首页 > 最新文献

2011 Third International Conference on Advanced Computing最新文献

英文 中文
Topology Control based on Demand MAC protocol for Wireless Sensor Networks 基于按需MAC协议的无线传感器网络拓扑控制
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165183
V. Nithya, B. Ramachandran
In recent years, Wireless Sensor Networks (WSNs) have been applied in myriad of applications. As the sensor nodes are battery operated, the critical issue is to design WSNs with long life-time to fulfill their application requirements. Many energy conservation schemes have been proposed so far to increase the life-time of WSNs. In this paper, we explored the interactions between energy conservation protocols and introduced a novel hybrid protocol called Topology Control based On Demand MAC (TCODM) Algorithm that combines the benefits of Topology Control and Sleep Wake up schemes. It was found that by simultaneously applying multiple energy conservation schemes the average energy conservation increased by 68–82 % when compared to energy conservation protocols that are operated independently.
近年来,无线传感器网络(WSNs)得到了广泛的应用。由于传感器节点是电池供电的,因此设计具有长寿命的无线传感器网络以满足其应用需求是关键问题。为了提高无线传感器网络的使用寿命,目前已经提出了许多节能方案。在本文中,我们探讨了节能协议之间的相互作用,并引入了一种新的混合协议,称为基于按需MAC (TCODM)算法的拓扑控制,它结合了拓扑控制和睡眠唤醒方案的优点。研究发现,与单独运行的节能方案相比,同时应用多种节能方案的平均节能效果提高了68 - 82%。
{"title":"Topology Control based on Demand MAC protocol for Wireless Sensor Networks","authors":"V. Nithya, B. Ramachandran","doi":"10.1109/ICOAC.2011.6165183","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165183","url":null,"abstract":"In recent years, Wireless Sensor Networks (WSNs) have been applied in myriad of applications. As the sensor nodes are battery operated, the critical issue is to design WSNs with long life-time to fulfill their application requirements. Many energy conservation schemes have been proposed so far to increase the life-time of WSNs. In this paper, we explored the interactions between energy conservation protocols and introduced a novel hybrid protocol called Topology Control based On Demand MAC (TCODM) Algorithm that combines the benefits of Topology Control and Sleep Wake up schemes. It was found that by simultaneously applying multiple energy conservation schemes the average energy conservation increased by 68–82 % when compared to energy conservation protocols that are operated independently.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122915351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey on Short text analysis in Web 基于Web的短文本分析研究综述
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165203
P. C. Rafeeque, S. Sendhilkumar
With the recent explosive growth of Short text in the Internet and blog-sphere, Short text classification and analysis has been identified as a booming research topic in recent times. Short text classification is a challenge due to its sparse nature, noise words, syntactical structure and colloquial terminologies used. It is usually difficult for traditional similarity measures to detect intrinsic relationship among Short text snippets as they contain very limited common words. Although there are several reviews done on Text classification in general, there are no systematic reviews on Short text classification and analysis. This survey discusses the existing works on Short text analysis and the related issues and challenges. The effectiveness of these algorithms have been analysed by using standard analytical measures.
