首页 > 最新文献

2011 Third International Conference on Advanced Computing最新文献

英文 中文
A novel cross layered energy based ad hoc on-demand routing protocol for MANETs 一种新的基于跨层能量的自组织按需路由协议
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165188
K. Muthumayil, V. Rajamani, S. Manikandan
The design of efficient routing protocols for Ad hoc neworks is a complex issue. These networks need efficient algorithms to determine ad hoc connectivity and routing. MANET aims not only to provide correct and efficient routes between pair of nodes but also to provide energy efficient route to maximize the life time of ad hoc mobile networks. In this paper, a dynamic energy conscious routing algorithm ECL-AODV where cross layer interaction is provided to utilize the energy related information from physical and MAC layers. This algorithm avoids the nodes which are having low residual energy. By maximizing the lifetime of mobile nodes routing algorithm selects a best path from the viewpoint of high residual energy path as part of route stability. The RTS/CTS transmission is a crucial step towards saving the energy of mobile nodes. In this scheme, the RTS/CTS transmission occurs after route discovery and route reply process. The path is reserved for further transmissions. The receiving power of sender, intermediate nodes and receiver are also another part of route stability. The protocol is implemented for achieving quality of service (QoS) in terms of average energy consumption, packet delivery ratio, end-to-end delay and throughput.
为Ad hoc网络设计高效的路由协议是一个复杂的问题。这些网络需要有效的算法来确定自组织连接和路由。MANET不仅要在对节点之间提供正确有效的路由,而且要提供节能的路由,以最大限度地延长自组织移动网络的生命周期。本文提出了一种动态能量意识路由算法ECL-AODV,该算法提供了跨层交互,以利用物理层和MAC层的能量相关信息。该算法避免了剩余能量较低的节点。路由算法通过最大化移动节点的生存期,从高剩余能量路径的角度选择最优路径,作为路由稳定性的一部分。RTS/CTS传输是节省移动节点能量的关键一步。在该方案中,经过路由发现和路由应答过程后进行RTS/CTS传输。该路径保留用于进一步传输。发送方、中间节点和接收方的接收能力也是路由稳定性的另一个组成部分。该协议从平均能耗、分组分发率、端到端延迟和吞吐量等方面实现服务质量(QoS)。
{"title":"A novel cross layered energy based ad hoc on-demand routing protocol for MANETs","authors":"K. Muthumayil, V. Rajamani, S. Manikandan","doi":"10.1109/ICOAC.2011.6165188","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165188","url":null,"abstract":"The design of efficient routing protocols for Ad hoc neworks is a complex issue. These networks need efficient algorithms to determine ad hoc connectivity and routing. MANET aims not only to provide correct and efficient routes between pair of nodes but also to provide energy efficient route to maximize the life time of ad hoc mobile networks. In this paper, a dynamic energy conscious routing algorithm ECL-AODV where cross layer interaction is provided to utilize the energy related information from physical and MAC layers. This algorithm avoids the nodes which are having low residual energy. By maximizing the lifetime of mobile nodes routing algorithm selects a best path from the viewpoint of high residual energy path as part of route stability. The RTS/CTS transmission is a crucial step towards saving the energy of mobile nodes. In this scheme, the RTS/CTS transmission occurs after route discovery and route reply process. The path is reserved for further transmissions. The receiving power of sender, intermediate nodes and receiver are also another part of route stability. The protocol is implemented for achieving quality of service (QoS) in terms of average energy consumption, packet delivery ratio, end-to-end delay and throughput.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131393437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A DiffServ Policy based approach for improved Shrew Attack Protection 基于DiffServ策略的改进鼩鼱攻击防护方法
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165215
T. Shanmugam, C. Chellappan
Shrew attack which causes TCP flows to attain zero throughput or a session reset by sending a very short bursts of attack pulses synchronized with TCP retransmission timeout value and makes the TCP packets to be dropped every time during TCP retransmission timeout. It creates a false congestion at the bottleneck links / routers. The Shrew attack can send packets either to non TCP ports or to TCP ports. There is no existing system which defends the attacks on protected ports, multiple and distributed shrew attacks, efficiently. In this paper, we propose an improved Shrew Attack Protection System (iSAP) for protecting the TCP flows from attack on both protected and unprotected ports. This system is based on a newly developed DiffServ Policy which ensures identification of shrew attack flows, preferential treatment and priority scheduling of TCP flows and other unresponsive flows. The simulation results show that legitimate TCP flows and other unresponsive flows attain their high bandwidth shares in the event of Shrew Attack in various forms. This system is developed as a new DiffServ Policy which makes easy to deploy in any DiffServ enabled bottleneck routers.
