首页 > 最新文献

2014 World Congress on Computing and Communication Technologies最新文献

英文 中文
Secure Multiparty Electronic Payments Using ECC Algorithm: A Comparative Study 基于ECC算法的安全多方电子支付比较研究
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.31
Dr. K. Ravikumar, A. Udhayakumar
This paper is an attempt at the detailed study of Cryptography algorithm. In resource constrained system, Elliptic Curve Cryptography is a promising alternative for public algorithms, because it provides similar level of security with proposed shorter keys than conventional integer based public key algorithm. ECC over binary field is taken up with special interest because the operation in binary filed operation, are thought to be more in space and efficient in time. However, ECC's software implementation, on binary field are slow, Specially on low end processors, which are used in small computing devices such as sensors node, mobile phone, etc. This proposed paper, studied the Cryptography algorithms and software implementation of ECC. Firstly, while implementing ECC with software, for example byte size may affect the choice of algorithm some architectural parameters has been examined. Also, identification of software for low-end processors has been done. In addition, the proposed paper has implemented ECC algorithm in Multiparty Electronic transaction.
本文是对密码学算法进行详细研究的一次尝试。在资源受限的系统中,椭圆曲线加密是一种很有前途的替代公共算法,因为它提供了与传统的基于整数的公钥算法相似的安全级别,并且提出了更短的密钥。二进制域上的ECC之所以受到人们的特别关注,是因为二进制域上的运算被认为在空间上更节省,在时间上更有效。但是,ECC在二进制领域的软件实现速度较慢,特别是在低端处理器上,主要应用于传感器节点、手机等小型计算设备。本文主要研究了ECC的加密算法和软件实现。首先,在软件实现ECC时,例如,字节大小可能影响算法的选择,一些架构参数进行了检查。此外,还对低端处理器的软件进行了识别。此外,本文还在多方电子交易中实现了ECC算法。
{"title":"Secure Multiparty Electronic Payments Using ECC Algorithm: A Comparative Study","authors":"Dr. K. Ravikumar, A. Udhayakumar","doi":"10.1109/WCCCT.2014.31","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.31","url":null,"abstract":"This paper is an attempt at the detailed study of Cryptography algorithm. In resource constrained system, Elliptic Curve Cryptography is a promising alternative for public algorithms, because it provides similar level of security with proposed shorter keys than conventional integer based public key algorithm. ECC over binary field is taken up with special interest because the operation in binary filed operation, are thought to be more in space and efficient in time. However, ECC's software implementation, on binary field are slow, Specially on low end processors, which are used in small computing devices such as sensors node, mobile phone, etc. This proposed paper, studied the Cryptography algorithms and software implementation of ECC. Firstly, while implementing ECC with software, for example byte size may affect the choice of algorithm some architectural parameters has been examined. Also, identification of software for low-end processors has been done. In addition, the proposed paper has implemented ECC algorithm in Multiparty Electronic transaction.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128654746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Security Issues in Cloud Environment and Solutions 云环境中的数据安全问题及解决方案
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.63
Dr. P. Dinadayalan, S. Jegadeeswari, D. Gnanambigai
Cloud computing is an internet based model that enable convenient, on demand and pay per use access to a pool of shared resources. It is a new technology that satisfies a user's requirement for computing resources like networks, storage, servers, services and applications, Data security is one of the leading concerns and primary challenges for cloud computing. This issue is getting more serious with the development of cloud computing. From the consumers' perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor for adoption of cloud computing services. This paper analyses the basic problem of cloud computing and describes the data security and privacy protection issues in cloud.
