首页 > 最新文献

2012 World Congress on Information and Communication Technologies最新文献

英文 中文
Optimization of OFDM systems resources using multi-objective Estimation Distribution Algorithms 基于多目标估计分布算法的OFDM系统资源优化
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409166
R. Annauth, H. Rughooputh
OFDM has been recognized as a promising technique for providing high spectral efficiency in future wireless system. In this paper, a novel optimization technique, the Estimation Distribution Algorithm (EDA) is proposed for multi-objective optimization of OFDM systems resources. The performance and effectiveness of the optimizer are analyzed and compared with the state of art NSGA II and multi-objective particle swarm optimization algorithm.
在未来的无线系统中,OFDM被认为是一种很有前途的技术,可以提供较高的频谱效率。本文提出了一种新的优化技术——估计分布算法(EDA),用于OFDM系统资源的多目标优化。分析了优化器的性能和有效性,并与NSGA II和多目标粒子群优化算法进行了比较。
{"title":"Optimization of OFDM systems resources using multi-objective Estimation Distribution Algorithms","authors":"R. Annauth, H. Rughooputh","doi":"10.1109/WICT.2012.6409166","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409166","url":null,"abstract":"OFDM has been recognized as a promising technique for providing high spectral efficiency in future wireless system. In this paper, a novel optimization technique, the Estimation Distribution Algorithm (EDA) is proposed for multi-objective optimization of OFDM systems resources. The performance and effectiveness of the optimizer are analyzed and compared with the state of art NSGA II and multi-objective particle swarm optimization algorithm.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130029731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel approach for malicious nodes detection in ad-hoc networks based on cellular learning automata 基于元胞学习自动机的自组织网络恶意节点检测新方法
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409055
Amir Bagheri Aghababa, Amirhosein Fathinavid, Abdolreza Salari, Seyedeh Elaheh Haghayegh Zavareh
There are some fields in ad-hoc networks that are more highlighted these days, such as energy consumption, quality of service and security. Among these, security has been predominantly concerned in military, civil and educational applications. In security problem, suspect nodes detection or abnormal behavior nodes is one of the most important parts. We have addressed the malicious nodes detection problem in ad-hoc networks using special type of learning automata in an irregular network. We have used the irregular cellular learning automata to detect anomalies in two levels. We have also rigorously evaluated the performance of our approach by simulating it with MATLAB and Glomosim simulator and have compared our solution with a powerful similar learning automata-based protocol named LAID. The simulation results proofs that our approach is more promising.
在ad-hoc网络中,有一些领域现在更加突出,比如能耗、服务质量和安全性。其中,安全主要涉及军事、民用和教育方面的应用。在安全问题中,可疑节点或异常行为节点的检测是最重要的环节之一。我们在不规则网络中使用特殊类型的学习自动机解决了ad-hoc网络中的恶意节点检测问题。我们使用不规则细胞学习自动机来检测两个层次的异常。我们还通过MATLAB和Glomosim模拟器对我们的方法进行了严格的性能评估,并将我们的解决方案与一个功能强大的类似的基于学习自动机的协议lay进行了比较。仿真结果证明了该方法的可行性。
{"title":"A novel approach for malicious nodes detection in ad-hoc networks based on cellular learning automata","authors":"Amir Bagheri Aghababa, Amirhosein Fathinavid, Abdolreza Salari, Seyedeh Elaheh Haghayegh Zavareh","doi":"10.1109/WICT.2012.6409055","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409055","url":null,"abstract":"There are some fields in ad-hoc networks that are more highlighted these days, such as energy consumption, quality of service and security. Among these, security has been predominantly concerned in military, civil and educational applications. In security problem, suspect nodes detection or abnormal behavior nodes is one of the most important parts. We have addressed the malicious nodes detection problem in ad-hoc networks using special type of learning automata in an irregular network. We have used the irregular cellular learning automata to detect anomalies in two levels. We have also rigorously evaluated the performance of our approach by simulating it with MATLAB and Glomosim simulator and have compared our solution with a powerful similar learning automata-based protocol named LAID. The simulation results proofs that our approach is more promising.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130102251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Development of advanced contrast enhancement technique for mammographie images 乳房x线摄影影像先进对比增强技术的发展
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409072
A. Das, M. Bhattacharya
In the present study, we have applied the process of image enhancement to mammographic images. This study has examined the problem of fuzziness/impreciseness of mammograms such as inhomogeneous background, low contrast, indistinct borders, small and ill-defined shapes, varying intensities of the suspicious regions and low distinguishability from their surroundings. Though fuzzy logic based contrast enhancement technique has good potential to handle the problem of impreciseness in mammograms, more generalized and flexible Vague Set theory is appropriate to capture the vagueness of mammograms.
