首页 > 最新文献

International Journal of Computer Science & Engineering Survey最新文献

英文 中文
Single Image Improvement using Superresolution. 单图像改进使用超分辨率。
Pub Date : 2012-04-30 DOI: 10.5121/IJCSES.2012.3206
Shwetambari Shinde, Meeta Dewangan
Methods for super-resolution can be broadly classified into two families of methods: (i) The classical multi-image super-resolution (combining images obtained at subpixel misalignments), and (ii) ExampleBased super-resolution (learning correspondence between low and high resolution image patches from a database). In this paper we propose a unified framework for combining these two families of methods. We further show how this combined approach can be applied to obtain super resolution from as little as a single image (with no database or prior examples). Our approach is based on the observation that patches in a natural image tend to redundantly recur many times inside the image, both within the same scale, as well as across different scales. Recurrence of patches within the same image scale (at sub pixel misalignments) gives rise to the classical super-resolution, whereas recurrence of patches across different scales of the same image gives rise to example-based super-resolution. Our approach attempts to recover at each pixel its best possible resolution increase based on its patch redundancy within and across scales.
超分辨率的方法大致可以分为两大类:(i)经典的多图像超分辨率(结合亚像素不对齐时获得的图像)和(ii)基于示例的超分辨率(从数据库中学习低分辨率和高分辨率图像补丁之间的对应关系)。在本文中,我们提出了一个统一的框架来结合这两类方法。我们进一步展示了如何将这种组合方法应用于从单个图像(没有数据库或先前的示例)获得超分辨率。我们的方法是基于这样一种观察,即自然图像中的斑块倾向于在图像内部冗余重复多次,无论是在相同的尺度内,还是在不同的尺度上。在同一图像尺度内(在亚像素不对齐时)补丁的重复出现会产生经典的超分辨率,而在同一图像的不同尺度上补丁的重复出现会产生基于实例的超分辨率。我们的方法试图在每个像素上恢复其基于尺度内和尺度间的补丁冗余的最佳分辨率增加。
{"title":"Single Image Improvement using Superresolution.","authors":"Shwetambari Shinde, Meeta Dewangan","doi":"10.5121/IJCSES.2012.3206","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3206","url":null,"abstract":"Methods for super-resolution can be broadly classified into two families of methods: (i) The classical multi-image super-resolution (combining images obtained at subpixel misalignments), and (ii) ExampleBased super-resolution (learning correspondence between low and high resolution image patches from a database). In this paper we propose a unified framework for combining these two families of methods. We further show how this combined approach can be applied to obtain super resolution from as little as a single image (with no database or prior examples). Our approach is based on the observation that patches in a natural image tend to redundantly recur many times inside the image, both within the same scale, as well as across different scales. Recurrence of patches within the same image scale (at sub pixel misalignments) gives rise to the classical super-resolution, whereas recurrence of patches across different scales of the same image gives rise to example-based super-resolution. Our approach attempts to recover at each pixel its best possible resolution increase based on its patch redundancy within and across scales.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115025576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy Efficient Recognition Protocol for Ad Hoc Networks Ad Hoc网络节能识别协议
Pub Date : 2012-04-30 DOI: 10.5121/IJCSES.2012.3202
Taresh Singh, S. Qamar
The recognition is a new security principle closely related to authentication. Low-power ad hoc networks with no pre-deployment information require the less authoritative security in recognition. We have studied previously proposed low-power protocols according to the environment and security model presented. We have implemented the New Message Recognition Protocol (NMRP) and Zero Common Knowledge (ZCK) protocol in C and matlab. From our comparison between NMRP and ZCK, we observed that NMRP satisfied the properties of low power environment.
