms like Cloud computing, IoT and Fog computing, securing ubiquitous computation that involves multiparty collaboration is considered an open research area that attains the attention of the researchers to develop novel protocols. Addressing the problem of secured computation over the network this paper presents a novel and hybrid quantum protocol in with Quantum key distribution is integrated with 3DES to enhance the secure computations through a quantum channel within the cloud infrastructure. Simulation results of the proposed protocol show that it outperforms many security protocols developed based on quantum resources.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128754388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pitfree: Pot-holes detection on Indian Roads using Mobile Sensors 无坑洞:使用移动传感器检测印度道路上的坑洞
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692120
Gaurav Singal, Anurag Goswami, S. Gupta, Tejalal Choudhary
Pot-holes on road will make transportation slower and costly. India has a big network of roads to connect the villages and cities, the authority persons cannot travel across the region for identification of holes. As per advancement in machine learning in recent time, we can use this technology for the identification and patching the pot-holes. As per the recent survey around 400millions, people have a smartphone in India. We can use smartphone sensors (such as Accelerometer and gyroscope) to identify the pot-holes on road and GPS for the location of the pit. The major task of this problem is to capture the data and annotation. We have developed an android app for capturing the value of displacement while travelling on road. We have applied different classification algorithms to sensor raw-data. SVM is the most suitable classification technique for this problem. The android app will sound an alarm when a pothole is detected.
道路上的坑坑洼洼会使交通变得更慢,成本更高。印度有一个庞大的道路网络连接村庄和城市,当局人员无法穿越该地区以识别漏洞。随着近年来机器学习的进步,我们可以利用这种技术来识别和修补坑洞。根据最近的调查,印度大约有4亿人拥有智能手机。我们可以使用智能手机传感器(如加速度计和陀螺仪)来识别道路上的坑洞,并使用GPS来确定坑洞的位置。该问题的主要任务是捕获数据和注释。我们开发了一款安卓应用程序,用于捕捉在路上行驶时位移的价值。我们对传感器原始数据应用了不同的分类算法。支持向量机是最适合这个问题的分类技术。当检测到坑洞时,安卓应用程序会发出警报。
{"title":"Pitfree: Pot-holes detection on Indian Roads using Mobile Sensors","authors":"Gaurav Singal, Anurag Goswami, S. Gupta, Tejalal Choudhary","doi":"10.1109/IADCC.2018.8692120","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692120","url":null,"abstract":"Pot-holes on road will make transportation slower and costly. India has a big network of roads to connect the villages and cities, the authority persons cannot travel across the region for identification of holes. As per advancement in machine learning in recent time, we can use this technology for the identification and patching the pot-holes. As per the recent survey around 400millions, people have a smartphone in India. We can use smartphone sensors (such as Accelerometer and gyroscope) to identify the pot-holes on road and GPS for the location of the pit. The major task of this problem is to capture the data and annotation. We have developed an android app for capturing the value of displacement while travelling on road. We have applied different classification algorithms to sensor raw-data. SVM is the most suitable classification technique for this problem. The android app will sound an alarm when a pothole is detected.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128379553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Human Posture Recognition using Artificial Neural Networks 基于人工神经网络的人体姿势识别
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692143
H. Kale, Prathamesh Mandke, Hrishikesh Mahajan, Vedant Deshpande
This paper proposes the use of artificial neural networks(ANNs) to classify human postures, using an invasive(intrusive) approach, into 6 categories namely standing, sitting, sleeping and bending - forward and backward. Human posture recognition has numerous applications in the field of healthcare analysis like patient monitoring, lifestyle analysis, elderly care etc. Most importantly, our solution is capable of classifying the aforementioned postures in real-time, by wirelessly(Wi-Fi) acquiring and processing the sensor data on a Raspberry-Pi device with minimal lag. A data-set of 44,800 samples was collected - from 3 subjects - which was used to train and test the neural network. After experimenting and testing with a plethora of network architectures, an optimal neural network architecture(6-9-6) with suitable hyper-parameters was determined which gave an overall accuracy of 97.589%.
