Pub Date : 2014-04-10DOI: 10.1109/ICRTIT.2014.6996092
Kirthanaa Raghuraman, Monisha Senthurpandian, Monisha Shanmugasundaram, Bhargavi, V. Vaidehi
Anomaly Detection in health care by monitoring the vital health parameters of patients is a challenging problem in machine learning. The existing algorithms do not process the data incrementally and hence are not very effective in predicting the anomalies accurately and at the correct instance. In this paper, in order to process the health data in an online fashion a novel Online Incremental Learning Algorithm (OILA) is proposed. The OILA predicts the health parameters using a regression based approach with a feedback mechanism to reduce error. An alert is generated when an anomaly is seen in the health parameters, thus alerting the doctor to be cautious. The algorithm is compared with Kalman Filter for comparing the prediction capabilities of OILA with Kalman Filter. The proposed algorithm is validated with real time health parameter data sets for health parameters namely heart rate and blood pressure.
{"title":"Online Incremental Learning Algorithm for anomaly detection and prediction in health care","authors":"Kirthanaa Raghuraman, Monisha Senthurpandian, Monisha Shanmugasundaram, Bhargavi, V. Vaidehi","doi":"10.1109/ICRTIT.2014.6996092","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996092","url":null,"abstract":"Anomaly Detection in health care by monitoring the vital health parameters of patients is a challenging problem in machine learning. The existing algorithms do not process the data incrementally and hence are not very effective in predicting the anomalies accurately and at the correct instance. In this paper, in order to process the health data in an online fashion a novel Online Incremental Learning Algorithm (OILA) is proposed. The OILA predicts the health parameters using a regression based approach with a feedback mechanism to reduce error. An alert is generated when an anomaly is seen in the health parameters, thus alerting the doctor to be cautious. The algorithm is compared with Kalman Filter for comparing the prediction capabilities of OILA with Kalman Filter. The proposed algorithm is validated with real time health parameter data sets for health parameters namely heart rate and blood pressure.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115378811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-10DOI: 10.1109/ICRTIT.2014.6996212
C. Valliyammai, S. Uma, B. Dhivya, P. Surya
In the field of cloud computing, energy efficiency plays a major role. This is because the usage of cloud is increasing and so is the cost of energy; and also there is a necessity to reduce the carbon emission which occurs due to the usage of information and communication technologies (ICT). Hence there is a need for energy-efficient technologies that should reduce the overall energy consumption that is needed for computation, storage and communications. The proposed mechanism reduces the energy consumption by suspending the idle virtual machines (VMs) and categorizing the active VMs into different energy clusters with the help of fuzzy C-means algorithm. Also the percentage of Service Level Agreement (SLA) violated is kept minimal.
{"title":"Efficient energy consumption in green cloud","authors":"C. Valliyammai, S. Uma, B. Dhivya, P. Surya","doi":"10.1109/ICRTIT.2014.6996212","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996212","url":null,"abstract":"In the field of cloud computing, energy efficiency plays a major role. This is because the usage of cloud is increasing and so is the cost of energy; and also there is a necessity to reduce the carbon emission which occurs due to the usage of information and communication technologies (ICT). Hence there is a need for energy-efficient technologies that should reduce the overall energy consumption that is needed for computation, storage and communications. The proposed mechanism reduces the energy consumption by suspending the idle virtual machines (VMs) and categorizing the active VMs into different energy clusters with the help of fuzzy C-means algorithm. Also the percentage of Service Level Agreement (SLA) violated is kept minimal.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"13 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120905177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-10DOI: 10.1109/ICRTIT.2014.6996213
S. Selvi, C. Valliyammai, V. N. Dhatchayani
Resource management is the primary issue as the demand grows for provisioning resources and computation in cloud systems. This article presents various research issues pertaining to the management of cloud resources while a comparison is made between existing resource allocation systems. The issues and challenges discussed in this paper are resource provisioning, job scheduling, load balancing, scalability, pricing, energy management and availability.
