首页 > 最新文献

2014 International Conference on Recent Trends in Information Technology最新文献

英文 中文
Hand based multibiometric authentication using local feature extraction 基于局部特征提取的手部多重生物特征认证
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996136
B. Bhaskar, S. Veluchamy
Biometrics has wide applications in the fields of security and privacy. Since unimodal biometrics are subjected to various problems regarding recognition and security, multimodal biometrics have been used extensively nowadays for personal authentication. In this paper we have proposed an efficient personal identification system using two biometric identifiers, palm print and Inner knuckle print. In the recent years, palm prints and knuckle prints have overruled other biometric identifiers because of their unique, stable and novelty feature. The proposed feature extraction method for palm print is Monogenic Binary Coding (MBC), which is an efficient approach for extracting palm print features. Then for inner knuckle print recognition we have tried two algorithms named Ridgelet Transform and Scale Invariant Feature Transform (SIFT). Also we have compared their results in terms of recognition rate. We then adopt Support Vector Machine (SVM) for classifying the extracted feature vectors. Combining both knuckle print and palm print for personal identification will give better security and accuracy.
生物识别技术在安全和隐私领域有着广泛的应用。由于单模态生物识别技术在识别和安全方面存在各种问题,多模态生物识别技术目前已广泛用于个人身份验证。本文提出了一种利用手掌指纹和内指关节指纹两种生物特征识别的高效个人识别系统。近年来,手掌指纹和指关节指纹因其独特、稳定和新颖的特征而取代了其他生物识别技术。本文提出的掌纹特征提取方法是单基因二进制编码(Monogenic Binary Coding, MBC),这是一种有效的掌纹特征提取方法。然后对指关节内纹识别进行了脊波变换和尺度不变特征变换(SIFT)两种算法的尝试。我们还比较了他们的结果在识别率方面。然后采用支持向量机(SVM)对提取的特征向量进行分类。结合指关节指纹和掌纹进行个人识别,安全性和准确性更高。
{"title":"Hand based multibiometric authentication using local feature extraction","authors":"B. Bhaskar, S. Veluchamy","doi":"10.1109/ICRTIT.2014.6996136","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996136","url":null,"abstract":"Biometrics has wide applications in the fields of security and privacy. Since unimodal biometrics are subjected to various problems regarding recognition and security, multimodal biometrics have been used extensively nowadays for personal authentication. In this paper we have proposed an efficient personal identification system using two biometric identifiers, palm print and Inner knuckle print. In the recent years, palm prints and knuckle prints have overruled other biometric identifiers because of their unique, stable and novelty feature. The proposed feature extraction method for palm print is Monogenic Binary Coding (MBC), which is an efficient approach for extracting palm print features. Then for inner knuckle print recognition we have tried two algorithms named Ridgelet Transform and Scale Invariant Feature Transform (SIFT). Also we have compared their results in terms of recognition rate. We then adopt Support Vector Machine (SVM) for classifying the extracted feature vectors. Combining both knuckle print and palm print for personal identification will give better security and accuracy.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127039129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Multimodal biometric recognition using sclera and fingerprint based on ANFIS 基于ANFIS的巩膜指纹多模态生物识别
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996159
M. Pallikonda Rajasekaran, M. Suresh, U. Dhanasekaran
Biometrics is the ID of humans utilizing intrinsic physical, biological, otherwise activity features, traits, or habits. Biometrics has the potential to provide this desired ability to clearly and discretely determine a person's identity with additional accuracy and security. Biometric systems primarily based on individual antecedent of advice which is referred as unimodal frameworks. Even though some unimodal frameworks (e.g. Palm, Finger impression, Face, Iris), have got significant change in consistency plus precision yet has experienced selection issues attributable to non-all-inclusiveness of biometrics attributes, vulnerability to biometric mocking and insufficient exactness created by boisterous information as their inconveniences. In future, single biometric framework might not be in a position to accomplish the wanted execution prerequisite in genuine world provisions. To defeat these issues, we have to utilize multimodal biometric confirmation frameworks which blend data from various modalities to make a choice. Multimodal biometric confirmation framework utilize use more than one human modalities such as face, iris, retina, sclera and fingerprint etc. to improve their security of the method. In this approach, combined the biometric traits of sclera and fingerprint for addressing authentication issues, which has not discussed and implemented earlier. The fusion of multimodal biometric system helps to reduce the system error rates. The ANFIS model consolidated the neural system versatile capacities and the fluffy rationale qualitative strategy will have low false dismissal degree contrasted with neural network and fluffy rationale qualitative frame work. The combination of multimodal biometric security conspires in the ANFIS will show higher accuracy come close with Neural Network and Fuzzy Inference System.