鼩鼱攻击,通过发送与TCP重传超时值同步的极短攻击脉冲,使TCP流达到零吞吐量或会话复位,使TCP报文在TCP重传超时值内每次都被丢弃。它在瓶颈链路/路由器上造成虚假拥塞。鼩鼱攻击既可以向非TCP端口发送报文,也可以向TCP端口发送报文。目前还没有有效防御针对被保护端口的多重分布式鼩鼱攻击的系统。在本文中,我们提出了一种改进的Shrew攻击保护系统(iSAP),用于保护TCP流免受保护端口和未保护端口的攻击。该系统基于一种新开发的DiffServ策略,确保了对恶意攻击流的识别,对TCP流和其他无响应流的优先处理和优先调度。仿真结果表明,在各种形式的鼩鼱攻击中,合法TCP流和其他无响应流都获得了较高的带宽份额。该系统是一种新的DiffServ策略,可以很容易地部署在任何启用DiffServ的瓶颈路由器上。
{"title":"A DiffServ Policy based approach for improved Shrew Attack Protection","authors":"T. Shanmugam, C. Chellappan","doi":"10.1109/ICOAC.2011.6165215","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165215","url":null,"abstract":"Shrew attack which causes TCP flows to attain zero throughput or a session reset by sending a very short bursts of attack pulses synchronized with TCP retransmission timeout value and makes the TCP packets to be dropped every time during TCP retransmission timeout. It creates a false congestion at the bottleneck links / routers. The Shrew attack can send packets either to non TCP ports or to TCP ports. There is no existing system which defends the attacks on protected ports, multiple and distributed shrew attacks, efficiently. In this paper, we propose an improved Shrew Attack Protection System (iSAP) for protecting the TCP flows from attack on both protected and unprotected ports. This system is based on a newly developed DiffServ Policy which ensures identification of shrew attack flows, preferential treatment and priority scheduling of TCP flows and other unresponsive flows. The simulation results show that legitimate TCP flows and other unresponsive flows attain their high bandwidth shares in the event of Shrew Attack in various forms. This system is developed as a new DiffServ Policy which makes easy to deploy in any DiffServ enabled bottleneck routers.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133401220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tutorial I: Neural networks and support vector machines 教程1:神经网络和支持向量机
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165238
C. Chandra Sekhar, S. Thamarai Selvi, C. N. Rao
Discriminative learning based approaches to pattern classification are important for tasks that involve nonlinearly separable classes and overlapping classes as in many real world pattern classification tasks. Multilayer feedforward neural networks built using the computational models of neurons with sigmoidal activation function, and trained using the error back propagation learning algorithm have been explored for complex pattern classification tasks. The main limitations of theses models are the slow convergence of the learning method, the local minima problem and the poor generalization ability of trained models. Support vector machines overcome these limitations by using the principles of kernel methods. In the kernel methods for pattern classification, the first stage involves nonlinear transformation of representation of an example in a low dimensional input feature space to a representation in a high dimensional feature space induced by a kernel function, so that the nonlinearly separable classes in the input feature space are likely be linearly separable classes in the kernel feature space. The second stage in the kernel methods involves constructing an optimal linear solution in the kernel feature space that corresponds to an optimal nonlinear solution in the input feature space. The main advantages of the support vector machines are the good generalization ability and the requirement of small size training data sets. The main issue in the design of support vector machines is the choice of kernel function that induces the nonlinear transformation. Support vector machines can be used for vectorial representations of data as well as for non-vectorial representations of data, whereas multilayer feed forward neural networks can be used mainly for vectorial representations of data. The tutorial presents the underlying principles of approaches to pattern classification using multilayer feedforward neural networks and support vector machines, and discusses the issues in developing pattern classification models using these approaches. Some applications of support vector machines to pattern classification tasks in speech and image processing are also presented.