云计算是一种基于互联网的模式,可以方便、按需、按次付费地访问共享资源池。它是一种满足用户对网络、存储、服务器、服务和应用程序等计算资源需求的新技术。数据安全是云计算的主要关注点和主要挑战之一。随着云计算的发展,这个问题变得越来越严重。从消费者的角度来看,云计算安全问题,特别是数据安全和隐私保护问题,仍然是采用云计算服务的主要障碍。分析了云计算的基本问题,阐述了云计算中的数据安全和隐私保护问题。
{"title":"Data Security Issues in Cloud Environment and Solutions","authors":"Dr. P. Dinadayalan, S. Jegadeeswari, D. Gnanambigai","doi":"10.1109/WCCCT.2014.63","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.63","url":null,"abstract":"Cloud computing is an internet based model that enable convenient, on demand and pay per use access to a pool of shared resources. It is a new technology that satisfies a user's requirement for computing resources like networks, storage, servers, services and applications, Data security is one of the leading concerns and primary challenges for cloud computing. This issue is getting more serious with the development of cloud computing. From the consumers' perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor for adoption of cloud computing services. This paper analyses the basic problem of cloud computing and describes the data security and privacy protection issues in cloud.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129266974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Security Analysis of Future Enterprise Business Intelligence 未来企业商业智能的安全性分析
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.59
P. Perumal, George Gabriel Richard Roy, Britto Kumar
BI is at a crossroads, its place as an integral part of Data Management is secure, with everyone from the public to the private sector incorporating data into their operational processes. Yet, as the reliance on data increases, the nature of the role that BI will play in future data integration is split into two diametrically opposed possibilities that can substantially alter the form of Data Management. The traditional use of this technology requires formal BI education, a process involving professional certificates and college degrees that aids the growing number of professionals looking to pursue careers as BI analysts. There is also a movement towards the simplification of BI, one of the most distinctly emerging trends related to the data industry, as evinced by the increasing number of business professionals using data to influence their decisions. There is a plethora of evidence to indicate that both of these trends are growing, although conventional wisdom posits that the more popular one will eventually cancel out the other.
商业智能正处于一个十字路口,它作为数据管理的一个组成部分是安全的,从公共部门到私营部门的每个人都将数据纳入他们的运营流程。然而,随着对数据依赖的增加,BI在未来数据集成中扮演的角色的性质被分成两种截然相反的可能性,这两种可能性可以从根本上改变数据管理的形式。这项技术的传统使用需要正规的商业智能教育,这一过程涉及专业证书和大学学位,这有助于越来越多的专业人士寻求商业智能分析师的职业。还有一种趋势是简化商业智能,这是与数据行业相关的最明显的新兴趋势之一,越来越多的商业专业人士使用数据来影响他们的决策就是证明。有大量证据表明,这两种趋势都在增长,尽管传统观点认为,更受欢迎的趋势最终会抵消另一种趋势。
{"title":"Security Analysis of Future Enterprise Business Intelligence","authors":"P. Perumal, George Gabriel Richard Roy, Britto Kumar","doi":"10.1109/WCCCT.2014.59","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.59","url":null,"abstract":"BI is at a crossroads, its place as an integral part of Data Management is secure, with everyone from the public to the private sector incorporating data into their operational processes. Yet, as the reliance on data increases, the nature of the role that BI will play in future data integration is split into two diametrically opposed possibilities that can substantially alter the form of Data Management. The traditional use of this technology requires formal BI education, a process involving professional certificates and college degrees that aids the growing number of professionals looking to pursue careers as BI analysts. There is also a movement towards the simplification of BI, one of the most distinctly emerging trends related to the data industry, as evinced by the increasing number of business professionals using data to influence their decisions. There is a plethora of evidence to indicate that both of these trends are growing, although conventional wisdom posits that the more popular one will eventually cancel out the other.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Fuzzy C Means Algorithm in Automated Detection of Brain Tumor 模糊C均值算法在脑肿瘤自动检测中的性能分析
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.26
R. Preetha, G. Suresh
Image Segmentation is essential and challenging to visualize the tissue of human for analyzing the MR images. In brain MR images, the boundary of tumor tissue is highly irregular. Deformable models and Region based methods are extensively used for medical image segmentation, to locate the boundary of the tumor. Problems associated with non-linear distribution of real data, User interaction and poor convergence to the boundary region limited their usefulness. Clustering of brain tumor images, using Fuzzy C means is robust and effective for tumor localization. Even though the proposed method has high computational complexity, it shows superior results in segmentation efficiency and convergence rate. The Fuzzy C means clustering with the extension of Feature extraction and classification is very promising in the field of brain tumor detection.