在本研究中,我们将图像增强过程应用于乳房x线摄影图像。本研究探讨了乳房x光片的模糊性/不精确性问题,如背景不均匀、对比度低、边界模糊、形状小且不明确、可疑区域的强度变化以及与周围环境的低可辨性。虽然基于模糊逻辑的对比度增强技术在处理乳房x光片的不精确性问题上有很好的潜力,但更广义和灵活的模糊集理论更适合于捕捉乳房x光片的模糊性。
{"title":"Development of advanced contrast enhancement technique for mammographie images","authors":"A. Das, M. Bhattacharya","doi":"10.1109/WICT.2012.6409072","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409072","url":null,"abstract":"In the present study, we have applied the process of image enhancement to mammographic images. This study has examined the problem of fuzziness/impreciseness of mammograms such as inhomogeneous background, low contrast, indistinct borders, small and ill-defined shapes, varying intensities of the suspicious regions and low distinguishability from their surroundings. Though fuzzy logic based contrast enhancement technique has good potential to handle the problem of impreciseness in mammograms, more generalized and flexible Vague Set theory is appropriate to capture the vagueness of mammograms.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131826384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VLDD: Vindictive Link detection in Distance Vector Routine for ad hoc network 自组网中距离矢量例程的报复性链路检测
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409200
K. Sreenivasulu, E. Prasad, A. Subramanyam
In this paper we present a novel Vindictive Link detection enabled Distance Vector Routing Protocol (VLDD) for mobile ad hoc networks, through which the cost of working out and consumption of resources is bounded. While most of the existing models go for Digital Signature the proposed protocol is based on adept symmetric key cryptography with proactive routing topology called DSDV. This proposed protocol offers an efficient hash chaining technique in which each node in the routing path stores only one arcanum where as the hash chained based protocols obliges high storage memory as it requires to preserve multiple numbers of Aracnums. The other hash chaining protocols like SEAD uses multiple user authentications where as VLDD uses only one authentication tag for giving acknowledgements, and for fault declarations. By the efficient use of hash chain elements the metric values and the sequence numbers on the path can be secured from logical tampering. In contrast with the proactive routing topology called SEAD that cited frequently in literature about secure ad hoc routing provides security that limited to lower bound of the evaluation metrics, VLDD can provide total protection. We evaluated scalability of VLDD by comparing with state-of-the-art algorithms and observed that it is scalable, adaptive over a wide range of divergent situations under different number of assessment measures. In particular, we show that it scales better on networks with dense in node count. In this regard simulation model developed inNS-2 environment.