{"title":"Resource allocation issues and challenges in cloud computing","authors":"S. Selvi, C. Valliyammai, V. N. Dhatchayani","doi":"10.1109/ICRTIT.2014.6996213","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996213","url":null,"abstract":"Resource management is the primary issue as the demand grows for provisioning resources and computation in cloud systems. This article presents various research issues pertaining to the management of cloud resources while a comparison is made between existing resource allocation systems. The issues and challenges discussed in this paper are resource provisioning, job scheduling, load balancing, scalability, pricing, energy management and availability.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121039748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-10DOI: 10.1109/ICRTIT.2014.6996165
Mukesh Kumar, S. K. Rath
The DNA microarray classification is one of the most popular technique among researchers and practitioners. In microarray data analysis, huge useful information may be lost due to irrelevant and insignificant features of the dataset. To overcome this drawback of the data set, only those features are selected which have high relevance with the classes and high significance in the feature set. In this paper, the t-statistic is used for feature selection with high relevance; and Fuzzy inference system (FIS) has been presented for classification purpose. FIS model is applied to classify the leukemia data set for gene classification. A comparative analysis of Fuzzy inference system (FIS) with different set of features (genes) have been presented. The comparison was performed on the basis of available performance parameters in literature such as: precision, recall, specificity, F-Measure, ROC curve and accuracy. The obtained results have been critically examined with the existing classifiers in the literature and it is observed that the proposed system obtained promising results with an increase in classification accuracy rate.
{"title":"Classification of microarray data using Fuzzy inference system","authors":"Mukesh Kumar, S. K. Rath","doi":"10.1109/ICRTIT.2014.6996165","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996165","url":null,"abstract":"The DNA microarray classification is one of the most popular technique among researchers and practitioners. In microarray data analysis, huge useful information may be lost due to irrelevant and insignificant features of the dataset. To overcome this drawback of the data set, only those features are selected which have high relevance with the classes and high significance in the feature set. In this paper, the t-statistic is used for feature selection with high relevance; and Fuzzy inference system (FIS) has been presented for classification purpose. FIS model is applied to classify the leukemia data set for gene classification. A comparative analysis of Fuzzy inference system (FIS) with different set of features (genes) have been presented. The comparison was performed on the basis of available performance parameters in literature such as: precision, recall, specificity, F-Measure, ROC curve and accuracy. The obtained results have been critically examined with the existing classifiers in the literature and it is observed that the proposed system obtained promising results with an increase in classification accuracy rate.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-10DOI: 10.1109/ICRTIT.2014.6996204
D. Bharti, K. Gupta
Although a number of efficient and high-level design algorithms have been put forward for the realization of FIR filter using the least number of arithmetic operations, but they do not take into account the low-level implementation issues which can exactly make a difference to the area and delay in designing of FIR filter. In this paper, at first, we have presented the delay efficient addition and multiplication architectures that are used in designing of the filter operation. Here We have used an algorithm for the multiplication that reduces the bit width and then an efficient parallel adder is been used that implements the two form of FIR filter with very less amount of delay considering the cost of each operation too. The paper presents two different types of FIR filter with 8 and 16 tap among which one of the form is good for the speed and the other is good for the area.
{"title":"Efficient design of different forms of FIR filter","authors":"D. Bharti, K. Gupta","doi":"10.1109/ICRTIT.2014.6996204","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996204","url":null,"abstract":"Although a number of efficient and high-level design algorithms have been put forward for the realization of FIR filter using the least number of arithmetic operations, but they do not take into account the low-level implementation issues which can exactly make a difference to the area and delay in designing of FIR filter. In this paper, at first, we have presented the delay efficient addition and multiplication architectures that are used in designing of the filter operation. Here We have used an algorithm for the multiplication that reduces the bit width and then an efficient parallel adder is been used that implements the two form of FIR filter with very less amount of delay considering the cost of each operation too. The paper presents two different types of FIR filter with 8 and 16 tap among which one of the form is good for the speed and the other is good for the area.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114686367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-10DOI: 10.1109/ICRTIT.2014.6996113
Kishan Singh, P. Jayashree
Quality of Service (QoS) is considered as the standard check of a conveyance system to show provided services and its availability. For illustration application like video conferencing, voice over ip (VOIP), streaming videos, real time operation feel necessity for draconian assurance on jitter, packet loss, prioritization of services and end-to-end delay. So to overcome these issues a novel scheme employing MAC and Application Layer protocols with enhanced (MAP) is proposed. Improved black-burst protocol as well as prioritization of services is proposed at the MAC layer. An influential packet scheduling scheme for multimedia application in IEEE 802.11e has also been designed. At the Application layer level, real time protocols such as Session Description Protocol (SDP) and Real Time Streaming Protocol (RTSP) are adopted to support QoS. The performance of proposed MAP with enhanced Black Burst Protocol is studied with OPNET 14.5 simulator. The result shows that proposed MAP mechanism has better performance in QoS parameters considered, while maintaining fairness during channel allocation.
