首页 > 最新文献

2014 International Conference on Contemporary Computing and Informatics (IC3I)最新文献

英文 中文
Federated Intelligent Cloud Service-Oriented Federation in Global Cloud Market with Match-Making Service Broker and Global Workload Management 基于配对服务代理和全球工作负载管理的全球云市场中面向服务的联邦智能云联盟
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019639
S. Sathyanarayanan, Reynald Susainathan Reni Sagayaraj
Federated Cloud Computing facilitates scalable on-demand service, ensuring business continuity through improved reliability on the cloud. This environment demands efficient Global Workload Management in the cloud market and appropriate mapping between service providers and consumers. This necessitates an efficient Service-Oriented Architecture, with an Enterprise Service Bus (ESB) providing a rich service abstraction. Service Broker, one of the main entities of ESB the implements Match-Making Algorithm. GWM focuses on scalable provisioning through Load-sharing policy improving QoS of global market. To realize this feature, the cloud coordinator implements an efficient distributed algorithm that incorporates vector clock based mutual exclusion on workload bursting. This paper presents vision, challenges and architectural elements of the Federated Intelligent Cloud.
联邦云计算促进可扩展的按需服务,通过提高云上的可靠性来确保业务连续性。这种环境需要云市场中高效的全局工作负载管理以及服务提供者和消费者之间的适当映射。这就需要高效的面向服务的体系结构,并使用企业服务总线(ESB)提供丰富的服务抽象。服务代理是ESB的主要实体之一,实现了匹配生成算法。GWM专注于通过负载共享策略提高全球市场QoS的可扩展配置。为了实现这一特性,云协调器实现了一种高效的分布式算法,该算法在工作负载爆发时结合了基于矢量时钟的互斥。本文介绍了联邦智能云的愿景、挑战和架构要素。
{"title":"Federated Intelligent Cloud Service-Oriented Federation in Global Cloud Market with Match-Making Service Broker and Global Workload Management","authors":"S. Sathyanarayanan, Reynald Susainathan Reni Sagayaraj","doi":"10.1109/IC3I.2014.7019639","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019639","url":null,"abstract":"Federated Cloud Computing facilitates scalable on-demand service, ensuring business continuity through improved reliability on the cloud. This environment demands efficient Global Workload Management in the cloud market and appropriate mapping between service providers and consumers. This necessitates an efficient Service-Oriented Architecture, with an Enterprise Service Bus (ESB) providing a rich service abstraction. Service Broker, one of the main entities of ESB the implements Match-Making Algorithm. GWM focuses on scalable provisioning through Load-sharing policy improving QoS of global market. To realize this feature, the cloud coordinator implements an efficient distributed algorithm that incorporates vector clock based mutual exclusion on workload bursting. This paper presents vision, challenges and architectural elements of the Federated Intelligent Cloud.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128651411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data security in Cloud Computing using Cramer - Shoup cryptosystem 基于Cramer - Shoup密码系统的云计算数据安全
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019773
Dr. Raju Shanmugam, Y. M. Sirajudeen
Cloud computing is an emerging technology which has become today's blistering research area due to the advancement of increased connectivity and it is most interesting and attractable technology which offers the on demand services to the users over the Internet. Since Cloud Computing stores the user data and allows the user to work on the cloud system and so the security has become the main concern which creates threat and tries to deploy the Cloud environments. Even though the Cloud Computing is efficient, there are many challenges for data security, which may take away the users from using the cloud computing. To ensure the security of data, we proposed a method by implementing Cramer - Shoup cryptosystem.