本文提出了一种新的基于报报性链路检测的移动自组织网络距离矢量路由协议(VLDD),通过该协议,计算和消耗的资源成本是有限的。虽然大多数现有模型都采用数字签名,但提议的协议是基于灵活的对称密钥加密技术,具有称为DSDV的主动路由拓扑。该提议的协议提供了一种高效的哈希链技术,其中路由路径中的每个节点仅存储一个奥秘,而基于哈希链的协议要求高存储内存,因为它需要保存多个奥秘。其他散列链协议(如SEAD)使用多个用户身份验证,而VLDD仅使用一个身份验证标记来给出确认和错误声明。通过有效地利用哈希链元素,可以保护路径上的度量值和序列号不受逻辑篡改。与被称为SEAD的主动路由拓扑(在有关安全自组织路由的文献中经常被引用)相比,它提供的安全性仅限于评估指标的下界,而VLDD可以提供全面的保护。我们通过比较最先进的算法来评估VLDD的可扩展性,并观察到它在不同数量的评估措施下在广泛的不同情况下具有可扩展性和自适应性。特别是,我们证明了它在节点数密集的网络上可以更好地扩展。为此开发了inNS-2环境仿真模型。
{"title":"VLDD: Vindictive Link detection in Distance Vector Routine for ad hoc network","authors":"K. Sreenivasulu, E. Prasad, A. Subramanyam","doi":"10.1109/WICT.2012.6409200","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409200","url":null,"abstract":"In this paper we present a novel Vindictive Link detection enabled Distance Vector Routing Protocol (VLDD) for mobile ad hoc networks, through which the cost of working out and consumption of resources is bounded. While most of the existing models go for Digital Signature the proposed protocol is based on adept symmetric key cryptography with proactive routing topology called DSDV. This proposed protocol offers an efficient hash chaining technique in which each node in the routing path stores only one arcanum where as the hash chained based protocols obliges high storage memory as it requires to preserve multiple numbers of Aracnums. The other hash chaining protocols like SEAD uses multiple user authentications where as VLDD uses only one authentication tag for giving acknowledgements, and for fault declarations. By the efficient use of hash chain elements the metric values and the sequence numbers on the path can be secured from logical tampering. In contrast with the proactive routing topology called SEAD that cited frequently in literature about secure ad hoc routing provides security that limited to lower bound of the evaluation metrics, VLDD can provide total protection. We evaluated scalability of VLDD by comparing with state-of-the-art algorithms and observed that it is scalable, adaptive over a wide range of divergent situations under different number of assessment measures. In particular, we show that it scales better on networks with dense in node count. In this regard simulation model developed inNS-2 environment.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133640953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rough sets and genetic algorithms: A hybrid approach to breast cancer classification 粗糙集和遗传算法:乳腺癌分类的混合方法
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409085
Hanaa Ismail Elshazly, N. Ghali, Abir M. El Korany, A. Hassanien
The use of computational intelligence systems such as rough sets, neural networks, fuzzy set, genetic algorithms, etc., for predictions and classification has been widely established. This paper presents a generic classification model based on a rough set approach and decision rules. To increase the efficiency of the classification process, boolean reasoning discretization algorithm is used to discretize the data sets. The approach is tested by a comparative study of three different classifiers (decision rules, naive bayes and k-nearest neighbor) over three distinct discretization techniques (equal bigning, entropy and boolean reasoning). The rough set reduction technique is applied to find all the reducts of the data which contains the minimal subset of attributes that are associated with a class label for prediction. In this paper we adopt the genetic algorithms approach to reach reducts. Finally, decision rules were used as a classifier to evaluate the performance of the predicted reducts and classes. To evaluate the performance of our approach, we present tests on breast cancer data set. The experimental results obtained, show that the overall classification accuracy offered by the employed rough set approach and decision rules is high compared with other classification techniques including Bayes and k-nearest neighbor.
使用计算智能系统,如粗糙集、神经网络、模糊集、遗传算法等,进行预测和分类已被广泛建立。提出了一种基于粗糙集方法和决策规则的通用分类模型。为了提高分类过程的效率,采用布尔推理离散化算法对数据集进行离散化处理。通过比较研究三种不同的分类器(决策规则、朴素贝叶斯和k近邻)和三种不同的离散化技术(相等大码、熵和布尔推理),对该方法进行了测试。应用粗糙集约简技术找到包含与类标签相关的最小属性子集的数据的所有约简,用于预测。在本文中,我们采用遗传算法的方法来达到约简。最后,使用决策规则作为分类器来评估预测约简和分类的性能。为了评估我们的方法的性能,我们对乳腺癌数据集进行了测试。实验结果表明,与贝叶斯和k近邻等其他分类技术相比,所采用的粗糙集方法和决策规则提供的总体分类精度较高。
{"title":"Rough sets and genetic algorithms: A hybrid approach to breast cancer classification","authors":"Hanaa Ismail Elshazly, N. Ghali, Abir M. El Korany, A. Hassanien","doi":"10.1109/WICT.2012.6409085","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409085","url":null,"abstract":"The use of computational intelligence systems such as rough sets, neural networks, fuzzy set, genetic algorithms, etc., for predictions and classification has been widely established. This paper presents a generic classification model based on a rough set approach and decision rules. To increase the efficiency of the classification process, boolean reasoning discretization algorithm is used to discretize the data sets. The approach is tested by a comparative study of three different classifiers (decision rules, naive bayes and k-nearest neighbor) over three distinct discretization techniques (equal bigning, entropy and boolean reasoning). The rough set reduction technique is applied to find all the reducts of the data which contains the minimal subset of attributes that are associated with a class label for prediction. In this paper we adopt the genetic algorithms approach to reach reducts. Finally, decision rules were used as a classifier to evaluate the performance of the predicted reducts and classes. To evaluate the performance of our approach, we present tests on breast cancer data set. The experimental results obtained, show that the overall classification accuracy offered by the employed rough set approach and decision rules is high compared with other classification techniques including Bayes and k-nearest neighbor.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133674390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On modeling the multirate sensor array 多速率传感器阵列的建模
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409150
P. Neenu, S. Kumari, R. Dhuli
In this paper we derive a model for a sensor. Such a model can form the basis of characterising the multirate sensor array in terms of a nonuniform filter bank structure. The capabilities and limitations of the model are also highlighted. Two approaches for obtaining the modeling error are presented. The model is extended for the case when the sensor sampling rate is a rational factor of the observation signal Nyquist rate. The additional error that results in this scenario is analysed.
