首页 > 最新文献

2014 International Conference on Recent Trends in Information Technology最新文献

英文 中文
Online Incremental Learning Algorithm for anomaly detection and prediction in health care 医疗保健异常检测与预测的在线增量学习算法
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996092
Kirthanaa Raghuraman, Monisha Senthurpandian, Monisha Shanmugasundaram, Bhargavi, V. Vaidehi
Anomaly Detection in health care by monitoring the vital health parameters of patients is a challenging problem in machine learning. The existing algorithms do not process the data incrementally and hence are not very effective in predicting the anomalies accurately and at the correct instance. In this paper, in order to process the health data in an online fashion a novel Online Incremental Learning Algorithm (OILA) is proposed. The OILA predicts the health parameters using a regression based approach with a feedback mechanism to reduce error. An alert is generated when an anomaly is seen in the health parameters, thus alerting the doctor to be cautious. The algorithm is compared with Kalman Filter for comparing the prediction capabilities of OILA with Kalman Filter. The proposed algorithm is validated with real time health parameter data sets for health parameters namely heart rate and blood pressure.
通过监测患者的重要健康参数来检测医疗保健中的异常是机器学习中的一个具有挑战性的问题。现有的算法没有对数据进行增量处理,因此不能很好地在正确的实例上准确地预测异常。为了在线处理健康数据,本文提出了一种新的在线增量学习算法(OILA)。OILA使用基于回归的方法和反馈机制来预测健康参数,以减少误差。当在健康参数中看到异常时,将生成警报,从而提醒医生要小心。将该算法与卡尔曼滤波进行比较,比较了两种算法的预测能力。用实时健康参数数据集(即心率和血压)对该算法进行了验证。
{"title":"Online Incremental Learning Algorithm for anomaly detection and prediction in health care","authors":"Kirthanaa Raghuraman, Monisha Senthurpandian, Monisha Shanmugasundaram, Bhargavi, V. Vaidehi","doi":"10.1109/ICRTIT.2014.6996092","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996092","url":null,"abstract":"Anomaly Detection in health care by monitoring the vital health parameters of patients is a challenging problem in machine learning. The existing algorithms do not process the data incrementally and hence are not very effective in predicting the anomalies accurately and at the correct instance. In this paper, in order to process the health data in an online fashion a novel Online Incremental Learning Algorithm (OILA) is proposed. The OILA predicts the health parameters using a regression based approach with a feedback mechanism to reduce error. An alert is generated when an anomaly is seen in the health parameters, thus alerting the doctor to be cautious. The algorithm is compared with Kalman Filter for comparing the prediction capabilities of OILA with Kalman Filter. The proposed algorithm is validated with real time health parameter data sets for health parameters namely heart rate and blood pressure.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115378811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Efficient energy consumption in green cloud 绿色云节能高效
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996212
C. Valliyammai, S. Uma, B. Dhivya, P. Surya
In the field of cloud computing, energy efficiency plays a major role. This is because the usage of cloud is increasing and so is the cost of energy; and also there is a necessity to reduce the carbon emission which occurs due to the usage of information and communication technologies (ICT). Hence there is a need for energy-efficient technologies that should reduce the overall energy consumption that is needed for computation, storage and communications. The proposed mechanism reduces the energy consumption by suspending the idle virtual machines (VMs) and categorizing the active VMs into different energy clusters with the help of fuzzy C-means algorithm. Also the percentage of Service Level Agreement (SLA) violated is kept minimal.
在云计算领域,能源效率扮演着重要的角色。这是因为云的使用在增加,能源成本也在增加;也有必要减少由于信息和通信技术(ICT)的使用而产生的碳排放。因此,有必要采用节能技术,以减少计算、存储和通信所需的总能源消耗。该机制通过暂停空闲的虚拟机,并利用模糊c均值算法将活跃的虚拟机划分为不同的能量集群,从而降低了能耗。此外,违反服务水平协议(SLA)的百分比保持在最低限度。
{"title":"Efficient energy consumption in green cloud","authors":"C. Valliyammai, S. Uma, B. Dhivya, P. Surya","doi":"10.1109/ICRTIT.2014.6996212","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996212","url":null,"abstract":"In the field of cloud computing, energy efficiency plays a major role. This is because the usage of cloud is increasing and so is the cost of energy; and also there is a necessity to reduce the carbon emission which occurs due to the usage of information and communication technologies (ICT). Hence there is a need for energy-efficient technologies that should reduce the overall energy consumption that is needed for computation, storage and communications. The proposed mechanism reduces the energy consumption by suspending the idle virtual machines (VMs) and categorizing the active VMs into different energy clusters with the help of fuzzy C-means algorithm. Also the percentage of Service Level Agreement (SLA) violated is kept minimal.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"13 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120905177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Resource allocation issues and challenges in cloud computing 云计算中的资源分配问题和挑战
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996213
S. Selvi, C. Valliyammai, V. N. Dhatchayani
Resource management is the primary issue as the demand grows for provisioning resources and computation in cloud systems. This article presents various research issues pertaining to the management of cloud resources while a comparison is made between existing resource allocation systems. The issues and challenges discussed in this paper are resource provisioning, job scheduling, load balancing, scalability, pricing, energy management and availability.
