首页 > 最新文献

2014 World Congress on Computing and Communication Technologies最新文献

英文 中文
Recognition of Marathi Handwritten Numerals Using Multi-Layer Feed-Forward Neural Network 基于多层前馈神经网络的马拉地手写数字识别
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.9
R. Hegadi, Parshuram M. Kamble
Marathi is one of the ancient Indian languages majorly spoken in the state of Maharashtra. Marathi is one of the Devanagari script and the literals and numerals are almost similar to Hindi. Recognition of handwritten Marathi numerals is quite challenging task because people have the practice of writing these numerals in variant ways. In this work we have presented a method to recognize the handwritten Marathi numerals using multilayer feed-forward neural network. The scanned document image is pre-processed to eliminate the noise and care is taken to link the broken characters. Each numeral is segmented from the document and it is resized to 7 × 5 pixels using cubic interpolation. While resizing a technique is used to provide better representation for every pixel in segmented numeral. This resized numeral is converted into a vector with 35 values before inputting it to the neural network. We have used 100 sets containing 1000 numerals for this experimentation, of which 50 sets are used for training the network and 50 sets for the testing purpose. The overall recognition rate of the proposed method is 97%.
马拉地语是古印度语言之一,主要在马哈拉施特拉邦使用。马拉地语是Devanagari文字的一种,其文字和数字几乎与印地语相似。识别手写的马拉地语数字是一项相当具有挑战性的任务,因为人们有以各种方式书写这些数字的习惯。在这项工作中,我们提出了一种使用多层前馈神经网络识别手写马拉地数字的方法。对扫描的文档图像进行预处理以消除噪声,并注意将破碎的字符连接起来。每个数字都从文档中分割出来,并使用立方插值将其大小调整为7 × 5像素。在调整尺寸的同时,采用了一种技术为分割数字中的每个像素提供更好的表示。这个调整大小的数字在输入到神经网络之前被转换成一个有35个值的向量。本次实验我们使用了100个包含1000个数字的集合,其中50个集合用于训练网络,50个集合用于测试。该方法的总体识别率为97%。
{"title":"Recognition of Marathi Handwritten Numerals Using Multi-Layer Feed-Forward Neural Network","authors":"R. Hegadi, Parshuram M. Kamble","doi":"10.1109/WCCCT.2014.9","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.9","url":null,"abstract":"Marathi is one of the ancient Indian languages majorly spoken in the state of Maharashtra. Marathi is one of the Devanagari script and the literals and numerals are almost similar to Hindi. Recognition of handwritten Marathi numerals is quite challenging task because people have the practice of writing these numerals in variant ways. In this work we have presented a method to recognize the handwritten Marathi numerals using multilayer feed-forward neural network. The scanned document image is pre-processed to eliminate the noise and care is taken to link the broken characters. Each numeral is segmented from the document and it is resized to 7 × 5 pixels using cubic interpolation. While resizing a technique is used to provide better representation for every pixel in segmented numeral. This resized numeral is converted into a vector with 35 values before inputting it to the neural network. We have used 100 sets containing 1000 numerals for this experimentation, of which 50 sets are used for training the network and 50 sets for the testing purpose. The overall recognition rate of the proposed method is 97%.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133369195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An Architecture for Data Security in Cloud Computing 云计算中的数据安全体系结构
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.53
M. Sugumaran, B. Murugan, D. Kamalraj
Cloud computing is a more flexible, cost effective and proven delivery platform for providing business or consumer services over the Internet. Cloud computing supports distributed service oriented architecture, multi-user and multi-domain administrative infrastructure. So, it is more prone to security threats and vulnerabilities. At present, a major concern in cloud adoption is towards its security and privacy. Security and privacy issues are of great concern to cloud service providers who are actually hosting the services. In most cases, the provider must guarantee that their infrastructure is secure and clients' data and applications are safe, by implementing security policies and mechanisms. The security issues are organized into several general categories: trust, identity management, software isolation, data protection, availability reliability, ownership, data backup, data portability and conversion, multi platform support and intellectual property. In this paper, it is discuss about some of the techniques that were implemented to protect data and propose architecture to protect data in cloud. This architecture was developed to store data in cloud in encrypted data format using cryptography technique which is based on block cipher.