本文推导了一种传感器的模型。该模型可以构成以非均匀滤波器组结构表征多速率传感器阵列的基础。还强调了该模型的功能和局限性。给出了两种获取建模误差的方法。将该模型扩展到传感器采样率是观测信号奈奎斯特率的一个合理因子的情况。分析了在此场景中导致的附加错误。
{"title":"On modeling the multirate sensor array","authors":"P. Neenu, S. Kumari, R. Dhuli","doi":"10.1109/WICT.2012.6409150","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409150","url":null,"abstract":"In this paper we derive a model for a sensor. Such a model can form the basis of characterising the multirate sensor array in terms of a nonuniform filter bank structure. The capabilities and limitations of the model are also highlighted. Two approaches for obtaining the modeling error are presented. The model is extended for the case when the sensor sampling rate is a rational factor of the observation signal Nyquist rate. The additional error that results in this scenario is analysed.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131871302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparison between analytic and numerical solution of linear Black-Scholes equation governing option pricing: Using BANKNIFTY 控制期权定价的Black-Scholes线性方程解析解与数值解的比较:基于BANKNIFTY
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409117
M. S. Kumar, Satyajit Das, M. Reza
Black Scholes(B-S) model is one of the popular methods of calculating the option prices. It consists of the closed form solution of the linear Black Scholes equation. Researchers have also found the numerical solutions of the Black Scholes equation which is much more intuitive compared to its closed form solution. In this paper, we have compared the analytical solution with the numerical solution of linear Black-Scholes equation governing option pricing. Finite Difference methods (FDMs) are used to discretize B-S equation base on three different schemes namely, Explicit, Implicit and the Crank Nicholson scheme. We have also tried to found out whether this solution are validate to compute the price the options of the higher strike prices such as those of BANKNIFTY options. It is also showed that numerical solutions are independent of number of grids.
Black Scholes(B-S)模型是计算期权价格的常用方法之一。它由线性Black Scholes方程的封闭形式解组成。研究人员还发现了Black Scholes方程的数值解,它比封闭形式的解更直观。本文比较了控制期权定价的线性Black-Scholes方程的解析解和数值解。利用有限差分法(FDMs)对B-S方程进行了显式、隐式和曲克尼克尔森三种不同格式的离散化。我们还试图找出这个解决方案是否有效,以计算更高的执行价格的期权,如BANKNIFTY期权的价格。数值解与网格数无关。
{"title":"A comparison between analytic and numerical solution of linear Black-Scholes equation governing option pricing: Using BANKNIFTY","authors":"M. S. Kumar, Satyajit Das, M. Reza","doi":"10.1109/WICT.2012.6409117","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409117","url":null,"abstract":"Black Scholes(B-S) model is one of the popular methods of calculating the option prices. It consists of the closed form solution of the linear Black Scholes equation. Researchers have also found the numerical solutions of the Black Scholes equation which is much more intuitive compared to its closed form solution. In this paper, we have compared the analytical solution with the numerical solution of linear Black-Scholes equation governing option pricing. Finite Difference methods (FDMs) are used to discretize B-S equation base on three different schemes namely, Explicit, Implicit and the Crank Nicholson scheme. We have also tried to found out whether this solution are validate to compute the price the options of the higher strike prices such as those of BANKNIFTY options. It is also showed that numerical solutions are independent of number of grids.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115508743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A cognitive based context-aware personalized medical assistance, A mobile application 一个基于认知的情境感知个性化医疗援助,一个移动应用程序
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409153
K. Patii, B. P. Vijayakumar
Ubiquitous computing is shifting healthcare from treatment by professionals in hospitals to self-care, mobile care, home care and preventive care. In order to support the healthcare evolution. a global healthcare system, which links healthcare service providers to an individual's personal and physical spaces, is expected to provide personalized healthcare services at the right time, right place and right manner. Developing a personalized, user-centric system to provide a peaceful and a better quality life is one of today's challenging issue. This paper discusses on Cognition based context-aware personal medical assistance application. The idea of how we can use a smart phone to learn about the user's daily life pattern in a cognitive way and provide him assistance wherein a smartphone learns about user's daily life pattern in a cognitive way and provide him assistance based on contextual input. This research work describes design and development of mobile application based on cognitive algorithm. The project is designed, developed and being tested at Nokia N-900 device.