生物识别技术是利用人类内在的物理、生物或活动特征、特征或习惯来识别人类的身份。生物识别技术有潜力提供这种所需的能力,以额外的准确性和安全性清晰而离散地确定一个人的身份。生物识别系统主要基于个人的建议,这被称为单模框架。尽管一些单模框架(如手掌、手指印象、面部、虹膜)在一致性和精度上有了显著的变化,但由于生物特征属性的非全包容性、易受生物特征嘲弄和嘈杂信息造成的准确性不足等问题,给选择带来了不便。将来,单个生物识别框架可能无法在真实世界的规定中完成所需的执行先决条件。为了解决这些问题,我们必须利用多模态生物识别确认框架,混合各种模态的数据来做出选择。多模态生物识别确认框架利用使用多种人体形态,如面部、虹膜、视网膜、巩膜和指纹等,以提高其方法的安全性。在这种方法中,结合巩膜和指纹的生物特征来解决以前没有讨论和实现的身份验证问题。多模态生物识别系统的融合有助于降低系统错误率。ANFIS模型巩固了神经系统的通用性,与神经网络和蓬松基本原理定性框架相比,蓬松基本原理定性策略具有较低的误解雇度。在ANFIS中,多模态生物识别安全方案的组合将显示出更高的准确率,接近神经网络和模糊推理系统。
{"title":"Multimodal biometric recognition using sclera and fingerprint based on ANFIS","authors":"M. Pallikonda Rajasekaran, M. Suresh, U. Dhanasekaran","doi":"10.1109/ICRTIT.2014.6996159","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996159","url":null,"abstract":"Biometrics is the ID of humans utilizing intrinsic physical, biological, otherwise activity features, traits, or habits. Biometrics has the potential to provide this desired ability to clearly and discretely determine a person's identity with additional accuracy and security. Biometric systems primarily based on individual antecedent of advice which is referred as unimodal frameworks. Even though some unimodal frameworks (e.g. Palm, Finger impression, Face, Iris), have got significant change in consistency plus precision yet has experienced selection issues attributable to non-all-inclusiveness of biometrics attributes, vulnerability to biometric mocking and insufficient exactness created by boisterous information as their inconveniences. In future, single biometric framework might not be in a position to accomplish the wanted execution prerequisite in genuine world provisions. To defeat these issues, we have to utilize multimodal biometric confirmation frameworks which blend data from various modalities to make a choice. Multimodal biometric confirmation framework utilize use more than one human modalities such as face, iris, retina, sclera and fingerprint etc. to improve their security of the method. In this approach, combined the biometric traits of sclera and fingerprint for addressing authentication issues, which has not discussed and implemented earlier. The fusion of multimodal biometric system helps to reduce the system error rates. The ANFIS model consolidated the neural system versatile capacities and the fluffy rationale qualitative strategy will have low false dismissal degree contrasted with neural network and fluffy rationale qualitative frame work. The combination of multimodal biometric security conspires in the ANFIS will show higher accuracy come close with Neural Network and Fuzzy Inference System.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127040851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Grouping in collaborative e-learning environment based on interaction among students 协作式电子学习环境中基于学生互动的分组
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996170
D. Jagadish
Collaborative learning is an online classroom can take the form of conversation between the whole classes or within smaller groups. Moodle (Modular Object-Oriented Dynamic Learning Environment) is a free and open source e-learning software platform, also known as a Learning Management System, or Virtual Learning Environment (VLE). As a web-based tool, Moodle offers the possible way to deliver courses which include an enormous variety of information sources - links to multimedia, websites and image - which are hard to deliver in a traditional teaching atmosphere. The converse (chat) activity module in moodle allows participants to encompass a realtime synchronous discussion in a moodle course. A teacher can organize users into groups within the course or within particular activities. This paper aims in efficient group formation of learners in a collaborative learning environment so that every individual in the group is benefitted. As a testing platform tenth standard Tamil text book is incorporated in to moodle. In this paper K-NN clustering algorithm is used to improve the group performance. This algorithm achieves good performance in terms of balancing the knowledge level among all the students.