云计算是一种更灵活、更具成本效益且经过验证的交付平台,用于在互联网上提供业务或消费者服务。云计算支持面向服务的分布式体系结构、多用户和多域管理基础设施。因此,它更容易受到安全威胁和漏洞。目前,采用云计算的主要关注点是其安全性和隐私性。安全性和隐私问题是实际托管服务的云服务提供商非常关心的问题。在大多数情况下,提供商必须通过实现安全策略和机制来保证其基础设施是安全的,客户的数据和应用程序是安全的。安全问题分为几大类:信任、身份管理、软件隔离、数据保护、可用性可靠性、所有权、数据备份、数据可移植性和转换、多平台支持和知识产权。本文讨论了在云环境中实现数据保护的一些技术,提出了云环境中数据保护的体系结构。该体系结构采用基于分组密码的密码学技术,以加密的数据格式在云中存储数据。
{"title":"An Architecture for Data Security in Cloud Computing","authors":"M. Sugumaran, B. Murugan, D. Kamalraj","doi":"10.1109/WCCCT.2014.53","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.53","url":null,"abstract":"Cloud computing is a more flexible, cost effective and proven delivery platform for providing business or consumer services over the Internet. Cloud computing supports distributed service oriented architecture, multi-user and multi-domain administrative infrastructure. So, it is more prone to security threats and vulnerabilities. At present, a major concern in cloud adoption is towards its security and privacy. Security and privacy issues are of great concern to cloud service providers who are actually hosting the services. In most cases, the provider must guarantee that their infrastructure is secure and clients' data and applications are safe, by implementing security policies and mechanisms. The security issues are organized into several general categories: trust, identity management, software isolation, data protection, availability reliability, ownership, data backup, data portability and conversion, multi platform support and intellectual property. In this paper, it is discuss about some of the techniques that were implemented to protect data and propose architecture to protect data in cloud. This architecture was developed to store data in cloud in encrypted data format using cryptography technique which is based on block cipher.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127466598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Performance Evaluation of Semantic Approaches for Automatic Clustering of Similar Web Services 相似Web服务自动聚类的语义方法性能评价
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.41
G. Vadivelou, E. Ilavarasan
In current web applications, more businesses are gradually publishing their business as services over the web. This growing number of web services available within an organization and on the Web raises a new and challenging search problem: locating desired web services. Searching for web services with conventional web search engines is insufficient in this context. Automatically clustering Web Service Description Language (WSDL) files on the web into functionally similar homogeneous service groups can be seen as a bootstrapping step for creating a service search engine and, at the same time, reducing the search space for service discovery. In order to overcome some the limitations of pattern-matching approach, the proposed work uses two semantic approaches to cluster similar services. An experimental study based on an information retrieval technique known as latent semantic analysis is applied to the collection of WSDL files and the another semantic approach is based on WordNet which is a lexical database to cluster similar services, as a predecessor step to retrieve the relevant Web services for a user request by search engines. The baseline approach and the two approaches based on semantic is applied on a collection of WSDL documents consisting of to test the quality of clusters formed. As a result, WordNet based approach for clustering shows better cluster quality.
