首页 > 最新文献

2014 World Congress on Computing and Communication Technologies最新文献

英文 中文
Infants Disease Prediction Architecture Using Artificial Neural Networks and Digital Image Processing 基于人工神经网络和数字图像处理的婴儿疾病预测体系结构
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.25
V. Thamaraiselvi, V. K. Kaliappan
Disease prediction of infants from DNA sequences remains as an open challenge in the area of bioinformatics, which deals with understanding human diseases and in identification of new molecular target for drug discovery. To provide solution, a novel prototype architecture is designed for the disease prediction of infants, based on the combination of parent DNA using Artificial Neural Networks (ANN). The proposed system integrates Micro array Technology, Digital Image Processing and Artificial Neural Networks. By applying micro array technology to the parental DNA, a gene expression image can be obtained. The extracted gene image is further characterized with the help of Digital Image processing. A neural network is trained with the mutated value which lists the probability of diseases to the infants. The proposed architecture is implemented in MATLAB. This novel system ensures that the prediction of disease for infants is possible and can be elaborated in future.
从DNA序列预测婴儿疾病仍然是生物信息学领域的一个公开挑战,该领域涉及对人类疾病的理解和对药物发现的新分子靶点的确定。为了提供解决方案,设计了一种新的基于人工神经网络(ANN)结合父母DNA的婴儿疾病预测原型架构。该系统集成了微阵列技术、数字图像处理技术和人工神经网络技术。将微阵列技术应用于亲本DNA,可以获得基因表达图像。提取的基因图像通过数字图像处理进一步表征。用突变值训练神经网络,该突变值列出婴儿患病的概率。该体系结构在MATLAB中实现。这种新颖的系统确保了对婴儿疾病的预测是可能的,并且可以在未来进行详细阐述。
{"title":"Infants Disease Prediction Architecture Using Artificial Neural Networks and Digital Image Processing","authors":"V. Thamaraiselvi, V. K. Kaliappan","doi":"10.1109/WCCCT.2014.25","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.25","url":null,"abstract":"Disease prediction of infants from DNA sequences remains as an open challenge in the area of bioinformatics, which deals with understanding human diseases and in identification of new molecular target for drug discovery. To provide solution, a novel prototype architecture is designed for the disease prediction of infants, based on the combination of parent DNA using Artificial Neural Networks (ANN). The proposed system integrates Micro array Technology, Digital Image Processing and Artificial Neural Networks. By applying micro array technology to the parental DNA, a gene expression image can be obtained. The extracted gene image is further characterized with the help of Digital Image processing. A neural network is trained with the mutated value which lists the probability of diseases to the infants. The proposed architecture is implemented in MATLAB. This novel system ensures that the prediction of disease for infants is possible and can be elaborated in future.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114983595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Activity Recognition with Fuzzy Finite Automata 模糊有限自动机的活动识别
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.34
H. Ali, D. Amalarethinam
Offering context aware services to users is one of the main objectives of pervasive computing. A context aware system needs to know the activities being performed by the user. Deciding what a user is doing at a given time poses a number of challenges. One significant challenge is dealing with the variation in the number, order and duration of the constituent steps of an activity. There happens to be considerable variation in these parameters even if the same user is performing the same activity at different times. Though fuzzy finite automata have been used by researchers to overcome this challenge, manual construction of the automata for daily life activities becomes onerous. This paper illustrates how finite automata can be constructed automatically and fuzziness incorporated into it, to recognize user activities in a smart environment. The proposed method is tested with a publicly available dataset and is found to give promising results.
