首页 > 最新文献

2014 International Conference on Recent Trends in Information Technology最新文献

英文 中文
DigiCloud: Scrutinizing apt service for coping with confidential control over utility practice DigiCloud:审查适当的服务,以应对公用事业实践的机密控制
Pub Date : 2014-12-29 DOI: 10.1109/ICRTIT.2014.6996162
T. Prasath, R. Vijayalakshmi, Krishnarao Arthi
In day today emerging trends utility services, cloud and green computations are playing the major task. The Utilities based paradigm provides many services for general public and other business activities. In the middle end cloud plays the vital role in shifting towards computational paradigm and pays way for users to utilize the resources anywhere at any time. In the current trend green replaces cloud with the effective performance evaluation strategy, with proper resource utilization without any waste of resource not in use. In this paper, it aims at developing digital cloud based utility management to enhance security based metering and billing service by using monitoring strategy. The security based monitoring service provides the way for the utility usage service, to maintain the efficient billing strategy as per the metering service. It also provides zonal wide substation monitoring and base station monitoring services are enhanced to track in with proper usage of utilities by the general public. In the existing service analog based metering services are allowed, but the identification of electric hack is very high in the perspective of security and monitoring. Here the advanced digital based cloud fault detection management is enhanced and security, monitoring is improved.
在当今新兴趋势中,公用事业服务、云计算和绿色计算正在发挥主要作用。基于utility的范例为一般公众和其他业务活动提供了许多服务。在中端,云在向计算范式的转变中起着至关重要的作用,并为用户随时随地利用资源提供了途径。在当前的趋势下,绿色以有效的绩效评估策略取代了云,合理利用资源,不浪费未使用的资源。本文旨在开发基于数字云的公用事业管理,利用监控策略增强基于安全的计量计费服务。基于安全性的监视服务为公用事业使用服务提供了一种方法,使其能够按照计量服务维护有效的计费策略。它还提供区域范围的变电站监测和基站监测服务,以跟踪公众对公用事业的正确使用。在现有的业务中,基于模拟的计量业务是允许的,但从安全和监控的角度来看,对电黑客的识别要求非常高。在这里,先进的基于数字化的云故障检测管理得到了加强,安全性、监控得到了提高。
{"title":"DigiCloud: Scrutinizing apt service for coping with confidential control over utility practice","authors":"T. Prasath, R. Vijayalakshmi, Krishnarao Arthi","doi":"10.1109/ICRTIT.2014.6996162","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996162","url":null,"abstract":"In day today emerging trends utility services, cloud and green computations are playing the major task. The Utilities based paradigm provides many services for general public and other business activities. In the middle end cloud plays the vital role in shifting towards computational paradigm and pays way for users to utilize the resources anywhere at any time. In the current trend green replaces cloud with the effective performance evaluation strategy, with proper resource utilization without any waste of resource not in use. In this paper, it aims at developing digital cloud based utility management to enhance security based metering and billing service by using monitoring strategy. The security based monitoring service provides the way for the utility usage service, to maintain the efficient billing strategy as per the metering service. It also provides zonal wide substation monitoring and base station monitoring services are enhanced to track in with proper usage of utilities by the general public. In the existing service analog based metering services are allowed, but the identification of electric hack is very high in the perspective of security and monitoring. Here the advanced digital based cloud fault detection management is enhanced and security, monitoring is improved.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127897557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and performance tradeoff analysis of floating point datapath in LTE downlink control channel receiver LTE下行控制信道接收机中浮点数据路径的设计与性能权衡分析
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996131
S. A. Abbas, S. Susithra, D. Priya, S. Thiruvengadam
Long Term Evolution (LTE) receiver processing involves decoding of complex valued received symbols from each antenna port to detect the codeword sent by the transmitter. The main objective of this paper is to design and implement the receiver hardware architectures for the control channels, PCFICH (Physical Control Format Indicator Channel) and PHICH (Physical Hybrid ARQ Indicator Channel) using fixed point and IEEE 754 single precision floating point arithmetic units for single input single output (SISO) configuration and validate their performance based on the signal to noise ratio (SNR) and mean square error (MSE) or the decision values for detecting the code words received. Floating point based receiver has an edge over fixed point in terms of reduced developing time, reduced complexity, higher accuracy, higher precision and tolerance to error but at the cost of increased hardware. Floating point based receivers employing folding and superscalar techniques to optimize the architectures through reduction in resource utilization are synthesized and implemented. ModelSim 6.4a is used to simulate the results while the architecture is implemented in Virtex-6 FPGA device using Xilinx-Plan Ahead tool.