基于判别学习的模式分类方法对于涉及非线性可分类和重叠类的任务非常重要,就像许多现实世界的模式分类任务一样。利用具有s型激活函数的神经元计算模型构建多层前馈神经网络,并使用误差反向传播学习算法进行训练,探索了用于复杂模式分类任务的多层前馈神经网络。这些模型的主要局限性是学习方法收敛速度慢,存在局部极小问题,训练模型泛化能力差。支持向量机通过使用核方法的原理克服了这些限制。在模式分类的核方法中,第一阶段是将样本在低维输入特征空间中的表示非线性转换为由核函数诱导的高维特征空间中的表示,从而使输入特征空间中的非线性可分类很可能是核特征空间中的线性可分类。核方法的第二阶段涉及在核特征空间中构造一个最优线性解,该解对应于输入特征空间中的最优非线性解。支持向量机的主要优点是良好的泛化能力和对训练数据集的要求较小。支持向量机设计中的主要问题是核函数的选择,从而引起非线性变换。支持向量机既可以用于数据的向量表示,也可以用于数据的非向量表示,而多层前馈神经网络主要用于数据的向量表示。本教程介绍了使用多层前馈神经网络和支持向量机进行模式分类方法的基本原理,并讨论了使用这些方法开发模式分类模型的问题。本文还介绍了支持向量机在语音和图像处理中模式分类任务中的一些应用。
{"title":"Tutorial I: Neural networks and support vector machines","authors":"C. Chandra Sekhar, S. Thamarai Selvi, C. N. Rao","doi":"10.1109/ICOAC.2011.6165238","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165238","url":null,"abstract":"Discriminative learning based approaches to pattern classification are important for tasks that involve nonlinearly separable classes and overlapping classes as in many real world pattern classification tasks. Multilayer feedforward neural networks built using the computational models of neurons with sigmoidal activation function, and trained using the error back propagation learning algorithm have been explored for complex pattern classification tasks. The main limitations of theses models are the slow convergence of the learning method, the local minima problem and the poor generalization ability of trained models. Support vector machines overcome these limitations by using the principles of kernel methods. In the kernel methods for pattern classification, the first stage involves nonlinear transformation of representation of an example in a low dimensional input feature space to a representation in a high dimensional feature space induced by a kernel function, so that the nonlinearly separable classes in the input feature space are likely be linearly separable classes in the kernel feature space. The second stage in the kernel methods involves constructing an optimal linear solution in the kernel feature space that corresponds to an optimal nonlinear solution in the input feature space. The main advantages of the support vector machines are the good generalization ability and the requirement of small size training data sets. The main issue in the design of support vector machines is the choice of kernel function that induces the nonlinear transformation. Support vector machines can be used for vectorial representations of data as well as for non-vectorial representations of data, whereas multilayer feed forward neural networks can be used mainly for vectorial representations of data. The tutorial presents the underlying principles of approaches to pattern classification using multilayer feedforward neural networks and support vector machines, and discusses the issues in developing pattern classification models using these approaches. Some applications of support vector machines to pattern classification tasks in speech and image processing are also presented.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116838265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Methodology for iris segmentation and recognition using multi-resolution transform 基于多分辨率变换的虹膜分割与识别方法
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165153
J. Sekar, S. Arivazhagan, R. Murugan
Iris segmentation is used to locate the valid part of the iris for iris biometrics which is an essential module in iris recognition because it defines the effective image region used for subsequent processing such as feature extraction and iris identification. A novel algorithm for efficient and accurate iris segmentation is carried out in this system. The pupil boundary is detected by applying the equation of circle by finding three points on its circumference. The reflection within the pupil region (if any) is filled by reducing the radius of the pupil one by one until it reaches to zero. Then calculating the edge points of iris boundaries (left, right, upper and lower) point by taking the fixed value from pupil circumference. The novelty here for eyelids localization can be performed by using ‘3 points marking’ for upper lid and ‘edge detector’ for lower lid. After that, eyelash removal can be done by Order — Statistic Filtering. Finally, the accurate iris edge region is fitted by calculating the point of intersection between eyelids and eye localization. After edge fitting, the curvelet transform is applied for feature extraction. The Manhattan and Euclidean Distance measures are used to measure the similarity between two images to find the best match. Here, the challenging benchmark database MMU is used for identification and verification.