在当前的web应用程序中,越来越多的企业逐渐将其业务作为服务发布到web上。组织内和web上可用的web服务数量不断增加,这引发了一个新的、具有挑战性的搜索问题:定位所需的web服务。在这种情况下,使用传统的web搜索引擎搜索web服务是不够的。将Web上的Web服务描述语言(WSDL)文件自动聚类到功能相似的同构服务组中,可以看作是创建服务搜索引擎的一个引导步骤,同时减少了服务发现的搜索空间。为了克服模式匹配方法的一些局限性,本文采用两种语义方法对相似服务进行聚类。一种基于潜在语义分析的信息检索技术的实验研究被应用于WSDL文件的集合,另一种语义方法是基于WordNet,它是一个词法数据库,用于聚类类似的服务,作为搜索引擎检索用户请求的相关Web服务的前驱步骤。基线方法和基于语义的两种方法分别应用于由WSDL文档组成的集合上,以测试所形成的簇的质量。因此,基于WordNet的聚类方法显示出更好的聚类质量。
{"title":"Performance Evaluation of Semantic Approaches for Automatic Clustering of Similar Web Services","authors":"G. Vadivelou, E. Ilavarasan","doi":"10.1109/WCCCT.2014.41","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.41","url":null,"abstract":"In current web applications, more businesses are gradually publishing their business as services over the web. This growing number of web services available within an organization and on the Web raises a new and challenging search problem: locating desired web services. Searching for web services with conventional web search engines is insufficient in this context. Automatically clustering Web Service Description Language (WSDL) files on the web into functionally similar homogeneous service groups can be seen as a bootstrapping step for creating a service search engine and, at the same time, reducing the search space for service discovery. In order to overcome some the limitations of pattern-matching approach, the proposed work uses two semantic approaches to cluster similar services. An experimental study based on an information retrieval technique known as latent semantic analysis is applied to the collection of WSDL files and the another semantic approach is based on WordNet which is a lexical database to cluster similar services, as a predecessor step to retrieve the relevant Web services for a user request by search engines. The baseline approach and the two approaches based on semantic is applied on a collection of WSDL documents consisting of to test the quality of clusters formed. As a result, WordNet based approach for clustering shows better cluster quality.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SaaS Framework for Library Augmented Reality Application 图书馆增强现实应用的SaaS框架
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.58
A. Alex, S. Jegatha, J. Jayanthi, S. Rabara
Augmented reality is an emerging technology of Virtual Reality, which has a great development and application prospects. Augmented Reality involves knowledge about sensors, image recognition, computer vision, human-computer interaction, virtual reality, and many other areas. The key technologies include displaying, registration and tracking, interactive etc. There exist a number of augmented reality applications. Most of them are able to collect the data from different servers related to the environment and traffic etc. But the softwares which address the students' issues are very less or in the discussion stages. Hence in this paper, we planned to focus on one of the major issue of automating Library application with the augmented reality software and we propose architecture for accessing the library books meta-data.
增强现实是虚拟现实的一种新兴技术,具有很大的发展和应用前景。增强现实涉及传感器、图像识别、计算机视觉、人机交互、虚拟现实和许多其他领域的知识。关键技术包括显示、注册与跟踪、交互等。现在有很多增强现实应用。它们中的大多数都能够从不同的服务器收集与环境和流量等相关的数据。但是解决学生问题的软件很少,或者还处于讨论阶段。因此,在本文中,我们计划将重点放在使用增强现实软件自动化图书馆应用程序的主要问题之一,并提出了访问图书馆图书元数据的架构。
{"title":"SaaS Framework for Library Augmented Reality Application","authors":"A. Alex, S. Jegatha, J. Jayanthi, S. Rabara","doi":"10.1109/WCCCT.2014.58","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.58","url":null,"abstract":"Augmented reality is an emerging technology of Virtual Reality, which has a great development and application prospects. Augmented Reality involves knowledge about sensors, image recognition, computer vision, human-computer interaction, virtual reality, and many other areas. The key technologies include displaying, registration and tracking, interactive etc. There exist a number of augmented reality applications. Most of them are able to collect the data from different servers related to the environment and traffic etc. But the softwares which address the students' issues are very less or in the discussion stages. Hence in this paper, we planned to focus on one of the major issue of automating Library application with the augmented reality software and we propose architecture for accessing the library books meta-data.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127739281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Parallelized Pattern Recognition Based DNA Sequence Compressor 基于并行模式识别的DNA序列压缩
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.33
S. P. Arokiaraj, L. Robert
DNA sequences contain hereditary information of all living organisms. The exploration of genomic research compulsorily involves such large sequences in high volumes and it requires voluminous storage. An initiative to reduce such storage is achieved through DNA data compression. The compression time is another influencing factor for compression algorithms and whose consumption must be reduced. This paper aims the same by proposing Parallelized Pattern Recognition based DNA Sequence Compression (PPRDNAC) algorithm that compresses the DNA sequences by identifying the appropriate patterns simultaneously with appreciable computation time.