长期演进(LTE)接收机处理涉及解码来自每个天线端口的复杂有价值的接收符号,以检测发射机发送的码字。本文的主要目的是设计和实现控制信道的接收机硬件体系结构。PCFICH(物理控制格式指示通道)和PHICH(物理混合ARQ指示通道)采用定点和IEEE 754单精度浮点算术单元进行单输入单输出(SISO)配置,并根据检测接收码字的信噪比(SNR)和均方误差(MSE)或决策值验证其性能。基于浮点的接收机在减少开发时间,降低复杂性,更高的精度,更高的精度和容错能力方面比定点接收机具有优势,但代价是硬件的增加。本文综合并实现了采用折叠和超标量技术的基于浮点数的接收机,通过减少资源利用率来优化体系结构。使用ModelSim 6.4a对结果进行仿真,同时使用Xilinx-Plan Ahead工具在Virtex-6 FPGA器件上实现该架构。
{"title":"Design and performance tradeoff analysis of floating point datapath in LTE downlink control channel receiver","authors":"S. A. Abbas, S. Susithra, D. Priya, S. Thiruvengadam","doi":"10.1109/ICRTIT.2014.6996131","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996131","url":null,"abstract":"Long Term Evolution (LTE) receiver processing involves decoding of complex valued received symbols from each antenna port to detect the codeword sent by the transmitter. The main objective of this paper is to design and implement the receiver hardware architectures for the control channels, PCFICH (Physical Control Format Indicator Channel) and PHICH (Physical Hybrid ARQ Indicator Channel) using fixed point and IEEE 754 single precision floating point arithmetic units for single input single output (SISO) configuration and validate their performance based on the signal to noise ratio (SNR) and mean square error (MSE) or the decision values for detecting the code words received. Floating point based receiver has an edge over fixed point in terms of reduced developing time, reduced complexity, higher accuracy, higher precision and tolerance to error but at the cost of increased hardware. Floating point based receivers employing folding and superscalar techniques to optimize the architectures through reduction in resource utilization are synthesized and implemented. ModelSim 6.4a is used to simulate the results while the architecture is implemented in Virtex-6 FPGA device using Xilinx-Plan Ahead tool.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115367802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New fast search block matching Motion Estimation algorithm for H.264 /AVC H.264 /AVC下新的快速搜索块匹配运动估计算法
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996139
T. Muralidhar Reddy, P. Muralidhar, C. Rama Rao
Video encoding algorithms with less complexity are required in many real time video coding applications. Motion Estimation (ME) is computationally intensive part of video compression. This paper introduces One bit transformation ME algorithm, which transforms the video sequences from multi-bit to a single bit per pixel representation and then used conventional motion estimation search strategies, this will reduce the arithmetic calculations and hardware complexity while maintaining almost good compression performance. In this paper, we propose an efficient fast search ME method for one bit transform to reduce computations involved in determining motion of blocks in a frame. The proposed Fast search algorithm effectively estimates the motion information in video. Experimental results shows 50% reduction in computations with a marginal loss of 3% PSNR compared to the conventional Exhaustive search algorithm.