虹膜分割用于虹膜生物识别中虹膜有效部分的定位,是虹膜识别中必不可少的一个模块,它定义了虹膜特征提取和虹膜识别等后续处理的有效图像区域。该系统提出了一种高效、准确的虹膜分割算法。利用圆方程在瞳孔的周长上找到三个点,从而检测瞳孔的边界。瞳孔区域内的反射(如果有的话)是通过一个接一个地缩小瞳孔的半径直到它达到零来填充的。然后从瞳孔周长取固定值计算虹膜边界的左、右、上、下点边缘点。眼睑定位的新颖之处可以通过上眼睑的“三点标记”和下眼睑的“边缘检测器”来实现。然后用顺序统计过滤法去除睫毛。最后,通过计算眼睑交点和眼部定位,拟合出准确的虹膜边缘区域。边缘拟合后,采用曲波变换进行特征提取。曼哈顿和欧几里得距离度量用于度量两个图像之间的相似性,以找到最佳匹配。在这里,使用具有挑战性的基准数据库MMU进行识别和验证。
{"title":"Methodology for iris segmentation and recognition using multi-resolution transform","authors":"J. Sekar, S. Arivazhagan, R. Murugan","doi":"10.1109/ICOAC.2011.6165153","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165153","url":null,"abstract":"Iris segmentation is used to locate the valid part of the iris for iris biometrics which is an essential module in iris recognition because it defines the effective image region used for subsequent processing such as feature extraction and iris identification. A novel algorithm for efficient and accurate iris segmentation is carried out in this system. The pupil boundary is detected by applying the equation of circle by finding three points on its circumference. The reflection within the pupil region (if any) is filled by reducing the radius of the pupil one by one until it reaches to zero. Then calculating the edge points of iris boundaries (left, right, upper and lower) point by taking the fixed value from pupil circumference. The novelty here for eyelids localization can be performed by using ‘3 points marking’ for upper lid and ‘edge detector’ for lower lid. After that, eyelash removal can be done by Order — Statistic Filtering. Finally, the accurate iris edge region is fitted by calculating the point of intersection between eyelids and eye localization. After edge fitting, the curvelet transform is applied for feature extraction. The Manhattan and Euclidean Distance measures are used to measure the similarity between two images to find the best match. Here, the challenging benchmark database MMU is used for identification and verification.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116909412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A dynamic service integration framework for modern service industry 现代服务业动态服务集成框架
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165214
Thirumaran M S Dhavachelvan, G Aranganayagi, M Karthikeyan, Pondicherry Pondicherry
Service Integration has become a critical issue as organizations find a greater need to consistently interact with their partners and share their Business logics to carry out the necessities. To accurately and efficiently extract and integrate the required service logics from the rapidly expanding Business services, developers need to empathize the whole service and must decide on proper approach to merge them which are complex and time-consuming tasks. So the present focus is to have a mechanized system which analyzes the Business logics and conveys proper mode to integrate them. There is no standard model to undertake these issues and one such a model proposed in this paper examines the Business logics individually and suggests proper structure to integrate them. One of the innovative concepts of proposed model is Property Evaluation System which scrutinizes the service logics and ascertains proper mode to integrate the service. The system constructs FSM for each Business logic and consumes this FSM to identify dependency between the logic and suggests the feasible ways to integrate the service logics. This helps developers to integrate the service logics with least effort.