向用户提供上下文感知服务是普适计算的主要目标之一。上下文感知系统需要知道用户正在执行的活动。确定用户在给定时间内正在做什么会带来许多挑战。一个重要的挑战是处理活动组成步骤的数量、顺序和持续时间的变化。即使同一用户在不同时间执行相同的活动,这些参数也会发生相当大的变化。尽管研究人员已经使用模糊有限自动机来克服这一挑战,但手工构建用于日常生活活动的自动机变得非常繁重。本文阐述了如何自动构造有限自动机并将模糊性融入其中,以识别智能环境中的用户活动。用公开可用的数据集对所提出的方法进行了测试,并发现给出了有希望的结果。
{"title":"Activity Recognition with Fuzzy Finite Automata","authors":"H. Ali, D. Amalarethinam","doi":"10.1109/WCCCT.2014.34","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.34","url":null,"abstract":"Offering context aware services to users is one of the main objectives of pervasive computing. A context aware system needs to know the activities being performed by the user. Deciding what a user is doing at a given time poses a number of challenges. One significant challenge is dealing with the variation in the number, order and duration of the constituent steps of an activity. There happens to be considerable variation in these parameters even if the same user is performing the same activity at different times. Though fuzzy finite automata have been used by researchers to overcome this challenge, manual construction of the automata for daily life activities becomes onerous. This paper illustrates how finite automata can be constructed automatically and fuzziness incorporated into it, to recognize user activities in a smart environment. The proposed method is tested with a publicly available dataset and is found to give promising results.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129782799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detection of Mammograms Using Honey Bees Mating Optimization Algorithm (M-HBMO) 基于蜜蜂交配优化算法(M-HBMO)的乳房x线照片检测
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.52
R. Durgadevi, B. Hemalatha, K. V. K. Kaliappan
Mammography is the best available technique used by radiologists for screening early detection of breast cancer. In digital mammography the crisis of finding efficient and precise breast profile segmentation technique is time-consuming. In this research work, a novel hybrid method named M-HBMO (Mammogram based Honey Bees Mating Optimization) algorithm has been proposed to segment the lesion. The cancer profile segmentation is based on texture feature and extraction of the lesion. The M-HBMO is evaluated with conventional ROI (region of interest) Algorithm. The experiment is conducted with MRI images retrieved from the medical hospital database. The result proves that the M-HBMO method segments the breast region accurately correspond to respective MRI images.
乳房x光摄影是放射科医生用于筛查早期发现乳腺癌的最佳技术。在数字乳房x线摄影中,寻找高效、精确的乳房轮廓分割技术是一个耗时的问题。在本研究中,提出了一种新的混合方法M-HBMO(基于乳房x光片的蜜蜂交配优化算法)来分割病变。肿瘤轮廓的分割是基于纹理特征和病灶的提取。用传统的感兴趣区域(ROI)算法对M-HBMO进行评估。实验是用从医院数据库检索的核磁共振成像图像进行的。结果表明,M-HBMO方法能准确地分割出与相应MRI图像对应的乳腺区域。
{"title":"Detection of Mammograms Using Honey Bees Mating Optimization Algorithm (M-HBMO)","authors":"R. Durgadevi, B. Hemalatha, K. V. K. Kaliappan","doi":"10.1109/WCCCT.2014.52","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.52","url":null,"abstract":"Mammography is the best available technique used by radiologists for screening early detection of breast cancer. In digital mammography the crisis of finding efficient and precise breast profile segmentation technique is time-consuming. In this research work, a novel hybrid method named M-HBMO (Mammogram based Honey Bees Mating Optimization) algorithm has been proposed to segment the lesion. The cancer profile segmentation is based on texture feature and extraction of the lesion. The M-HBMO is evaluated with conventional ROI (region of interest) Algorithm. The experiment is conducted with MRI images retrieved from the medical hospital database. The result proves that the M-HBMO method segments the breast region accurately correspond to respective MRI images.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131959680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving Cloud Security by Enhanced HASBE Using Hybrid Encryption Scheme 使用混合加密方案增强HASBE提高云安全性
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.88
B. Poornima, T. Rajendran
Cloud computing has appeared as one of the most influential paradigms in the IT commerce in recent years and this technology needs users to entrust their precious facts and figures to cloud providers, there have been expanding security and privacy concerns on outsourced data. Several schemes employing attribute-based encryption (ABE) have been suggested for get access to control of outsourced data in cloud computing; however, most of them suffer from inflexibility in applying convoluted get access to command principles. In order to recognize scalable, flexible, and finegrained get access to control of outsourced facts and figures in cloud computing, in this paper, we suggest hierarchical attribute-set-based encryption (HASBE) by expanding ciphertext-policy attributeset- based encryption (ASBE) with a hierarchical structure of users. The suggested design not only achieves scalability due to its hierarchical structure, but furthermore inherits flexibility and fine-grained get access to command in carrying compound attributes of ASBE. In addition, HASBE uses multiple worth assignments for access expiration time to deal with client revocation more effectively than living schemes. We apply our scheme and show that it is both effective and flexible in dealing with get access to command for outsourced facts in cloud computing with comprehensive trials.