协作学习是一种在线课堂,可以采取全班之间或小组内部对话的形式。Moodle(模块化面向对象动态学习环境)是一个免费的开源电子学习软件平台,也被称为学习管理系统或虚拟学习环境(VLE)。作为一种基于网络的工具,Moodle提供了一种可能的方式来交付课程,其中包括各种各样的信息来源-多媒体,网站和图像的链接-这些在传统的教学环境中很难交付。moodle中的会话(聊天)活动模块允许参与者在moodle课程中包含实时同步讨论。教师可以在课程或特定活动中将用户组织成组。本文的目的是在协作学习环境中有效地形成学习者的小组,使小组中的每个人都受益。作为一个测试平台,第十标准泰米尔语教科书被纳入moodle。本文采用K-NN聚类算法来提高分组性能。该算法在平衡所有学生的知识水平方面取得了良好的性能。
{"title":"Grouping in collaborative e-learning environment based on interaction among students","authors":"D. Jagadish","doi":"10.1109/ICRTIT.2014.6996170","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996170","url":null,"abstract":"Collaborative learning is an online classroom can take the form of conversation between the whole classes or within smaller groups. Moodle (Modular Object-Oriented Dynamic Learning Environment) is a free and open source e-learning software platform, also known as a Learning Management System, or Virtual Learning Environment (VLE). As a web-based tool, Moodle offers the possible way to deliver courses which include an enormous variety of information sources - links to multimedia, websites and image - which are hard to deliver in a traditional teaching atmosphere. The converse (chat) activity module in moodle allows participants to encompass a realtime synchronous discussion in a moodle course. A teacher can organize users into groups within the course or within particular activities. This paper aims in efficient group formation of learners in a collaborative learning environment so that every individual in the group is benefitted. As a testing platform tenth standard Tamil text book is incorporated in to moodle. In this paper K-NN clustering algorithm is used to improve the group performance. This algorithm achieves good performance in terms of balancing the knowledge level among all the students.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Application of Natural Language Processing in Object Oriented Software Development 自然语言处理在面向对象软件开发中的应用
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996121
Abinash Tripathy, S. Rath
Software Development Life Cycle (SDLC) starts with eliciting requirement of user as a document called Software Requirement Specification (SRS). SRS document is mostly written in the form of any natural language (NL) that is convenient for the client. In order to develop a right software based on user's requirements, the objects, methods and attributes needs to be identified from SRS document. In this paper, an attempt is made to develop a methodology, using the concept of Natural Language Processing (NLP) for Object Oriented (OO) Programming System analysis concept, by finding out the class name and its details directly form SRS.
软件开发生命周期(SDLC)从引出用户的需求开始,形成称为软件需求规范(SRS)的文档。SRS文档主要以方便客户端的任何自然语言(NL)的形式编写。为了根据用户需求开发出合适的软件,需要从SRS文档中识别对象、方法和属性。本文尝试将自然语言处理(NLP)的概念应用于面向对象(OO)编程系统的分析概念,通过直接从SRS中找出类名及其详细信息,开发一种方法。
{"title":"Application of Natural Language Processing in Object Oriented Software Development","authors":"Abinash Tripathy, S. Rath","doi":"10.1109/ICRTIT.2014.6996121","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996121","url":null,"abstract":"Software Development Life Cycle (SDLC) starts with eliciting requirement of user as a document called Software Requirement Specification (SRS). SRS document is mostly written in the form of any natural language (NL) that is convenient for the client. In order to develop a right software based on user's requirements, the objects, methods and attributes needs to be identified from SRS document. In this paper, an attempt is made to develop a methodology, using the concept of Natural Language Processing (NLP) for Object Oriented (OO) Programming System analysis concept, by finding out the class name and its details directly form SRS.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122868152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detecting cloning attack in Social Networks using classification and clustering techniques 利用分类聚类技术检测社交网络中的克隆攻击
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996166
S. Kiruthiga, P. Kola Sujatha, A. Kannan
Social Networks (SN) are popular among the people to interact with their friends through the internet. Users spending their time in popular social networking sites like facebook, Myspace and twitter to share the personal information. Cloning attack is one of the insidious attacks in facebook. Usually attackers stole the images and personal information about a person and create the fake profile pages. Once the profile gets cloned they started to send a friend request using the cloned profile. Incase if the real users account gets blocked, they used to send a new friend request to their friends. At the same time cloned one also sending the request to the person. At that time it was hard to identify the real one for users. In the proposed system the clone attack is detected based on user action time period and users click pattern to find the similarity between the cloned profile and real one in facebook. Using Cosine similarity and Jaccard index the performance of the similarity between the users is improved.