许多实时视频编码应用都需要复杂度较低的视频编码算法。运动估计(ME)是视频压缩中计算量较大的部分。本文介绍了一比特变换ME算法,该算法将视频序列从多比特表示转换为每像素单比特表示,然后使用传统的运动估计搜索策略,在保持良好压缩性能的同时减少了算法计算和硬件复杂度。在本文中,我们提出了一种有效的快速搜索的一比特变换方法,以减少计算所涉及的确定块在一帧中的运动。提出的快速搜索算法能有效地估计视频中的运动信息。实验结果表明,与传统的穷举搜索算法相比,该算法的计算量减少了50%,PSNR的边际损失为3%。
{"title":"New fast search block matching Motion Estimation algorithm for H.264 /AVC","authors":"T. Muralidhar Reddy, P. Muralidhar, C. Rama Rao","doi":"10.1109/ICRTIT.2014.6996139","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996139","url":null,"abstract":"Video encoding algorithms with less complexity are required in many real time video coding applications. Motion Estimation (ME) is computationally intensive part of video compression. This paper introduces One bit transformation ME algorithm, which transforms the video sequences from multi-bit to a single bit per pixel representation and then used conventional motion estimation search strategies, this will reduce the arithmetic calculations and hardware complexity while maintaining almost good compression performance. In this paper, we propose an efficient fast search ME method for one bit transform to reduce computations involved in determining motion of blocks in a frame. The proposed Fast search algorithm effectively estimates the motion information in video. Experimental results shows 50% reduction in computations with a marginal loss of 3% PSNR compared to the conventional Exhaustive search algorithm.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116939315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trust model for privacy in social networking using probabilistic determination 基于概率确定的社交网络隐私信任模型
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996179
Preeti Yadav, Savita Gupta, S. Venkatesan
With the advancement in the technology, this era of Internet has witnessed a bloom in the Social Networking sites popularity. Social Networking sites facilitate the users with features like sharing personal information, making friends, developing new relationships, giving rise to new privacy concerns, etc., allowing only reliable people in one's network. Here comes in the concept of `Trust'. How can we assure that a person is trustworthy and what factors account to build the trust between two persons, known or unknown to each other? This requires an exploratory insight into users' intention to share information. This paper aims to understand the factors of trust, trust levels based on trust ratings from others and probability of accepting the other person in his/her network.
随着科技的进步,这个互联网时代见证了社交网站的蓬勃发展。社交网站为用户提供了分享个人信息、交友、发展新关系、产生新的隐私问题等功能,只允许可靠的人进入自己的网络。这就是“信任”的概念。我们如何确保一个人是值得信赖的,以及哪些因素可以在两个人之间建立信任,无论他们彼此认识还是不认识?这需要对用户分享信息的意图进行探索性的洞察。本文旨在了解信任的影响因素,基于他人信任评级的信任水平以及在其网络中接受他人的概率。
{"title":"Trust model for privacy in social networking using probabilistic determination","authors":"Preeti Yadav, Savita Gupta, S. Venkatesan","doi":"10.1109/ICRTIT.2014.6996179","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996179","url":null,"abstract":"With the advancement in the technology, this era of Internet has witnessed a bloom in the Social Networking sites popularity. Social Networking sites facilitate the users with features like sharing personal information, making friends, developing new relationships, giving rise to new privacy concerns, etc., allowing only reliable people in one's network. Here comes in the concept of `Trust'. How can we assure that a person is trustworthy and what factors account to build the trust between two persons, known or unknown to each other? This requires an exploratory insight into users' intention to share information. This paper aims to understand the factors of trust, trust levels based on trust ratings from others and probability of accepting the other person in his/her network.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115566555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reputation-enhanced similarity-based dynamic service discovery framework for service-based applications 基于声誉增强的基于相似性的动态服务发现框架,用于基于服务的应用程序
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996120
Jenith G. Delphin, R. Purushothaman
Service-based applications are applications that make use of one or more autonomous computer-based entities owned by third parties known as services, to perform their functions. The identification of similar, reputed services during the execution of service-based applications to replace services in them that are no longer available is an important issue. This paper proposes a framework to support dynamic service discovery. The users subscribe with the framework and submit their request for services. The framework is integrated with a Web service repository, where the service providers publish their services with QoS specification. The framework also collects the user ratings of services. To discover services, first the framework finds the similarity between functional and quality characteristics of services in the repository and the user requests. Then it calculates the reputation score of the services based on the ratings collected. Based on the similarity score and reputation score, the framework lists and ranks a set of candidate services for replacement. The framework can perform service discovery both proactively and reactively. Thus the framework provides an effective, user-friendly and flexible approach for run time service identification for service-based applications.