服务集成已经成为一个关键问题,因为组织发现更需要与他们的合作伙伴进行一致的交互,并共享他们的业务逻辑来执行必要的操作。为了准确有效地从快速扩展的业务服务中提取和集成所需的服务逻辑,开发人员需要关注整个服务,并且必须决定适当的方法来合并复杂且耗时的任务。因此,目前的重点是建立一个自动化的系统来分析业务逻辑,并传达合适的集成模式。没有标准模型来处理这些问题,本文中提出的一个这样的模型可以单独检查业务逻辑,并建议适当的结构来集成它们。该模型的创新理念之一是“物业评估系统”,它对服务逻辑进行了细致的审查,并确定了合适的服务整合模式。系统为每个业务逻辑构造FSM,并使用该FSM来识别逻辑之间的依赖关系,并建议可行的方法来集成业务逻辑。这有助于开发人员以最少的工作量集成服务逻辑。
{"title":"A dynamic service integration framework for modern service industry","authors":"Thirumaran M S Dhavachelvan, G Aranganayagi, M Karthikeyan, Pondicherry Pondicherry","doi":"10.1109/ICOAC.2011.6165214","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165214","url":null,"abstract":"Service Integration has become a critical issue as organizations find a greater need to consistently interact with their partners and share their Business logics to carry out the necessities. To accurately and efficiently extract and integrate the required service logics from the rapidly expanding Business services, developers need to empathize the whole service and must decide on proper approach to merge them which are complex and time-consuming tasks. So the present focus is to have a mechanized system which analyzes the Business logics and conveys proper mode to integrate them. There is no standard model to undertake these issues and one such a model proposed in this paper examines the Business logics individually and suggests proper structure to integrate them. One of the innovative concepts of proposed model is Property Evaluation System which scrutinizes the service logics and ascertains proper mode to integrate the service. The system constructs FSM for each Business logic and consumes this FSM to identify dependency between the logic and suggests the feasible ways to integrate the service logics. This helps developers to integrate the service logics with least effort.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125340138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trust model: Providing witness anonymity in P2P network 信任模型:在P2P网络中提供证人匿名
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165156
B. Elangovan, Bharath
In this paper a Peer to peer network is considered where all the peers have equal responsibilities. In a peer to peer network, trust issues have gained focus as a result of the decentralized nature of P2P systems where autonomous peers interact with each other. Reputation systems provide a way for building trust through feedback about past experiences of peers to help making recommendation and judgment on quality and reliability of the transactions. The peer can rate the reliability of those peers with which it has dealt in the past. Existing reputation mechanisms detects malicious peer by simple trust metric like calculating number of positive feedback divided by sum of positive feedback and negative feedback. The proposed system is to design a trust model with intensified malicious node detection in peer-to-peer network in which, I-SDT (Intensified Secure Deep Throat) protocol is used to provide witness anonymity of malicious behaviour with intensified malicious node detection procedure. The detection method proposed is improved — Eigen Trust algorithm based on Fuzzy synthetic evaluation model.
