首页 > 最新文献

2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)最新文献

英文 中文
An efficient retrieval of watermarked multiple color images using secret sharing 基于秘密共享的彩色水印图像的有效检索
Modigari Narendra, D. Ben, C. P. Jetlin, L. Anbarasi
Secret image is converted into meaningful shares using a technique called visual sharing. Information is not disclosed by any single share except for all shares. Printing the encrypted secret on transparencies and stacking them will reveal the secret. More than one secret is encrypted by the visual sharing of multiple secrets and thus encryption capacity is increased when compared to a single secret. A code book resulting in at least two times of pixel expansion is followed by visual cryptography thus creating a poor contrast level. This proposed visual secret sharing scheme share two color images on rectangular shares with no pixel expansion. The originality of secret is verified by watermark which is embedded into the secret image followed by the sharing process. The secret is reconstructed and watermarks are retrieved from the original secret to perform authenticity. The experimental results shows that the proposed scheme has tremendous reconstruction quality resulting in 50.06dB of PSNR value.
使用一种称为视觉共享的技术将秘密图像转换为有意义的共享。除所有股份外,任何股份均不披露信息。将加密的秘密打印在透明片上并堆叠它们将显示秘密。通过多个秘密的可视化共享对多个秘密进行加密,因此与单个秘密相比,加密容量增加了。导致至少两倍像素扩展的代码本随后是视觉加密,从而产生较差的对比度水平。提出的视觉秘密共享方案在不扩展像素的情况下,在矩形共享上共享两幅彩色图像。通过在秘密图像中嵌入水印,然后进行共享过程来验证秘密的原创性。对原密码进行重构,并从原密码中提取水印以保证密码的真实性。实验结果表明,该方案具有较好的重构质量,PSNR值为50.06dB。
{"title":"An efficient retrieval of watermarked multiple color images using secret sharing","authors":"Modigari Narendra, D. Ben, C. P. Jetlin, L. Anbarasi","doi":"10.1109/ICSCN.2017.8085663","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085663","url":null,"abstract":"Secret image is converted into meaningful shares using a technique called visual sharing. Information is not disclosed by any single share except for all shares. Printing the encrypted secret on transparencies and stacking them will reveal the secret. More than one secret is encrypted by the visual sharing of multiple secrets and thus encryption capacity is increased when compared to a single secret. A code book resulting in at least two times of pixel expansion is followed by visual cryptography thus creating a poor contrast level. This proposed visual secret sharing scheme share two color images on rectangular shares with no pixel expansion. The originality of secret is verified by watermark which is embedded into the secret image followed by the sharing process. The secret is reconstructed and watermarks are retrieved from the original secret to perform authenticity. The experimental results shows that the proposed scheme has tremendous reconstruction quality resulting in 50.06dB of PSNR value.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121016022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Geometric image change detection in urban environment 城市环境中的几何图像变化检测
J. Badmapriyadharisiny, K. Anusudha
A proficient technique to distinguish changes in the geometry of an urban environment is proposed in this paper. Generally, many of the change detection techniques involve a pixel to pixel comparison by using an algebraic or a transform method of change detection. This technique profoundly depends on the optimum choice of threshold value to separate the real altered pixels. Moreover all these techniques are capable of calculating only the two dimensionality change in the environment, whereas in the proposed technique a differential geometry approach is used to detect changes from images which are done by involving the geometric property of the pixels with respect to its environment. Finally the quality of image is measured using various performance parameters like PSNR and MSE.