基于服务的应用程序是利用第三方拥有的一个或多个基于计算机的自治实体(称为服务)来执行其功能的应用程序。在执行基于服务的应用程序期间,识别类似的知名服务以替换其中不再可用的服务是一个重要问题。本文提出了一个支持动态服务发现的框架。用户订阅框架并提交他们对服务的请求。该框架与Web服务存储库集成,服务提供者在其中使用QoS规范发布其服务。该框架还收集用户对服务的评级。为了发现服务,框架首先找到存储库中服务的功能和质量特征与用户请求之间的相似性。然后,它根据收集到的评级计算服务的信誉分数。基于相似性评分和声誉评分,该框架列出了一组候选服务并对其进行排序。框架可以主动或被动地执行服务发现。因此,该框架为基于服务的应用程序的运行时服务标识提供了一种有效、用户友好且灵活的方法。
{"title":"Reputation-enhanced similarity-based dynamic service discovery framework for service-based applications","authors":"Jenith G. Delphin, R. Purushothaman","doi":"10.1109/ICRTIT.2014.6996120","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996120","url":null,"abstract":"Service-based applications are applications that make use of one or more autonomous computer-based entities owned by third parties known as services, to perform their functions. The identification of similar, reputed services during the execution of service-based applications to replace services in them that are no longer available is an important issue. This paper proposes a framework to support dynamic service discovery. The users subscribe with the framework and submit their request for services. The framework is integrated with a Web service repository, where the service providers publish their services with QoS specification. The framework also collects the user ratings of services. To discover services, first the framework finds the similarity between functional and quality characteristics of services in the repository and the user requests. Then it calculates the reputation score of the services based on the ratings collected. Based on the similarity score and reputation score, the framework lists and ranks a set of candidate services for replacement. The framework can perform service discovery both proactively and reactively. Thus the framework provides an effective, user-friendly and flexible approach for run time service identification for service-based applications.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128331243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The development of syllable based text to speech system for Tamil language 泰米尔语基于音节的文本转语音系统的发展
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996126
M. Karthikadevi, K. .. Srinivasagan
Speech synthesis is the most significant applications in linguistic communication process. The Text to Speech structure is the undertaking of accepts the input sentence and converts the audible speech as output. The Tamil language may be a syllable based language. A syllable is the unit of language, which may be spoken independent of the adjacent phones. It consists of an interrupted portion of sound, once the word is pronounced. The task of proposed Text to Speech System for Tamil language includes syllabication, Letter-to-Sound rules and concatenation. Syllabication is that the method of distinguishing the linguistic unit units, that is presented within the given input. The Trainable Text syllabication algorithm is employed for deriving the syllables. The Letter to Sound mapping technique is employed for changing the text to phonemes. These phonemes square measure mapped with the waveform that may be a recorded sound file, which can be a variety of wave files. The recorded sounds are concatenated by Unit selection Speech Synthesis algorithm, which uses the massive databases of recorded speech. The efficient joining cost is required to be calculated for locating the best sequence of speech as synthesized output. Java Media Framework speak engine is employed to synthesis the speech. The proposed text to speech system founded on syllable unit for Tamil language is employed to boost the excellence of speech.
语音合成是语言交际过程中最重要的应用。语转语结构是接受输入句子,将可听语音转换为输出的过程。泰米尔语可能是一种基于音节的语言。音节是语言的单位,可以独立于相邻的音素而说。一旦单词被发音,它由声音的中断部分组成。提出的泰米尔语文本到语音系统的任务包括音节、字母到声音规则和连接。音节是一种区分语言单位的方法,它是在给定的输入中呈现的。采用可训练文本音节提取算法进行音节提取。字母到声音的映射技术用于将文本转换为音素。这些音素平方测量映射的波形可能是一个录制的声音文件,它可以是各种波文件。采用单元选择语音合成算法,利用海量的录音数据库,将录音进行拼接。为了找到最佳的语音序列作为合成输出,需要计算有效的连接代价。采用Java Media Framework语音引擎进行语音合成。提出了基于音节单位的泰米尔语语篇转语系统,提高了泰米尔语语篇的语音质量。
{"title":"The development of syllable based text to speech system for Tamil language","authors":"M. Karthikadevi, K. .. Srinivasagan","doi":"10.1109/ICRTIT.2014.6996126","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996126","url":null,"abstract":"Speech synthesis is the most significant applications in linguistic communication process. The Text to Speech structure is the undertaking of accepts the input sentence and converts the audible speech as output. The Tamil language may be a syllable based language. A syllable is the unit of language, which may be spoken independent of the adjacent phones. It consists of an interrupted portion of sound, once the word is pronounced. The task of proposed Text to Speech System for Tamil language includes syllabication, Letter-to-Sound rules and concatenation. Syllabication is that the method of distinguishing the linguistic unit units, that is presented within the given input. The Trainable Text syllabication algorithm is employed for deriving the syllables. The Letter to Sound mapping technique is employed for changing the text to phonemes. These phonemes square measure mapped with the waveform that may be a recorded sound file, which can be a variety of wave files. The recorded sounds are concatenated by Unit selection Speech Synthesis algorithm, which uses the massive databases of recorded speech. The efficient joining cost is required to be calculated for locating the best sequence of speech as synthesized output. Java Media Framework speak engine is employed to synthesis the speech. The proposed text to speech system founded on syllable unit for Tamil language is employed to boost the excellence of speech.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128426052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Highly correlated feature set selection for data clustering 用于数据聚类的高度相关特征集选择