服务质量(QoS)被认为是传输系统显示所提供服务及其可用性的标准检查。对于视频会议、ip语音(VOIP)、流媒体视频等示例应用,实时操作需要严格保证抖动、数据包丢失、服务优先级和端到端延迟。为了克服这些问题,提出了一种采用MAC和增强的应用层协议(MAP)的新方案。在MAC层提出了改进的黑突发协议和服务优先级。在ieee802.11 e标准下,设计了一种对多媒体应用有影响的分组调度方案。在应用层,采用SDP (Session Description Protocol)和RTSP (real time Streaming Protocol)等实时协议来支持QoS。在opnet14.5仿真平台上研究了基于增强型黑突发协议的MAP的性能。结果表明,在保证信道分配公平性的前提下,所提出的MAP机制在考虑QoS参数时具有更好的性能。
{"title":"Improving WLAN QoS for multimedia application using MAC and application layer (MAP) approach","authors":"Kishan Singh, P. Jayashree","doi":"10.1109/ICRTIT.2014.6996113","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996113","url":null,"abstract":"Quality of Service (QoS) is considered as the standard check of a conveyance system to show provided services and its availability. For illustration application like video conferencing, voice over ip (VOIP), streaming videos, real time operation feel necessity for draconian assurance on jitter, packet loss, prioritization of services and end-to-end delay. So to overcome these issues a novel scheme employing MAC and Application Layer protocols with enhanced (MAP) is proposed. Improved black-burst protocol as well as prioritization of services is proposed at the MAC layer. An influential packet scheduling scheme for multimedia application in IEEE 802.11e has also been designed. At the Application layer level, real time protocols such as Session Description Protocol (SDP) and Real Time Streaming Protocol (RTSP) are adopted to support QoS. The performance of proposed MAP with enhanced Black Burst Protocol is studied with OPNET 14.5 simulator. The result shows that proposed MAP mechanism has better performance in QoS parameters considered, while maintaining fairness during channel allocation.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121872732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-10DOI: 10.1109/ICRTIT.2014.6996091
T. Gopalakrishnan, S. Ramakrishnan, M. Balakumar
This paper proposes a chaos-based image encryption scheme with a permutation-diffusion structure. In this method the encryption is performed in bitwise manner. Mixing process is introduced to modify the pixel intensity values before encryption process. In the permutation stage the plain image pixels are shuffled and in the diffusion stage the generated random bits are exclusive or with the confused image pixels. Tent map and logistic maps are used to generate Permutation order and Diffusion bits.
{"title":"An image encryption using chaotic permutation and diffusion","authors":"T. Gopalakrishnan, S. Ramakrishnan, M. Balakumar","doi":"10.1109/ICRTIT.2014.6996091","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996091","url":null,"abstract":"This paper proposes a chaos-based image encryption scheme with a permutation-diffusion structure. In this method the encryption is performed in bitwise manner. Mixing process is introduced to modify the pixel intensity values before encryption process. In the permutation stage the plain image pixels are shuffled and in the diffusion stage the generated random bits are exclusive or with the confused image pixels. Tent map and logistic maps are used to generate Permutation order and Diffusion bits.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"31 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114394887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-10DOI: 10.1109/ICRTIT.2014.6996156
S. Ajitha, A. Fathima, V. Vaidehi, M. Hemalatha, R. Karthigaiveni
In this paper, an approach for face recognition combining multi-resolution analysis and transform domain analysis is proposed. Face Recognition system find its use in many applications such as authentication, surveillance, human-computer interaction systems etc. As the applications using face recognition systems are of much importance and demand more accuracy, more robustness in the face recognition system is expected with less computation time. In the proposed ComGW-DCT approach, features are extracted using a combination of Gabor filters and Discrete Cosine Transform (DCT). The normalised input grayscale image is approximated and reduced in dimension to lower the processing overhead for Gabor filters. This image is convolved with bank of Gabor filters with varying scales and orientations. Further DCT technique is adapted to reduce the feature space dimension. DCT extracts low frequency components of the Gabor wavelet thus resulting in the compression of Gabor features. For classification, k-Nearest Neighbour (k-NN) classifier is used to recognise the test image by comparing with each of the training set features. The ComGW-DCT approach is robust against illumination conditions as the Gabor features are illumination invariant. This algorithm also aims at better recognition rate using less number of features for varying expressions without affecting the computation time. The results of the proposed system are evaluated using AT&T database and MIT-India face database.