识别是一种与身份验证密切相关的新型安全原理。没有预部署信息的低功耗自组织网络在识别方面要求较低的权威性安全性。我们根据所提出的环境和安全模型研究了先前提出的低功耗协议。我们在C语言和matlab语言中实现了新消息识别协议(NMRP)和零常识协议(ZCK)。通过对NMRP和ZCK的比较,我们发现NMRP满足低功耗环境的特性。
{"title":"Energy Efficient Recognition Protocol for Ad Hoc Networks","authors":"Taresh Singh, S. Qamar","doi":"10.5121/IJCSES.2012.3202","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3202","url":null,"abstract":"The recognition is a new security principle closely related to authentication. Low-power ad hoc networks with no pre-deployment information require the less authoritative security in recognition. We have studied previously proposed low-power protocols according to the environment and security model presented. We have implemented the New Message Recognition Protocol (NMRP) and Zero Common Knowledge (ZCK) protocol in C and matlab. From our comparison between NMRP and ZCK, we observed that NMRP satisfied the properties of low power environment.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129795680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE STUDY ON LOAD BALANCING STRATEGIES IN DISTRIBUTED COMPUTING SYSTEM 分布式计算系统中负载均衡策略的研究
Pub Date : 2012-04-30 DOI: 10.5121/IJCSES.2012.3203
R. Khan
A number of load balancing algorithms were developed in order to improve the execution of a distributed application in any kind of distributed architecture. Load balancing involves assigning tasks to each processor and minimizing the execution time of the program. In practice, it would be possible even to execute the applications on any machine of worldwide distributed systems. However, the ‘distributed system’ becomes popular and attractive with the introduction of the web. This results in a significant performance improvement for the users. This paper describes the necessary, newly developed, principal concepts for several load balancing techniques in a distributed computing environment. This paper also includes various types of load balancing strategies, their merits, demerits and comparison depending on certain parameters.
为了改善分布式应用程序在任何类型的分布式体系结构中的执行,开发了许多负载平衡算法。负载平衡涉及到给每个处理器分配任务和最小化程序的执行时间。在实践中,甚至可以在全球分布式系统的任何机器上执行应用程序。然而,随着网络的引入,“分布式系统”变得流行和有吸引力。这为用户带来了显著的性能改进。本文描述了分布式计算环境中几种负载平衡技术的必要的、新发展的主要概念。本文还介绍了各种类型的负载均衡策略,它们的优缺点以及在特定参数下的比较。
{"title":"THE STUDY ON LOAD BALANCING STRATEGIES IN DISTRIBUTED COMPUTING SYSTEM","authors":"R. Khan","doi":"10.5121/IJCSES.2012.3203","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3203","url":null,"abstract":"A number of load balancing algorithms were developed in order to improve the execution of a distributed application in any kind of distributed architecture. Load balancing involves assigning tasks to each processor and minimizing the execution time of the program. In practice, it would be possible even to execute the applications on any machine of worldwide distributed systems. However, the ‘distributed system’ becomes popular and attractive with the introduction of the web. This results in a significant performance improvement for the users. This paper describes the necessary, newly developed, principal concepts for several load balancing techniques in a distributed computing environment. This paper also includes various types of load balancing strategies, their merits, demerits and comparison depending on certain parameters.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132346266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Error Analysis Of 3d Polygonal Model:A Survey 三维多边形模型误差分析综述
Pub Date : 2012-04-30 DOI: 10.5121/IJCSES.2012.3205
D. Rajput
{"title":"Error Analysis Of 3d Polygonal Model:A Survey","authors":"D. Rajput","doi":"10.5121/IJCSES.2012.3205","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3205","url":null,"abstract":"","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133181342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SEGMENT BASED VISUAL CRYPTOGRAPHY FOR KEY DISTRIBUTION 基于段的密钥分配可视化密码
Pub Date : 2012-02-29 DOI: 10.5121/IJCSES.2012.3110
Sesha Pallavi Indrakanti, S. AvadhaniP.
Security is playing a vital role in this era of information technology, it has become a prerequisite in the digital world for maintaining the secrecy of the information. Many techniques have been proposed for handling textual data, maintenance of confidentiality of pictographic data is also becoming a priority. The trend of pictographic data hiding is pixel based, here a version of Visual Cryptography is presented which is segment-based instead of pixel based. The key or the secret which is in the form of digits that is to be distributed is converted into segment display and then encrypted .The result of encryption is two random shares. The decryption process involves the stacking of these two shares. It is easier to view the secret with the human eye by stacking the shares.