云计算是一项新兴的技术,由于连接性的提高,它已经成为当今炙手可热的研究领域,它是通过互联网向用户提供按需服务的最有趣和最具吸引力的技术。由于云计算存储用户数据并允许用户在云系统上工作,因此安全性已成为主要关注的问题,它会产生威胁并试图部署云环境。尽管云计算是高效的,但在数据安全方面存在许多挑战,这可能会使用户放弃使用云计算。为了保证数据的安全性,我们提出了一种实现Cramer - Shoup密码系统的方法。
{"title":"Data security in Cloud Computing using Cramer - Shoup cryptosystem","authors":"Dr. Raju Shanmugam, Y. M. Sirajudeen","doi":"10.1109/IC3I.2014.7019773","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019773","url":null,"abstract":"Cloud computing is an emerging technology which has become today's blistering research area due to the advancement of increased connectivity and it is most interesting and attractable technology which offers the on demand services to the users over the Internet. Since Cloud Computing stores the user data and allows the user to work on the cloud system and so the security has become the main concern which creates threat and tries to deploy the Cloud environments. Even though the Cloud Computing is efficient, there are many challenges for data security, which may take away the users from using the cloud computing. To ensure the security of data, we proposed a method by implementing Cramer - Shoup cryptosystem.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"76 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115665919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A review of theatmospheric effects on radiopath lossin cellular mobile communication system 蜂窝移动通信系统中大气对辐射患者信号丢失的影响研究进展
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019761
C. S. Hanchinal, K. N. Muralidhara
Radio propagation is essential for emerging technologies with appropriate design, deployment and management strategies for any wireless network. It is heavily site specific and can vary significantly depending on terrain, atmospheric effects, frequency of operation, velocity of mobile terminal, interface sources and other dynamic factor. Accurate characterization of radio channel through key parameters and a mathematical model is important for: predicting signal coverage, achievable data rates, network planning, Quality of service, hand over performance, etc. Efficiency of present path loss models for cellular communication system suffers when they are used in the environment other than for which they have been used. Accurate path loss can be determined by measuring strength of signal through site specific field measurements.
无线电传播对于任何无线网络都具有适当的设计、部署和管理策略的新兴技术至关重要。它具有很强的场地特异性,可以根据地形、大气效应、操作频率、移动终端速度、界面源和其他动态因素而发生显着变化。通过关键参数和数学模型准确表征无线电信道对于预测信号覆盖、可实现的数据速率、网络规划、服务质量、移交性能等都很重要。现有的蜂窝通信系统路径损耗模型在不同的环境下使用时,其效率会受到影响。准确的路径损耗可以通过测量信号强度来确定。
{"title":"A review of theatmospheric effects on radiopath lossin cellular mobile communication system","authors":"C. S. Hanchinal, K. N. Muralidhara","doi":"10.1109/IC3I.2014.7019761","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019761","url":null,"abstract":"Radio propagation is essential for emerging technologies with appropriate design, deployment and management strategies for any wireless network. It is heavily site specific and can vary significantly depending on terrain, atmospheric effects, frequency of operation, velocity of mobile terminal, interface sources and other dynamic factor. Accurate characterization of radio channel through key parameters and a mathematical model is important for: predicting signal coverage, achievable data rates, network planning, Quality of service, hand over performance, etc. Efficiency of present path loss models for cellular communication system suffers when they are used in the environment other than for which they have been used. Accurate path loss can be determined by measuring strength of signal through site specific field measurements.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125550725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A precedence based load balancing strategy for batch of DAGs for computational grid 基于优先级的计算网格批量dag负载均衡策略
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019681
Mohammad Shahid, Z. Raza
Load balancing on computational resources in a computational grid environment is an NP Hard problem. Therefore, a number of schemes can be proposed for the same under different constraints. Accordingly, a variety of techniques have been proposed in the literature but none of them can be treated as the best for all conditions and QoS parameters. A computational grid enables the users to execute their compute intensive jobs on the resources in which investing is either not wise or beyond their limit to invest. Grid resources can be used to meet the user's requirements in terms of QoS parameters if the scheduling strategy provides the efficient mapping between the software parallelisms available in the application on the hardware parallelism offered by the grid. This work presents a centralized precedence based load balancing strategy for a batch of jobs represented as Direct Acyclic Graph (DAG) having communication requirements. Performance evaluation is carried out by comparing the proposed strategy with other load balancing schemes viz. LRR and OLB. Experimental study reveals that load distribution on nodes is better than LRR and OLB. The strategy can be used for the jobs which are more interactive as it results in a lower response time for the jobs of the batch.