随着云系统中资源供应和计算需求的增长,资源管理成为主要问题。本文介绍了与云资源管理有关的各种研究问题,同时对现有资源分配系统进行了比较。本文讨论的问题和挑战包括资源配置、作业调度、负载平衡、可伸缩性、定价、能源管理和可用性。
{"title":"Resource allocation issues and challenges in cloud computing","authors":"S. Selvi, C. Valliyammai, V. N. Dhatchayani","doi":"10.1109/ICRTIT.2014.6996213","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996213","url":null,"abstract":"Resource management is the primary issue as the demand grows for provisioning resources and computation in cloud systems. This article presents various research issues pertaining to the management of cloud resources while a comparison is made between existing resource allocation systems. The issues and challenges discussed in this paper are resource provisioning, job scheduling, load balancing, scalability, pricing, energy management and availability.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121039748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Classification of microarray data using Fuzzy inference system 基于模糊推理系统的微阵列数据分类
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996165
Mukesh Kumar, S. K. Rath
The DNA microarray classification is one of the most popular technique among researchers and practitioners. In microarray data analysis, huge useful information may be lost due to irrelevant and insignificant features of the dataset. To overcome this drawback of the data set, only those features are selected which have high relevance with the classes and high significance in the feature set. In this paper, the t-statistic is used for feature selection with high relevance; and Fuzzy inference system (FIS) has been presented for classification purpose. FIS model is applied to classify the leukemia data set for gene classification. A comparative analysis of Fuzzy inference system (FIS) with different set of features (genes) have been presented. The comparison was performed on the basis of available performance parameters in literature such as: precision, recall, specificity, F-Measure, ROC curve and accuracy. The obtained results have been critically examined with the existing classifiers in the literature and it is observed that the proposed system obtained promising results with an increase in classification accuracy rate.
DNA微阵列分类技术是研究人员和从业者中最受欢迎的技术之一。在微阵列数据分析中,由于数据集的特征不相关或不重要,可能会丢失大量有用的信息。为了克服数据集的这一缺点,只选择那些与类高度相关且在特征集中具有高重要性的特征。本文采用t统计量进行高相关性的特征选择;并提出了模糊推理系统(FIS)进行分类。采用FIS模型对白血病数据集进行基因分类。本文对具有不同特征(基因)集的模糊推理系统进行了比较分析。根据文献中可用的性能参数,如:精密度、召回率、特异性、F-Measure、ROC曲线和准确度进行比较。将得到的结果与文献中现有的分类器进行了严格的检验,观察到所提出的系统在分类准确率上取得了很好的结果。
{"title":"Classification of microarray data using Fuzzy inference system","authors":"Mukesh Kumar, S. K. Rath","doi":"10.1109/ICRTIT.2014.6996165","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996165","url":null,"abstract":"The DNA microarray classification is one of the most popular technique among researchers and practitioners. In microarray data analysis, huge useful information may be lost due to irrelevant and insignificant features of the dataset. To overcome this drawback of the data set, only those features are selected which have high relevance with the classes and high significance in the feature set. In this paper, the t-statistic is used for feature selection with high relevance; and Fuzzy inference system (FIS) has been presented for classification purpose. FIS model is applied to classify the leukemia data set for gene classification. A comparative analysis of Fuzzy inference system (FIS) with different set of features (genes) have been presented. The comparison was performed on the basis of available performance parameters in literature such as: precision, recall, specificity, F-Measure, ROC curve and accuracy. The obtained results have been critically examined with the existing classifiers in the literature and it is observed that the proposed system obtained promising results with an increase in classification accuracy rate.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient design of different forms of FIR filter 高效设计不同形式的FIR滤波器
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996204
D. Bharti, K. Gupta
Although a number of efficient and high-level design algorithms have been put forward for the realization of FIR filter using the least number of arithmetic operations, but they do not take into account the low-level implementation issues which can exactly make a difference to the area and delay in designing of FIR filter. In this paper, at first, we have presented the delay efficient addition and multiplication architectures that are used in designing of the filter operation. Here We have used an algorithm for the multiplication that reduces the bit width and then an efficient parallel adder is been used that implements the two form of FIR filter with very less amount of delay considering the cost of each operation too. The paper presents two different types of FIR filter with 8 and 16 tap among which one of the form is good for the speed and the other is good for the area.