在这个信息技术时代,安全起着至关重要的作用,它已成为数字世界中维护信息保密性的先决条件。已经提出了许多处理文本数据的技术,维护象形文字数据的机密性也成为一个优先事项。象形文字数据隐藏的趋势是基于像素,本文提出了一种基于段的视觉密码技术,取代了基于像素的视觉密码技术。将要分发的数字形式的密钥或秘密转换为段显示,然后进行加密,加密的结果是两次随机共享。解密过程涉及到这两个共享的叠加。通过堆叠股票,更容易用肉眼看到秘密。
{"title":"SEGMENT BASED VISUAL CRYPTOGRAPHY FOR KEY DISTRIBUTION","authors":"Sesha Pallavi Indrakanti, S. AvadhaniP.","doi":"10.5121/IJCSES.2012.3110","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3110","url":null,"abstract":"Security is playing a vital role in this era of information technology, it has become a prerequisite in the digital world for maintaining the secrecy of the information. Many techniques have been proposed for handling textual data, maintenance of confidentiality of pictographic data is also becoming a priority. The trend of pictographic data hiding is pixel based, here a version of Visual Cryptography is presented which is segment-based instead of pixel based. The key or the secret which is in the form of digits that is to be distributed is converted into segment display and then encrypted .The result of encryption is two random shares. The decryption process involves the stacking of these two shares. It is easier to view the secret with the human eye by stacking the shares.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117281279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Pattern Association For Character Recognition By Back-Propagation Algorithm Using Neural Network Approach 基于神经网络反向传播算法的模式关联字符识别
Pub Date : 2012-02-29 DOI: 10.5121/IJCSES.2012.3112
S. Kosbatwar
The use of artificial neural network in applications can dramatically simplify the code and improve quality of recognition while achieving good performance. Another benefit of using neural network in application is extensibility of the system – ability to recognize more character sets than initially defined. Most of traditional systems are not extensible enough. In this paper recognition of characters is possible by using neural network back propagation algorithm. What is neural network Neural network are simplified models of the biological nervous system and therefore have drawn their motivation from the kind of computing performed by a human brain. An NN in general is a highly interconnected of a large number of processing elements called neurons in an architecture inspired by the brain. An NN can be massively parallel and therefore is said to exhibit parallel distributed processing. Neural Network exhibits characteristics such as mapping capabilities or pattern association, generalization, robustness, fault tolerance, and parallel and high speed information processing. Neural network learn by example. They can therefore be trained with known examples of a problem to acquire knowledge about it. Once appropriate trained the network can be put to effective use in solving ‘unknown’ or ‘untrained’ instances of the problem. Neural network adopt various learning mechanism of which supervised learning and unsupervised learning methods have turned out to be very popular. In supervised learning, a teacher is assumed to be present during the learning process, i.e. the network aims to minimize he error between target (desired) output presented by the teacher and the computed output to achieve better performance. However, in unsupervised learning, there is no teacher present to hand over the desired output and the network therefore tries to learn by itself, organizing the input instances of the problem.NN Architecture has been broadly classified as single layer feed forward networks, multilayer feed forward networks and recurrent networks, over the year several other NN.Architecture have evolved .some of the well known NN system include backpropogation network, perceptron, ADALINE ,Boltzmann machine ,adaptive resonance theory, Self-organized feature map, and Hopfield network. Neural Network has been successfully applied to problem in the field of pattern recognition, image processing, data compression, forecasting and optimization to quote a few. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.3, No.1, February 2012 128 Backpropagation algorithm The architecture of the neural network is the one of a basically backpropagation network with only one hidden layer (although it is the same techniques with more layers). The input layer is constituted of 35 neuron (one per input pixel in the matrix, of course)., they are 8 hidden neurons, and 26 output neurons(one per letter) in this problem domain of character recognition. The weight m