本文考虑了一个对等网络,其中所有的对等节点都具有相同的责任。在点对点网络中,信任问题由于P2P系统的分散性而受到关注,在P2P系统中,自主的对等体彼此交互。声誉系统提供了一种建立信任的方式,通过对同行过去经验的反馈来帮助对交易的质量和可靠性进行推荐和判断。对等体可以对它过去处理过的对等体的可靠性进行评估。现有的信誉机制通过计算正反馈数除以正反馈和负反馈之和的简单信任度量来检测恶意对等体。该系统设计了一种在点对点网络中增强恶意节点检测的信任模型,该模型采用I-SDT (enhanced Secure Deep Throat,强化安全深喉)协议,通过增强的恶意节点检测过程为恶意行为证人提供匿名性。提出了一种改进的基于模糊综合评价模型的特征信任算法。
{"title":"Trust model: Providing witness anonymity in P2P network","authors":"B. Elangovan, Bharath","doi":"10.1109/ICOAC.2011.6165156","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165156","url":null,"abstract":"In this paper a Peer to peer network is considered where all the peers have equal responsibilities. In a peer to peer network, trust issues have gained focus as a result of the decentralized nature of P2P systems where autonomous peers interact with each other. Reputation systems provide a way for building trust through feedback about past experiences of peers to help making recommendation and judgment on quality and reliability of the transactions. The peer can rate the reliability of those peers with which it has dealt in the past. Existing reputation mechanisms detects malicious peer by simple trust metric like calculating number of positive feedback divided by sum of positive feedback and negative feedback. The proposed system is to design a trust model with intensified malicious node detection in peer-to-peer network in which, I-SDT (Intensified Secure Deep Throat) protocol is used to provide witness anonymity of malicious behaviour with intensified malicious node detection procedure. The detection method proposed is improved — Eigen Trust algorithm based on Fuzzy synthetic evaluation model.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128293823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Writer identification for offline Tamil handwriting based on gray-level co-occurrence matrices 基于灰度共现矩阵的离线泰米尔笔迹写作者识别
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165173
Dr.S. K. Jayanthi, D. Rajalakshmi
Writer identification is a popular research field in many languages. Since alphabets of different language have different pattern, the methods are dependent on the language. Handwriting of a person has some features which are unique to every person and can be used for identification. Most of the research activities for writer identification are based on English documents and the research activities for Tamil handwriting are thin and databases are not available. In this paper, a method is proposed to identify a writer from the scanned images of Tamil handwritten text. Our approach is based on texture analysis where each writer's handwriting is treated as a different texture. The method is text independent and based on the features extracted from gray level co-occurrence matrix of the scanned image. Handwriting samples from 70 writers were used and the documents were scanned with 150 dpi.
作者识别是许多语言研究的热点。由于不同语言的字母具有不同的模式,因此方法依赖于语言。一个人的笔迹有一些特征,这些特征对每个人来说都是独一无二的,可以用来识别。作者鉴定的研究活动大多以英文文献为基础,泰米尔语笔迹的研究活动很少,也没有数据库。本文提出了一种从泰米尔语手写文本扫描图像中识别作者的方法。我们的方法是基于纹理分析,其中每个作者的笔迹被视为不同的纹理。该方法与文本无关,基于从扫描图像的灰度共生矩阵中提取的特征。使用了70位作家的笔迹样本,并以150 dpi扫描了文档。
{"title":"Writer identification for offline Tamil handwriting based on gray-level co-occurrence matrices","authors":"Dr.S. K. Jayanthi, D. Rajalakshmi","doi":"10.1109/ICOAC.2011.6165173","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165173","url":null,"abstract":"Writer identification is a popular research field in many languages. Since alphabets of different language have different pattern, the methods are dependent on the language. Handwriting of a person has some features which are unique to every person and can be used for identification. Most of the research activities for writer identification are based on English documents and the research activities for Tamil handwriting are thin and databases are not available. In this paper, a method is proposed to identify a writer from the scanned images of Tamil handwritten text. Our approach is based on texture analysis where each writer's handwriting is treated as a different texture. The method is text independent and based on the features extracted from gray level co-occurrence matrix of the scanned image. Handwriting samples from 70 writers were used and the documents were scanned with 150 dpi.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"384 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132977805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Plenary speaker I: Networking and protocol layering — Legacy or clean slate 全体发言嘉宾1:网络和协议分层——遗留问题还是重新开始
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165231
N. Shenoy, M. Srivatsa, K. Sivalingam, R. Chandramouli, C. Chellappan, S. Naik, Shoolapani Biju, A. Kannan, T. Geetha, K. Sunder, V. Vaidehi, M. Govindarasu
Over the last couple of decades, the trends in network protocols and the layering principles have witnessed deviations from the standard 7-layer OSI model or the 5-layer TCP/IP model. These deviations were necessary to improve network performance, in terms of service quality offered to the increasing numbers in users and their demands and coping with emerging software and hardware technologies among others. In the wireless networking arena, cross layered techniques are being increasingly employed to overcome limitations and constraints imposed by the layering principles. These efforts are indicators that it is time for researchers to investigate the rationale to adhere to the legacy layering principles. This talk is directed towards some of the recent networking demands that would be better addressed by a clean slate approach both from an architectural and protocols perspective. The talk targets the current Internet as an example of wired networks and mobile ad hoc networks as an example of wireless networks, to show how one can transition out of the layering principles and hence the constraints imposed by them.