{"title":"Face recognition system using Combined Gabor Wavelet and DCT approach","authors":"S. Ajitha, A. Fathima, V. Vaidehi, M. Hemalatha, R. Karthigaiveni","doi":"10.1109/ICRTIT.2014.6996156","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996156","url":null,"abstract":"In this paper, an approach for face recognition combining multi-resolution analysis and transform domain analysis is proposed. Face Recognition system find its use in many applications such as authentication, surveillance, human-computer interaction systems etc. As the applications using face recognition systems are of much importance and demand more accuracy, more robustness in the face recognition system is expected with less computation time. In the proposed ComGW-DCT approach, features are extracted using a combination of Gabor filters and Discrete Cosine Transform (DCT). The normalised input grayscale image is approximated and reduced in dimension to lower the processing overhead for Gabor filters. This image is convolved with bank of Gabor filters with varying scales and orientations. Further DCT technique is adapted to reduce the feature space dimension. DCT extracts low frequency components of the Gabor wavelet thus resulting in the compression of Gabor features. For classification, k-Nearest Neighbour (k-NN) classifier is used to recognise the test image by comparing with each of the training set features. The ComGW-DCT approach is robust against illumination conditions as the Gabor features are illumination invariant. This algorithm also aims at better recognition rate using less number of features for varying expressions without affecting the computation time. The results of the proposed system are evaluated using AT&T database and MIT-India face database.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134404834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-10DOI: 10.1109/ICRTIT.2014.6996163
R. Aishwarya, Dr.S. Malliga
One of the emerging and glooming technologies in the IT is Cloud computing where the information is permanently stored in the third party cloud servers and cached temporarily on clients that include different devices like desktops, entertainment centers, table computers, notebooks, wall computers, sensors, etc. Internet connection is the basic requirement for accessing the cloud. Virtualization technology is another technology which goes along with the cloud environment which is used most widely to reduce the cost purchasing the hardware infrastructures in organizations. Henceforth, the Cloud Computing Systems can be easily intruded by various types of cyber attacks including Denial of Serv-ice (DoS) attack and Distributed Denial of Service (DDoS) attack which utilize the entire resources like CPU, Memory, etc and makes the server to starve. This creates a major impact reducing the efficiency of the virtual machines. In the proposed method, attack can be overcome by Transmission Control Protocol (TCP) Mitigation Strategy which uses the SYN Cookie to prevent the attack in the cloud to prevent the attack in which the server ignores the connection packets when it does not receive the correct Acknowledgement (ACK) from the client which requested the connection. The server here has rules to be check whether it is a legitimate client or the spoofed one using the first layer of security for hop count filtering mechanism and second layer of security is encoding the sequence number of the SYN packet so that only a legitimate client can decode it. Additionally security is also provided for the data packets using the Message Authentication Code (MAC) and thus client is authenticated.