在应用程序中使用人工神经网络可以大大简化代码,提高识别质量,同时获得良好的性能。在应用中使用神经网络的另一个好处是系统的可扩展性——能够识别比最初定义的更多的字符集。大多数传统系统的可扩展性都不够。本文采用神经网络反向传播算法对字符进行识别。什么是神经网络神经网络是生物神经系统的简化模型,因此从人类大脑进行的那种计算中得出了它们的动机。一般来说,神经网络是由大量被称为神经元的处理元素高度互连而成的,其架构受到大脑的启发。神经网络可以大规模并行,因此被称为并行分布式处理。神经网络表现出诸如映射能力或模式关联、泛化、鲁棒性、容错以及并行和高速信息处理等特征。神经网络通过实例学习。因此,他们可以用已知的问题实例进行训练,以获得有关该问题的知识。一旦经过适当的训练,网络就可以有效地用于解决“未知”或“未经训练”的问题实例。神经网络采用多种学习机制,其中有监督学习和无监督学习方法已成为非常流行的学习方法。在监督学习中,假设在学习过程中有老师在场,即网络的目标是最小化老师给出的目标(期望)输出与计算输出之间的误差,以获得更好的性能。然而,在无监督学习中,没有老师在场交出期望的输出,因此网络试图自己学习,组织问题的输入实例。神经网络架构大致分为单层前馈网络、多层前馈网络和循环网络,近年来又有几种神经网络。神经网络的结构已经发生了变化,一些著名的神经网络系统包括反向传播网络、感知器、ADALINE、玻尔兹曼机、自适应共振理论、自组织特征映射和Hopfield网络。神经网络已成功地应用于模式识别、图像处理、数据压缩、预测和优化等领域的问题。国际计算机科学与工程概论杂志(IJCSES) Vol.3, No.1, 2012年2月128反向传播算法神经网络的体系结构基本上是一个只有一个隐藏层的反向传播网络(尽管它是具有更多层的相同技术)。输入层由35个神经元组成(当然,矩阵中每个输入像素一个神经元)。在字符识别的问题域中,它们是8个隐藏神经元和26个输出神经元(每个字母一个)。权重矩阵给出了每个神经元的每个输入的权重因子。这些矩阵就是我们所说的神经网络的记忆。学习过程是通过调整这些权重来完成的,以便对于每个给定的输入,输出尽可能接近所需的输出(这里是要识别的字符对应的输出神经元的完全激活)[1]。训练模式按随机顺序依次应用,并利用反向传播学习规律调整权值。训练集模式的每次应用称为一个循环。这些模式必须应用几个训练周期才能使输出误差达到可接受的低值。一旦网络被训练,它就可以用来回忆新的输入模式的适当模式。召回的计算很简单,因为使用不同层中单元的权重和输出函数来计算激活值和输出信号。输出层的信号对应于输出端[2]。反向传播学习是人工神经网络领域最重要的研究成果。反向传播学习涉及将误差从输出层反向传播到隐藏层,以确定导致隐藏层中单元的权重的更新。输出层本身的误差是使用每个输出单元的期望输出和实际输出之间的差来计算的。给定输入训练模式的实际输出是通过计算输入数据前向传递中每个隐藏层的单位输出来确定的。输出中的错误被向后传播,只是为了确定权重更新[6]。
{"title":"Pattern Association For Character Recognition By Back-Propagation Algorithm Using Neural Network Approach","authors":"S. Kosbatwar","doi":"10.5121/IJCSES.2012.3112","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3112","url":null,"abstract":"The use of artificial neural network in applications can dramatically simplify the code and improve quality of recognition while achieving good performance. Another benefit of using neural network in application is extensibility of the system – ability to recognize more character sets than initially defined. Most of traditional systems are not extensible enough. In this paper recognition of characters is possible by using neural network back propagation algorithm. What is neural network Neural network are simplified models of the biological nervous system and therefore have drawn their motivation from the kind of computing performed by a human brain. An NN in general is a highly interconnected of a large number of processing elements called neurons in an architecture inspired by the brain. An NN can be massively parallel and therefore is said to exhibit parallel distributed processing. Neural Network exhibits characteristics such as mapping capabilities or pattern association, generalization, robustness, fault tolerance, and parallel and high speed information processing. Neural network learn by example. They can therefore be trained with known examples of a problem to acquire knowledge about it. Once appropriate trained the network can be put to effective use in solving ‘unknown’ or ‘untrained’ instances of the problem. Neural network adopt various learning mechanism of which supervised learning and unsupervised learning methods have turned out to be very popular. In supervised learning, a teacher is assumed to be present during the learning process, i.e. the network aims to minimize he error between target (desired) output presented by the teacher and the computed output to achieve better performance. However, in unsupervised learning, there is no teacher present to hand over the desired output and the network therefore tries to learn by itself, organizing the input instances of the problem.NN Architecture has been broadly classified as single layer feed forward networks, multilayer feed forward networks and recurrent networks, over the year several other NN.Architecture have evolved .some of the well known NN system include backpropogation network, perceptron, ADALINE ,Boltzmann machine ,adaptive resonance theory, Self-organized feature map, and Hopfield network. Neural Network has been successfully applied to problem in the field of pattern recognition, image processing, data compression, forecasting and optimization to quote a few. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.3, No.1, February 2012 128 Backpropagation algorithm The architecture of the neural network is the one of a basically backpropagation network with only one hidden layer (although it is the same techniques with more layers). The input layer is constituted of 35 neuron (one per input pixel in the matrix, of course)., they are 8 hidden neurons, and 26 output neurons(one per letter) in this problem domain of character recognition. The weight m","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116609292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
SECURE KEY AGREEMENT AND AUTHENTICATION PROTOCOLS 安全密钥协议和身份验证协议
Pub Date : 2012-02-29 DOI: 10.5121/IJCSES.2012.3111
B. Maheshwari