计算网格环境下计算资源的负载平衡是一个NP困难问题。因此,在不同的约束条件下,可以提出许多相同的方案。因此,文献中提出了各种各样的技术,但没有一种技术可以被认为是所有条件和QoS参数的最佳技术。计算网格使用户能够在资源上执行计算密集型工作,而这些资源的投资要么是不明智的,要么是超出了他们的投资限制。如果调度策略提供了应用程序中可用的软件并行性与网格提供的硬件并行性之间的有效映射,则可以使用网格资源来满足用户在QoS参数方面的需求。这项工作提出了一种集中的基于优先级的负载平衡策略,用于具有通信需求的一批作业,这些作业表示为直接无环图(DAG)。通过将所提出的策略与其他负载均衡方案(LRR和OLB)进行比较,进行性能评估。实验研究表明,节点负载分布优于LRR和OLB。该策略可用于交互性更强的作业,因为它可以降低批作业的响应时间。
{"title":"A precedence based load balancing strategy for batch of DAGs for computational grid","authors":"Mohammad Shahid, Z. Raza","doi":"10.1109/IC3I.2014.7019681","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019681","url":null,"abstract":"Load balancing on computational resources in a computational grid environment is an NP Hard problem. Therefore, a number of schemes can be proposed for the same under different constraints. Accordingly, a variety of techniques have been proposed in the literature but none of them can be treated as the best for all conditions and QoS parameters. A computational grid enables the users to execute their compute intensive jobs on the resources in which investing is either not wise or beyond their limit to invest. Grid resources can be used to meet the user's requirements in terms of QoS parameters if the scheduling strategy provides the efficient mapping between the software parallelisms available in the application on the hardware parallelism offered by the grid. This work presents a centralized precedence based load balancing strategy for a batch of jobs represented as Direct Acyclic Graph (DAG) having communication requirements. Performance evaluation is carried out by comparing the proposed strategy with other load balancing schemes viz. LRR and OLB. Experimental study reveals that load distribution on nodes is better than LRR and OLB. The strategy can be used for the jobs which are more interactive as it results in a lower response time for the jobs of the batch.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126885635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance analysis of Free Space Optics link at different data rates 自由空间光链路在不同数据速率下的性能分析
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019625
G. Soni, V. Banga
FSO technology offers the potential of broadband communication capacity using unlicensed optical wavelengths. FSO is an independent protocol that can be fixed to any network topology. Even if a line-of-sight condition of Free Space Optics (FSO) is satisfied, atmospheric-induced fading, scattering, and attenuation may severely deteriorate the availability of the communication link. In this paper the proposed FSO link with link range of 500 meters and at wavelength of 1550 nm is simulated under weak turbulence conditions and the link performance is evaluated at different data rates.
FSO技术提供了使用未经许可的光波长的宽带通信容量的潜力。FSO是一种独立的协议,可以固定在任何网络拓扑结构上。即使满足自由空间光学(FSO)的视距条件,大气引起的衰落、散射和衰减也可能严重恶化通信链路的可用性。本文对链路距离为500米、波长为1550 nm的FSO链路在弱湍流条件下进行了仿真,并对不同数据速率下的链路性能进行了评估。
{"title":"Performance analysis of Free Space Optics link at different data rates","authors":"G. Soni, V. Banga","doi":"10.1109/IC3I.2014.7019625","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019625","url":null,"abstract":"FSO technology offers the potential of broadband communication capacity using unlicensed optical wavelengths. FSO is an independent protocol that can be fixed to any network topology. Even if a line-of-sight condition of Free Space Optics (FSO) is satisfied, atmospheric-induced fading, scattering, and attenuation may severely deteriorate the availability of the communication link. In this paper the proposed FSO link with link range of 500 meters and at wavelength of 1550 nm is simulated under weak turbulence conditions and the link performance is evaluated at different data rates.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128065030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Edge based selective encryption scheme for biometric data using chaotic theory 基于混沌理论的生物特征数据边缘选择性加密方案
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019712
Garima Mehta, M. Dutta, C. Travieso-González, Pyung Soo Kim
Security of biometric data plays a major concern due to extensive use of biometric systems in many applications. This paper proposes an efficient method for encryption of iris images using edge based encryption algorithm based on chaotic theory. In this proposed technique, the iris image is segmented into significant and non significant blocks to find region of interest (ROI) i.e. to localize iris from complete eye image from which features are extracted to generate biometric template. Selective encryption is used to encrypt the region of interest and it reduces the computational overhead and processing time as compared to full encryption techniques. The experimental results prove that edge based selective encryption significantly reduces the time of encryption of iris images as compared to full encryption method without any compromise in performance. Performance of proposed algorithm has been experimentally analyzed using key sensitivity analysis and the results prove that the encryption algorithm has high key sensitivity and the algorithm is lossless in nature.