本文提出使用人工神经网络(ann)对人体姿势进行分类,采用侵入式(侵入式)方法,分为6类,即站立,坐姿,睡眠和弯曲-向前和向后。人体姿势识别在病人监护、生活方式分析、老年护理等医疗分析领域有着广泛的应用。最重要的是,我们的解决方案能够通过无线(Wi-Fi)获取和处理树莓派设备上的传感器数据,以最小的延迟实时对上述姿势进行分类。从3个对象中收集了44,800个样本的数据集,用于训练和测试神经网络。在对大量网络架构进行实验和测试后,确定了具有合适超参数的最优神经网络架构(6-9-6),总体准确率为97.589%。
{"title":"Human Posture Recognition using Artificial Neural Networks","authors":"H. Kale, Prathamesh Mandke, Hrishikesh Mahajan, Vedant Deshpande","doi":"10.1109/IADCC.2018.8692143","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692143","url":null,"abstract":"This paper proposes the use of artificial neural networks(ANNs) to classify human postures, using an invasive(intrusive) approach, into 6 categories namely standing, sitting, sleeping and bending - forward and backward. Human posture recognition has numerous applications in the field of healthcare analysis like patient monitoring, lifestyle analysis, elderly care etc. Most importantly, our solution is capable of classifying the aforementioned postures in real-time, by wirelessly(Wi-Fi) acquiring and processing the sensor data on a Raspberry-Pi device with minimal lag. A data-set of 44,800 samples was collected - from 3 subjects - which was used to train and test the neural network. After experimenting and testing with a plethora of network architectures, an optimal neural network architecture(6-9-6) with suitable hyper-parameters was determined which gave an overall accuracy of 97.589%.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116513739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Image Classification for Underage Detection in Restricted Public Zone 限制公共区域未成年人检测的图像分类
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692093
Megha Agarwal, Somya Jain
Image classification technique analyzes images and its features to unmask the underlined facts. The estimation of age via faces is an area of prime research relevance that deals with several challenges because of its rapid emergent flow in real world applications. In this paper a classifier is built which scans the upper body image i.e. facial images of a person to classify a image to detect the age group namely child, adult and old. The sole purpose of the research is to detect the underage people for enhancing the security system. Taking into account the geometrical features along with wrinkle features, underage is detected using three techniques namely KNN (k-nearest neighbor), ANN (Artificial Neural Network), and SVM (Support Vector Machine) classification algorithm.
图像分类技术通过对图像及其特征的分析,揭示出被强调的事实。通过面部来估计年龄是一个重要的研究领域,由于其在现实世界中的应用迅速涌现,因此面临着一些挑战。本文建立了一个分类器,该分类器通过扫描一个人的上半身图像即面部图像来对图像进行分类,以检测儿童,成人和老年人的年龄组。这项研究的唯一目的是检测未成年人,以加强安全系统。结合几何特征和皱纹特征,采用KNN (k-近邻)、ANN(人工神经网络)和SVM(支持向量机)三种分类算法检测未成年人。
{"title":"Image Classification for Underage Detection in Restricted Public Zone","authors":"Megha Agarwal, Somya Jain","doi":"10.1109/IADCC.2018.8692093","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692093","url":null,"abstract":"Image classification technique analyzes images and its features to unmask the underlined facts. The estimation of age via faces is an area of prime research relevance that deals with several challenges because of its rapid emergent flow in real world applications. In this paper a classifier is built which scans the upper body image i.e. facial images of a person to classify a image to detect the age group namely child, adult and old. The sole purpose of the research is to detect the underage people for enhancing the security system. Taking into account the geometrical features along with wrinkle features, underage is detected using three techniques namely KNN (k-nearest neighbor), ANN (Artificial Neural Network), and SVM (Support Vector Machine) classification algorithm.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126569315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Technique of Image Fusion Using Cloud Based Copyright Protection for Data Distribution 基于云版权保护的数据分发图像融合安全技术
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692139
Ashwani Kumar, Sangeeta Gupta
Now a day’s the uses of digital content or media is increasing rapidly. So, there is a need to secure the digital document from both unauthorized users and authorized users. In this paper a secure technique of image fusion using hybrid domain for copyright protection and data distribution is proposed. The proposed method provides a secure technique for the digital content in cloud environment. Two services of cloud are used to develop this work which eliminates the role of trusted third party (TTP). Previously the user and content provider rely on this TTP. First is the design of an infrastructure as a Service (IaaS) to store different images with encryption process to speed up the image fusion process and save storage. Second is a Platform as a Service (PaaS) to enable the digital content to achieve great computation power and to increase the bandwidth. These two services provided by the cloud plays a very important role because it reduces communication overhead in the process of image fusion. Imperceptibility and robustness measures are used to calculate the performance of the proposed approach.