DNA序列包含了所有生物的遗传信息。基因组研究的探索必然涉及如此大量的大序列,它需要大容量的存储。一项减少这种存储的倡议是通过DNA数据压缩实现的。压缩时间是影响压缩算法的另一个因素,必须降低压缩时间的消耗。本文提出了基于并行模式识别的DNA序列压缩(PPRDNAC)算法,该算法通过同时识别合适的模式来压缩DNA序列,并且计算时间短。
{"title":"Parallelized Pattern Recognition Based DNA Sequence Compressor","authors":"S. P. Arokiaraj, L. Robert","doi":"10.1109/WCCCT.2014.33","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.33","url":null,"abstract":"DNA sequences contain hereditary information of all living organisms. The exploration of genomic research compulsorily involves such large sequences in high volumes and it requires voluminous storage. An initiative to reduce such storage is achieved through DNA data compression. The compression time is another influencing factor for compression algorithms and whose consumption must be reduced. This paper aims the same by proposing Parallelized Pattern Recognition based DNA Sequence Compression (PPRDNAC) algorithm that compresses the DNA sequences by identifying the appropriate patterns simultaneously with appreciable computation time.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115815423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Message Encryption Using DNA Sequences 使用DNA序列的信息加密
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.35
K. Menaka
Data hiding is the skill of hiding messages in such a way that only the sender and the receiver of the message know that the message has been hidden. In the contexts of secured information transmission and reception, efficient techniques for data encryption and decryption are very much essential. Though many algorithms have been developed for hiding the data, DNA sequences based data encryption seems to be a promising strategy for fulfilling the current information security needs. In this paper, an algorithm using DNA sequences for data hiding is proposed and discussed for secure data transmission and reception.
数据隐藏是一种以只有消息的发送者和接收者知道消息被隐藏的方式隐藏消息的技能。在安全信息传输和接收的背景下,有效的数据加密和解密技术是非常必要的。虽然已经开发了许多用于隐藏数据的算法,但基于DNA序列的数据加密似乎是满足当前信息安全需求的一种很有前途的策略。本文提出并讨论了一种利用DNA序列进行数据隐藏的算法,以保证数据的安全传输和接收。
{"title":"Message Encryption Using DNA Sequences","authors":"K. Menaka","doi":"10.1109/WCCCT.2014.35","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.35","url":null,"abstract":"Data hiding is the skill of hiding messages in such a way that only the sender and the receiver of the message know that the message has been hidden. In the contexts of secured information transmission and reception, efficient techniques for data encryption and decryption are very much essential. Though many algorithms have been developed for hiding the data, DNA sequences based data encryption seems to be a promising strategy for fulfilling the current information security needs. In this paper, an algorithm using DNA sequences for data hiding is proposed and discussed for secure data transmission and reception.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116930535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Cloud Storage and Retrieval - A User Perspective 云存储和检索——用户视角
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.20
V. Abhishek, S. Megha
The young upcoming industry is the cloud storage with lots of potential in terms of growth of storage capacity and the potential of faster retrieval. The architecture of the cloud is designed so as to not only offer unlimited storage capacity, but also has to eliminate the old data backups - created as a part of the constant replication of data. In this paper, the key component is storage-as-a-service solution, that is, the cloud storage is analyzed and comprehended for the storage and retrieval speeds on various free cloud storage sites. The experiments were piloted for files varying in sizes and various time spans. Time spans are deliberated based on network traffic. This paper overall tries to give a snapshot of the data working on different free clouds available. The analysis done gives an identification of the free cloud storage capacity, its performance, betterments and evaluation.