本文提出了一种判别城市环境几何变化的熟练技术。通常,许多变更检测技术都涉及到使用变更检测的代数或变换方法进行像素到像素的比较。该技术在很大程度上依赖于阈值的最佳选择来分离真实改变的像素。此外,所有这些技术都只能计算环境中的二维变化,而在所提出的技术中,微分几何方法用于检测图像的变化,这些变化是通过涉及像素相对于其环境的几何特性来完成的。最后利用PSNR和MSE等性能参数对图像质量进行了测量。
{"title":"Geometric image change detection in urban environment","authors":"J. Badmapriyadharisiny, K. Anusudha","doi":"10.1109/ICSCN.2017.8085653","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085653","url":null,"abstract":"A proficient technique to distinguish changes in the geometry of an urban environment is proposed in this paper. Generally, many of the change detection techniques involve a pixel to pixel comparison by using an algebraic or a transform method of change detection. This technique profoundly depends on the optimum choice of threshold value to separate the real altered pixels. Moreover all these techniques are capable of calculating only the two dimensionality change in the environment, whereas in the proposed technique a differential geometry approach is used to detect changes from images which are done by involving the geometric property of the pixels with respect to its environment. Finally the quality of image is measured using various performance parameters like PSNR and MSE.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124256567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A VLSI implementation of an adaptive genetic algorithm processor 一种自适应遗传算法处理器的VLSI实现
M. Jayashree, C. Ranjith, S. Rani
A genetic algorithm (GA) is a powerful heuristic method of selection based on natural living process. Because of larger size of the scheduling, implementing GA in software was tiresome and highly time complex. GA processor parallelizes the work in order to reduce the processing time and increases the speed, but still the efficiency of the GA is maintained through quality solutions. This work proposes a fast Adaptive Genetic Algorithm Processor (AGAP) for the implementation of Adaptive Noise Cancelation (ANC) filters in VLSI. The AGAP updates the coefficients of the ANC filter nullifying the effect of noise at the output end. The coefficients are optimized at every stage of the algorithm and are adaptively changed in order to meet the constraints of active noise canceller. AGAP processor is modeled using Verilog HDL in Xilinx ISE 14.6 platform. The functional performance of each module and the processor are simulated for their correctness to be synthesized using Spartan 6 XC6SLX45-3CSG324I FPGA.
遗传算法是一种基于自然生命过程的强大的启发式选择方法。由于调度规模较大,在软件中实现遗传算法非常繁琐,且时间复杂度高。遗传算法处理器将工作并行化,以减少处理时间和提高速度,但仍然通过高质量的解来保持遗传算法的效率。本工作提出了一种快速自适应遗传算法处理器(AGAP),用于在VLSI中实现自适应噪声消除(ANC)滤波器。AGAP更新ANC滤波器的系数,消除输出端噪声的影响。在算法的每个阶段都对系数进行了优化,并自适应地改变,以满足主动降噪的约束。AGAP处理器在Xilinx ISE 14.6平台上使用Verilog HDL进行建模。利用Spartan 6 XC6SLX45-3CSG324I FPGA对各模块和处理器的功能性能进行了仿真,验证了其合成正确性。
{"title":"A VLSI implementation of an adaptive genetic algorithm processor","authors":"M. Jayashree, C. Ranjith, S. Rani","doi":"10.1109/ICSCN.2017.8085725","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085725","url":null,"abstract":"A genetic algorithm (GA) is a powerful heuristic method of selection based on natural living process. Because of larger size of the scheduling, implementing GA in software was tiresome and highly time complex. GA processor parallelizes the work in order to reduce the processing time and increases the speed, but still the efficiency of the GA is maintained through quality solutions. This work proposes a fast Adaptive Genetic Algorithm Processor (AGAP) for the implementation of Adaptive Noise Cancelation (ANC) filters in VLSI. The AGAP updates the coefficients of the ANC filter nullifying the effect of noise at the output end. The coefficients are optimized at every stage of the algorithm and are adaptively changed in order to meet the constraints of active noise canceller. AGAP processor is modeled using Verilog HDL in Xilinx ISE 14.6 platform. The functional performance of each module and the processor are simulated for their correctness to be synthesized using Spartan 6 XC6SLX45-3CSG324I FPGA.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130989293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of avalanche effect of the 3GPP integrity algorithm f9 3GPP完整性算法雪崩效应研究[j]
Siyuan Shen, Xu Han, Xingru Zhou
The avalanche effect is an important security property that any Integrity algorithm must have. With implementing integrity algorithm f9 in C++ program, we test and analyze the avalanche effect of algorithm f9 by means of giving the respectively changed MAC-I bit numbers when changing one bit of the key or message in turn. The result shows that the f9 algorithm has very good avalanche effect property.
