首页 > 最新文献

2017 2nd International Conference on Computing and Communications Technologies (ICCCT)最新文献

英文 中文
Regression based cluster formation for enhancement of lifetime of WSN 基于回归聚类的WSN寿命增强研究
K. Joshitha, A. Gangasri
The objective of the proposed system is to develop an adaptive iterative linear regression (ILR) based clustering for wireless sensor network. ILR classifies the initial cluster simultaneously in horizontal and vertical patterns to form two sub clusters. Among these two, the best is selected based on similarity index (SI). This selected cluster is taken as reference and the iteration continues until the convergence criteria ‘Delta’ is met. The cluster quality is evaluated using internal and external indices and then compared with existing k-means and hierarchical clustering. The performance indices confirm the supremacy of the ILR clustering.
该系统的目标是开发一种基于自适应迭代线性回归(ILR)的无线传感器网络聚类方法。ILR将初始集群按水平和垂直方向同时分类,形成两个子集群。在这两者中,根据相似度指数(SI)选择最佳。这个选择的集群作为参考,迭代继续,直到满足收敛标准“Delta”。使用内部和外部指标评估聚类质量,然后与现有的k-means和分层聚类进行比较。性能指标证实了ILR聚类的优越性。
{"title":"Regression based cluster formation for enhancement of lifetime of WSN","authors":"K. Joshitha, A. Gangasri","doi":"10.1109/ICCCT2.2017.7972315","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972315","url":null,"abstract":"The objective of the proposed system is to develop an adaptive iterative linear regression (ILR) based clustering for wireless sensor network. ILR classifies the initial cluster simultaneously in horizontal and vertical patterns to form two sub clusters. Among these two, the best is selected based on similarity index (SI). This selected cluster is taken as reference and the iteration continues until the convergence criteria ‘Delta’ is met. The cluster quality is evaluated using internal and external indices and then compared with existing k-means and hierarchical clustering. The performance indices confirm the supremacy of the ILR clustering.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130654946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Survey of failures and fault tolerance in cloud 云计算中的故障与容错研究
S. Prathiba, S. Sowvarnica
Cloud computing provides support for hosting client's application. Cloud is a distributed platform that provides hardware, software and network resources to both execute consumer's application and also to store and mange user's data. Cloud is also used to execute scientific workflow applications that are in general complex in nature when compared to other applications. Since cloud is a distributed platform, it is more prone to errors and failures. In such an environment, avoiding a failure is difficult and identifying the source of failure is also complex. Because of this, fault tolerance mechanisms are implemented on the cloud platform. This ensures that even if there are failures in the environment, critical data of the client is not lost and user's application running on cloud is not affected in any manner. Fault tolerance mechanisms also help in improving the cloud's performance by proving the services to the users as required on demand. In this paper a survey of existing fault tolerance mechanisms for the cloud platform are discussed. This paper also discusses the failures, fault tolerant clustering methods and fault tolerant models that are specific for scientific workflow applications.
云计算为托管客户端应用程序提供支持。云是一个分布式平台,它提供硬件、软件和网络资源来执行消费者的应用程序,也存储和管理用户的数据。云还用于执行科学工作流应用程序,与其他应用程序相比,这些应用程序通常性质复杂。由于云是一个分布式平台,它更容易出现错误和故障。在这样的环境中,避免故障是困难的,识别故障的来源也很复杂。因此,在云平台上实现了容错机制。这确保了即使环境中出现故障,客户端的关键数据也不会丢失,在云上运行的用户应用程序也不会受到任何影响。通过按需向用户证明服务,容错机制还有助于提高云的性能。本文对现有的云平台容错机制进行了综述。本文还讨论了针对科学工作流应用的故障、容错聚类方法和容错模型。
{"title":"Survey of failures and fault tolerance in cloud","authors":"S. Prathiba, S. Sowvarnica","doi":"10.1109/ICCCT2.2017.7972271","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972271","url":null,"abstract":"Cloud computing provides support for hosting client's application. Cloud is a distributed platform that provides hardware, software and network resources to both execute consumer's application and also to store and mange user's data. Cloud is also used to execute scientific workflow applications that are in general complex in nature when compared to other applications. Since cloud is a distributed platform, it is more prone to errors and failures. In such an environment, avoiding a failure is difficult and identifying the source of failure is also complex. Because of this, fault tolerance mechanisms are implemented on the cloud platform. This ensures that even if there are failures in the environment, critical data of the client is not lost and user's application running on cloud is not affected in any manner. Fault tolerance mechanisms also help in improving the cloud's performance by proving the services to the users as required on demand. In this paper a survey of existing fault tolerance mechanisms for the cloud platform are discussed. This paper also discusses the failures, fault tolerant clustering methods and fault tolerant models that are specific for scientific workflow applications.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Preserving data and key privacy in Data Aggregation for Wireless Sensor Networks 无线传感器网络数据聚合中的数据保护和密钥隐私
V. Akila, T. Sheela
Reliable and trustful data aggregation is needed for most application in Wireless Sensor Networks. In this paper, we propose a new approach to attain data and key privacy protection in data aggregation called Preserving Data and Key Privacy in Data Aggregation for Wireless Sensor Networks (PDKP).Existing privacy preserving protocol provide more computational and communicational overhead in the sensor nodes. It increases the consumption of energy among the nodes. In our scheme, the encrypted content of the data is shared without revealing the data and key to other nodes by using simple technique. It preserves the key and data from an adversary with less computational and communication overhead. The base station can identify the distrustful groups related to the set of group aggregates and the retransmission of data is performed only for the abnormal data sensing intermediate nodes. It preserves the various security issues such as data freshness, data integrity, data confidentiality in data aggregation. Our simulation result showed that implementation of PDKP reduces the communication overhead and increases energy efficiency.