虽然已经提出了一些高效的、高层次的设计算法来使用最少的算术运算来实现FIR滤波器,但它们都没有考虑到底层的实现问题,而这些问题恰恰会影响FIR滤波器的设计面积和延迟。在本文中,我们首先提出了用于设计滤波器运算的延迟有效的加法和乘法结构。在这里,我们使用了一种减少位宽的乘法算法,然后使用了一种高效的并行加法器,该加法器实现了两种形式的FIR滤波器,考虑到每次操作的成本,延迟也非常少。本文提出了8分接和16分接两种不同类型的FIR滤波器,其中一种形式对速度有利,另一种形式对面积有利。
{"title":"Efficient design of different forms of FIR filter","authors":"D. Bharti, K. Gupta","doi":"10.1109/ICRTIT.2014.6996204","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996204","url":null,"abstract":"Although a number of efficient and high-level design algorithms have been put forward for the realization of FIR filter using the least number of arithmetic operations, but they do not take into account the low-level implementation issues which can exactly make a difference to the area and delay in designing of FIR filter. In this paper, at first, we have presented the delay efficient addition and multiplication architectures that are used in designing of the filter operation. Here We have used an algorithm for the multiplication that reduces the bit width and then an efficient parallel adder is been used that implements the two form of FIR filter with very less amount of delay considering the cost of each operation too. The paper presents two different types of FIR filter with 8 and 16 tap among which one of the form is good for the speed and the other is good for the area.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114686367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving WLAN QoS for multimedia application using MAC and application layer (MAP) approach 采用MAC和MAP方法改进多媒体应用的无线局域网QoS
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996113
Kishan Singh, P. Jayashree
Quality of Service (QoS) is considered as the standard check of a conveyance system to show provided services and its availability. For illustration application like video conferencing, voice over ip (VOIP), streaming videos, real time operation feel necessity for draconian assurance on jitter, packet loss, prioritization of services and end-to-end delay. So to overcome these issues a novel scheme employing MAC and Application Layer protocols with enhanced (MAP) is proposed. Improved black-burst protocol as well as prioritization of services is proposed at the MAC layer. An influential packet scheduling scheme for multimedia application in IEEE 802.11e has also been designed. At the Application layer level, real time protocols such as Session Description Protocol (SDP) and Real Time Streaming Protocol (RTSP) are adopted to support QoS. The performance of proposed MAP with enhanced Black Burst Protocol is studied with OPNET 14.5 simulator. The result shows that proposed MAP mechanism has better performance in QoS parameters considered, while maintaining fairness during channel allocation.