由于生物识别系统在许多应用中的广泛使用,生物识别数据的安全性成为一个主要问题。提出了一种基于混沌理论的基于边缘的虹膜图像加密算法。在该技术中,虹膜图像被分割成重要和不重要的块,以找到感兴趣的区域(ROI),即从完整的眼睛图像中定位虹膜,从中提取特征以生成生物识别模板。选择性加密用于加密感兴趣的区域,与完全加密技术相比,它减少了计算开销和处理时间。实验结果表明,与完全加密方法相比,基于边缘的选择性加密大大减少了虹膜图像的加密时间,且不影响性能。利用密钥灵敏度分析对算法性能进行了实验分析,结果证明该算法具有较高的密钥灵敏度和无损性。
{"title":"Edge based selective encryption scheme for biometric data using chaotic theory","authors":"Garima Mehta, M. Dutta, C. Travieso-González, Pyung Soo Kim","doi":"10.1109/IC3I.2014.7019712","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019712","url":null,"abstract":"Security of biometric data plays a major concern due to extensive use of biometric systems in many applications. This paper proposes an efficient method for encryption of iris images using edge based encryption algorithm based on chaotic theory. In this proposed technique, the iris image is segmented into significant and non significant blocks to find region of interest (ROI) i.e. to localize iris from complete eye image from which features are extracted to generate biometric template. Selective encryption is used to encrypt the region of interest and it reduces the computational overhead and processing time as compared to full encryption techniques. The experimental results prove that edge based selective encryption significantly reduces the time of encryption of iris images as compared to full encryption method without any compromise in performance. Performance of proposed algorithm has been experimentally analyzed using key sensitivity analysis and the results prove that the encryption algorithm has high key sensitivity and the algorithm is lossless in nature.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127478306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Automatic detection of red lesions in digital color retinal images 数字彩色视网膜图像中红色病灶的自动检测
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019607
P. N. Sharath Kumar, R. Rajesh Kumar, A. Sathar, V. Sahasranamam
These days, Automated screening systems are becoming the best possible solution for not only reducing burden on the medical practitioners but also reducing human prone errors with the help of accurate automated diagnosis of the disease. In Diabetic Retinopathy (DR), the crucial step for an automated system is exhaustive detection of the lesions. In this paper, a modified red lesion detection method is presented based on some changes to the filters used in the prior work by Spencer et al. Along with this, a novel three stage false positive elimination technique is presented to remove non red-lesion candidates detected in the modified filter approach. Firstly, false positive candidates detected elsewhere in the retina are removed. Secondly, falsely found candidates on the blood vessels are removed. Third, candidates found in the optic disc area are removed using our earlier work. To evaluate our method for the detection of red lesions, we examined two sets of fundus images, first set constituting of 94 images obtained from the routine screening at Regional Institute of Ophthalmology, Thiruvananthapuram and the second set of 89 images from DIARETDB1 database. When determining whether an image contains red lesions, our method achieved a sensitivity of 95.6% and specificity of 93.2%. Also, our method detected 78.9% red lesions present in each of the images.