社交网络(SN)是人们通过互联网与朋友互动的热门工具。用户花时间在facebook、Myspace和twitter等流行的社交网站上分享个人信息。克隆攻击是facebook的一种阴险的攻击。通常,攻击者会窃取一个人的图像和个人信息,并创建虚假的个人资料页面。一旦配置文件被克隆,他们就开始使用克隆的配置文件发送好友请求。如果真实用户的账户被屏蔽,他们通常会向他们的朋友发送新的好友请求。同时克隆了一个也向该人发送请求。当时,用户很难识别真假。在该系统中,基于用户动作时间段和用户点击模式检测克隆攻击,以寻找克隆的个人资料与facebook真实个人资料的相似度。利用余弦相似度和Jaccard索引提高了用户间相似度的性能。
{"title":"Detecting cloning attack in Social Networks using classification and clustering techniques","authors":"S. Kiruthiga, P. Kola Sujatha, A. Kannan","doi":"10.1109/ICRTIT.2014.6996166","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996166","url":null,"abstract":"Social Networks (SN) are popular among the people to interact with their friends through the internet. Users spending their time in popular social networking sites like facebook, Myspace and twitter to share the personal information. Cloning attack is one of the insidious attacks in facebook. Usually attackers stole the images and personal information about a person and create the fake profile pages. Once the profile gets cloned they started to send a friend request using the cloned profile. Incase if the real users account gets blocked, they used to send a new friend request to their friends. At the same time cloned one also sending the request to the person. At that time it was hard to identify the real one for users. In the proposed system the clone attack is detected based on user action time period and users click pattern to find the similarity between the cloned profile and real one in facebook. Using Cosine similarity and Jaccard index the performance of the similarity between the users is improved.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130959535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An efficient dynamic indexing and metadata based storage in cloud environment 云环境下基于元数据的高效动态索引存储
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996151
S. Anjanadevi, D. Vijayakumar, K. .. Srinivasagan
Cloud computing is an emerging, computing model wherein the tasks are allocated to software, combination of connections, and services accessed over a network. This connections and network of servers is collectively known as the cloud. In place of operating their own data centers, users might rent computing power and storage capacity from a service provider and pays only for what they use. Cloud storage is delivering the data storage as service. If the data is stored in cloud, it must provide the data access and heterogeneity. With the advances in cloud computing it allows storing of large number of images and data throughout the world. This paper proposes the indexing and metadata management which helps to access the distributed data with reduced latency. The metadata management can be enhanced for large scale file system applications. When designing the metadata, the storage location of the metadata and attributes is important for the efficient retrieval of the data. Indexes are used to quickly locate data without having to search over every location in storage. Based on these two models, the data can be easily fetched and the search time was reduced to retrieve the appropriate data.