无处不在的计算正在将医疗保健从医院的专业人员治疗转变为自我护理、移动护理、家庭护理和预防性护理。以支持医疗保健的发展。全球医疗保健系统将医疗保健服务提供者与个人的个人和物理空间联系起来,期望在正确的时间、正确的地点和正确的方式提供个性化的医疗保健服务。开发一个个性化的、以用户为中心的系统来提供一个和平和更高质量的生活是当今具有挑战性的问题之一。本文探讨了基于认知的情境感知个人医疗救助应用。我们如何使用智能手机以认知的方式了解用户的日常生活模式,并为他提供帮助,其中智能手机以认知的方式了解用户的日常生活模式,并根据上下文输入为他提供帮助。本研究工作描述了基于认知算法的移动应用程序的设计与开发。该项目在诺基亚N-900设备上进行设计、开发和测试。
{"title":"A cognitive based context-aware personalized medical assistance, A mobile application","authors":"K. Patii, B. P. Vijayakumar","doi":"10.1109/WICT.2012.6409153","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409153","url":null,"abstract":"Ubiquitous computing is shifting healthcare from treatment by professionals in hospitals to self-care, mobile care, home care and preventive care. In order to support the healthcare evolution. a global healthcare system, which links healthcare service providers to an individual's personal and physical spaces, is expected to provide personalized healthcare services at the right time, right place and right manner. Developing a personalized, user-centric system to provide a peaceful and a better quality life is one of today's challenging issue. This paper discusses on Cognition based context-aware personal medical assistance application. The idea of how we can use a smart phone to learn about the user's daily life pattern in a cognitive way and provide him assistance wherein a smartphone learns about user's daily life pattern in a cognitive way and provide him assistance based on contextual input. This research work describes design and development of mobile application based on cognitive algorithm. The project is designed, developed and being tested at Nokia N-900 device.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115684780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of a transaction recovery instance based on bi-directional ring election algorithm for crashed coordinator in distributed database systems 基于双向环选举算法的分布式数据库系统崩溃协调器事务恢复实例设计
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409169
D. Ramesh, K. Kumar, B. Ramji
In a distributed database environment, when the coordinator site (root node or process) is not working, the environment needs to choose or elect a new one in order to perform the transactional tasks. The elected coordinator takes the lead to perform the activities as well and continues the functioning. If the previous (crashed) site is recovered from the failures then again it leads the system by taking the responsibility. In this paper, a recovery instance based on bi-directional ring election algorithm for the crashed coordinator was brought up. The new algorithm for the recovered site quickly brings the state back by sending messages in parallel instances. This work shows that how the algorithm makes the recovered site faster and takes less time to make the system quickly to handle transactions normally.