随着互联网和博客领域中短文本的爆炸式增长,短文本分类与分析已被确定为近年来蓬勃发展的研究课题。摘要短文本分类由于其稀疏性、噪声词、句法结构和口语化术语的使用而成为一个难题。由于短文本中包含的常用词非常有限,传统的相似度度量方法很难检测出短文本片段之间的内在关系。虽然对文本分类已有一些综述,但对短文本分类和分析还没有系统的综述。本文对现有的短文本分析工作以及相关的问题和挑战进行了综述。用标准的分析方法对这些算法的有效性进行了分析。
{"title":"A survey on Short text analysis in Web","authors":"P. C. Rafeeque, S. Sendhilkumar","doi":"10.1109/ICOAC.2011.6165203","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165203","url":null,"abstract":"With the recent explosive growth of Short text in the Internet and blog-sphere, Short text classification and analysis has been identified as a booming research topic in recent times. Short text classification is a challenge due to its sparse nature, noise words, syntactical structure and colloquial terminologies used. It is usually difficult for traditional similarity measures to detect intrinsic relationship among Short text snippets as they contain very limited common words. Although there are several reviews done on Text classification in general, there are no systematic reviews on Short text classification and analysis. This survey discusses the existing works on Short text analysis and the related issues and challenges. The effectiveness of these algorithms have been analysed by using standard analytical measures.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134125969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A comparative study on existing methodologies to predict dominating patterns amongst biological sequences 现有生物序列支配模式预测方法的比较研究
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165177
G. Lakshmi Priya, S. Hariharan
Data Mining is the process of extracting or mining the patterns from very large amount of biological datasets. Utilization of Data mining algorithms can reveal biological relevant associations between different genes and gene expression. In Data Mining, several techniques are available for predicting frequent patterns. One among the technique is association rule mining algorithm; which can be applied for solving the crucial problems faced in the field of biological science. From the literature, various algorithms have been employed in generating frequent patterns for distinct application. These algorithms have some limitations in predicting frequent patterns, such as space, time complexity and accuracy. In order to overcome these drawbacks, the study is made on existing algorithms for generating frequent patterns from the biological sequences. The literature survey gives a significant number of methods were generated for predicting associative patterns. The proposed system has to be developed for solving problems in biological science. Biological sequence may be a collection of DNA sequence, Gene expression sequence or Protein sequence for a specific viral disease. Amino acids are the building blocks of proteins. Proteins are organic compounds made up of amino acids arranged in a linear chain and folded into a globular form. The future proposal not only leads in predicting the frequent patterns; it will also satisfy some factors such as: time complexity, space and predict accurate solution to the required problem. With the help of these three factors into consideration and efficient algorithm can be identified for predicting the dominating amino acids for any kind of specific biological implication.
数据挖掘是从大量的生物数据集中提取或挖掘模式的过程。利用数据挖掘算法可以揭示不同基因和基因表达之间的生物学相关性。在数据挖掘中,有几种技术可用于预测频繁模式。其中一种技术是关联规则挖掘算法;可以应用于解决生物科学领域面临的关键问题。从文献中,各种算法已被用于为不同的应用生成频繁模式。这些算法在预测频繁模式方面存在一定的局限性,如空间、时间复杂度和准确性。为了克服这些缺点,对现有的生物序列频繁模式生成算法进行了研究。文献综述给出了预测联想模式的大量方法。所提出的系统必须用于解决生物科学中的问题。生物序列可以是特定病毒疾病的DNA序列、基因表达序列或蛋白质序列的集合。氨基酸是蛋白质的基本成分。蛋白质是由排列成线性链并折叠成球形的氨基酸组成的有机化合物。未来的建议不仅可以预测频繁的模式;它还能满足时间复杂度、空间复杂度等因素,预测所需问题的准确解。考虑到这三个因素,可以确定有效的算法来预测任何一种特定生物学意义的主导氨基酸。
{"title":"A comparative study on existing methodologies to predict dominating patterns amongst biological sequences","authors":"G. Lakshmi Priya, S. Hariharan","doi":"10.1109/ICOAC.2011.6165177","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165177","url":null,"abstract":"Data Mining is the process of extracting or mining the patterns from very large amount of biological datasets. Utilization of Data mining algorithms can reveal biological relevant associations between different genes and gene expression. In Data Mining, several techniques are available for predicting frequent patterns. One among the technique is association rule mining algorithm; which can be applied for solving the crucial problems faced in the field of biological science. From the literature, various algorithms have been employed in generating frequent patterns for distinct application. These algorithms have some limitations in predicting frequent patterns, such as space, time complexity and accuracy. In order to overcome these drawbacks, the study is made on existing algorithms for generating frequent patterns from the biological sequences. The literature survey gives a significant number of methods were generated for predicting associative patterns. The proposed system has to be developed for solving problems in biological science. Biological sequence may be a collection of DNA sequence, Gene expression sequence or Protein sequence for a specific viral disease. Amino acids are the building blocks of proteins. Proteins are organic compounds made up of amino acids arranged in a linear chain and folded into a globular form. The future proposal not only leads in predicting the frequent patterns; it will also satisfy some factors such as: time complexity, space and predict accurate solution to the required problem. With the help of these three factors into consideration and efficient algorithm can be identified for predicting the dominating amino acids for any kind of specific biological implication.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"53 41","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132389002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Weight based clustered key management scheme using RSA for wireless mobile Ad hoc networks 无线移动自组网中基于RSA的权值聚类密钥管理方案