近年来,云计算作为最具影响力的IT商务模式之一出现,这种技术需要用户将宝贵的事实和数据委托给云提供商,外包数据的安全和隐私问题日益严重。已经提出了几种采用基于属性的加密(ABE)的方案来访问云计算中外包数据的控制;然而,它们中的大多数在应用复杂的命令访问原则时缺乏灵活性。为了在云计算中识别可扩展的、灵活的、细粒度的对外包事实和数字的访问控制,本文通过将基于密文策略属性集的加密(ASBE)扩展为用户层次结构,提出了基于层次化属性集的加密(HASBE)。所建议的设计不仅由于其层次化的结构实现了可扩展性,而且继承了ASBE在携带复合属性时的灵活性和细粒度访问命令。此外,HASBE对访问到期时间使用多个值分配,以比活体方案更有效地处理客户端撤销。通过综合试验,证明了该方案在处理云计算外包事实获取命令方面的有效性和灵活性。
{"title":"Improving Cloud Security by Enhanced HASBE Using Hybrid Encryption Scheme","authors":"B. Poornima, T. Rajendran","doi":"10.1109/WCCCT.2014.88","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.88","url":null,"abstract":"Cloud computing has appeared as one of the most influential paradigms in the IT commerce in recent years and this technology needs users to entrust their precious facts and figures to cloud providers, there have been expanding security and privacy concerns on outsourced data. Several schemes employing attribute-based encryption (ABE) have been suggested for get access to control of outsourced data in cloud computing; however, most of them suffer from inflexibility in applying convoluted get access to command principles. In order to recognize scalable, flexible, and finegrained get access to control of outsourced facts and figures in cloud computing, in this paper, we suggest hierarchical attribute-set-based encryption (HASBE) by expanding ciphertext-policy attributeset- based encryption (ASBE) with a hierarchical structure of users. The suggested design not only achieves scalability due to its hierarchical structure, but furthermore inherits flexibility and fine-grained get access to command in carrying compound attributes of ASBE. In addition, HASBE uses multiple worth assignments for access expiration time to deal with client revocation more effectively than living schemes. We apply our scheme and show that it is both effective and flexible in dealing with get access to command for outsourced facts in cloud computing with comprehensive trials.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126542710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Improving the Retailers Profit for CRM Using Data Mining Techniques 利用数据挖掘技术提高零售商CRM利润
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.23
K. Deepa, S. Dhanabal, V. K. Kaliappan
Customer Relationship Management (CRM) is a widespread strategy and process of identifying, retaining and associating selective customers in order to sustain their relationship with the organization. By the application of CRM, greater efficacy and effectiveness in delivering strategies could be achieved. To support CRM in retail sector, many data mining techniques are applied in identifying, attracting, developing and retaining the customer's relationships. On the other hand, the retailers are unable to predict the demand of products which may leads to inconsistencies in profit by the use of CRM. To overcome this disadvantage, an integrated version of CRM along with Supply Chain Management (SCM) is designed which affords the stock requirement from SCM based on the demand in CRM. Thus SCM with CRM enhances the retailers profit, meet the customer's demand and retain the current customers.