雪崩效应是任何完整性算法都必须具备的重要安全特性。通过在c++程序中实现完整性算法f9,通过给出在依次改变密钥或消息的1位时分别改变的MAC-I位的方法,测试和分析了f9算法的雪崩效应。结果表明,f9算法具有很好的雪崩效应特性。
{"title":"Research of avalanche effect of the 3GPP integrity algorithm f9","authors":"Siyuan Shen, Xu Han, Xingru Zhou","doi":"10.1109/ICSCN.2017.8085660","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085660","url":null,"abstract":"The avalanche effect is an important security property that any Integrity algorithm must have. With implementing integrity algorithm f9 in C++ program, we test and analyze the avalanche effect of algorithm f9 by means of giving the respectively changed MAC-I bit numbers when changing one bit of the key or message in turn. The result shows that the f9 algorithm has very good avalanche effect property.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134061129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Under water image enhancement based on linear image interpolation and limited image enhancer techniques 基于线性图像插值和有限图像增强技术的水下图像增强
A. Bindhu, O. Maheswari
The obstacles for images that are taken under the water are haze, low contrast, loss of color, etc. The quality of images that are taken under the water is not clear due to the impurities present in the water and some properties of water. This paper proposes methods to improve the quality of the underwater images. The proposed work in the paper consist of two methods they are Interpolation based Enhancement and Limited Image Enhancer. The First method is based on increasing the resolution of the image and the second method is based on increasing the contrast of the images. The main aim of the paper is to enhance the image that are taken under water. The qualitative for both the algorithms compared with the previous image enhancement techniques.
在水下拍摄图像的障碍是雾霾、低对比度、色彩损失等。由于水中存在的杂质和水的某些特性,在水下拍摄的图像质量不清晰。本文提出了提高水下图像质量的方法。本文提出的工作包括两种方法:基于插值的增强和有限图像增强。第一种方法是基于增加图像的分辨率,第二种方法是基于增加图像的对比度。本文的主要目的是增强水下拍摄的图像。两种算法的定性都与以往的图像增强技术进行了比较。
{"title":"Under water image enhancement based on linear image interpolation and limited image enhancer techniques","authors":"A. Bindhu, O. Maheswari","doi":"10.1109/ICSCN.2017.8085692","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085692","url":null,"abstract":"The obstacles for images that are taken under the water are haze, low contrast, loss of color, etc. The quality of images that are taken under the water is not clear due to the impurities present in the water and some properties of water. This paper proposes methods to improve the quality of the underwater images. The proposed work in the paper consist of two methods they are Interpolation based Enhancement and Limited Image Enhancer. The First method is based on increasing the resolution of the image and the second method is based on increasing the contrast of the images. The main aim of the paper is to enhance the image that are taken under water. The qualitative for both the algorithms compared with the previous image enhancement techniques.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133098469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of an intrusion detection system based on distance feature using ensemble classifier 基于距离特征的集成分类器入侵检测系统的设计
M. Aravind, V. Kalaiselvi
This paper focuses on designing an Intrusion Detection System(IDS), which detects the family of attack in a dataset. An IDS detects various types of malicious traffic and computer usage which cannot be detected by a conventional firewall. In this proposed work, the data is extracted from UNSW_NB15 dataset. To identify the data cluster centers, the k means algorithm is used. A new and one dimensional distance based feature is used to represent each data sample. Following this, an ensemble classifier is used to classify the data. Our algorithm would classify five families of attack viz., Normal, Probe, DOS, U2R and R2L. For each and every classifier output, Training state, Performance, Error histogram, Regression Fit are plotted.