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165202
K. Gomathi, Meera Gandhi
Key management is vital part of security; this issue is even bigger in wireless network compared to wired network. The distribution of keys in an authenticated manner is a difficult task in WMANET and when a node leaves or joins it need to generate new session key to maintain forward and backward secrecy. This paper reviewed technological solutions for managing keys by divide the network into clusters. A clustering architecture increases network lifetime and fault tolerance, and results in more efficient use of network resources. Cluster head will maintain the group key; it will also update the group key whenever there is a change in the membership. And the CH is responsible for inter-cluster and intra-cluster communication. A Secondary Cluster Head (SCH) is also elected to avoid the CH from becoming a bottleneck, and also it acts a monitoring node for cluster head lifetime. The combination of Weight based Clustering and RSA algorithm has been proposed for secure multicast key distribution in which source node uses Ad hoc On-Demand Distance Vector (AODV) routing protocol to reach its destination. The weight based clustering approach is based on combined weight metric that takes into account of several system parameters like the degree difference, transmission range, battery power and mobility of the node. The performance of the system is evaluated based on the few metrics like Packet Delivery Ratio (PDR), and end to end delay. As demonstrated, our algorithm reduces frequent head election phenomena by having SCH, thus improving overall performance and reducing energy utilization.
密钥管理是安全的重要组成部分;这个问题在无线网络中比在有线网络中更严重。在WMANET中,以身份验证的方式分发密钥是一项困难的任务,当节点离开或加入时,需要生成新的会话密钥以保持向前和向后保密。本文综述了将网络划分为集群来管理密钥的技术方案。集群体系结构增加了网络生存期和容错能力,并导致更有效地使用网络资源。集群头将维护组键;它还将在成员关系发生更改时更新组密钥。CH负责集群间和集群内的通信。为了避免CH成为瓶颈,还选择了一个辅助簇头(Secondary Cluster Head, SCH),它还充当簇头生命周期的监视节点。针对源节点采用自组织按需距离矢量(AODV)路由协议到达目的地的多播密钥安全分发问题,提出了基于权重聚类和RSA算法的组合。基于权重的聚类方法是基于综合权重度量的方法,该方法考虑了多个系统参数,如度差、传输范围、电池电量和节点的移动性。系统的性能是根据几个指标来评估的,比如包投递率(PDR)和端到端延迟。如所示,我们的算法通过SCH减少了频繁的头部选举现象,从而提高了整体性能并降低了能源利用率。
{"title":"Weight based clustered key management scheme using RSA for wireless mobile Ad hoc networks","authors":"K. Gomathi, Meera Gandhi","doi":"10.1109/ICOAC.2011.6165202","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165202","url":null,"abstract":"Key management is vital part of security; this issue is even bigger in wireless network compared to wired network. The distribution of keys in an authenticated manner is a difficult task in WMANET and when a node leaves or joins it need to generate new session key to maintain forward and backward secrecy. This paper reviewed technological solutions for managing keys by divide the network into clusters. A clustering architecture increases network lifetime and fault tolerance, and results in more efficient use of network resources. Cluster head will maintain the group key; it will also update the group key whenever there is a change in the membership. And the CH is responsible for inter-cluster and intra-cluster communication. A Secondary Cluster Head (SCH) is also elected to avoid the CH from becoming a bottleneck, and also it acts a monitoring node for cluster head lifetime. The combination of Weight based Clustering and RSA algorithm has been proposed for secure multicast key distribution in which source node uses Ad hoc On-Demand Distance Vector (AODV) routing protocol to reach its destination. The weight based clustering approach is based on combined weight metric that takes into account of several system parameters like the degree difference, transmission range, battery power and mobility of the node. The performance of the system is evaluated based on the few metrics like Packet Delivery Ratio (PDR), and end to end delay. As demonstrated, our algorithm reduces frequent head election phenomena by having SCH, thus improving overall performance and reducing energy utilization.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130888634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cloud technologies for the government 政府的云技术
Pub Date : 2011-12-01 DOI: 10.1109/ICoAC.2011.6165211
K. Sunder
Of the many cultural attributes associated with a government — such as diplomacy, empathy, or tact — the one that is often questioned is the attribute of execution. Questions are raised and frustrations are voiced, all demanding to know information about the forthcoming policies, enabling projects, infrastructure projects as an example, and/or sometimes the status of a demanded service. Cloud technologies can play a vital role (read means) in making this information available through its fundamental capacities. This paper elaborates Ramco's experiences in working on large government projects where knowing the nature of an asset, government initiatives, etc and using this knowledge to exploit cloud technologies, has proved effective for the Government and its community.