云计算是一种新兴的计算模型,其中任务分配给软件、连接组合和通过网络访问的服务。这种连接和服务器网络统称为云。用户可以从服务提供商那里租用计算能力和存储容量,而无需运营自己的数据中心,只需为自己使用的部分付费。云存储将数据存储作为服务来提供。如果数据存储在云中,则必须提供数据访问和异构性。随着云计算的进步,它允许在世界各地存储大量的图像和数据。本文提出了索引和元数据管理,这有助于减少对分布式数据的访问延迟。对于大型文件系统应用程序,可以增强元数据管理。在设计元数据时,元数据和属性的存储位置对于有效地检索数据非常重要。索引用于快速定位数据,而不必搜索存储中的每个位置。基于这两种模型,可以方便地获取数据,减少了检索相应数据的搜索时间。
{"title":"An efficient dynamic indexing and metadata based storage in cloud environment","authors":"S. Anjanadevi, D. Vijayakumar, K. .. Srinivasagan","doi":"10.1109/ICRTIT.2014.6996151","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996151","url":null,"abstract":"Cloud computing is an emerging, computing model wherein the tasks are allocated to software, combination of connections, and services accessed over a network. This connections and network of servers is collectively known as the cloud. In place of operating their own data centers, users might rent computing power and storage capacity from a service provider and pays only for what they use. Cloud storage is delivering the data storage as service. If the data is stored in cloud, it must provide the data access and heterogeneity. With the advances in cloud computing it allows storing of large number of images and data throughout the world. This paper proposes the indexing and metadata management which helps to access the distributed data with reduced latency. The metadata management can be enhanced for large scale file system applications. When designing the metadata, the storage location of the metadata and attributes is important for the efficient retrieval of the data. Indexes are used to quickly locate data without having to search over every location in storage. Based on these two models, the data can be easily fetched and the search time was reduced to retrieve the appropriate data.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133641606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Harnessing the semantic analysis of tag using Semantic Based Lesk Algorithm 利用基于语义的Lesk算法对标签进行语义分析
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996200
M. Shankar, R. Senthilkumar
In the field of Data retrieval, accessing web resources is frequent task. This domain is shifting radically from the amplified data growth to the way in which it is structured and retrieved across web. This explosive growth of data is the result of billions of people using the Internet and mobile devices for commerce, entertainment, social interactions and as well as the Internet of things that constantly share machine-generated data. Even with lot of research, the task of analyzing this data to extract its business values with precision still remains as a trivial issue. To address this issue, the paper presents a novel Semantic Based Lesk Algorithm (SBLA), which traces the meaning of user defined tags and categorizes the web data by means of Support Vector Machine (SVM) classifier. On comparing with existing methods, the proposed method performs well in extraction of admissible data with the better accuracy and precision as discussed in result analysis.
在数据检索领域,访问web资源是一个频繁的任务。这个领域正在从根本上从放大数据增长转变为通过网络构建和检索数据的方式。数据的爆炸式增长是数十亿人使用互联网和移动设备进行商业、娱乐、社交互动以及不断共享机器生成数据的物联网的结果。即使进行了大量的研究,分析这些数据以精确地提取其业务价值的任务仍然是一个微不足道的问题。为了解决这一问题,本文提出了一种新的基于语义的Lesk算法(SBLA),该算法通过跟踪用户自定义标签的含义,并利用支持向量机(SVM)分类器对web数据进行分类。结果分析表明,与现有方法相比,该方法在可接受数据提取方面表现良好,具有较高的准确度和精密度。
{"title":"Harnessing the semantic analysis of tag using Semantic Based Lesk Algorithm","authors":"M. Shankar, R. Senthilkumar","doi":"10.1109/ICRTIT.2014.6996200","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996200","url":null,"abstract":"In the field of Data retrieval, accessing web resources is frequent task. This domain is shifting radically from the amplified data growth to the way in which it is structured and retrieved across web. This explosive growth of data is the result of billions of people using the Internet and mobile devices for commerce, entertainment, social interactions and as well as the Internet of things that constantly share machine-generated data. Even with lot of research, the task of analyzing this data to extract its business values with precision still remains as a trivial issue. To address this issue, the paper presents a novel Semantic Based Lesk Algorithm (SBLA), which traces the meaning of user defined tags and categorizes the web data by means of Support Vector Machine (SVM) classifier. On comparing with existing methods, the proposed method performs well in extraction of admissible data with the better accuracy and precision as discussed in result analysis.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"30 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132869878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CLBC - Cost effective load balanced resource allocation for partitioned cloud system CLBC—分区云系统的成本高效负载均衡资源分配
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996174
M. Sumalatha, C. Selvakumar, T. Priya, R. T. Azariah, P. Manohar
In cloud computing, remote based massive data storage and dynamic computation services are provided to the users. The cloud enables the user to complete their tasks using pay-as-you-go cost model which typically works on the incurred virtual machine hours, so reducing the execution time will minimize the computational cost. Therefore the scheduler should bring maximum throughput in order to achieve effective resource allocation in cloud. Hence, in this work, DBPS (Deadline Based Pre-emptive Scheduling) and a TLBC (Throttled Load Balancing for Cloud) load balancing model based on cloud partitioning using virtual machine has been proposed. Workload prediction is done using statistics and training set, so that error tolerance can be achieved in TLBC. The preliminary results obtained when measuring performance based on the computational cost of the task set and the number of tasks executed in a particular time shows the proposed TLBC outperforms compared with existing systems. OpenNebula has been used as the cloud management tool for doing real time analysis and improving performance.