如今,自动筛查系统正在成为最好的解决方案,不仅减轻了医疗从业者的负担,而且在准确的疾病自动诊断的帮助下,减少了人类容易出现的错误。在糖尿病视网膜病变(DR)中,自动化系统的关键步骤是彻底检测病变。本文在对Spencer等人先前工作中使用的滤波器进行一些修改的基础上,提出了一种改进的红色病灶检测方法。与此同时,提出了一种新的三级假阳性消除技术,以去除在改进的滤波方法中检测到的非红色病变候选物。首先,移除在视网膜其他地方检测到的假阳性候选物。其次,将错误发现的候选血管去除。第三,使用我们早期的工作将视盘区域的候选物移除。为了评估我们检测红色病变的方法,我们检查了两组眼底图像,第一组由94张图像组成,这些图像来自Thiruvananthapuram地区眼科研究所的常规筛查,第二组由89张图像组成,来自DIARETDB1数据库。在确定图像是否包含红色病变时,我们的方法达到了95.6%的灵敏度和93.2%的特异性。此外,我们的方法在每张图像中检测到78.9%的红色病变。
{"title":"Automatic detection of red lesions in digital color retinal images","authors":"P. N. Sharath Kumar, R. Rajesh Kumar, A. Sathar, V. Sahasranamam","doi":"10.1109/IC3I.2014.7019607","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019607","url":null,"abstract":"These days, Automated screening systems are becoming the best possible solution for not only reducing burden on the medical practitioners but also reducing human prone errors with the help of accurate automated diagnosis of the disease. In Diabetic Retinopathy (DR), the crucial step for an automated system is exhaustive detection of the lesions. In this paper, a modified red lesion detection method is presented based on some changes to the filters used in the prior work by Spencer et al. Along with this, a novel three stage false positive elimination technique is presented to remove non red-lesion candidates detected in the modified filter approach. Firstly, false positive candidates detected elsewhere in the retina are removed. Secondly, falsely found candidates on the blood vessels are removed. Third, candidates found in the optic disc area are removed using our earlier work. To evaluate our method for the detection of red lesions, we examined two sets of fundus images, first set constituting of 94 images obtained from the routine screening at Regional Institute of Ophthalmology, Thiruvananthapuram and the second set of 89 images from DIARETDB1 database. When determining whether an image contains red lesions, our method achieved a sensitivity of 95.6% and specificity of 93.2%. Also, our method detected 78.9% red lesions present in each of the images.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126397648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Business intelligence from online product review-a rough set based rule induction approach 在线产品评论的商业智能——基于粗糙集的规则归纳方法
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019662
T. K. Das, D. Acharjya, M. Patra
In this paper we have explained the detailed work done in developing a framework which can be used for the purpose of discovering business intelligence with the help of decision rules induced from the customer reviews of a product or a service posted online. We have explained the analysis for the product Samsung Galaxy S5. Our proposed framework has been designed by collecting the reviews from Samsung home page, preprocessing it and inducing rules by using rough set based LEM2 algorithm. The induced rules would be helpful for Business analyst in understanding the product dimensions, attributes and inherent association among them.
在本文中,我们解释了开发框架的详细工作,该框架可用于通过在线发布的产品或服务的客户评论诱导的决策规则来发现商业智能。我们已经解释了对产品三星Galaxy S5的分析。本文提出的框架是通过收集来自三星主页的评论,使用基于粗糙集的LEM2算法对其进行预处理并归纳规则而设计的。归纳出的规则有助于业务分析人员理解产品的维度、属性以及它们之间的内在联系。
{"title":"Business intelligence from online product review-a rough set based rule induction approach","authors":"T. K. Das, D. Acharjya, M. Patra","doi":"10.1109/IC3I.2014.7019662","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019662","url":null,"abstract":"In this paper we have explained the detailed work done in developing a framework which can be used for the purpose of discovering business intelligence with the help of decision rules induced from the customer reviews of a product or a service posted online. We have explained the analysis for the product Samsung Galaxy S5. Our proposed framework has been designed by collecting the reviews from Samsung home page, preprocessing it and inducing rules by using rough set based LEM2 algorithm. The induced rules would be helpful for Business analyst in understanding the product dimensions, attributes and inherent association among them.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124422534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Depression level prediction using EEG signal processing 基于脑电信号处理的抑郁程度预测
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019674
H. Mallikarjun, H. N. Suresh
Depression is one of the most common mental disorders that at its worst can lead to suicide. Diagnosing depression in the early curable stage is very important. It may also lead to various disorders like sleep disorders and alcoholism. Here in this project the Electroencephalogram Gram (EEG) signals are obtained from publicly available database are processed in MATLAB. This can be useful in classifying subjects with the disorders using classifier tools present in it. For this aim, the features are extracted from frequency bands (alpha, delta and theta).