We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They are: 1) Distributed nature in which there is no centralized key server; 2) Collaborative nature in which the group key is contributory (i.e., each group member will collaboratively contribute its part to the global group key); and 3) Dynamic nature in which existing members may leave the group while new members may join. Instead of performing individual rekeying operations, i.e. recomputing the group key after every join or leave request, we discuss an interval-based approach of rekeying. We consider three intervalbased distributed rekeying algorithms, or interval-based algorithms for short, for updating the group key: 1) the Rebuild algorithm; 2) the Batch algorithm; and 3) the Queue-batch algorithm. Performance of these three interval-based algorithms under different settings, such as different join and leave probabilities, is analyzed. We show that the interval-based algorithms significantly outperform the individual rekeying approach and that the Queue-batch algorithm performs the best among the three interval-based algorithms. More importantly, the Queue-batch algorithm can substantially reduce the computation and communication workload in a highly dynamic environment. We further enhance the interval-based algorithms in two aspects: authentication and implementation. Authentication focuses on the security improvement, while implementation realizes the interval-based algorithms in real network settings. Our work provides a fundamental understanding about establishing a group key via a distributed and collaborative approach for a dynamic peer group.
我们考虑了动态对等组的几种分布式协作密钥协议和认证协议。该问题有几个重要的特点,使其不同于传统的安全群通信。它们是:1)分布式,没有集中的密钥服务器;2)协作性,即组密钥是贡献性的(即每个组成员将协作地为全局组密钥贡献自己的部分);3)动态性质,即现有成员可能离开群体,而新成员可能加入。我们不再执行单独的重键操作,即在每次加入或离开请求后重新计算组密钥,而是讨论一种基于间隔的重键方法。我们考虑了三种基于区间的分布式密钥更新算法,或简称为基于区间的算法,用于更新组密钥:1)重建算法;2)批处理算法;3)队列批处理算法。分析了这三种基于间隔的算法在不同设置下的性能,如不同的连接概率和离开概率。我们表明,基于间隔的算法明显优于单个密钥更新方法,并且队列批处理算法在三种基于间隔的算法中表现最好。更重要的是,在高动态环境下,Queue-batch算法可以大大减少计算和通信工作量。我们从认证和实现两个方面进一步改进了基于间隔的算法。认证的重点是提高安全性,而实现则是在实际网络环境中实现基于间隔的算法。我们的工作提供了通过分布式和协作的方法为动态对等组建立组密钥的基本理解。
{"title":"SECURE KEY AGREEMENT AND AUTHENTICATION PROTOCOLS","authors":"B. Maheshwari","doi":"10.5121/IJCSES.2012.3111","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3111","url":null,"abstract":"We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They are: 1) Distributed nature in which there is no centralized key server; 2) Collaborative nature in which the group key is contributory (i.e., each group member will collaboratively contribute its part to the global group key); and 3) Dynamic nature in which existing members may leave the group while new members may join. Instead of performing individual rekeying operations, i.e. recomputing the group key after every join or leave request, we discuss an interval-based approach of rekeying. We consider three intervalbased distributed rekeying algorithms, or interval-based algorithms for short, for updating the group key: 1) the Rebuild algorithm; 2) the Batch algorithm; and 3) the Queue-batch algorithm. Performance of these three interval-based algorithms under different settings, such as different join and leave probabilities, is analyzed. We show that the interval-based algorithms significantly outperform the individual rekeying approach and that the Queue-batch algorithm performs the best among the three interval-based algorithms. More importantly, the Queue-batch algorithm can substantially reduce the computation and communication workload in a highly dynamic environment. We further enhance the interval-based algorithms in two aspects: authentication and implementation. Authentication focuses on the security improvement, while implementation realizes the interval-based algorithms in real network settings. Our work provides a fundamental understanding about establishing a group key via a distributed and collaborative approach for a dynamic peer group.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129792641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A comparative study analysis of materialized view for selection cost 物化观对选择成本的比较研究分析
Pub Date : 2012-02-29 DOI: 10.5121/IJCSES.2012.3102
T. Nalini, Dr. A. Kumaravel, Dr. K. Rangarajan
Materialized view selection is one of the most crucial techniques to design data warehouse in an optimal manner. Selecting views to materialize for the purpose of supporting the decision making efficiently is one of the most significant decisions in designing Data Warehouse. Selecting a set of derived views to materialize which minimizes the sum of total query response time and maintenance of the selected views is defined as view selection problem. Selecting a suitable set of views that minimizes the total cost associated with the materialized views is the key objective of data warehousing. In this paper we compare the various research works on several parameters for controlling the selection process and also we compare time, query frequency and spatial cost.