本文重点设计了一个入侵检测系统(IDS),该系统可以检测数据集中的攻击族。IDS检测各种类型的恶意流量和计算机使用情况,这是传统防火墙无法检测到的。在本文中,数据提取自UNSW_NB15数据集。为了识别数据簇中心,使用k均值算法。使用一个新的一维距离特征来表示每个数据样本。接下来,使用集成分类器对数据进行分类。我们的算法将分为五类攻击,即Normal, Probe, DOS, U2R和R2L。对于每个分类器输出,绘制训练状态,性能,误差直方图,回归拟合。
{"title":"Design of an intrusion detection system based on distance feature using ensemble classifier","authors":"M. Aravind, V. Kalaiselvi","doi":"10.1109/ICSCN.2017.8085661","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085661","url":null,"abstract":"This paper focuses on designing an Intrusion Detection System(IDS), which detects the family of attack in a dataset. An IDS detects various types of malicious traffic and computer usage which cannot be detected by a conventional firewall. In this proposed work, the data is extracted from UNSW_NB15 dataset. To identify the data cluster centers, the k means algorithm is used. A new and one dimensional distance based feature is used to represent each data sample. Following this, an ensemble classifier is used to classify the data. Our algorithm would classify five families of attack viz., Normal, Probe, DOS, U2R and R2L. For each and every classifier output, Training state, Performance, Error histogram, Regression Fit are plotted.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133182370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Efficient cache distribution using hash-routing schemes and nodal clustering for information centric network 在信息中心网络中使用散列路由和节点集群的高效缓存分配
P. Rani, S. Shalinie
Hash-routing is an ingenious technique, which is deployed in client-server environment to forward requested content to the corresponding server playing role of origin and disseminate the requested content. Our proposed approach hash based-routing is novel technique which is more suitable to ICN, in which in-network content caches cater for content as a storage that is momentary. Especially, edge-routers forward further content request to in-network caches as per to the hash placement function. Despite this, off-path cache having some notable benefits such that as cache-hit ratio with minimum cluster co-ordination overhead, the above mentioned technique suffers from some shortcomings. One of them is, in the event of dealing with greater domains, the off-path caching detour the content request and so it could intensify latency, to exorbitant magnitude. It is critical for us. To delve into domain clustering, so as to tackle bumper detour delays. In accordance with this technique, we divide huge domains into clusters, subsequently we employ hash based-routing technique in the subcategory of each cluster, we devise and appraise the characteristics of domain clustering and intimate substantial enhancement in delivering the latency. In order to this achieve enhancement we need to forfeit something in cache hit ratio.
哈希路由是一种巧妙的技术,它部署在客户机-服务器环境中,将请求的内容转发到扮演原始角色的相应服务器并传播请求的内容。我们提出的基于哈希路由的方法是一种更适合ICN的新技术,其中网络内内容缓存满足内容作为瞬时存储的需求。特别是,边缘路由器根据散列放置功能将进一步的内容请求转发到网络内缓存。尽管如此,离路缓存具有一些显著的优点,例如缓存命中率和最小的集群协调开销,但上述技术存在一些缺点。其中之一是,在处理更大域的情况下,离路缓存绕过了内容请求,因此它可能会加剧延迟,达到过高的程度。这对我们至关重要。深入研究领域聚类,以解决保险杠绕行延误问题。根据该技术,我们将巨大的域划分为集群,然后在每个集群的子类别中采用基于哈希的路由技术,我们设计和评估了域集群的特征,并在交付延迟方面进行了实质性的改进。为了实现这种增强,我们需要在缓存命中率上损失一些东西。
{"title":"Efficient cache distribution using hash-routing schemes and nodal clustering for information centric network","authors":"P. Rani, S. Shalinie","doi":"10.1109/ICSCN.2017.8085718","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085718","url":null,"abstract":"Hash-routing is an ingenious technique, which is deployed in client-server environment to forward requested content to the corresponding server playing role of origin and disseminate the requested content. Our proposed approach hash based-routing is novel technique which is more suitable to ICN, in which in-network content caches cater for content as a storage that is momentary. Especially, edge-routers forward further content request to in-network caches as per to the hash placement function. Despite this, off-path cache having some notable benefits such that as cache-hit ratio with minimum cluster co-ordination overhead, the above mentioned technique suffers from some shortcomings. One of them is, in the event of dealing with greater domains, the off-path caching detour the content request and so it could intensify latency, to exorbitant magnitude. It is critical for us. To delve into domain clustering, so as to tackle bumper detour delays. In accordance with this technique, we divide huge domains into clusters, subsequently we employ hash based-routing technique in the subcategory of each cluster, we devise and appraise the characteristics of domain clustering and intimate substantial enhancement in delivering the latency. In order to this achieve enhancement we need to forfeit something in cache hit ratio.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"470 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133247518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Segmentation and analysis of ventricles in Schizophrenic MR brain images using optimal region based energy minimization framework 基于最优区域能量最小化框架的精神分裂症MR脑图像心室分割与分析