客户关系管理(CRM)是一种广泛的策略和过程,用于识别、保留和联系有选择的客户,以维持他们与组织的关系。通过客户关系管理的应用,可以实现更高的有效性和有效性的战略交付。为了支持零售行业的客户关系管理,许多数据挖掘技术被应用于识别、吸引、发展和保留客户关系。另一方面,零售商无法预测产品的需求,这可能导致客户关系管理的利润不一致。为了克服这一缺点,设计了CRM与供应链管理的集成版本,根据CRM的需求提供供应链的库存需求。从而提高零售商的利润,满足顾客的需求,留住现有的顾客。
{"title":"Improving the Retailers Profit for CRM Using Data Mining Techniques","authors":"K. Deepa, S. Dhanabal, V. K. Kaliappan","doi":"10.1109/WCCCT.2014.23","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.23","url":null,"abstract":"Customer Relationship Management (CRM) is a widespread strategy and process of identifying, retaining and associating selective customers in order to sustain their relationship with the organization. By the application of CRM, greater efficacy and effectiveness in delivering strategies could be achieved. To support CRM in retail sector, many data mining techniques are applied in identifying, attracting, developing and retaining the customer's relationships. On the other hand, the retailers are unable to predict the demand of products which may leads to inconsistencies in profit by the use of CRM. To overcome this disadvantage, an integrated version of CRM along with Supply Chain Management (SCM) is designed which affords the stock requirement from SCM based on the demand in CRM. Thus SCM with CRM enhances the retailers profit, meet the customer's demand and retain the current customers.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126377859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Java Native Pthread for Win32 Platform Win32平台的Java Native Pthread
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.13
Dr. Bala Dhandayuthapani V, G. M. Nasira
Numerous advanced operating systems honestly hold both time-sliced and multiprocessor threading with a process scheduler. The kernel of an operating system permits programmers to control threads via the system call interface. Java incorporates threading facility within the language itself rather than managing threads as a facility of the underlying operating system. This research finding focuses on how Java can facilitate Pthreads through JNI, which can exploit in Java threads and Native Pthreads to execute in hybrid model.
许多先进的操作系统都使用进程调度器同时支持分时线程和多处理器线程。操作系统的内核允许程序员通过系统调用接口来控制线程。Java在语言本身中集成了线程功能,而不是将线程作为底层操作系统的功能来管理。这项研究的重点是Java如何通过JNI促进pthread, JNI可以利用Java线程和Native pthread在混合模型中执行。
{"title":"Java Native Pthread for Win32 Platform","authors":"Dr. Bala Dhandayuthapani V, G. M. Nasira","doi":"10.1109/WCCCT.2014.13","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.13","url":null,"abstract":"Numerous advanced operating systems honestly hold both time-sliced and multiprocessor threading with a process scheduler. The kernel of an operating system permits programmers to control threads via the system call interface. Java incorporates threading facility within the language itself rather than managing threads as a facility of the underlying operating system. This research finding focuses on how Java can facilitate Pthreads through JNI, which can exploit in Java threads and Native Pthreads to execute in hybrid model.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125178188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Enhanced Clustering of High Dimensional Datasets Using Unsupervised Quick Reduct Algorithm (USQR) With Rough Set Theory 基于粗糙集理论的无监督快速约简算法增强高维数据集聚类
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.55
P. Gomathi, S. Dhanabal, V. K. Kaliappan
The performance of K-means clustering algorithm is poor for high dimensions data set. The goal of this paper is to reduce the high dimensional data to a meaningful low dimensional data representation, so that the efficiency of clustering algorithm will be elevated. Hence to improve the efficiency of clustering analysis, unsupervised quick reduct algorithm (USQR) is used for selecting the features from high dimensional data. Then the selected features are used to find the initial centroid using k-MAM initialization technique for k-means. The initial centroids are finally used to find the clusters. The results are compared to k-means and k-MAM with USQR so that outperforms well, in terms of accuracy and number of iterations compared to the k-means, for high dimensional data.