物化视图选择是优化数据仓库设计的关键技术之一。为了有效地支持决策制定,选择要具体化的视图是设计数据仓库中最重要的决策之一。选择一组要实现的派生视图,使所选视图的总查询响应时间和维护时间最小化,这被定义为视图选择问题。选择一组合适的视图,使与物化视图相关的总成本最小化,这是数据仓库的关键目标。本文比较了控制选择过程的几个参数的各种研究成果,并比较了时间、查询频率和空间成本。
{"title":"A comparative study analysis of materialized view for selection cost","authors":"T. Nalini, Dr. A. Kumaravel, Dr. K. Rangarajan","doi":"10.5121/IJCSES.2012.3102","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3102","url":null,"abstract":"Materialized view selection is one of the most crucial techniques to design data warehouse in an optimal manner. Selecting views to materialize for the purpose of supporting the decision making efficiently is one of the most significant decisions in designing Data Warehouse. Selecting a set of derived views to materialize which minimizes the sum of total query response time and maintenance of the selected views is defined as view selection problem. Selecting a suitable set of views that minimizes the total cost associated with the materialized views is the key objective of data warehousing. In this paper we compare the various research works on several parameters for controlling the selection process and also we compare time, query frequency and spatial cost.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130595705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
SPATIOTEMPORAL DATA MINING : ISSUES , TASKS AND APPLICATIONS 时空数据挖掘:问题、任务和应用
Pub Date : 2012-02-29 DOI: 10.5121/IJCSES.2012.3104
K. .. Rao, A. Govardhan, K. V. C. Rao
Spatiotemporal data usually contain the states of an object, an event or a position in space over a period of time. Vast amount of spatiotemporal data can be found in several application fields such as traffic management, environment monitoring, and weather forecast. These datasets might be collected at different locations at various points of time in different formats. It poses many challenges in representing, processing, analysis and mining of such datasets due to complex structure of spatiotemporal objects and the relationships among them in both spatial and temporal dimensions. In this paper, the issues and challenges related to spatiotemporal data representation, analysis, mining and visualization of knowledge are presented. Various kinds of data mining tasks such as association rules, classification clustering for discovering knowledge from spatiotemporal datasets are examined and reviewed. System functional requirements for such kind of knowledge discovery and database structure are discussed. Finally applications of spatiotemporal data mining are presented.
时空数据通常包含一段时间内物体、事件或空间位置的状态。在交通管理、环境监测、天气预报等多个应用领域都可以找到大量的时空数据。这些数据集可能在不同的时间点以不同的格式在不同的地点收集。由于时空对象的复杂结构及其在空间和时间维度上的相互关系,对这些数据集的表示、处理、分析和挖掘提出了许多挑战。本文提出了与知识的时空数据表示、分析、挖掘和可视化相关的问题和挑战。研究和回顾了从时空数据集中发现知识的各种数据挖掘任务,如关联规则、分类聚类。讨论了这类知识发现的系统功能需求和数据库结构。最后介绍了时空数据挖掘的应用。
{"title":"SPATIOTEMPORAL DATA MINING : ISSUES , TASKS AND APPLICATIONS","authors":"K. .. Rao, A. Govardhan, K. V. C. Rao","doi":"10.5121/IJCSES.2012.3104","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3104","url":null,"abstract":"Spatiotemporal data usually contain the states of an object, an event or a position in space over a period of time. Vast amount of spatiotemporal data can be found in several application fields such as traffic management, environment monitoring, and weather forecast. These datasets might be collected at different locations at various points of time in different formats. It poses many challenges in