云存储是一个新兴的行业,在存储容量的增长和更快的检索方面具有很大的潜力。云架构的设计不仅是为了提供无限的存储容量,而且还必须消除旧的数据备份——作为数据持续复制的一部分而创建的。本文的关键组件是存储即服务解决方案,即对云存储在各种免费云存储站点上的存储和检索速度进行分析和理解。这些实验是针对不同大小和不同时间跨度的文件进行的。时间跨度是根据网络流量来考虑的。本文总体上试图给出在不同可用的免费云上运行的数据的快照。所做的分析给出了免费云存储容量的识别,其性能,改进和评估。
{"title":"Cloud Storage and Retrieval - A User Perspective","authors":"V. Abhishek, S. Megha","doi":"10.1109/WCCCT.2014.20","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.20","url":null,"abstract":"The young upcoming industry is the cloud storage with lots of potential in terms of growth of storage capacity and the potential of faster retrieval. The architecture of the cloud is designed so as to not only offer unlimited storage capacity, but also has to eliminate the old data backups - created as a part of the constant replication of data. In this paper, the key component is storage-as-a-service solution, that is, the cloud storage is analyzed and comprehended for the storage and retrieval speeds on various free cloud storage sites. The experiments were piloted for files varying in sizes and various time spans. Time spans are deliberated based on network traffic. This paper overall tries to give a snapshot of the data working on different free clouds available. The analysis done gives an identification of the free cloud storage capacity, its performance, betterments and evaluation.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115738452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Cloud Model for Effective E-Learning 有效电子学习的云模型
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.51
I. Carol, George Gabriel Richard Roy, A. J. P. Prassanna
The integration of information and communication technologies in education according to the global trend is occupying a great interest in the world through E-Learning techniques. And the institutions of higher education are dipping their toes into the cloud computing waters, just as organizations in the broader market are doing. A new model for accessing the E-materials in the educational community cloud is proposed in this paper. The educational materials can be stored and accessed from the cloud servers rather than every institution maintaining their own computing facilities. The learners need an environment to access the application anywhere, anytime and with any device at a minimum cost. This paper strengthens the traditional learning technique by proposing a new model for Effective E-learning in the cloud.
根据全球发展趋势,通过E-Learning技术将信息通信技术与教育相结合,引起了世界各国的极大兴趣。高等教育机构也开始涉足云计算领域,就像更广泛市场中的组织一样。本文提出了一种新的教育社区云电子资料访问模型。教育资料可以从云服务器存储和访问,而不是每个机构维护自己的计算设施。学习者需要一个环境,以最低的成本随时随地使用任何设备访问应用程序。本文通过提出一种新的云环境下有效的电子学习模型,对传统的学习技术进行了改进。
{"title":"A Cloud Model for Effective E-Learning","authors":"I. Carol, George Gabriel Richard Roy, A. J. P. Prassanna","doi":"10.1109/WCCCT.2014.51","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.51","url":null,"abstract":"The integration of information and communication technologies in education according to the global trend is occupying a great interest in the world through E-Learning techniques. And the institutions of higher education are dipping their toes into the cloud computing waters, just as organizations in the broader market are doing. A new model for accessing the E-materials in the educational community cloud is proposed in this paper. The educational materials can be stored and accessed from the cloud servers rather than every institution maintaining their own computing facilities. The learners need an environment to access the application anywhere, anytime and with any device at a minimum cost. This paper strengthens the traditional learning technique by proposing a new model for Effective E-learning in the cloud.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115123836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enhancing Security Level for Public Key Cryptosystem Using MRGA 利用MRGA提高公钥密码系统的安全级别
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.32
D. Amalarethinam
The efficiency of cryptographic algorithm is not only based on the time taken for encryption and decryption, but also the number of levels used to get the cipher text from a plain text. The public key cryptosystem RSA is one of the widely used algorithms. However, several attacks are introduced to break this algorithm due to certain limitations. Also, it may not be guaranteed that the cipher text is fully secured. One of such limitations in the past cryptosystem is using ASCII characters for numerical representation of the text. To overcome the above said limitation, an innovative algorithm namely Magic Rectangle Generation Algorithm (MRGA) is being proposed in this work. It is helpful to enhance the security due to its complexity in encryption process. The singly even magic rectangle is formed based on the seed number, start number, row sum and column sum. The value of row sum and column sum is very difficult to be traced. The proposed work introduces one more level of security in public key algorithms such as RSA, ElGAMAL etc. Finally, MRGA helps to overcome the weakness of public key cryptosystem. Cipher text developed by this method can be entirely different when compared to the plain text and will be suitable for the secured transmission over the internet.