在云计算中,为用户提供基于远程的海量数据存储和动态计算服务。云允许用户使用按需付费的成本模型来完成他们的任务,这种模型通常在产生的虚拟机小时上工作,因此减少执行时间将使计算成本最小化。因此,调度器应该带来最大的吞吐量,以便在云中实现有效的资源分配。因此,本文提出了一种基于虚拟机的基于云分区的DBPS (Deadline Based preemptive Scheduling)和TLBC (throttledloadbalancing for Cloud)负载均衡模型。利用统计数据和训练集对工作负载进行预测,从而实现TLBC的容错性。根据任务集的计算成本和在特定时间内执行的任务数量对性能进行测量时获得的初步结果表明,与现有系统相比,建议的TLBC性能更好。OpenNebula被用作云管理工具,用于进行实时分析和提高性能。
{"title":"CLBC - Cost effective load balanced resource allocation for partitioned cloud system","authors":"M. Sumalatha, C. Selvakumar, T. Priya, R. T. Azariah, P. Manohar","doi":"10.1109/ICRTIT.2014.6996174","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996174","url":null,"abstract":"In cloud computing, remote based massive data storage and dynamic computation services are provided to the users. The cloud enables the user to complete their tasks using pay-as-you-go cost model which typically works on the incurred virtual machine hours, so reducing the execution time will minimize the computational cost. Therefore the scheduler should bring maximum throughput in order to achieve effective resource allocation in cloud. Hence, in this work, DBPS (Deadline Based Pre-emptive Scheduling) and a TLBC (Throttled Load Balancing for Cloud) load balancing model based on cloud partitioning using virtual machine has been proposed. Workload prediction is done using statistics and training set, so that error tolerance can be achieved in TLBC. The preliminary results obtained when measuring performance based on the computational cost of the task set and the number of tasks executed in a particular time shows the proposed TLBC outperforms compared with existing systems. OpenNebula has been used as the cloud management tool for doing real time analysis and improving performance.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130663596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A short message classification algorithm for tweet classification 一种用于tweet分类的短消息分类算法
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996189
P. Selvaperumal, A. Suruliandi
Twitter users tweet their views in the form of short text messages. Twitter topic classification is classifying the tweets in to a set of predefined classes. In this work, a new tweet classification Method that makes use of tweet features like URL's in the tweet, retweeted tweets and influential users tweet is proposed. Experiments were carried out with extensive tweet data set. The performance of the proposed algorithm in classifying the tweets was compared with the text classification algorithms like SVM, Naïve Bayes, KNN etc. It is observed that the proposed method outclasses the conventional text classification algorithms in classifying the tweets.