representing, processing, analysis and mining of such datasets due to complex structure of spatiotemporal objects and the relationships among them in both spatial and temporal dimensions. In this paper, the issues and challenges related to spatiotemporal data representation, analysis, mining and visualization of knowledge are presented. Various kinds of data mining tasks such as association rules, classification clustering for discovering knowledge from spatiotemporal datasets are examined and reviewed. System functional requirements for such kind of knowledge discovery and database structure are discussed. Finally applications of spatiotemporal data mining are presented.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"133 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113996599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
WATERMARKING SCHEMES FOR COPY PROTECTION : A SURVEY 版权保护的水印方案:综述
Pub Date : 2012-02-29 DOI: 10.5121/IJCSES.2012.3106
Dolley Shukla, Manisha Sharma, S. Shankaracharya
DIGITAL WATERMARKING IS THE PROCESS OF EMBEDDING INFORMATION INTO A DIGITAL SIGNAL, I.E. AUDIO , PICTURES , VIDEO , ETC . EMBEDDED MARKS IN THE MESSAGE ARE GENERALLY IMPERCEPTIBLE BUT CAN BE DETECTED OR EXTRACTED. THE EMBEDDING TAKES PLACE BY MANIPULATING THE CONTENT OF THE DIGITAL DATA , WHICH MEANS THE INFORMATION IS NOT EMBEDDED IN THE FRAME AROUND THE DATA . IF THE SIGNAL IS COPIED , THEN THE EMBEDDED INFORMATION IS ALSO IN THE COPY . BY IMPERCEPTIBLY HIDING INFORMATION INTO THE VIDEO CONTENT IT WILL BE POSSIBLE TO PREVENT COPYING OR PLAYBACK OF SUCH CONTENT . SO , WATERMARKING IS AN EMERGING TECHNOLOGY THAT IS CLAIMED TO HAVE AN IMPORTANT APPLICATION IN COPY PROTECTION . A VARIETY OF WATERMARKING TECHNIQUES HAVE BEEN PROPOSED BY RESEARCHERS FOR THE COPY -PROTECTION . THIS PAPER PRESENTS AN EXTENSIVE REVIEW OF THE PREVAILING LITERATURE IN WATERMARKING FOR COPY PROTECTION .
数字水印是将信息嵌入数字信号,即音频、图片、视频等的过程。信息中嵌入的标记通常是难以察觉的,但可以检测或提取。嵌入是通过操纵数字数据的内容来实现的,这意味着信息没有嵌入到数据周围的框架中。如果信号被复制,那么嵌入的信息也在拷贝中。通过不知不觉地将信息隐藏到视频内容中,可以防止复制或播放这些内容。因此,水印技术是一项新兴的技术,在拷贝保护中有着重要的应用。为了防止复制,研究者们提出了各种各样的水印技术。本文提出了一个广泛的审查在水印复制保护的主流文献。
{"title":"WATERMARKING SCHEMES FOR COPY PROTECTION : A SURVEY","authors":"Dolley Shukla, Manisha Sharma, S. Shankaracharya","doi":"10.5121/IJCSES.2012.3106","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3106","url":null,"abstract":"DIGITAL WATERMARKING IS THE PROCESS OF EMBEDDING INFORMATION INTO A DIGITAL SIGNAL, I.E. AUDIO , PICTURES , VIDEO , ETC . EMBEDDED MARKS IN THE MESSAGE ARE GENERALLY IMPERCEPTIBLE BUT CAN BE DETECTED OR EXTRACTED. THE EMBEDDING TAKES PLACE BY MANIPULATING THE CONTENT OF THE DIGITAL DATA , WHICH MEANS THE INFORMATION IS NOT EMBEDDED IN THE FRAME AROUND THE DATA . IF THE SIGNAL IS COPIED , THEN THE EMBEDDED INFORMATION IS ALSO IN THE COPY . BY IMPERCEPTIBLY HIDING INFORMATION INTO THE VIDEO CONTENT IT WILL BE POSSIBLE TO PREVENT COPYING OR PLAYBACK OF SUCH CONTENT . SO , WATERMARKING IS AN EMERGING TECHNOLOGY THAT IS CLAIMED TO HAVE AN IMPORTANT APPLICATION IN COPY PROTECTION . A VARIETY OF WATERMARKING TECHNIQUES HAVE BEEN PROPOSED BY RESEARCHERS FOR THE COPY -PROTECTION . THIS PAPER PRESENTS AN EXTENSIVE REVIEW OF THE PREVAILING LITERATURE IN WATERMARKING FOR COPY PROTECTION .","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124737664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
International Journal of Computer Science & Engineering Survey
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1