在过去的几十年里,网络协议和分层原则的趋势已经见证了标准的7层OSI模型或5层TCP/IP模型的偏离。这些偏差对于改善网络性能是必要的,就向越来越多的用户及其需求提供的服务质量以及应对新兴的软件和硬件技术等而言。在无线网络领域,越来越多地采用跨层技术来克服分层原则所施加的限制和约束。这些努力表明,研究人员是时候调查坚持遗留分层原则的基本原理了。这次演讲是针对最近的一些网络需求,从架构和协议的角度来看,通过一种全新的方法可以更好地解决这些需求。该演讲以当前的互联网为例,以有线网络为例,以移动自组织网络为例,以无线网络为例,展示如何从分层原则中过渡,从而摆脱它们所施加的限制。
{"title":"Plenary speaker I: Networking and protocol layering — Legacy or clean slate","authors":"N. Shenoy, M. Srivatsa, K. Sivalingam, R. Chandramouli, C. Chellappan, S. Naik, Shoolapani Biju, A. Kannan, T. Geetha, K. Sunder, V. Vaidehi, M. Govindarasu","doi":"10.1109/ICOAC.2011.6165231","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165231","url":null,"abstract":"Over the last couple of decades, the trends in network protocols and the layering principles have witnessed deviations from the standard 7-layer OSI model or the 5-layer TCP/IP model. These deviations were necessary to improve network performance, in terms of service quality offered to the increasing numbers in users and their demands and coping with emerging software and hardware technologies among others. In the wireless networking arena, cross layered techniques are being increasingly employed to overcome limitations and constraints imposed by the layering principles. These efforts are indicators that it is time for researchers to investigate the rationale to adhere to the legacy layering principles. This talk is directed towards some of the recent networking demands that would be better addressed by a clean slate approach both from an architectural and protocols perspective. The talk targets the current Internet as an example of wired networks and mobile ad hoc networks as an example of wireless networks, to show how one can transition out of the layering principles and hence the constraints imposed by them.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134137838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RMAC — A new encryption scheme for Arithmetic Coding to evade CCA attacks RMAC——一种新的算术编码躲避CCA攻击的加密方案
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165170
V Kavitha, Professor, S. Balaji, R. Jeeva, P. Scholar
The random bit generated by pseudorandom bit generator used in Randomized Arithmetic Coding (RAC) doesn't depend on any parameter, so it raises the difficulty in decryption side to reconstruct that random bit and the process to match the exact pattern will take multistep till it reaches exact value. In our system Randomized Matrix Arithmetic Coding (RMAC), the security depends on a randomized matrix formed by the random key based on the user profile. So the adversary can't guess the cipher or key because we are encrypting plaintext with the symbols in the matrix, not only by the key and at the same time using that key it is easy to recreate the matrix at the decryption side. It will increase the security of Arithmetic Coding by preventing from the attacks like Chosen Cipher text Attack type-2 (CCA2) attack, third party attack etc and at the same time it reduces the computational time to match the cipher with original pattern.