在磁共振图像分析中,图像分割是实现人体组织可视化的关键和难点。在脑磁共振图像中,肿瘤组织的边界非常不规则。可变形模型和基于区域的方法被广泛用于医学图像分割,以定位肿瘤的边界。实际数据的非线性分布、用户交互性和边界区域收敛性差等问题限制了它们的实用性。利用模糊C均值对脑肿瘤图像进行聚类,对肿瘤定位具有鲁棒性和有效性。尽管该方法具有较高的计算复杂度,但在分割效率和收敛速度方面取得了较好的效果。模糊C均值聚类及其特征提取和分类的扩展在脑肿瘤检测领域具有广阔的应用前景。
{"title":"Performance Analysis of Fuzzy C Means Algorithm in Automated Detection of Brain Tumor","authors":"R. Preetha, G. Suresh","doi":"10.1109/WCCCT.2014.26","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.26","url":null,"abstract":"Image Segmentation is essential and challenging to visualize the tissue of human for analyzing the MR images. In brain MR images, the boundary of tumor tissue is highly irregular. Deformable models and Region based methods are extensively used for medical image segmentation, to locate the boundary of the tumor. Problems associated with non-linear distribution of real data, User interaction and poor convergence to the boundary region limited their usefulness. Clustering of brain tumor images, using Fuzzy C means is robust and effective for tumor localization. Even though the proposed method has high computational complexity, it shows superior results in segmentation efficiency and convergence rate. The Fuzzy C means clustering with the extension of Feature extraction and classification is very promising in the field of brain tumor detection.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116190690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Recognizability of Intuitionistic Fuzzy Finite Automata-Homomorphic Images 直觉模糊有限自动机同态图像的可识别性
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.56
A. Jordon, Telesphor Lakra, K. J. Priya, T. Rajaretnam
An intuitionistic fuzzy finite automaton with a unique membership transition on an input symbol is considered. It is shown that, if h : Γ* → Σ* is a morphism and h-1(1) = 1, then the image of a recognizable subset of Γ* is a recognizable subset of Σ* and if h is fine, then the inverse image of recognizable subset of Σ* is recognizable. It is also proved that the shuffle product of any two recognizable sets is recognizable.
研究了输入符号上具有唯一隶属转移的直觉模糊有限自动机。结果表明,如果h: Γ*→Σ*是一个态射且h-1(1) = 1,则Γ*的一个可识别子集的图像是Σ*的一个可识别子集,如果h很好,则Σ*的可识别子集的逆图像是可识别的。证明了任意两个可识别集合的洗牌积是可识别的。
{"title":"Recognizability of Intuitionistic Fuzzy Finite Automata-Homomorphic Images","authors":"A. Jordon, Telesphor Lakra, K. J. Priya, T. Rajaretnam","doi":"10.1109/WCCCT.2014.56","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.56","url":null,"abstract":"An intuitionistic fuzzy finite automaton with a unique membership transition on an input symbol is considered. It is shown that, if h : Γ* → Σ* is a morphism and h<sup>-1</sup>(1) = 1, then the image of a recognizable subset of Γ* is a recognizable subset of Σ* and if h is fine, then the inverse image of recognizable subset of Σ* is recognizable. It is also proved that the shuffle product of any two recognizable sets is recognizable.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125677272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Kernel-Based Fuzzy C-Means Clustering for Pest Detection and Classification 基于核的高效模糊c均值聚类害虫检测与分类
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.61
N. Vinushree, B. Hemalatha, V. K. Kaliappan
Plant pest detection is an essential for food security, quality of life and steady agricultural economy. Through rapid infestation by pests and insects various problems faced in enormous agricultural yield for every year. Many researches are being carried out worldwide to identify scientific methodologies for detection of pests. In the recent past, several approaches based on automation and image processing has come to light on the way to address this issue. In this paper we present a clustering technique, the popular algorithm for clustering is kernel-based fuzzy c-means clustering algorithm (KFCM) is used to identify density of pest in plant. A supervised learning neural network was applied to the classification of feature extraction of leaf. The methods studied are for increasing throughput & reducing subjective arising from human experts in detecting the pests in plant.