服务质量(QoS)被认为是传输系统显示所提供服务及其可用性的标准检查。对于视频会议、ip语音(VOIP)、流媒体视频等示例应用,实时操作需要严格保证抖动、数据包丢失、服务优先级和端到端延迟。为了克服这些问题,提出了一种采用MAC和增强的应用层协议(MAP)的新方案。在MAC层提出了改进的黑突发协议和服务优先级。在ieee802.11 e标准下,设计了一种对多媒体应用有影响的分组调度方案。在应用层,采用SDP (Session Description Protocol)和RTSP (real time Streaming Protocol)等实时协议来支持QoS。在opnet14.5仿真平台上研究了基于增强型黑突发协议的MAP的性能。结果表明,在保证信道分配公平性的前提下,所提出的MAP机制在考虑QoS参数时具有更好的性能。
{"title":"Improving WLAN QoS for multimedia application using MAC and application layer (MAP) approach","authors":"Kishan Singh, P. Jayashree","doi":"10.1109/ICRTIT.2014.6996113","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996113","url":null,"abstract":"Quality of Service (QoS) is considered as the standard check of a conveyance system to show provided services and its availability. For illustration application like video conferencing, voice over ip (VOIP), streaming videos, real time operation feel necessity for draconian assurance on jitter, packet loss, prioritization of services and end-to-end delay. So to overcome these issues a novel scheme employing MAC and Application Layer protocols with enhanced (MAP) is proposed. Improved black-burst protocol as well as prioritization of services is proposed at the MAC layer. An influential packet scheduling scheme for multimedia application in IEEE 802.11e has also been designed. At the Application layer level, real time protocols such as Session Description Protocol (SDP) and Real Time Streaming Protocol (RTSP) are adopted to support QoS. The performance of proposed MAP with enhanced Black Burst Protocol is studied with OPNET 14.5 simulator. The result shows that proposed MAP mechanism has better performance in QoS parameters considered, while maintaining fairness during channel allocation.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121872732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An image encryption using chaotic permutation and diffusion 一种利用混沌置换和扩散的图像加密方法
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996091
T. Gopalakrishnan, S. Ramakrishnan, M. Balakumar
This paper proposes a chaos-based image encryption scheme with a permutation-diffusion structure. In this method the encryption is performed in bitwise manner. Mixing process is introduced to modify the pixel intensity values before encryption process. In the permutation stage the plain image pixels are shuffled and in the diffusion stage the generated random bits are exclusive or with the confused image pixels. Tent map and logistic maps are used to generate Permutation order and Diffusion bits.
提出了一种基于混沌的排列扩散结构的图像加密方案。在这种方法中,加密是以位方式执行的。在加密处理之前,引入混合处理来修改像素强度值。在排列阶段,对普通图像像素进行洗牌,在扩散阶段,所生成的随机位与所混淆的图像像素相互排斥。帐篷映射和逻辑映射用于生成排列顺序和扩散位。
{"title":"An image encryption using chaotic permutation and diffusion","authors":"T. Gopalakrishnan, S. Ramakrishnan, M. Balakumar","doi":"10.1109/ICRTIT.2014.6996091","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996091","url":null,"abstract":"This paper proposes a chaos-based image encryption scheme with a permutation-diffusion structure. In this method the encryption is performed in bitwise manner. Mixing process is introduced to modify the pixel intensity values before encryption process. In the permutation stage the plain image pixels are shuffled and in the diffusion stage the generated random bits are exclusive or with the confused image pixels. Tent map and logistic maps are used to generate Permutation order and Diffusion bits.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"31 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114394887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Face recognition system using Combined Gabor Wavelet and DCT approach 基于Gabor小波与DCT相结合的人脸识别系统
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996156
S. Ajitha, A. Fathima, V. Vaidehi, M. Hemalatha, R. Karthigaiveni
In this paper, an approach for face recognition combining multi-resolution analysis and transform domain analysis is proposed. Face Recognition system find its use in many applications such as authentication, surveillance, human-computer interaction systems etc. As the applications using face recognition systems are of much importance and demand more accuracy, more robustness in the face recognition system is expected with less computation time. In the proposed ComGW-DCT approach, features are extracted using a combination of Gabor filters and Discrete Cosine Transform (DCT). The normalised input grayscale image is approximated and reduced in dimension to lower the processing overhead for Gabor filters. This image is convolved with bank of Gabor filters with varying scales and orientations. Further DCT technique is adapted to reduce the feature space dimension. DCT extracts low frequency components of the Gabor wavelet thus resulting in the compression of Gabor features. For classification, k-Nearest Neighbour (k-NN) classifier is used to recognise the test image by comparing with each of the training set features. The ComGW-DCT approach is robust against illumination conditions as the Gabor features are illumination invariant. This algorithm also aims at better recognition rate using less number of features for varying expressions without affecting the computation time. The results of the proposed system are evaluated using AT&T database and MIT-India face database.