云计算是IT领域新兴且前景黯淡的技术之一,它将信息永久存储在第三方云服务器中,并临时缓存在客户端上,这些客户端包括不同的设备,如台式机、娱乐中心、台式电脑、笔记本电脑、壁式电脑、传感器等。互联网连接是访问云的基本要求。虚拟化技术是伴随云环境而来的另一种技术,它被广泛用于降低组织中购买硬件基础设施的成本。从此以后,云计算系统很容易被各种类型的网络攻击入侵,包括拒绝服务(DoS)攻击和分布式拒绝服务(DDoS)攻击,这些攻击利用CPU,内存等整个资源,使服务器饿死。这对降低虚拟机的效率产生了重大影响。在该方法中,可以通过TCP (Transmission Control Protocol)缓解策略克服攻击,该策略使用SYN Cookie在云中防止攻击,以防止服务器在未收到请求连接的客户端正确的ACK (Acknowledgement)时忽略连接数据包的攻击。这里的服务器有规则来检查它是合法的客户端还是被欺骗的客户端,使用第一层安全的跳数过滤机制,第二层安全编码SYN包的序列号,以便只有合法的客户端才能解码它。此外,还使用消息认证码(MAC)为数据包提供安全性,从而对客户端进行身份验证。
{"title":"Intrusion detection system- An efficient way to thwart against Dos/DDos attack in the cloud environment","authors":"R. Aishwarya, Dr.S. Malliga","doi":"10.1109/ICRTIT.2014.6996163","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996163","url":null,"abstract":"One of the emerging and glooming technologies in the IT is Cloud computing where the information is permanently stored in the third party cloud servers and cached temporarily on clients that include different devices like desktops, entertainment centers, table computers, notebooks, wall computers, sensors, etc. Internet connection is the basic requirement for accessing the cloud. Virtualization technology is another technology which goes along with the cloud environment which is used most widely to reduce the cost purchasing the hardware infrastructures in organizations. Henceforth, the Cloud Computing Systems can be easily intruded by various types of cyber attacks including Denial of Serv-ice (DoS) attack and Distributed Denial of Service (DDoS) attack which utilize the entire resources like CPU, Memory, etc and makes the server to starve. This creates a major impact reducing the efficiency of the virtual machines. In the proposed method, attack can be overcome by Transmission Control Protocol (TCP) Mitigation Strategy which uses the SYN Cookie to prevent the attack in the cloud to prevent the attack in which the server ignores the connection packets when it does not receive the correct Acknowledgement (ACK) from the client which requested the connection. The server here has rules to be check whether it is a legitimate client or the spoofed one using the first layer of security for hop count filtering mechanism and second layer of security is encoding the sequence number of the SYN packet so that only a legitimate client can decode it. Additionally security is also provided for the data packets using the Message Authentication Code (MAC) and thus client is authenticated.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"416 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134464622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-10DOI: 10.1109/ICRTIT.2014.6996185
S. Karthick, S. Mercy Shalinie, Ar Eswarimeena, P. Madhumitha, T. Naga Abhinaya
Contemporary search engines and other automated web tools are faced with the task of extracting relevant information from huge web archives. This is supposed to be a difficult task due to the semi-structured and unstructured nature of the web documents. Users need automated ways of organizing and cataloging the web documents so that they can be queried efficiently. Clustering is typically employed to organize web archives and to subsequently handle user queries. This paper analyzes the effect of including multi-word features on the performance of a hierarchical clustering algorithm. Noun sequences are the predominant features considered in our work, while most of the previous research uses n-grams as features. The paper also analyzes the effect of combining link and content based representations for the web documents and their inter-relationships on the clustering performance. Empirical evaluation of the hierarchical clustering engine suggests that including multi-word features enhances the performance of the hierarchical clustering algorithm with respect to precision.
{"title":"Effect of multi-word features on the hierarchical clustering of web documents","authors":"S. Karthick, S. Mercy Shalinie, Ar Eswarimeena, P. Madhumitha, T. Naga Abhinaya","doi":"10.1109/ICRTIT.2014.6996185","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996185","url":null,"abstract":"Contemporary search engines and other automated web tools are faced with the task of extracting relevant information from huge web archives. This is supposed to be a difficult task due to the semi-structured and unstructured nature of the web documents. Users need automated ways of organizing and cataloging the web documents so that they can be queried efficiently. Clustering is typically employed to organize web archives and to subsequently handle user queries. This paper analyzes the effect of including multi-word features on the performance of a hierarchical clustering algorithm. Noun sequences are the predominant features considered in our work, while most of the previous research uses n-grams as features. The paper also analyzes the effect of combining link and content based representations for the web documents and their inter-relationships on the clustering performance. Empirical evaluation of the hierarchical clustering engine suggests that including multi-word features enhances the performance of the hierarchical clustering algorithm with respect to precision.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114057006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}