植物病虫害检测对粮食安全、生活质量和稳定的农业经济至关重要。由于害虫和昆虫的迅速侵袭,每年都面临着巨大的农业产量所面临的各种问题。全世界正在进行许多研究,以确定检测害虫的科学方法。在最近的过去,基于自动化和图像处理的几种方法已经出现在解决这个问题的方法上。本文提出了一种聚类技术,目前常用的聚类算法是基于核的模糊c均值聚类算法(KFCM),用于植物有害生物密度的识别。将监督学习神经网络应用于树叶的分类特征提取。所研究的方法是为了提高植物有害生物检测的吞吐量和减少人类专家对植物有害生物检测的主观性。
{"title":"Efficient Kernel-Based Fuzzy C-Means Clustering for Pest Detection and Classification","authors":"N. Vinushree, B. Hemalatha, V. K. Kaliappan","doi":"10.1109/WCCCT.2014.61","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.61","url":null,"abstract":"Plant pest detection is an essential for food security, quality of life and steady agricultural economy. Through rapid infestation by pests and insects various problems faced in enormous agricultural yield for every year. Many researches are being carried out worldwide to identify scientific methodologies for detection of pests. In the recent past, several approaches based on automation and image processing has come to light on the way to address this issue. In this paper we present a clustering technique, the popular algorithm for clustering is kernel-based fuzzy c-means clustering algorithm (KFCM) is used to identify density of pest in plant. A supervised learning neural network was applied to the classification of feature extraction of leaf. The methods studied are for increasing throughput & reducing subjective arising from human experts in detecting the pests in plant.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127302039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Fuzzy Cost Based Multipath Routing Protocol for MANETS 基于模糊代价的多路径路由协议
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.10
K. Thangadurai, C. V. Anchugam
Routing is a challenging issue in MANET due to node mobility, unstable links and limited resources. Swarm Intelligence (SI), as demonstrated by social behavior of ant based on self organization, which allows exploiting to coordinate population of artificial ants the collaborative to solve computational problems. However already existing SI based routing protocols find a optimal path by considering one or two route selection metrics, such as time delay or node count. Conventional routing algorithm found to be unsuitable for routing multimedia traffic or real time applications which requires optimization of several qualities of service parameters. They are not considering correlations among multiple route selection parameters. In the proposal a approach called fuzzy ant colony based routing protocol using fuzzy logic and SI of different objectives while retaining the merits of swarm based intelligence algorithm. Simulation results show that great improvement for existing SI based routing protocols for routing in MANET.