M. Latha, G. Kavitha
Schizophrenia (SZ) is a neurological disorder, which affects linguistic, memory, consciousness and executive functions of the brain. Magnetic resonance imaging (MRI) is used to capture structural abnormalities in human brain regions. In this work, segmentation of ventricle region from Schizophrenic MR brain images was carried out using optimized energy minimization framework. The images considered in this work are obtained from Centers of Biomedical Research Excellence (COBRE) database. Initially, the original images are subjected to simultaneous bias correction and segmentation using multiplicative intrinsic component optimization. The ventricles are extracted from other internal brain structures using this method. The obtained results are validated against the ground truth images. Results show that, multiplicative intrinsic component optimization method is able to segment ventricle from normal and SZ images. The correlation of ventricle area with ground truth is high (R = 0.99). It is noticed that SZ subjects have increased ventricle area compared to that of normal subjects. The high value of rand index (0.98) along with low value of global consistency error and variation of information shows the efficiency of the proposed method. The feature area extracted from the ventricle seems to be significant; hence it may be clinically supportive in the diagnosis of Schizophrenic subjects.
精神分裂症(SZ)是一种神经系统疾病,影响大脑的语言、记忆、意识和执行功能。磁共振成像(MRI)用于捕捉人类大脑区域的结构异常。在这项工作中,使用优化的能量最小化框架从精神分裂症MR脑图像中进行脑室区域分割。在这项工作中考虑的图像是从卓越生物医学研究中心(COBRE)数据库中获得的。首先,使用乘法内禀分量优化对原始图像进行同步偏差校正和分割。用这种方法从其他大脑内部结构中提取心室。所得结果与地面真值图像进行了验证。结果表明,乘法内禀分量优化方法能够从正常和SZ图像中分割心室。脑室面积与地面真值相关性高(R = 0.99)。我们注意到,与正常受试者相比,SZ受试者的心室面积有所增加。rand指数较高(0.98),全局一致性误差和信息变异值较低,表明了该方法的有效性。从脑室提取的特征区似乎是显著的;因此,它可能在临床上支持精神分裂症受试者的诊断。
{"title":"Segmentation and analysis of ventricles in Schizophrenic MR brain images using optimal region based energy minimization framework","authors":"M. Latha, G. Kavitha","doi":"10.1109/ICSCN.2017.8085735","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085735","url":null,"abstract":"Schizophrenia (SZ) is a neurological disorder, which affects linguistic, memory, consciousness and executive functions of the brain. Magnetic resonance imaging (MRI) is used to capture structural abnormalities in human brain regions. In this work, segmentation of ventricle region from Schizophrenic MR brain images was carried out using optimized energy minimization framework. The images considered in this work are obtained from Centers of Biomedical Research Excellence (COBRE) database. Initially, the original images are subjected to simultaneous bias correction and segmentation using multiplicative intrinsic component optimization. The ventricles are extracted from other internal brain structures using this method. The obtained results are validated against the ground truth images. Results show that, multiplicative intrinsic component optimization method is able to segment ventricle from normal and SZ images. The correlation of ventricle area with ground truth is high (R = 0.99). It is noticed that SZ subjects have increased ventricle area compared to that of normal subjects. The high value of rand index (0.98) along with low value of global consistency error and variation of information shows the efficiency of the proposed method. The feature area extracted from the ventricle seems to be significant; hence it may be clinically supportive in the diagnosis of Schizophrenic subjects.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133458299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Decentralized secure framework for social collaborative Internet of Things 社会协同物联网的分散安全框架
S. Prabavathy, K. Sundarakantham, S. Shalinie
The Social-Collaborative Internet of Things (SCIoT) provides the ability for objects to autonomously establish social relationship among them based on the rules imposed by its owners'. This paper proposes a new secure framework for SCIoTto tackle the issues related to security and privacy. The proposed framework adopts a decentralized architecture to handle the problems of large-scale deployment and management of heterogeneous objects in different Internet of Things platforms. The proposed framework consists Relationship Based Dynamic Trust Management Protocol to ensure trustworthiness among objects in the dynamic environment of SCIoT.