抑郁症是最常见的精神障碍之一,最严重时可能导致自杀。在早期可治愈阶段诊断抑郁症是非常重要的。它还可能导致各种疾病,如睡眠障碍和酗酒。在这个项目中,脑电图(EEG)信号是从公开的数据库中获得的,并在MATLAB中进行处理。这对于使用分类工具对疾病进行分类是有用的。为此,从频带(alpha, delta和theta)中提取特征。
{"title":"Depression level prediction using EEG signal processing","authors":"H. Mallikarjun, H. N. Suresh","doi":"10.1109/IC3I.2014.7019674","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019674","url":null,"abstract":"Depression is one of the most common mental disorders that at its worst can lead to suicide. Diagnosing depression in the early curable stage is very important. It may also lead to various disorders like sleep disorders and alcoholism. Here in this project the Electroencephalogram Gram (EEG) signals are obtained from publicly available database are processed in MATLAB. This can be useful in classifying subjects with the disorders using classifier tools present in it. For this aim, the features are extracted from frequency bands (alpha, delta and theta).","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121642514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Imperceptible digital watermarking in medical retinal images for tele-medicine applications 用于远程医疗应用的医学视网膜图像中的不可察觉数字水印
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019705
M. Dutta, Anushikha Singh, M. Parthasarathi, C. Travieso
This paper proposes a method of inserting a digital pattern having patient identity information in the medical retinal image without changing the perceptual property and without causing any loss of medical information of this image. To achieve this insertion of the digital signature identity of the patient is done in the singular value based decomposition (SVD) domain of the image. After the insertion of this digital signature is done in the retinal image a detailed comparative study and analysis is done between original image and marked image to test if all the medical information and features of the image is retained. The important feature of the medical image like blood arteries, macula and optic disc has been segmented from the original and stego-image. The experimental results indicate that the original and the stego image have similar perceptual properties and no medical information is lost in the process of digital watermarking. Features of the original and stego image has been analyzed and experimental results indicates that the variation in the features is minimal and do not affect the medical information which has been validated by professional ophthalmologists. The correlation of the features extracted is above 0.99 indicating the insertion of the digital pattern did not cause any loss of medical information in the image.
本文提出了一种在医学视网膜图像中插入具有患者身份信息的数字模式的方法,该方法不会改变图像的感知特性,也不会造成图像医学信息的损失。为了实现数字签名的插入,患者的身份在图像的基于奇异值的分解(SVD)域中完成。在视网膜图像中插入该数字签名后,对原始图像和标记后的图像进行详细的对比研究和分析,以检验是否保留了图像的所有医学信息和特征。将医学图像中的动脉、黄斑、视盘等重要特征从原始图像和隐图像中分割出来。实验结果表明,原始图像和隐写图像具有相似的感知特性,在数字水印过程中不会丢失医学信息。对原始图像和隐去图像的特征进行了分析,实验结果表明,特征的变化很小,不影响医学信息,并得到了专业眼科医生的验证。提取的特征相关性大于0.99,说明数字模式的插入没有造成图像中医学信息的损失。
{"title":"Imperceptible digital watermarking in medical retinal images for tele-medicine applications","authors":"M. Dutta, Anushikha Singh, M. Parthasarathi, C. Travieso","doi":"10.1109/IC3I.2014.7019705","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019705","url":null,"abstract":"This paper proposes a method of inserting a digital pattern having patient identity information in the medical retinal image without changing the perceptual property and without causing any loss of medical information of this image. To achieve this insertion of the digital signature identity of the patient is done in the singular value based decomposition (SVD) domain of the image. After the insertion of this digital signature is done in the retinal image a detailed comparative study and analysis is done between original image and marked image to test if all the medical information and features of the image is retained. The important feature of the medical image like blood arteries, macula and optic disc has been segmented from the original and stego-image. The experimental results indicate that the original and the stego image have similar perceptual properties and no medical information is lost in the process of digital watermarking. Features of the original and stego image has been analyzed and experimental results indicates that the variation in the features is minimal and do not affect the medical information which has been validated by professional ophthalmologists. The correlation of the features extracted is above 0.99 indicating the insertion of the digital pattern did not cause any loss of medical information in the image.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"5 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122124814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2014 International Conference on Contemporary Computing and Informatics (IC3I)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1