在分布式数据库环境中,当协调器站点(根节点或进程)不工作时,环境需要选择或选择一个新的协调器来执行事务性任务。当选的协调员也带头执行活动并继续发挥作用。如果以前的(崩溃的)站点从故障中恢复,那么它将再次承担责任,从而领导系统。提出了一种基于双向环选举算法的崩溃协调器恢复实例。用于恢复站点的新算法通过在并行实例中发送消息来快速恢复状态。这项工作表明,该算法如何使恢复的站点更快,花费更少的时间,使系统快速正常处理事务。
{"title":"Design of a transaction recovery instance based on bi-directional ring election algorithm for crashed coordinator in distributed database systems","authors":"D. Ramesh, K. Kumar, B. Ramji","doi":"10.1109/WICT.2012.6409169","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409169","url":null,"abstract":"In a distributed database environment, when the coordinator site (root node or process) is not working, the environment needs to choose or elect a new one in order to perform the transactional tasks. The elected coordinator takes the lead to perform the activities as well and continues the functioning. If the previous (crashed) site is recovered from the failures then again it leads the system by taking the responsibility. In this paper, a recovery instance based on bi-directional ring election algorithm for the crashed coordinator was brought up. The new algorithm for the recovered site quickly brings the state back by sending messages in parallel instances. This work shows that how the algorithm makes the recovered site faster and takes less time to make the system quickly to handle transactions normally.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116861914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Tumor demarcation by VQ based clustering and augmentation with KMCG and KFCG codebook generation algorithms 基于VQ的聚类和KMCG和KFCG码本生成算法增强的肿瘤划分
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409219
H. B. Kekre, P. Shrinath
Ultrasound (US) imaging is important modality to examine the clinical problems and also used as complimentary to the mammogram images to understand nature and shape of the breast tumor. Accurate and efficient segmentation method helps radiologists to understand and observe the volume of a tumor (growth or shrinkage). Inherent artifact present in US images, such as speckle, attenuation and shadows are major hurdles in achieving proper segmentation. Along with the accuracy, computational efficiency is also major concern in the segmentation process. Here, in this paper, VQ based clustering technique is proposed for US image segmentation with KMCG and KFCG as codebook generation algorithms. A novel technique of sequential cluster clubbing is used on clusters obtained from codebook generation algorithms and appropriate cluster has been selected as segmentation result. Besides original KMCG and KFCG, augmented KMCG and KFCG are also proposed for clustering with different block sizes. The results of all proposed methods are compared with each other and best result is selected based on two criteria's, one is computational efficiency and other is accuracy. Finally, best results amongst our methods are compared with results of original watershed and improved watershed transforms.
超声(US)成像是检查临床问题的重要方式,也用于补充乳房x光检查图像,以了解乳腺肿瘤的性质和形状。准确有效的分割方法有助于放射科医生了解和观察肿瘤的体积(生长或缩小)。美国图像中存在的固有伪影,如斑点、衰减和阴影是实现正确分割的主要障碍。在分割过程中,除了精度之外,计算效率也是一个重要的问题。本文以KMCG和KFCG作为码本生成算法,提出了基于VQ的聚类技术用于美国图像分割。对码本生成算法得到的聚类采用了一种新颖的序列聚类棒化技术,选取了合适的聚类作为分割结果。除了原始KMCG和KFCG外,还提出了增强KMCG和KFCG用于不同块大小的聚类。将所有方法的结果进行比较,并根据计算效率和精度两个标准选出最佳结果。最后,将各方法的最佳结果与原始流域变换和改进流域变换的结果进行了比较。
{"title":"Tumor demarcation by VQ based clustering and augmentation with KMCG and KFCG codebook generation algorithms","authors":"H. B. Kekre, P. Shrinath","doi":"10.1109/WICT.2012.6409219","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409219","url":null,"abstract":"Ultrasound (US) imaging is important modality to examine the clinical problems and also used as complimentary to the mammogram images to understand nature and shape of the breast tumor. Accurate and efficient segmentation method helps radiologists to understand and observe the volume of a tumor (growth or shrinkage). Inherent artifact present in US images, such as speckle, attenuation and shadows are major hurdles in achieving proper segmentation. Along with the accuracy, computational efficiency is also major concern in the segmentation process. Here, in this paper, VQ based clustering technique is proposed for US image segmentation with KMCG and KFCG as codebook generation algorithms. A novel technique of sequential cluster clubbing is used on clusters obtained from codebook generation algorithms and appropriate cluster has been selected as segmentation result. Besides original KMCG and KFCG, augmented KMCG and KFCG are also proposed for clustering with different block sizes. The results of all proposed methods are compared with each other and best result is selected based on two criteria's, one is computational efficiency and other is accuracy. Finally, best results amongst our methods are compared with results of original watershed and improved watershed transforms.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122108984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2012 World Congress on Information and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1