对于高维数据集,k均值聚类算法的性能较差。本文的目标是将高维数据简化为有意义的低维数据表示,从而提高聚类算法的效率。因此,为了提高聚类分析的效率,采用无监督快速约简算法(USQR)从高维数据中选择特征。然后利用k-均值的k-MAM初始化技术,利用所选特征找到初始质心。最后使用初始质心来找到簇。将结果与USQR的k-means和k-MAM进行比较,以便在高维数据方面,与k-means相比,在精度和迭代次数方面表现出色。
{"title":"An Enhanced Clustering of High Dimensional Datasets Using Unsupervised Quick Reduct Algorithm (USQR) With Rough Set Theory","authors":"P. Gomathi, S. Dhanabal, V. K. Kaliappan","doi":"10.1109/WCCCT.2014.55","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.55","url":null,"abstract":"The performance of K-means clustering algorithm is poor for high dimensions data set. The goal of this paper is to reduce the high dimensional data to a meaningful low dimensional data representation, so that the efficiency of clustering algorithm will be elevated. Hence to improve the efficiency of clustering analysis, unsupervised quick reduct algorithm (USQR) is used for selecting the features from high dimensional data. Then the selected features are used to find the initial centroid using k-MAM initialization technique for k-means. The initial centroids are finally used to find the clusters. The results are compared to k-means and k-MAM with USQR so that outperforms well, in terms of accuracy and number of iterations compared to the k-means, for high dimensional data.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116037916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Multiparty Electronic Payments Using ECC Algorithm: A Comparative Study 基于ECC算法的安全多方电子支付比较研究
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.31
Dr. K. Ravikumar, A. Udhayakumar
This paper is an attempt at the detailed study of Cryptography algorithm. In resource constrained system, Elliptic Curve Cryptography is a promising alternative for public algorithms, because it provides similar level of security with proposed shorter keys than conventional integer based public key algorithm. ECC over binary field is taken up with special interest because the operation in binary filed operation, are thought to be more in space and efficient in time. However, ECC's software implementation, on binary field are slow, Specially on low end processors, which are used in small computing devices such as sensors node, mobile phone, etc. This proposed paper, studied the Cryptography algorithms and software implementation of ECC. Firstly, while implementing ECC with software, for example byte size may affect the choice of algorithm some architectural parameters has been examined. Also, identification of software for low-end processors has been done. In addition, the proposed paper has implemented ECC algorithm in Multiparty Electronic transaction.
本文是对密码学算法进行详细研究的一次尝试。在资源受限的系统中,椭圆曲线加密是一种很有前途的替代公共算法,因为它提供了与传统的基于整数的公钥算法相似的安全级别,并且提出了更短的密钥。二进制域上的ECC之所以受到人们的特别关注,是因为二进制域上的运算被认为在空间上更节省,在时间上更有效。但是,ECC在二进制领域的软件实现速度较慢,特别是在低端处理器上,主要应用于传感器节点、手机等小型计算设备。本文主要研究了ECC的加密算法和软件实现。首先,在软件实现ECC时,例如,字节大小可能影响算法的选择,一些架构参数进行了检查。此外,还对低端处理器的软件进行了识别。此外,本文还在多方电子交易中实现了ECC算法。
{"title":"Secure Multiparty Electronic Payments Using ECC Algorithm: A Comparative Study","authors":"Dr. K. Ravikumar, A. Udhayakumar","doi":"10.1109/WCCCT.2014.31","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.31","url":null,"abstract":"This paper is an attempt at the detailed study of Cryptography algorithm. In resource constrained system, Elliptic Curve Cryptography is a promising alternative for public algorithms, because it provides similar level of security with proposed shorter keys than conventional integer based public key algorithm. ECC over binary field is taken up with special interest because the operation in binary filed operation, are thought to be more in space and efficient in time. However, ECC's software implementation, on binary field are slow, Specially on low end processors, which are used in small computing devices such as sensors node, mobile phone, etc. This proposed paper, studied the Cryptography algorithms and software implementation of ECC. Firstly, while implementing ECC with software, for example byte size may affect the choice of algorithm some architectural parameters has been examined. Also, identification of software for low-end processors has been done. In addition, the proposed paper has implemented ECC algorithm in Multiparty Electronic transaction.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128654746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
WAN Optimization Tools, Techniques and Research Issues for Cloud-Based Big Data Analytics 基于云的大数据分析的广域网优化工具、技术和研究问题
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.72
M. Nirmala
Increasing data volumes, data replication at offsite, and the greater than ever use of content-rich and Big Data, applications are mandating IT organizations to optimize their network resources. Trends such as Virtualization and Cloud computing further emphasize this requirement of this current era of Big data. To help with this process, companies are increasingly relying on a new generation of WAN optimization Techniques, Appliances, Controllers, Platforms and Products that are displacing standalone physical appliances by offering more scalability, flexibility, and manageability by additional inclusion of software to handle this Big data and bring valuable insights through big data analytics. An optimized WAN environment can increase network reliability, accessibility and availability and improve cost profiles. It also improves the performance and consistency of data backup, replication, and recovery processes. This paper covers the introduction to WAN optimization, prominent WAN optimization techniques, WAN optimization products used for Big data analytics and finally future trends and research Issues of WAN optimization in the ensuing era of Big data.