加密算法的效率不仅取决于加密和解密所花费的时间,还取决于从明文中获得密文所使用的层数。公钥密码系统RSA是目前广泛使用的加密算法之一。然而,由于该算法的局限性,引入了几种攻击来破坏该算法。此外,也不能保证密文是完全安全的。在过去的密码系统中,这样的限制之一是使用ASCII字符作为文本的数字表示。为了克服上述限制,本文提出了一种创新的算法,即魔矩形生成算法(MRGA)。由于其加密过程的复杂性,有助于提高安全性。单偶幻矩形由种子数、起始数、行和、列和组成。行和和列和的值很难被跟踪。所提出的工作在RSA、ElGAMAL等公钥算法中引入了一个新的安全级别。最后,MRGA有助于克服公钥密码体制的弱点。用这种方法生成的密文与明文相比具有完全不同的特性,适用于互联网上的安全传输。
{"title":"Enhancing Security Level for Public Key Cryptosystem Using MRGA","authors":"D. Amalarethinam","doi":"10.1109/WCCCT.2014.32","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.32","url":null,"abstract":"The efficiency of cryptographic algorithm is not only based on the time taken for encryption and decryption, but also the number of levels used to get the cipher text from a plain text. The public key cryptosystem RSA is one of the widely used algorithms. However, several attacks are introduced to break this algorithm due to certain limitations. Also, it may not be guaranteed that the cipher text is fully secured. One of such limitations in the past cryptosystem is using ASCII characters for numerical representation of the text. To overcome the above said limitation, an innovative algorithm namely Magic Rectangle Generation Algorithm (MRGA) is being proposed in this work. It is helpful to enhance the security due to its complexity in encryption process. The singly even magic rectangle is formed based on the seed number, start number, row sum and column sum. The value of row sum and column sum is very difficult to be traced. The proposed work introduces one more level of security in public key algorithms such as RSA, ElGAMAL etc. Finally, MRGA helps to overcome the weakness of public key cryptosystem. Cipher text developed by this method can be entirely different when compared to the plain text and will be suitable for the secured transmission over the internet.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129457467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Applying User-Favorite-Item-Based Similarity into Slope One Scheme for Collaborative Filtering 基于用户收藏项相似度的斜率一协同过滤方案
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.43
Ziqing Zhang, Xinhuai Tang, D. Chen
Collaborative Filtering (CF) is one of the most effective technologies in making rating prediction for recommender systems. Traditional user-based CF methods take user-item matrices as input and compute the prediction value based on user similarity. The computation of similarity between each user pair requires exact matching on item set by finding a minimum number of same items rated by both users. However in real-world scenario, the input matrix is very sparse, therefore the amount of required information is far from enough to compute reliable similarity. To deal with this so-called data sparsity problem, we introduce a novel user similarity measure based on user favorite items (UFI) and apply it into Slope One scheme for rating prediction. The experimental results suggest that UFI user similarity measure is effective in user-based approaches and UFI-based Slope One algorithm can provide better quality of prediction than best available similarity-based CF algorithms.
协同过滤(CF)是对推荐系统进行评级预测最有效的技术之一。传统的基于用户的CF方法以用户项矩阵为输入,根据用户相似度计算预测值。计算每个用户对之间的相似度需要通过找到两个用户评价的相同项目的最小数量来精确匹配项目集。然而,在现实场景中,输入矩阵非常稀疏,因此所需的信息量远远不足以计算可靠的相似度。为了解决这种所谓的数据稀疏性问题,我们引入了一种基于用户喜爱项目(UFI)的用户相似度度量,并将其应用于斜率一方案中进行评级预测。实验结果表明,UFI用户相似度度量在基于用户的方法中是有效的,基于UFI的Slope One算法比现有的基于相似度的CF算法提供更好的预测质量。
{"title":"Applying User-Favorite-Item-Based Similarity into Slope One Scheme for Collaborative Filtering","authors":"Ziqing Zhang, Xinhuai Tang, D. Chen","doi":"10.1109/WCCCT.2014.43","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.43","url":null,"abstract":"Collaborative Filtering (CF) is one of the most effective technologies in making rating prediction for recommender systems. Traditional user-based CF methods take user-item matrices as input and compute the prediction value based on user similarity. The computation of similarity between each user pair requires exact matching on item set by finding a minimum number of same items rated by both users. However in real-world scenario, the input matrix is very sparse, therefore the amount of required information is far from enough to compute reliable similarity. To deal with this so-called data sparsity problem, we introduce a novel user similarity measure based on user favorite items (UFI) and apply it into Slope One scheme for rating prediction. The experimental results suggest that UFI user similarity measure is effective in user-based approaches and UFI-based Slope One algorithm can provide better quality of prediction than best available similarity-based CF algorithms.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116727854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2014 World Congress on Computing and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1