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996215
M. Sumalatha, M. Ananthi, A. Arvind, N. Navin, C. Siddarth
Feature set selection is the process of identifying a subset of features which produces the result same as the entire set. The feature set selection helps in clustering the datasets. In this paper, a Highly Correlated Feature set Selection (HCFS) algorithmis proposed for clustering the data. This algorithm helps in selecting features based on its relevancy and redundancy factors. All the selected features are finally clustered based on how they are correlated with each other. The main objective of this paper is to identify the feature subsets which will improve the classification performance by constructing minimum spanning tree (MST) between the features.The HCFS algorithm works in two steps. In the first step, the features are divided into clusters using the spanning tree construction process. In the second step, the cluster representatives are selected using Frequent Pattern Analysis (FPA) technique to form the effective feature set which reduces the time required for query evaluation process. The redundant and irrelevant features are removed based on their Symmetric Uncertainty (SU) values. This effectively improves the efficiency of data clustering process.
特征集选择是识别特征子集的过程,该子集产生与整个集合相同的结果。特征集选择有助于对数据集进行聚类。本文提出了一种用于数据聚类的高度相关特征集选择(HCFS)算法。该算法可以根据特征的相关度和冗余度进行特征的选择。最后,根据所选特征之间的相互关系对它们进行聚类。本文的主要目标是通过在特征子集之间构造最小生成树(MST)来识别特征子集,从而提高分类性能。HCFS算法分为两个步骤。在第一步中,使用生成树构建过程将特征划分为簇。第二步,使用频繁模式分析(FPA)技术选择聚类代表,形成有效的特征集,减少查询评估过程所需的时间。根据冗余和不相关特征的对称不确定性(SU)值去除冗余和不相关特征。这有效地提高了数据聚类过程的效率。
{"title":"Highly correlated feature set selection for data clustering","authors":"M. Sumalatha, M. Ananthi, A. Arvind, N. Navin, C. Siddarth","doi":"10.1109/ICRTIT.2014.6996215","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996215","url":null,"abstract":"Feature set selection is the process of identifying a subset of features which produces the result same as the entire set. The feature set selection helps in clustering the datasets. In this paper, a Highly Correlated Feature set Selection (HCFS) algorithmis proposed for clustering the data. This algorithm helps in selecting features based on its relevancy and redundancy factors. All the selected features are finally clustered based on how they are correlated with each other. The main objective of this paper is to identify the feature subsets which will improve the classification performance by constructing minimum spanning tree (MST) between the features.The HCFS algorithm works in two steps. In the first step, the features are divided into clusters using the spanning tree construction process. In the second step, the cluster representatives are selected using Frequent Pattern Analysis (FPA) technique to form the effective feature set which reduces the time required for query evaluation process. The redundant and irrelevant features are removed based on their Symmetric Uncertainty (SU) values. This effectively improves the efficiency of data clustering process.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128721559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cluster based enhanced sybil attack detection in MANET through integration of RSSI and CRL 集成RSSI和CRL的基于集群的MANET增强符号攻击检测
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996207
R. V. Kumar, P. Ramesh, H. A. Rauf
Fully self-controlled mobile ad hoc networks represent a complex system. Due to the broadcast nature of wireless channel, MANET has many security issues. Especially, Sybil Attack is a very serious threat to the MANET as it creates multiple virtual fake identities per entity, there by affecting the routing table. The multiple virtual identities are obtained by spoofing the victim's node or by creating an arbitrary node as there is no restriction to create an arbitrary node in MANET. In the existing system, author has used RSSI as a parameter to detect the Sybil node because of its lightweight but it has failed to detect the fast moving Sybil nodes. The proposed system works considering the Certification Authority as one parameter and RSSI as the other parameter. The RSSI is used to form the cluster and to elect the cluster head. The CA's responsibility is given to the CH. Whenever huge variations occur in RSSI on neighbour's entry and exit behaviour, the Certification Authority comes into play. The CA checks the certification of a node. If it is not valid, its certificate is revoked otherwise it is free to communicate in the network.