由于节点的可移动性、链路的不稳定性和资源的有限性,路由问题在MANET中是一个具有挑战性的问题。蚁群智能(Swarm Intelligence, SI)是蚂蚁基于自组织的社会行为,它允许开发人员协调人工蚂蚁群体,协同解决计算问题。然而,现有的基于SI的路由协议通过考虑一个或两个路由选择指标(如时间延迟或节点计数)来找到最优路径。传统的路由算法不适用于多媒体流量或需要优化多个服务质量参数的实时应用。它们没有考虑多个选路参数之间的相关性。在保留群体智能算法优点的基础上,提出了一种基于模糊逻辑和不同目标的模糊蚁群路由协议。仿真结果表明,该方法对现有的基于SI的路由协议进行了改进。
{"title":"Fuzzy Cost Based Multipath Routing Protocol for MANETS","authors":"K. Thangadurai, C. V. Anchugam","doi":"10.1109/WCCCT.2014.10","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.10","url":null,"abstract":"Routing is a challenging issue in MANET due to node mobility, unstable links and limited resources. Swarm Intelligence (SI), as demonstrated by social behavior of ant based on self organization, which allows exploiting to coordinate population of artificial ants the collaborative to solve computational problems. However already existing SI based routing protocols find a optimal path by considering one or two route selection metrics, such as time delay or node count. Conventional routing algorithm found to be unsuitable for routing multimedia traffic or real time applications which requires optimization of several qualities of service parameters. They are not considering correlations among multiple route selection parameters. In the proposal a approach called fuzzy ant colony based routing protocol using fuzzy logic and SI of different objectives while retaining the merits of swarm based intelligence algorithm. Simulation results show that great improvement for existing SI based routing protocols for routing in MANET.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130360415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Ear as a Raised area for Hottest Biometric Solution Using Universality, Distinctiveness, Permanence and Measurability Properties -- PURS Using UDPM 耳朵作为最热门的生物识别解决方案的提升领域,具有通用性,独特性,持久性和可测量性-使用UDPM的PURS
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.57
G. S. Kamatchi, G Gnanajeyaraman Rajaram
Traditionally, thumb print and iris pattern are used for person identification as biometric features. The recent use of biometric evolution for person identification is ear. In this paper PURS using UDPM (Person Unique Recognition System using Universality, Distinctiveness, Permanence, and Measurability), processes biometric characteristic, human ear, to uniquely recognize a person with the help of the ear features. Ear image is captured digitally and is processed to extract ear features (Helix rim, Lobule, Triangular fossa, Conch a, Tragus, Cannal Intertraguiano, Crus of Helix, Antihelix, and Antritragus) and stored in database for matching process. [12]. Matching process uses projection lines to quantify ear features and provides corresponding profile as a end result of system in graphical format as well as textual format with tolerance boundary. A system is presented here for person recognition using ear features.
传统上,指纹和虹膜作为生物特征被用于人的身份识别。生物识别进化的最新应用是人的身份识别。本文利用UDPM (Person Unique Recognition System,通用性、独特性、持久性、可测量性)对人耳的生物特征进行处理,利用人耳的特征对人进行唯一识别。对耳图像进行数字化采集,提取耳廓特征(螺旋边缘、小叶、三角窝、海螺、耳屏、耳间沟、螺旋足、反螺旋足、耳窦),存储在数据库中进行匹配处理。[12]。匹配过程利用投影线对耳朵特征进行量化,并以图形格式和具有公差边界的文本格式提供相应的轮廓作为系统的最终结果。本文提出了一种基于人耳特征的人脸识别系统。
{"title":"Ear as a Raised area for Hottest Biometric Solution Using Universality, Distinctiveness, Permanence and Measurability Properties -- PURS Using UDPM","authors":"G. S. Kamatchi, G Gnanajeyaraman Rajaram","doi":"10.1109/WCCCT.2014.57","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.57","url":null,"abstract":"Traditionally, thumb print and iris pattern are used for person identification as biometric features. The recent use of biometric evolution for person identification is ear. In this paper PURS using UDPM (Person Unique Recognition System using Universality, Distinctiveness, Permanence, and Measurability), processes biometric characteristic, human ear, to uniquely recognize a person with the help of the ear features. Ear image is captured digitally and is processed to extract ear features (Helix rim, Lobule, Triangular fossa, Conch a, Tragus, Cannal Intertraguiano, Crus of Helix, Antihelix, and Antritragus) and stored in database for matching process. [12]. Matching process uses projection lines to quantify ear features and provides corresponding profile as a end result of system in graphical format as well as textual format with tolerance boundary. A system is presented here for person recognition using ear features.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134178881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing an Error Logging Framework for Ruby on Rails Application Using AOP 使用AOP为Ruby on Rails应用程序开发错误日志记录框架
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.19
M. Gomathy, V. Devi, D. Meenakshi
A framework for detecting and recording the flaws that happen during the usage of web applications is designed and a library functionality to perform this is discussed in this paper. The recorded information can be stored at different levels of detail, commonly called the logging levels. For some modules more than others, it may be required to store more detailed information about any error that arises during its usage according to its importance. A Web Application also needs to print the stack trace containing the error information on the web page when an error occurs for the user to understand the nature of the error. When dealing with legacy web applications, it is difficult to insert code. The proposed and designed framework is tested with a web application called Kic Kart.