在与政府相关的许多文化属性中——比如外交、同理心或机智——最常受到质疑的是执行力。人们提出了问题,表达了不满,所有人都要求了解即将出台的政策、启用项目、基础设施项目等信息,有时还要求了解所需服务的状态。云技术在通过其基本能力提供这些信息方面可以发挥至关重要的作用。本文阐述了Ramco在大型政府项目中的工作经验,在这些项目中,了解资产的性质、政府举措等,并利用这些知识来开发云技术,已被证明对政府及其社区有效。
{"title":"Cloud technologies for the government","authors":"K. Sunder","doi":"10.1109/ICoAC.2011.6165211","DOIUrl":"https://doi.org/10.1109/ICoAC.2011.6165211","url":null,"abstract":"Of the many cultural attributes associated with a government — such as diplomacy, empathy, or tact — the one that is often questioned is the attribute of execution. Questions are raised and frustrations are voiced, all demanding to know information about the forthcoming policies, enabling projects, infrastructure projects as an example, and/or sometimes the status of a demanded service. Cloud technologies can play a vital role (read means) in making this information available through its fundamental capacities. This paper elaborates Ramco's experiences in working on large government projects where knowing the nature of an asset, government initiatives, etc and using this knowledge to exploit cloud technologies, has proved effective for the Government and its community.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134646911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of knowledge management on offshore software development: An exploratory study 知识管理对离岸软件开发的影响:探索性研究
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165160
N. V. Abilash Prabhu, R. Latha, K. Sankaran, G. Kannabiran
In recent times, customers have shifted their focus to offshoring vendors' ability to provide high quality software, in addition to the cost advantages. The present research highlights how knowledge management (KM) impacts through different factors on software quality in offshore development projects executed by vendors. A survey of 70 project managers engaged in offshoring at a mid size Indian Software Company was carried out and the collected data were analyzed using SPSS package. Out of seven factors considered for KM, Technical Knowledge (TK), Domain Knowledge (DK), Knowledge Sharing (KS), Organization Practices (OP), Knowledge Transfer Integration (KTI), and Leadership Coordination Practices (LCP) are associated with functionality, reliability, maintainability and usability attributes of Software Quality. However, it is found that Country Specific Requirement (CSR) is not associated with functionality, reliability and maintainability but associated with usability. Similarly, Technical Knowledge (TK) is not associated with functionality of the software.