现在,数字内容或媒体的使用正在迅速增加。因此,需要保护数字文档不受未授权用户和授权用户的访问。提出了一种利用混合域进行版权保护和数据分发的图像融合安全技术。该方法为云环境下的数字内容提供了一种安全技术。使用了两个云服务来开发这项工作,从而消除了可信第三方(TTP)的作用。以前,用户和内容提供者依赖于这个http。首先是设计基础设施即服务(IaaS),通过加密过程存储不同的图像,加快图像融合过程,节省存储空间。二是平台即服务(PaaS),使数字内容实现强大的计算能力,增加带宽。云提供的这两种服务在图像融合过程中起到了非常重要的作用,因为它减少了通信开销。使用不可感知性和鲁棒性度量来计算所提出方法的性能。
{"title":"A Secure Technique of Image Fusion Using Cloud Based Copyright Protection for Data Distribution","authors":"Ashwani Kumar, Sangeeta Gupta","doi":"10.1109/IADCC.2018.8692139","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692139","url":null,"abstract":"Now a day’s the uses of digital content or media is increasing rapidly. So, there is a need to secure the digital document from both unauthorized users and authorized users. In this paper a secure technique of image fusion using hybrid domain for copyright protection and data distribution is proposed. The proposed method provides a secure technique for the digital content in cloud environment. Two services of cloud are used to develop this work which eliminates the role of trusted third party (TTP). Previously the user and content provider rely on this TTP. First is the design of an infrastructure as a Service (IaaS) to store different images with encryption process to speed up the image fusion process and save storage. Second is a Platform as a Service (PaaS) to enable the digital content to achieve great computation power and to increase the bandwidth. These two services provided by the cloud plays a very important role because it reduces communication overhead in the process of image fusion. Imperceptibility and robustness measures are used to calculate the performance of the proposed approach.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125756687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Discovering Motifs in DNA Sequences: A Suffix Tree Based Approach 发现DNA序列中的基序:基于后缀树的方法
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692107
S. Prakash, Harshit Agarwal, Urvi Agarwal, Prantik Biswas, Suma Dawn Jaypee
Motif discovery also known as motif finding is a challenging problem in the field of bioinformatics that deals with various computational and statistical techniques to identify short patterns, often referred to as motifs that corresponds to the binding sites in the DNA sequence for transcription factors. Owing to the recent growth of bioinformatics, a good number of algorithms have come into limelight. This paper proposes a competent algorithm that extracts binding sites in set of DNA sequences for transcription factors, using successive iterations on the sequences provided. The motif we work on are of unknown length, un-gapped and non-mutated. The algorithm uses suffix trie for finding such sites. In this approach the first sequence is used as base for constructing the suffix trie and is mapped with other sequences which results in extraction of the motif. Additionally, this algorithm can also be applied to related problems in the field of data mining, pattern detection, etc.