本文设计了一个用于检测和记录web应用程序使用过程中出现的缺陷的框架,并讨论了实现该框架的库功能。记录的信息可以存储在不同的详细级别,通常称为日志级别。对于某些模块,可能需要根据其重要性存储有关其使用过程中出现的任何错误的更详细信息。当发生错误时,Web应用程序还需要在网页上打印包含错误信息的堆栈跟踪,以便用户了解错误的性质。在处理遗留web应用程序时,很难插入代码。通过一个名为Kic Kart的web应用程序对所提出和设计的框架进行了测试。
{"title":"Developing an Error Logging Framework for Ruby on Rails Application Using AOP","authors":"M. Gomathy, V. Devi, D. Meenakshi","doi":"10.1109/WCCCT.2014.19","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.19","url":null,"abstract":"A framework for detecting and recording the flaws that happen during the usage of web applications is designed and a library functionality to perform this is discussed in this paper. The recorded information can be stored at different levels of detail, commonly called the logging levels. For some modules more than others, it may be required to store more detailed information about any error that arises during its usage according to its importance. A Web Application also needs to print the stack trace containing the error information on the web page when an error occurs for the user to understand the nature of the error. When dealing with legacy web applications, it is difficult to insert code. The proposed and designed framework is tested with a web application called Kic Kart.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116311826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Reactive AODV Routing Protocol for MANET 面向MANET的无功AODV路由协议分析
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.70
Mr B Karthikeyan, Mrs N Kanimozhi, Ganesh
Ad-Hoc network is the ultimate solution for mobile (movable) user's network. Now a day the huge growth of mobile users in network, so such infrastructure less (MANET) network are needed. Mobile Ad-Hoc Network (MANET) is a collection of mobile device, multi hop and self configured network. In this infrastructure less (MANET) network the routing is a challenging work, because there is no fixed device, all are movable and each device act as a node as well as a router. The mobile Ad-Hoc network has more routing protocols to address the packet. According to the previous survey, we found the Ad-Hoc On demand Distance Vector Protocol (AODV) is the best choice for different types of infrastructure less network. This work proposed to find merits and demerits of the AODV protocol using OMNET++ simulator.
Ad-Hoc网络是移动用户网络的最终解决方案。现在每天移动用户在网络上的巨大增长,因此对这样的基础设施(MANET)网络的需求越来越少。移动自组网(MANET)是一种集移动设备、多跳和自配置为一体的网络。在这种基础设施少(MANET)网络中,路由是一项具有挑战性的工作,因为没有固定的设备,所有的设备都是可移动的,每个设备既充当节点又充当路由器。移动Ad-Hoc网络有更多的路由协议来处理数据包。根据之前的调查,我们发现Ad-Hoc按需距离矢量协议(AODV)是不同类型的无基础设施网络的最佳选择。本文提出了利用omnet++模拟器来发现AODV协议的优缺点。
{"title":"Analysis of Reactive AODV Routing Protocol for MANET","authors":"Mr B Karthikeyan, Mrs N Kanimozhi, Ganesh","doi":"10.1109/WCCCT.2014.70","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.70","url":null,"abstract":"Ad-Hoc network is the ultimate solution for mobile (movable) user's network. Now a day the huge growth of mobile users in network, so such infrastructure less (MANET) network are needed. Mobile Ad-Hoc Network (MANET) is a collection of mobile device, multi hop and self configured network. In this infrastructure less (MANET) network the routing is a challenging work, because there is no fixed device, all are movable and each device act as a node as well as a router. The mobile Ad-Hoc network has more routing protocols to address the packet. According to the previous survey, we found the Ad-Hoc On demand Distance Vector Protocol (AODV) is the best choice for different types of infrastructure less network. This work proposed to find merits and demerits of the AODV protocol using OMNET++ simulator.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133886002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2014 World Congress on Computing and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1