最近,除了成本优势之外,客户已经将他们的焦点转移到离岸供应商提供高质量软件的能力上。本文着重研究了知识管理如何通过不同的因素对供应商执行的离岸开发项目的软件质量产生影响。对印度一家中型软件公司70名从事离岸外包的项目经理进行了调查,并使用SPSS软件包对收集到的数据进行了分析。在考虑知识管理的七个因素中,技术知识(TK)、领域知识(DK)、知识共享(KS)、组织实践(OP)、知识转移集成(KTI)和领导协调实践(LCP)与软件质量的功能、可靠性、可维护性和可用性属性相关。然而,国家特定需求(CSR)与功能、可靠性和可维护性无关,而与可用性相关。类似地,技术知识(TK)与软件的功能无关。
{"title":"Impact of knowledge management on offshore software development: An exploratory study","authors":"N. V. Abilash Prabhu, R. Latha, K. Sankaran, G. Kannabiran","doi":"10.1109/ICOAC.2011.6165160","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165160","url":null,"abstract":"In recent times, customers have shifted their focus to offshoring vendors' ability to provide high quality software, in addition to the cost advantages. The present research highlights how knowledge management (KM) impacts through different factors on software quality in offshore development projects executed by vendors. A survey of 70 project managers engaged in offshoring at a mid size Indian Software Company was carried out and the collected data were analyzed using SPSS package. Out of seven factors considered for KM, Technical Knowledge (TK), Domain Knowledge (DK), Knowledge Sharing (KS), Organization Practices (OP), Knowledge Transfer Integration (KTI), and Leadership Coordination Practices (LCP) are associated with functionality, reliability, maintainability and usability attributes of Software Quality. However, it is found that Country Specific Requirement (CSR) is not associated with functionality, reliability and maintainability but associated with usability. Similarly, Technical Knowledge (TK) is not associated with functionality of the software.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128767238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Roadway for sustainable disposal of scrap computers in India 印度可持续处理废旧电脑的道路
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165168
S. Victor, S. S. Kumar
The term E-Waste or electronic waste refers to the end of life remnants of electronics goods whenever they cease to be of no material value to the original user. The main ingredient of e-waste or electronic waste or e-scrap are computers. E-Waste management is given the top priority in many developed/developing countries. The Indian government has also given the much needed impetus to the e-waste policy by way of drafting and implementing a bill (which is expected to be implemented w.e.f 01 Jan 2013) on the management, disposal and trans boundary movement of e-waste. This paper presents a review and assessment of the disposal system of scrap computers in India and has compared with the practices in Switzerland.
术语电子废物或电子废物是指电子产品的生命结束时,他们不再是没有物质价值的原始用户。电子垃圾或电子垃圾或电子废料的主要成分是计算机。在许多发达国家/发展中国家,电子废物管理是最优先考虑的问题。印度政府也通过起草和实施一项法案(预计将于2013年1月1日起实施),就电子废物的管理,处置和跨界移动,为电子废物政策提供了急需的动力。本文对印度废旧计算机处理制度进行了回顾和评价,并与瑞士的做法进行了比较。
{"title":"Roadway for sustainable disposal of scrap computers in India","authors":"S. Victor, S. S. Kumar","doi":"10.1109/ICOAC.2011.6165168","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165168","url":null,"abstract":"The term E-Waste or electronic waste refers to the end of life remnants of electronics goods whenever they cease to be of no material value to the original user. The main ingredient of e-waste or electronic waste or e-scrap are computers. E-Waste management is given the top priority in many developed/developing countries. The Indian government has also given the much needed impetus to the e-waste policy by way of drafting and implementing a bill (which is expected to be implemented w.e.f 01 Jan 2013) on the management, disposal and trans boundary movement of e-waste. This paper presents a review and assessment of the disposal system of scrap computers in India and has compared with the practices in Switzerland.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133678673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of Feature Extraction and clustering in mammogram classification using Support Vector Machine 特征提取与聚类在支持向量机乳腺影像分类中的应用
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165150
R. Aarthi, K. Divya, N. Komala, S. Kavitha
Medicine is one of the major fields where the application of artificial intelligence primarily deals with construction of programs that perform diagnosis and make therapy recommendations. In digital mammography, data mining techniques are used to detect and characterize abnormalities in images and clinical reports. In the existing approaches, the mammogram image classification is done in either clinical data or statistical features of an image using neural networks and Support Vector Machine (SVM) classifier. This paper is proposed to evaluate the Application of Feature Extraction by means of combining the clinical and image features for clustering and classification in mammogram images. Initially, mammogram dataset is divided into training and test set. For the training and test sets, preprocessing techniques like noise removal and background removal are done to the images and Region of Interest (ROI) is identified. The statistical features are extracted from the ROI and the clinical data are obtained from the dataset. The feature set is clustered using k-means algorithm followed by SVM classification to classify the image as benign or malignant. The accuracy obtained from the proposed approach of clustering followed by classification is 86.11% which is higher than the direct classification approach where the accuracy is 80.0%. From the above results, the superiority of the proposed approach in terms of accuracy is justified.