完全自我控制的移动自组织网络是一个复杂的系统。由于无线信道的广播性质,MANET存在许多安全问题。特别是,Sybil攻击对MANET是一个非常严重的威胁,因为它通过影响路由表,为每个实体创建多个虚拟假身份。由于在MANET中没有创建任意节点的限制,因此可以通过欺骗受害者节点或创建任意节点来获得多个虚拟身份。在现有的系统中,由于RSSI的轻量级,作者使用RSSI作为参数来检测Sybil节点,但是无法检测到快速移动的Sybil节点。该系统将证书颁发机构作为一个参数,RSSI作为另一个参数。RSSI用于形成簇并选举簇头。CA的责任交给了CH。每当RSSI中邻居的进入和退出行为发生巨大变化时,证书颁发机构就会发挥作用。CA检查节点的证书。如果无效,则吊销其证书,否则可以在网络中自由通信。
{"title":"Cluster based enhanced sybil attack detection in MANET through integration of RSSI and CRL","authors":"R. V. Kumar, P. Ramesh, H. A. Rauf","doi":"10.1109/ICRTIT.2014.6996207","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996207","url":null,"abstract":"Fully self-controlled mobile ad hoc networks represent a complex system. Due to the broadcast nature of wireless channel, MANET has many security issues. Especially, Sybil Attack is a very serious threat to the MANET as it creates multiple virtual fake identities per entity, there by affecting the routing table. The multiple virtual identities are obtained by spoofing the victim's node or by creating an arbitrary node as there is no restriction to create an arbitrary node in MANET. In the existing system, author has used RSSI as a parameter to detect the Sybil node because of its lightweight but it has failed to detect the fast moving Sybil nodes. The proposed system works considering the Certification Authority as one parameter and RSSI as the other parameter. The RSSI is used to form the cluster and to elect the cluster head. The CA's responsibility is given to the CH. Whenever huge variations occur in RSSI on neighbour's entry and exit behaviour, the Certification Authority comes into play. The CA checks the certification of a node. If it is not valid, its certificate is revoked otherwise it is free to communicate in the network.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129314120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Event matching based on subscriber category in sensor cloud 传感器云中基于用户类别的事件匹配
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996171
S. Grace, M. Sumalatha
Sensor cloud infrastructure is composed of wireless sensor network and cloud computing technology. The limitation of wireless sensor network can be overcome by integrating it with cloud. The sensor data are collected and stored in cloud for processing that helps to make real time alert in critical situation used for future analysis. Distributing the sensor data to appropriate subscriber is more important. In existing work many event matching algorithms are discussed. The matching is performed on the basis of their predicates and requires more space for indexing all the predicate values. In our proposed work publisher/subscriber model has been taken. In the first stage, subscriptions are categorized on the basis of their privilege and in next stage the events will be matched to the subscription. By this method the subscription storing and matching can be made easier and faster.