随机算术编码(RAC)中使用的伪随机比特发生器产生的随机比特不依赖于任何参数,这给解密端重构该随机比特带来了困难,匹配精确模式的过程需要多步才能达到精确值。在随机矩阵算术编码(RMAC)系统中,安全性依赖于基于用户配置文件的随机密钥形成的随机矩阵。所以对手无法猜出密码或密钥,因为我们是用矩阵中的符号加密明文,不仅是通过密钥,同时使用该密钥很容易在解密端重新创建矩阵。它通过防止选择密文攻击类型-2 (CCA2)攻击、第三方攻击等攻击,提高了算术编码的安全性,同时减少了密码与原始模式匹配的计算时间。
{"title":"RMAC — A new encryption scheme for Arithmetic Coding to evade CCA attacks","authors":"V Kavitha, Professor, S. Balaji, R. Jeeva, P. Scholar","doi":"10.1109/ICOAC.2011.6165170","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165170","url":null,"abstract":"The random bit generated by pseudorandom bit generator used in Randomized Arithmetic Coding (RAC) doesn't depend on any parameter, so it raises the difficulty in decryption side to reconstruct that random bit and the process to match the exact pattern will take multistep till it reaches exact value. In our system Randomized Matrix Arithmetic Coding (RMAC), the security depends on a randomized matrix formed by the random key based on the user profile. So the adversary can't guess the cipher or key because we are encrypting plaintext with the symbols in the matrix, not only by the key and at the same time using that key it is easy to recreate the matrix at the decryption side. It will increase the security of Arithmetic Coding by preventing from the attacks like Chosen Cipher text Attack type-2 (CCA2) attack, third party attack etc and at the same time it reduces the computational time to match the cipher with original pattern.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"106 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131980152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Sharon: Tension free mobile incorporated with health care system using Christina heart card 沙伦:使用克里斯蒂娜心脏卡的无张力移动设备与医疗保健系统相结合
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165217
T. S. Kumar, R. Ganesan
In this work we have proposed a new mobile based health application on pervasive computing to cater the well being of heart and we designing a new bio-related mobile which is incorporated with stethoscope. We call it as “Mobile Steth” with automatic application for suggesting the food and heart related alerts. Mobile Steth will record the user feeding food related datum; with this user datum critical label will be checked. If the subject (patient) reaches the critical label, mobile steth will initiates an alarm to their family members and if the subject needs, it will fix appointm ent in the nearest hospital zone.
在这项工作中,我们提出了一个新的基于普适计算的移动健康应用程序,以满足心脏的健康,我们设计了一个新的生物相关手机,它与听诊器相结合。我们称它为“移动Steth”,自动应用程序建议食物和心脏相关警报。移动Steth将记录用户喂食食物的相关数据;使用此用户数据,将检查临界标签。如果受试者(患者)达到临界标签,移动传感器将向其家庭成员发出警报,如果受试者需要,它将在最近的医院区域安排预约。
{"title":"Sharon: Tension free mobile incorporated with health care system using Christina heart card","authors":"T. S. Kumar, R. Ganesan","doi":"10.1109/ICOAC.2011.6165217","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165217","url":null,"abstract":"In this work we have proposed a new mobile based health application on pervasive computing to cater the well being of heart and we designing a new bio-related mobile which is incorporated with stethoscope. We call it as “Mobile Steth” with automatic application for suggesting the food and heart related alerts. Mobile Steth will record the user feeding food related datum; with this user datum critical label will be checked. If the subject (patient) reaches the critical label, mobile steth will initiates an alarm to their family members and if the subject needs, it will fix appointm ent in the nearest hospital zone.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132197578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2011 Third International Conference on Advanced Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1