医学是人工智能应用的主要领域之一,其中人工智能主要用于构建执行诊断和提出治疗建议的程序。在数字乳房x线照相术中,数据挖掘技术用于检测和描述图像和临床报告中的异常。在现有的方法中,使用神经网络和支持向量机(SVM)分类器对临床数据或图像的统计特征进行乳房x光图像分类。本文提出将临床特征与影像特征相结合,评价特征提取在乳腺x线图像聚类分类中的应用。最初,乳房x光数据集分为训练集和测试集。对于训练集和测试集,对图像进行去噪、去背景等预处理,识别感兴趣区域(ROI)。从ROI中提取统计特征,并从数据集中获得临床数据。使用k-means算法对特征集进行聚类,然后使用SVM分类对图像进行良性或恶性分类。本文提出的先聚类后分类方法的准确率为86.11%,高于直接分类方法的准确率80.0%。以上结果证明了该方法在精度方面的优越性。
{"title":"Application of Feature Extraction and clustering in mammogram classification using Support Vector Machine","authors":"R. Aarthi, K. Divya, N. Komala, S. Kavitha","doi":"10.1109/ICOAC.2011.6165150","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165150","url":null,"abstract":"Medicine is one of the major fields where the application of artificial intelligence primarily deals with construction of programs that perform diagnosis and make therapy recommendations. In digital mammography, data mining techniques are used to detect and characterize abnormalities in images and clinical reports. In the existing approaches, the mammogram image classification is done in either clinical data or statistical features of an image using neural networks and Support Vector Machine (SVM) classifier. This paper is proposed to evaluate the Application of Feature Extraction by means of combining the clinical and image features for clustering and classification in mammogram images. Initially, mammogram dataset is divided into training and test set. For the training and test sets, preprocessing techniques like noise removal and background removal are done to the images and Region of Interest (ROI) is identified. The statistical features are extracted from the ROI and the clinical data are obtained from the dataset. The feature set is clustered using k-means algorithm followed by SVM classification to classify the image as benign or malignant. The accuracy obtained from the proposed approach of clustering followed by classification is 86.11% which is higher than the direct classification approach where the accuracy is 80.0%. From the above results, the superiority of the proposed approach in terms of accuracy is justified.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132229665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Threshold based dynamic source routing in mobile ad hoc networks 移动自组网中基于阈值的动态源路由
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165161
S. Sathish, S. Boopathi, K. Gavel
Mobile Adhoc NETwork (MANET) is a collection of wireless mobile nodes that can dynamically form a network. This definition implies that there is no permanent topology, centralized administration and standard support services. Due to the characteristics of MANET, the movement of node is uncertain. It may cause links to break and the low battery life in nodes may cause nodes to fail. Each node is responsible for routing information among them and hence it act as a node and router. In on demand routing protocols all nodes when they learn or use routes, store the routes to the destinations in a routing table or a cache. The threshold based cache routing is proposed based on the information system of rough set theory for better routing. It is potentially useful to study the application of Information systems in cache-based routing protocols.