传感器云基础设施由无线传感器网络和云计算技术组成。通过将无线传感器网络与云集成,可以克服无线传感器网络的局限性。传感器数据被收集并存储在云中进行处理,有助于在紧急情况下实时警报,用于未来分析。将传感器数据分发给合适的用户更为重要。在已有的工作中,讨论了许多事件匹配算法。匹配是基于它们的谓词执行的,并且需要更多的空间来索引所有谓词值。在我们建议的工作中,采用了发布者/订阅者模型。在第一阶段,根据订阅的权限对其进行分类,在下一阶段,事件将与订阅相匹配。通过这种方法可以使订阅的存储和匹配更容易、更快。
{"title":"Event matching based on subscriber category in sensor cloud","authors":"S. Grace, M. Sumalatha","doi":"10.1109/ICRTIT.2014.6996171","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996171","url":null,"abstract":"Sensor cloud infrastructure is composed of wireless sensor network and cloud computing technology. The limitation of wireless sensor network can be overcome by integrating it with cloud. The sensor data are collected and stored in cloud for processing that helps to make real time alert in critical situation used for future analysis. Distributing the sensor data to appropriate subscriber is more important. In existing work many event matching algorithms are discussed. The matching is performed on the basis of their predicates and requires more space for indexing all the predicate values. In our proposed work publisher/subscriber model has been taken. In the first stage, subscriptions are categorized on the basis of their privilege and in next stage the events will be matched to the subscription. By this method the subscription storing and matching can be made easier and faster.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121545945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Intrusion detection in MANET using Self Organizing Map (SOM) 基于自组织映射(SOM)的MANET入侵检测
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996118
V. Dinesh Kumar, S. Radhakrishnan
Mobile Ad-hoc networks (MANET) are formed with dynamism and upheld by individual hosts in a network. In these type of networks all communication occurs through a wireless medium and the nature of the network is decentralized and dynamic. Hence it probes for a number of security problems and in order provide security against malicious attacks, Intrusion Detection System (IDS) is commonly used as a second route of protection in MANET. Intrusion detection models are used to detect the attacks based on the patterns and alerts in case of intruders are being met with the system. In this paper, we propose and implement intrusion-detection system grounded on artificial neural network model such as Self-Organizing Map (SOM) based competitive network, which in turn plays a vital role in detection of malicious nodes based on input data patterns. The proposed model deals with different types of attacks and their detection approach based on SOM model. The approach aids at increasing Detection rate as well as reducing the False alarm rate, which in turn helps to detect those attacks before it makes larger damage to the network and prevent them with supportive techniques and increase the network performance. The experimental results of proposed model is evaluated under different parameters.
移动自组织网络(MANET)具有动态性,由网络中的单个主机维护。在这些类型的网络中,所有的通信都是通过无线媒介进行的,网络的性质是分散的和动态的。入侵检测系统(IDS)是城域网中常用的第二种保护方式,它可以探测大量的安全问题,并提供针对恶意攻击的安全保护。入侵检测模型用于在系统遇到入侵者时,根据模式和警报来检测攻击。本文提出并实现了基于自组织映射(SOM)竞争网络等人工神经网络模型的入侵检测系统,该系统在基于输入数据模式的恶意节点检测中起着至关重要的作用。该模型处理了不同类型的攻击及其基于SOM模型的检测方法。该方法不仅可以提高检测率,而且可以降低虚警率,从而在攻击对网络造成更大破坏之前检测到攻击,并利用支持技术加以防范,提高网络性能。在不同参数下对模型的实验结果进行了评价。
{"title":"Intrusion detection in MANET using Self Organizing Map (SOM)","authors":"V. Dinesh Kumar, S. Radhakrishnan","doi":"10.1109/ICRTIT.2014.6996118","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996118","url":null,"abstract":"Mobile Ad-hoc networks (MANET) are formed with dynamism and upheld by individual hosts in a network. In these type of networks all communication occurs through a wireless medium and the nature of the network is decentralized and dynamic. Hence it probes for a number of security problems and in order provide security against malicious attacks, Intrusion Detection System (IDS) is commonly used as a second route of protection in MANET. Intrusion detection models are used to detect the attacks based on the patterns and alerts in case of intruders are being met with the system. In this paper, we propose and implement intrusion-detection system grounded on artificial neural network model such as Self-Organizing Map (SOM) based competitive network, which in turn plays a vital role in detection of malicious nodes based on input data patterns. The proposed model deals with different types of attacks and their detection approach based on SOM model. The approach aids at increasing Detection rate as well as reducing the False alarm rate, which in turn helps to detect those attacks before it makes larger damage to the network and prevent them with supportive techniques and increase the network performance. The experimental results of proposed model is evaluated under different parameters.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130422719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2014 International Conference on Recent Trends in Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1