在无线传感器网络中,可靠可信的数据聚合是大多数应用所需要的。本文提出了一种在数据聚合中实现数据和密钥隐私保护的新方法,即无线传感器网络数据聚合中的数据和密钥隐私保护(PDKP)。现有的隐私保护协议在传感器节点上提供了更多的计算和通信开销。它增加了节点之间的能量消耗。在我们的方案中,通过使用简单的技术,在不向其他节点泄露数据和密钥的情况下共享数据的加密内容。它以较少的计算和通信开销保存来自对手的密钥和数据。基站可以识别与组聚合集相关的不信任组,仅对异常的数据感知中间节点进行数据重传。它保留了数据聚合中的各种安全问题,如数据新鲜度、数据完整性和数据机密性。仿真结果表明,PDKP的实现降低了通信开销,提高了能源效率。
{"title":"Preserving data and key privacy in Data Aggregation for Wireless Sensor Networks","authors":"V. Akila, T. Sheela","doi":"10.1109/ICCCT2.2017.7972286","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972286","url":null,"abstract":"Reliable and trustful data aggregation is needed for most application in Wireless Sensor Networks. In this paper, we propose a new approach to attain data and key privacy protection in data aggregation called Preserving Data and Key Privacy in Data Aggregation for Wireless Sensor Networks (PDKP).Existing privacy preserving protocol provide more computational and communicational overhead in the sensor nodes. It increases the consumption of energy among the nodes. In our scheme, the encrypted content of the data is shared without revealing the data and key to other nodes by using simple technique. It preserves the key and data from an adversary with less computational and communication overhead. The base station can identify the distrustful groups related to the set of group aggregates and the retransmission of data is performed only for the abnormal data sensing intermediate nodes. It preserves the various security issues such as data freshness, data integrity, data confidentiality in data aggregation. Our simulation result showed that implementation of PDKP reduces the communication overhead and increases energy efficiency.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114715098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
PNN-based analysis system to classify renal pathologies in Kidney Ultrasound Images 基于pnn的肾脏超声图像病理分类分析系统
T. Mangayarkarasi, D. N. Jamal
In this paper, a computer assistive tool is proposed to Process and analyse ultrasound Kidney Images for the classification of Renal Pathologies. The Ultrasound Kidney Images are classified into four classes: Normal, Cyst, Calculi and Tumor. Scanned Kidney Ultra-Sound (US) Images are obtained and Knowledge pertaining to common Pathologies from an Urologist Perspective is utilized as inputs to carry out the classification. The Images are preprocessed for the removal of Speckle noises by applying Median and Gaussian filter. Optimal thresholding segmentation algorithm is used to obtain the region of Interest. A set of first order statistical features are extracted. These features are given as inputs for training and testing the probabilistic neural network classifier. Hold out method is adopted where in 50% images are used for training and remaining 50% images are used for testing. The efficiency of the classifier is finally evaluated. A classification rate of 93.5% is obtained. The results achieved, are based on performance metrics calculations and are highly satisfactory.