推特用户以短信的形式发布他们的观点。Twitter主题分类是将tweet分类到一组预定义的类中。本文提出了一种新的推文分类方法,该方法利用推文、转发推文和有影响力用户推文中的URL等推文特征。在广泛的推文数据集上进行了实验。将本文算法与SVM、Naïve贝叶斯、KNN等文本分类算法在推文分类中的性能进行了比较。结果表明,该方法在推文分类方面优于传统的文本分类算法。
{"title":"A short message classification algorithm for tweet classification","authors":"P. Selvaperumal, A. Suruliandi","doi":"10.1109/ICRTIT.2014.6996189","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996189","url":null,"abstract":"Twitter users tweet their views in the form of short text messages. Twitter topic classification is classifying the tweets in to a set of predefined classes. In this work, a new tweet classification Method that makes use of tweet features like URL's in the tweet, retweeted tweets and influential users tweet is proposed. Experiments were carried out with extensive tweet data set. The performance of the proposed algorithm in classifying the tweets was compared with the text classification algorithms like SVM, Naïve Bayes, KNN etc. It is observed that the proposed method outclasses the conventional text classification algorithms in classifying the tweets.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114713257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A novel proposal to effectively combine multipath data forwarding for data center networks with congestion control and load balancing using Software-Defined Networking Approach 一种利用软件定义网络方法将数据中心网络的多路径数据转发与拥塞控制和负载均衡有效结合的新方案
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996178
Arijit Mallik, S. Hegde
Modern data center networks (DCNs) often use multi-rooted topologies, which offer multipath capability, for increased bandwidth and fault tolerance. However, traditional routing algorithms for the Internet have no or limited support for multipath routing, and cannot fully utilize available bandwidth in such DCNs. As a result, they route all the traffic through a single path, and thus form congestion. Multipath (MP) routing might be a good alternative, but is not sufficient alone to handle congestion that comes from the contention of end stations. Dynamic load balancing, on the other hand, protects the network from sudden congestions which could be caused by load spikes or link failures. However, little work has been done to incorporate all these features in a single and comprehensive solution for Data Center Ethernet (DCE). In this paper, we propose a novel method that attempts to integrate dynamic load balancing, multi-path scheme with congestion control (CC), with the use of pure Software-Defined-Networking (SDN) approach. SDN decouples control plane from the data forwarding plane, which reduces the overheads of the network switches. The major objectives that our solution attempts to achieve are, efficient utilization of network resources, high throughput and minimal frame loss.
现代数据中心网络(dcn)通常使用多根拓扑,这种拓扑提供多路径功能,以增加带宽和容错性。然而,传统的Internet路由算法对多路径路由的支持是有限的,并且不能充分利用这种dcn中的可用带宽。结果,它们将所有的流量通过一条路径,从而形成拥堵。多路径(MP)路由可能是一个很好的替代方案,但是单独处理端站争用引起的拥塞是不够的。另一方面,动态负载平衡保护网络免受突然拥塞,这可能是由负载峰值或链路故障引起的。然而,要将所有这些特性整合到数据中心以太网(DCE)的单一综合解决方案中,还做了很少的工作。在本文中,我们提出了一种新的方法,试图将动态负载平衡,多路径方案与拥塞控制(CC)结合起来,并使用纯软件定义网络(SDN)方法。SDN将控制平面与数据转发平面解耦,降低了网络交换机的开销。我们的解决方案试图实现的主要目标是,有效利用网络资源,高吞吐量和最小的帧丢失。
{"title":"A novel proposal to effectively combine multipath data forwarding for data center networks with congestion control and load balancing using Software-Defined Networking Approach","authors":"Arijit Mallik, S. Hegde","doi":"10.1109/ICRTIT.2014.6996178","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996178","url":null,"abstract":"Modern data center networks (DCNs) often use multi-rooted topologies, which offer multipath capability, for increased bandwidth and fault tolerance. However, traditional routing algorithms for the Internet have no or limited support for multipath routing, and cannot fully utilize available bandwidth in such DCNs. As a result, they route all the traffic through a single path, and thus form congestion. Multipath (MP) routing might be a good alternative, but is not sufficient alone to handle congestion that comes from the contention of end stations. Dynamic load balancing, on the other hand, protects the network from sudden congestions which could be caused by load spikes or link failures. However, little work has been done to incorporate all these features in a single and comprehensive solution for Data Center Ethernet (DCE). In this paper, we propose a novel method that attempts to integrate dynamic load balancing, multi-path scheme with congestion control (CC), with the use of pure Software-Defined-Networking (SDN) approach. SDN decouples control plane from the data forwarding plane, which reduces the overheads of the network switches. The major objectives that our solution attempts to achieve are, efficient utilization of network resources, high throughput and minimal frame loss.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115912833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2014 International Conference on Recent Trends in Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1