社会-协作物联网(SCIoT)为对象提供了基于其所有者强加的规则自主建立其之间社会关系的能力。本文提出了一种新的SCIoTto安全框架,解决了与安全和隐私相关的问题。该框架采用分散式架构,解决了异构对象在不同物联网平台上的大规模部署和管理问题。该框架包括基于关系的动态信任管理协议,以确保SCIoT动态环境中对象之间的可信度。
{"title":"Decentralized secure framework for social collaborative Internet of Things","authors":"S. Prabavathy, K. Sundarakantham, S. Shalinie","doi":"10.1109/ICSCN.2017.8085714","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085714","url":null,"abstract":"The Social-Collaborative Internet of Things (SCIoT) provides the ability for objects to autonomously establish social relationship among them based on the rules imposed by its owners'. This paper proposes a new secure framework for SCIoTto tackle the issues related to security and privacy. The proposed framework adopts a decentralized architecture to handle the problems of large-scale deployment and management of heterogeneous objects in different Internet of Things platforms. The proposed framework consists Relationship Based Dynamic Trust Management Protocol to ensure trustworthiness among objects in the dynamic environment of SCIoT.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130294473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance evaluation of concatenated kernel codes 串联内核代码的性能评估
C. P. Kumar, R. Selvakumar
Concatenated codes proposed by Forney are used extensively in digital communication. In this paper, concatenated kernel codes, a class of group codes is constructed with inner code and outer code. Binary and non — binary variants of concatenated kernel code is discussed with example. Constructed concatenated kernel code is represented over trellis. Minimal trellis representation is given for the concatenated kernel code and its state complexity profile is discussed. Performance evaluation of concatenated kernel code is derived in terms of BER. It is observed that the concatenated kernel codes with random selection of groups perform better than kernel codes with random selection of homomorphisms with coding gain.
Forney提出的级联码在数字通信中得到了广泛的应用。本文通过串接内核码,构造了由内码和外码组成的一类群码。通过实例讨论了串接内核代码的二进制和非二进制变体。构造的连接内核代码在网格上表示。给出了连接内核代码的最小网格表示,并讨论了其状态复杂度特征。从误码率的角度对串接内核代码进行了性能评价。结果表明,随机选择组的串接核码比随机选择同态的编码增益的串接核码性能更好。
{"title":"Performance evaluation of concatenated kernel codes","authors":"C. P. Kumar, R. Selvakumar","doi":"10.1109/ICSCN.2017.8085667","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085667","url":null,"abstract":"Concatenated codes proposed by Forney are used extensively in digital communication. In this paper, concatenated kernel codes, a class of group codes is constructed with inner code and outer code. Binary and non — binary variants of concatenated kernel code is discussed with example. Constructed concatenated kernel code is represented over trellis. Minimal trellis representation is given for the concatenated kernel code and its state complexity profile is discussed. Performance evaluation of concatenated kernel code is derived in terms of BER. It is observed that the concatenated kernel codes with random selection of groups perform better than kernel codes with random selection of homomorphisms with coding gain.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1