不断增加的数据量、异地数据复制以及比以往更多地使用内容丰富的大数据,应用程序要求IT组织优化其网络资源。虚拟化和云计算等趋势进一步强调了当前大数据时代的这一要求。为了帮助实现这一过程,公司越来越依赖于新一代广域网优化技术、设备、控制器、平台和产品,这些设备通过提供更多的可扩展性、灵活性和可管理性来取代独立的物理设备,通过附加的软件来处理这些大数据,并通过大数据分析带来有价值的见解。优化的WAN环境可以提高网络可靠性、可访问性和可用性,并改善成本配置文件。它还可以提高数据备份、复制和恢复过程的性能和一致性。本文将介绍广域网优化、主要的广域网优化技术、用于大数据分析的广域网优化产品以及大数据时代下广域网优化的未来趋势和研究问题。
{"title":"WAN Optimization Tools, Techniques and Research Issues for Cloud-Based Big Data Analytics","authors":"M. Nirmala","doi":"10.1109/WCCCT.2014.72","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.72","url":null,"abstract":"Increasing data volumes, data replication at offsite, and the greater than ever use of content-rich and Big Data, applications are mandating IT organizations to optimize their network resources. Trends such as Virtualization and Cloud computing further emphasize this requirement of this current era of Big data. To help with this process, companies are increasingly relying on a new generation of WAN optimization Techniques, Appliances, Controllers, Platforms and Products that are displacing standalone physical appliances by offering more scalability, flexibility, and manageability by additional inclusion of software to handle this Big data and bring valuable insights through big data analytics. An optimized WAN environment can increase network reliability, accessibility and availability and improve cost profiles. It also improves the performance and consistency of data backup, replication, and recovery processes. This paper covers the introduction to WAN optimization, prominent WAN optimization techniques, WAN optimization products used for Big data analytics and finally future trends and research Issues of WAN optimization in the ensuing era of Big data.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130930088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Empirical Study on the Performance of Rule-Based Classification by Feature Selection 基于特征选择的基于规则的分类性能实证研究
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.76
S. Balakrishnan, M. Babu, P. Krishna
Medical databases contain massive volume of clinical data which could provide valuable information regarding diagnosis, prognosis and treatment plan when mining algorithms are used in appropriate manner. The irrelevant, redundant and incomplete data in medical databases makes the extraction of useful pattern a difficult process. Feature selection, a robust data preprocessing method selects attributes that enhances the predictive accuracy of classification algorithms. Consistency subset evaluation with best first search approach selects a feature subset of consistence equal to that of full feature set. The optimal feature subset selected is classified using Modlem, a rough set based rule-induction algorithm. The performance of the classification algorithms are evaluated in terms of three metrics viz, Accuracy, Sensitivity and Specificity.
医学数据库包含大量的临床数据,通过适当的挖掘算法,可以为诊断、预后和治疗方案提供有价值的信息。医学数据库中数据的不相关、冗余和不完整使得有用模式的提取成为一个困难的过程。特征选择是一种鲁棒的数据预处理方法,它可以选择属性,从而提高分类算法的预测精度。一致性子集评估采用最佳优先搜索方法,选择一致性特征子集等于完整特征集的一致性特征子集。使用基于粗糙集的规则归纳算法Modlem对所选择的最优特征子集进行分类。分类算法的性能是根据三个指标进行评估,即,准确性,灵敏度和特异性。
{"title":"An Empirical Study on the Performance of Rule-Based Classification by Feature Selection","authors":"S. Balakrishnan, M. Babu, P. Krishna","doi":"10.1109/WCCCT.2014.76","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.76","url":null,"abstract":"Medical databases contain massive volume of clinical data which could provide valuable information regarding diagnosis, prognosis and treatment plan when mining algorithms are used in appropriate manner. The irrelevant, redundant and incomplete data in medical databases makes the extraction of useful pattern a difficult process. Feature selection, a robust data preprocessing method selects attributes that enhances the predictive accuracy of classification algorithms. Consistency subset evaluation with best first search approach selects a feature subset of consistence equal to that of full feature set. The optimal feature subset selected is classified using Modlem, a rough set based rule-induction algorithm. The performance of the classification algorithms are evaluated in terms of three metrics viz, Accuracy, Sensitivity and Specificity.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116683959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2014 World Congress on Computing and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1