本文提出了一种计算机辅助工具来处理和分析肾脏超声图像,用于肾脏病理分类。肾超声图像分为正常、囊肿、结石和肿瘤四类。获得肾脏超声扫描(US)图像,并从泌尿科医生的角度利用与常见病理相关的知识作为输入来进行分类。采用中值滤波和高斯滤波对图像进行预处理,去除散斑噪声。采用最优阈值分割算法获得感兴趣区域。提取了一组一阶统计特征。这些特征作为训练和测试概率神经网络分类器的输入。采用Hold out方法,其中50%的图像用于训练,其余50%的图像用于测试。最后对分类器的效率进行了评价。分类率为93.5%。实现的结果是基于性能度量计算的,并且非常令人满意。
{"title":"PNN-based analysis system to classify renal pathologies in Kidney Ultrasound Images","authors":"T. Mangayarkarasi, D. N. Jamal","doi":"10.1109/ICCCT2.2017.7972258","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972258","url":null,"abstract":"In this paper, a computer assistive tool is proposed to Process and analyse ultrasound Kidney Images for the classification of Renal Pathologies. The Ultrasound Kidney Images are classified into four classes: Normal, Cyst, Calculi and Tumor. Scanned Kidney Ultra-Sound (US) Images are obtained and Knowledge pertaining to common Pathologies from an Urologist Perspective is utilized as inputs to carry out the classification. The Images are preprocessed for the removal of Speckle noises by applying Median and Gaussian filter. Optimal thresholding segmentation algorithm is used to obtain the region of Interest. A set of first order statistical features are extracted. These features are given as inputs for training and testing the probabilistic neural network classifier. Hold out method is adopted where in 50% images are used for training and remaining 50% images are used for testing. The efficiency of the classifier is finally evaluated. A classification rate of 93.5% is obtained. The results achieved, are based on performance metrics calculations and are highly satisfactory.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123779934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Clustered security for Smart Networks 智能网络的集群安全性
Swati V, T. P. Rani
The heterogeneous Internet of things bridges together multiple devices with different capabilities, functionalities, configurations, platforms, varieties and multiple users with different roles advocating its ubiquity and thereby, exposing the security risks faced by devices and users. Security is paramount for the safe, reliable operations of IoT connected devices and it is the foundational enabler for IoT. The cryptographic mechanisms are one of the means to provide security. The cryptographic schemes must be strong enough to meet the security requirements but, at the same time, they must meet the limitations in the resource constrained networks. This project focuses on efficient message deliveries among resource-constrained devices in IoT using the ElGamal Signature Scheme to enable the protection of user data. ElGamal signature scheme make use of (i) complexity in computing discrete logarithms, (ii) secure end-to-end communication based on session resumption and (iii) proves its power by use of random number generation. The proposed model employs data encryption rather than key exchanges in order to avoid overhead in sending large number of packets between energy-constrained sensors.
异构物联网将具有不同能力、功能、配置、平台、品种的多台设备和具有不同角色的多台用户连接在一起,使其具有普遍性,从而暴露了设备和用户所面临的安全风险。安全对于物联网连接设备的安全、可靠运行至关重要,它是物联网的基础推动者。加密机制是提供安全性的手段之一。加密方案必须足够强大以满足安全需求,但同时必须满足资源受限网络中的限制。该项目侧重于使用ElGamal签名方案在物联网中资源受限设备之间进行有效的消息传递,以实现对用户数据的保护。ElGamal签名方案利用了(i)计算离散对数的复杂性,(ii)基于会话恢复的端到端安全通信,(iii)通过使用随机数生成来证明其功能。该模型采用数据加密而不是密钥交换,以避免在能量受限的传感器之间发送大量数据包的开销。
{"title":"Clustered security for Smart Networks","authors":"Swati V, T. P. Rani","doi":"10.1109/ICCCT2.2017.7972301","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972301","url":null,"abstract":"The heterogeneous Internet of things bridges together multiple devices with different capabilities, functionalities, configurations, platforms, varieties and multiple users with different roles advocating its ubiquity and thereby, exposing the security risks faced by devices and users. Security is paramount for the safe, reliable operations of IoT connected devices and it is the foundational enabler for IoT. The cryptographic mechanisms are one of the means to provide security. The cryptographic schemes must be strong enough to meet the security requirements but, at the same time, they must meet the limitations in the resource constrained networks. This project focuses on efficient message deliveries among resource-constrained devices in IoT using the ElGamal Signature Scheme to enable the protection of user data. ElGamal signature scheme make use of (i) complexity in computing discrete logarithms, (ii) secure end-to-end communication based on session resumption and (iii) proves its power by use of random number generation. The proposed model employs data encryption rather than key exchanges in order to avoid overhead in sending large number of packets between energy-constrained sensors.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125869487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 2nd International Conference on Computing and Communications Technologies (ICCCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1