提出了一种结合多分辨率分析和变换域分析的人脸识别方法。人脸识别系统在身份验证、监控、人机交互等系统中有着广泛的应用。由于人脸识别系统的应用越来越重要,对准确率的要求也越来越高,因此人们期望人脸识别系统的鲁棒性更好,计算时间更短。在提出的ComGW-DCT方法中,使用Gabor滤波器和离散余弦变换(DCT)的组合来提取特征。将归一化后的输入灰度图像进行近似处理并降低其维数,以降低Gabor滤波器的处理开销。该图像与具有不同尺度和方向的Gabor滤波器进行卷积。进一步采用DCT技术降低特征空间维度。DCT提取Gabor小波的低频分量,从而压缩Gabor特征。对于分类,使用k-最近邻(k-NN)分类器通过比较每个训练集的特征来识别测试图像。ComGW-DCT方法对光照条件具有鲁棒性,因为Gabor特征是光照不变性的。该算法在不影响计算时间的前提下,使用更少的特征对不同的表达式进行更好的识别率。使用AT&T数据库和MIT-India人脸数据库对系统的结果进行了评估。
{"title":"Face recognition system using Combined Gabor Wavelet and DCT approach","authors":"S. Ajitha, A. Fathima, V. Vaidehi, M. Hemalatha, R. Karthigaiveni","doi":"10.1109/ICRTIT.2014.6996156","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996156","url":null,"abstract":"In this paper, an approach for face recognition combining multi-resolution analysis and transform domain analysis is proposed. Face Recognition system find its use in many applications such as authentication, surveillance, human-computer interaction systems etc. As the applications using face recognition systems are of much importance and demand more accuracy, more robustness in the face recognition system is expected with less computation time. In the proposed ComGW-DCT approach, features are extracted using a combination of Gabor filters and Discrete Cosine Transform (DCT). The normalised input grayscale image is approximated and reduced in dimension to lower the processing overhead for Gabor filters. This image is convolved with bank of Gabor filters with varying scales and orientations. Further DCT technique is adapted to reduce the feature space dimension. DCT extracts low frequency components of the Gabor wavelet thus resulting in the compression of Gabor features. For classification, k-Nearest Neighbour (k-NN) classifier is used to recognise the test image by comparing with each of the training set features. The ComGW-DCT approach is robust against illumination conditions as the Gabor features are illumination invariant. This algorithm also aims at better recognition rate using less number of features for varying expressions without affecting the computation time. The results of the proposed system are evaluated using AT&T database and MIT-India face database.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134404834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Intrusion detection system- An efficient way to thwart against Dos/DDos attack in the cloud environment 入侵检测系统——一种在云环境中阻止Dos/DDos攻击的有效方法
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996163
R. Aishwarya, Dr.S. Malliga
One of the emerging and glooming technologies in the IT is Cloud computing where the information is permanently stored in the third party cloud servers and cached temporarily on clients that include different devices like desktops, entertainment centers, table computers, notebooks, wall computers, sensors, etc. Internet connection is the basic requirement for accessing the cloud. Virtualization technology is another technology which goes along with the cloud environment which is used most widely to reduce the cost purchasing the hardware infrastructures in organizations. Henceforth, the Cloud Computing Systems can be easily intruded by various types of cyber attacks including Denial of Serv-ice (DoS) attack and Distributed Denial of Service (DDoS) attack which utilize the entire resources like CPU, Memory, etc and makes the server to starve. This creates a major impact reducing the efficiency of the virtual machines. In the proposed method, attack can be overcome by Transmission Control Protocol (TCP) Mitigation Strategy which uses the SYN Cookie to prevent the attack in the cloud to prevent the attack in which the server ignores the connection packets when it does not receive the correct Acknowledgement (ACK) from the client which requested the connection. The server here has rules to be check whether it is a legitimate client or the spoofed one using the first layer of security for hop count filtering mechanism and second layer of security is encoding the sequence number of the SYN packet so that only a legitimate client can decode it. Additionally security is also provided for the data packets using the Message Authentication Code (MAC) and thus client is authenticated.