移动自组网(MANET)是一组可以动态组成网络的无线移动节点的集合。该定义意味着不存在永久拓扑、集中管理和标准支持服务。由于自组网的特点,节点的运动具有不确定性。可能导致链路中断,节点电池寿命过短可能导致节点故障。每个节点负责它们之间的路由信息,因此它既是节点又是路由器。在按需路由协议中,当所有节点学习或使用路由时,将到目的地的路由存储在路由表或缓存中。为了实现更好的路由,基于粗糙集理论的信息系统提出了基于阈值的缓存路由。研究信息系统在基于缓存的路由协议中的应用具有潜在的实用价值。
{"title":"Threshold based dynamic source routing in mobile ad hoc networks","authors":"S. Sathish, S. Boopathi, K. Gavel","doi":"10.1109/ICOAC.2011.6165161","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165161","url":null,"abstract":"Mobile Adhoc NETwork (MANET) is a collection of wireless mobile nodes that can dynamically form a network. This definition implies that there is no permanent topology, centralized administration and standard support services. Due to the characteristics of MANET, the movement of node is uncertain. It may cause links to break and the low battery life in nodes may cause nodes to fail. Each node is responsible for routing information among them and hence it act as a node and router. In on demand routing protocols all nodes when they learn or use routes, store the routes to the destinations in a routing table or a cache. The threshold based cache routing is proposed based on the information system of rough set theory for better routing. It is potentially useful to study the application of Information systems in cache-based routing protocols.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131052442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hunting malicious attacks in social networks 在社交网络中搜寻恶意攻击
Pub Date : 2011-12-01 DOI: 10.1109/ICOAC.2011.6165172
D. Arulsuju
The Rapid growth of internet resulted in feature rich and dynamic web applications. This increase in features also introduced completely under estimated attack vectors. Cross site scripting attacks, SQL Injection and malicious file execution are the most dominant classes of web vulnerabilities reported by OWASP 2011. These attacks make use of vulnerabilities in the code of web applications, resulting in serious consequences, such as theft of cookies, passwords and other personal credentials. It is caused by scripts, which do not sanitize user input. Several server-side counter measures for XSS attacks do exist, but such techniques have not been universally applied, because of their deployment overhead. The existing client-side solutions degrade the performance of client's system resulting in a poor web surfing experience. We present automata-based symbolic string analyses (XHunter)for automatic verification of string manipulating programs we compute the pre and post conditions of common string functions using deterministic finite automata (DFAs). Experiment result shows that our approach finds large number of malicious attacks in web application.
internet的快速发展导致了功能丰富和动态的web应用程序。这种特性的增加也引入了完全低于估计的攻击向量。跨站脚本攻击、SQL注入和恶意文件执行是OWASP 2011报告的最主要的web漏洞类别。这些攻击利用web应用程序代码中的漏洞,导致严重后果,例如窃取cookie、密码和其他个人凭据。它是由脚本引起的,脚本没有对用户输入进行消毒。针对XSS攻击的几种服务器端对策确实存在,但由于部署开销的原因,这些技术并没有得到普遍应用。现有的客户端解决方案降低了客户端系统的性能,导致了糟糕的网页浏览体验。我们提出了基于自动机的符号字符串分析(XHunter),用于字符串操作程序的自动验证。我们使用确定性有限自动机(dfa)计算常见字符串函数的前后条件。实验结果表明,该方法能够在web应用中发现大量的恶意攻击。
{"title":"Hunting malicious attacks in social networks","authors":"D. Arulsuju","doi":"10.1109/ICOAC.2011.6165172","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165172","url":null,"abstract":"The Rapid growth of internet resulted in feature rich and dynamic web applications. This increase in features also introduced completely under estimated attack vectors. Cross site scripting attacks, SQL Injection and malicious file execution are the most dominant classes of web vulnerabilities reported by OWASP 2011. These attacks make use of vulnerabilities in the code of web applications, resulting in serious consequences, such as theft of cookies, passwords and other personal credentials. It is caused by scripts, which do not sanitize user input. Several server-side counter measures for XSS attacks do exist, but such techniques have not been universally applied, because of their deployment overhead. The existing client-side solutions degrade the performance of client's system resulting in a poor web surfing experience. We present automata-based symbolic string analyses (XHunter)for automatic verification of string manipulating programs we compute the pre and post conditions of common string functions using deterministic finite automata (DFAs). Experiment result shows that our approach finds large number of malicious attacks in web application.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122045888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2011 Third International Conference on Advanced Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1