基序发现也被称为基序发现,是生物信息学领域的一个具有挑战性的问题,它涉及到各种计算和统计技术来识别短模式,通常被称为基序,对应于转录因子DNA序列中的结合位点。由于近年来生物信息学的发展,许多算法已经成为人们关注的焦点。本文提出了一个胜任的算法,提取结合位点在一组DNA序列的转录因子,使用连续迭代的序列提供。我们研究的基序长度未知,没有缺口,也没有突变。该算法使用后缀trie来查找此类站点。在这种方法中,第一个序列被用作构建后缀trie的基础,并与其他序列进行映射,从而提取motif。此外,该算法还可以应用于数据挖掘、模式检测等领域的相关问题。
{"title":"Discovering Motifs in DNA Sequences: A Suffix Tree Based Approach","authors":"S. Prakash, Harshit Agarwal, Urvi Agarwal, Prantik Biswas, Suma Dawn Jaypee","doi":"10.1109/IADCC.2018.8692107","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692107","url":null,"abstract":"Motif discovery also known as motif finding is a challenging problem in the field of bioinformatics that deals with various computational and statistical techniques to identify short patterns, often referred to as motifs that corresponds to the binding sites in the DNA sequence for transcription factors. Owing to the recent growth of bioinformatics, a good number of algorithms have come into limelight. This paper proposes a competent algorithm that extracts binding sites in set of DNA sequences for transcription factors, using successive iterations on the sequences provided. The motif we work on are of unknown length, un-gapped and non-mutated. The algorithm uses suffix trie for finding such sites. In this approach the first sequence is used as base for constructing the suffix trie and is mapped with other sequences which results in extraction of the motif. Additionally, this algorithm can also be applied to related problems in the field of data mining, pattern detection, etc.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"35 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113936887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
3D-Printed Sole with Variable Density using Foot Plantar Pressure Measurements 3d打印鞋底与可变密度使用脚底压力测量
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8691943
Trisha Singhal, Akshat Khare, Nikhil Gupta, T. Gandhi
With the increasing applications of 3D printing, podiatric research has received considerable attention from researchers worldwide. 3D-printed customized soles came into use to mitigate a patient foot’s pain and ameliorate comfortability. The presented work is aimed to provide customized foot sole with variable infills and appropriate depths in order to get the adequate pressure and comfort on the precise nerve areas, which are the origins of pain.In the proposed work, a 3D-sole is reconstructed conceptualizing variable infill density and appropriate depth fitting using foot plantar pressure measurements. The given work comprised of four phases: attaining foot plantar pressure readings, data processing, infill density distribution and 3D printing of the sole. Initially, the foot plantar data is obtained by a platform using an array of 32 X 32 piezo-electric sensors. Secondly, the input data is corrected with the removal of the rigid pattern from the foot sole via median filtering and interpolated via bicubic interpolation to obtain the smooth surface. Thereafter, modifiers are created to dispense different densities to distinct portions of the model. At last, the model is 3D-printed using fused deposition modeling (FDM) technology. The novel work can be extremely considerable in various medical and commercial applications.
随着3D打印技术的应用越来越广泛,足病研究受到了世界范围内研究者的广泛关注。3d打印定制鞋底开始用于减轻患者足部疼痛并改善舒适度。本研究旨在提供具有不同填充物和适当深度的定制足底,以便在疼痛的精确神经区域获得足够的压力和舒适度。在提出的工作中,利用足底压力测量重建了3d鞋底,概念上定义了可变填充密度和适当的深度拟合。这项工作包括四个阶段:获得足底压力读数、数据处理、填充密度分布和鞋底3D打印。最初,脚底数据是由一个使用32 X 32压电传感器阵列的平台获得的。其次,对输入数据进行校正,通过中值滤波去除鞋底的刚性图案,并通过双三次插值进行插值,得到光滑表面;然后,修改器被创建来分配不同的密度到模型的不同部分。最后,采用熔融沉积建模(FDM)技术对模型进行3d打印。这项新工作在各种医学和商业应用中具有极其重要的意义。
{"title":"3D-Printed Sole with Variable Density using Foot Plantar Pressure Measurements","authors":"Trisha Singhal, Akshat Khare, Nikhil Gupta, T. Gandhi","doi":"10.1109/IADCC.2018.8691943","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8691943","url":null,"abstract":"With the increasing applications of 3D printing, podiatric research has received considerable attention from researchers worldwide. 3D-printed customized soles came into use to mitigate a patient foot’s pain and ameliorate comfortability. The presented work is aimed to provide customized foot sole with variable infills and appropriate depths in order to get the adequate pressure and comfort on the precise nerve areas, which are the origins of pain.In the proposed work, a 3D-sole is reconstructed conceptualizing variable infill density and appropriate depth fitting using foot plantar pressure measurements. The given work comprised of four phases: attaining foot plantar pressure readings, data processing, infill density distribution and 3D printing of the sole. Initially, the foot plantar data is obtained by a platform using an array of 32 X 32 piezo-electric sensors. Secondly, the input data is corrected with the removal of the rigid pattern from the foot sole via median filtering and interpolated via bicubic interpolation to obtain the smooth surface. Thereafter, modifiers are created to dispense different densities to distinct portions of the model. At last, the model is 3D-printed using fused deposition modeling (FDM) technology. The novel work can be extremely considerable in various medical and commercial applications.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125759875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 IEEE 8th International Advance Computing Conference (IACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1