云计算是IT领域新兴且前景黯淡的技术之一,它将信息永久存储在第三方云服务器中,并临时缓存在客户端上,这些客户端包括不同的设备,如台式机、娱乐中心、台式电脑、笔记本电脑、壁式电脑、传感器等。互联网连接是访问云的基本要求。虚拟化技术是伴随云环境而来的另一种技术,它被广泛用于降低组织中购买硬件基础设施的成本。从此以后,云计算系统很容易被各种类型的网络攻击入侵,包括拒绝服务(DoS)攻击和分布式拒绝服务(DDoS)攻击,这些攻击利用CPU,内存等整个资源,使服务器饿死。这对降低虚拟机的效率产生了重大影响。在该方法中,可以通过TCP (Transmission Control Protocol)缓解策略克服攻击,该策略使用SYN Cookie在云中防止攻击,以防止服务器在未收到请求连接的客户端正确的ACK (Acknowledgement)时忽略连接数据包的攻击。这里的服务器有规则来检查它是合法的客户端还是被欺骗的客户端,使用第一层安全的跳数过滤机制,第二层安全编码SYN包的序列号,以便只有合法的客户端才能解码它。此外,还使用消息认证码(MAC)为数据包提供安全性,从而对客户端进行身份验证。
{"title":"Intrusion detection system- An efficient way to thwart against Dos/DDos attack in the cloud environment","authors":"R. Aishwarya, Dr.S. Malliga","doi":"10.1109/ICRTIT.2014.6996163","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996163","url":null,"abstract":"One of the emerging and glooming technologies in the IT is Cloud computing where the information is permanently stored in the third party cloud servers and cached temporarily on clients that include different devices like desktops, entertainment centers, table computers, notebooks, wall computers, sensors, etc. Internet connection is the basic requirement for accessing the cloud. Virtualization technology is another technology which goes along with the cloud environment which is used most widely to reduce the cost purchasing the hardware infrastructures in organizations. Henceforth, the Cloud Computing Systems can be easily intruded by various types of cyber attacks including Denial of Serv-ice (DoS) attack and Distributed Denial of Service (DDoS) attack which utilize the entire resources like CPU, Memory, etc and makes the server to starve. This creates a major impact reducing the efficiency of the virtual machines. In the proposed method, attack can be overcome by Transmission Control Protocol (TCP) Mitigation Strategy which uses the SYN Cookie to prevent the attack in the cloud to prevent the attack in which the server ignores the connection packets when it does not receive the correct Acknowledgement (ACK) from the client which requested the connection. The server here has rules to be check whether it is a legitimate client or the spoofed one using the first layer of security for hop count filtering mechanism and second layer of security is encoding the sequence number of the SYN packet so that only a legitimate client can decode it. Additionally security is also provided for the data packets using the Message Authentication Code (MAC) and thus client is authenticated.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"416 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134464622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Effect of multi-word features on the hierarchical clustering of web documents 多词特征对web文档分层聚类的影响
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996185
S. Karthick, S. Mercy Shalinie, Ar Eswarimeena, P. Madhumitha, T. Naga Abhinaya
Contemporary search engines and other automated web tools are faced with the task of extracting relevant information from huge web archives. This is supposed to be a difficult task due to the semi-structured and unstructured nature of the web documents. Users need automated ways of organizing and cataloging the web documents so that they can be queried efficiently. Clustering is typically employed to organize web archives and to subsequently handle user queries. This paper analyzes the effect of including multi-word features on the performance of a hierarchical clustering algorithm. Noun sequences are the predominant features considered in our work, while most of the previous research uses n-grams as features. The paper also analyzes the effect of combining link and content based representations for the web documents and their inter-relationships on the clustering performance. Empirical evaluation of the hierarchical clustering engine suggests that including multi-word features enhances the performance of the hierarchical clustering algorithm with respect to precision.
当代搜索引擎和其他自动化网络工具都面临着从庞大的网络档案中提取相关信息的任务。由于web文档的半结构化和非结构化性质,这应该是一项困难的任务。用户需要自动组织和编目网络文档的方式,以便他们可以有效地查询。集群通常用于组织web存档并随后处理用户查询。本文分析了包含多词特征对分层聚类算法性能的影响。名词序列是我们研究的主要特征,而之前的研究大多使用n-gram作为特征。本文还分析了将基于链接的表示与基于内容的表示相结合以及它们之间的相互关系对聚类性能的影响。对层次聚类引擎的经验评价表明,加入多词特征可以提高层次聚类算法的精度。
{"title":"Effect of multi-word features on the hierarchical clustering of web documents","authors":"S. Karthick, S. Mercy Shalinie, Ar Eswarimeena, P. Madhumitha, T. Naga Abhinaya","doi":"10.1109/ICRTIT.2014.6996185","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996185","url":null,"abstract":"Contemporary search engines and other automated web tools are faced with the task of extracting relevant information from huge web archives. This is supposed to be a difficult task due to the semi-structured and unstructured nature of the web documents. Users need automated ways of organizing and cataloging the web documents so that they can be queried efficiently. Clustering is typically employed to organize web archives and to subsequently handle user queries. This paper analyzes the effect of including multi-word features on the performance of a hierarchical clustering algorithm. Noun sequences are the predominant features considered in our work, while most of the previous research uses n-grams as features. The paper also analyzes the effect of combining link and content based representations for the web documents and their inter-relationships on the clustering performance. Empirical evaluation of the hierarchical clustering engine suggests that including multi-word features enhances the performance of the hierarchical clustering algorithm with respect to precision.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114057006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 International Conference on Recent Trends in Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1