首页 > 最新文献

2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)最新文献

英文 中文
An approach for semantic query expansion based on maximum entropy-hidden Markov model 基于最大熵隐马尔可夫模型的语义查询扩展方法
R. Jothilakshmi, N. Shanthi, R. Babisaraswathi
The ineffectiveness of information retrieval systems is mostly caused by the inaccurate query formed by a few keywords that reflect actual user information need. One well known technique to overcome this limitation is Automatic Query Expansion (AQE), whereby the user's original query is improved by adding new features with a related meaning. It has long been accepted that capturing term associations is a vital part of information retrieval. It is therefore mainly to consider whether many sources of support may be combined to forecast term relations more precisely. This is mainly significant when frustrating to predict the probability of relevance of a set of terms given a query, which may involve both lexical and semantic relations between the terms. This paper presents a approach to expand the user query using three level domain model such as conceptual level(underlying Domain knowledge), linguistic level(term vocabulary based on Wordnet), stochastic model ME-HMM2 which combines (HMM (Hidden Markov Model and Maximum Entropy(ME) models) stores the mapping between such levels, taking into account the linguistic context of words.
信息检索系统的低效主要是由于少数几个反映用户实际信息需求的关键字所形成的查询不准确造成的。克服这一限制的一种众所周知的技术是自动查询扩展(Automatic Query Expansion, AQE),通过添加具有相关含义的新特性来改进用户的原始查询。长期以来,人们一直认为术语关联的获取是信息检索的重要组成部分。因此,主要是考虑是否可以将许多支持来源结合起来以更精确地预测期限关系。这在预测给定查询的一组术语的相关性概率时非常重要,因为这可能涉及术语之间的词法和语义关系。本文提出了一种利用概念层(基础领域知识)、语言层(基于Wordnet的术语词汇)三层领域模型扩展用户查询的方法,结合隐马尔可夫模型和最大熵模型(HMM)的随机模型ME- hmm2在考虑词的语言上下文的情况下存储了各层之间的映射。
{"title":"An approach for semantic query expansion based on maximum entropy-hidden Markov model","authors":"R. Jothilakshmi, N. Shanthi, R. Babisaraswathi","doi":"10.1109/ICCCNT.2013.6726755","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726755","url":null,"abstract":"The ineffectiveness of information retrieval systems is mostly caused by the inaccurate query formed by a few keywords that reflect actual user information need. One well known technique to overcome this limitation is Automatic Query Expansion (AQE), whereby the user's original query is improved by adding new features with a related meaning. It has long been accepted that capturing term associations is a vital part of information retrieval. It is therefore mainly to consider whether many sources of support may be combined to forecast term relations more precisely. This is mainly significant when frustrating to predict the probability of relevance of a set of terms given a query, which may involve both lexical and semantic relations between the terms. This paper presents a approach to expand the user query using three level domain model such as conceptual level(underlying Domain knowledge), linguistic level(term vocabulary based on Wordnet), stochastic model ME-HMM2 which combines (HMM (Hidden Markov Model and Maximum Entropy(ME) models) stores the mapping between such levels, taking into account the linguistic context of words.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"62 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90100321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nucleotide transfigurations using playback conversion 使用回放转换的核苷酸变形
B. Kathiresan, G. Karthik
Bioinformatics is the application of computer technology for the management and analysis of biological data. Pattern matching in a DNA sequence or searching a pattern from a large data base is a major research area in computational biology. One of the major problems in genomic field is to perform pattern comparison on DNA and protein sequences. A full DNA strand contains three billion of nucleotide bases. To parse and to convert amino acids of high volume, the existing approach takes some minutes. If the conversion process is aborted in middle, it will restart from the beginning again. In order to overcome this drawback, the playback conversion approach is proposed to continue the process from where it aborted. And the subsequent implementation of this approach in parallel mode will reduce forty percent of time taken by the existing approach. This paper entirely focuses on an approach to reduce the time taken for the conversion of nucleotide to amino acids. The proposed technique gives very good performance related to DNA sequence analysis for querying of publicly available genome sequence data. These experimental results show that there is considerable increase in the improvement of overall performance.
生物信息学是应用计算机技术对生物数据进行管理和分析的学科。DNA序列的模式匹配或从大型数据库中搜索模式是计算生物学的一个主要研究领域。基因组学领域的主要问题之一是如何对DNA和蛋白质序列进行模式比较。一条完整的DNA链包含30亿个核苷酸碱基。为了解析和转换大量的氨基酸,现有的方法需要几分钟。如果转换过程中途中止,它将重新开始。为了克服这个缺点,建议使用重放转换方法从中断的地方继续进程。并且该方法在并行模式下的后续实现将减少现有方法所花费的时间的40%。这篇论文完全集中在一种方法,以减少所需的时间为核苷酸转化为氨基酸。该技术在DNA序列分析方面具有很好的性能,可用于查询公开可用的基因组序列数据。这些实验结果表明,在整体性能的提高上有相当大的提高。
{"title":"Nucleotide transfigurations using playback conversion","authors":"B. Kathiresan, G. Karthik","doi":"10.1109/ICCCNT.2013.6726612","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726612","url":null,"abstract":"Bioinformatics is the application of computer technology for the management and analysis of biological data. Pattern matching in a DNA sequence or searching a pattern from a large data base is a major research area in computational biology. One of the major problems in genomic field is to perform pattern comparison on DNA and protein sequences. A full DNA strand contains three billion of nucleotide bases. To parse and to convert amino acids of high volume, the existing approach takes some minutes. If the conversion process is aborted in middle, it will restart from the beginning again. In order to overcome this drawback, the playback conversion approach is proposed to continue the process from where it aborted. And the subsequent implementation of this approach in parallel mode will reduce forty percent of time taken by the existing approach. This paper entirely focuses on an approach to reduce the time taken for the conversion of nucleotide to amino acids. The proposed technique gives very good performance related to DNA sequence analysis for querying of publicly available genome sequence data. These experimental results show that there is considerable increase in the improvement of overall performance.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"26 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89150237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy rule based data forwarding for energy efficient wireless sensor networks in industrial control system 基于模糊规则的高效节能无线传感器网络数据转发
S. Jisha, Sangeetha Jamal
Industrial Control System employ wireless sensor networks for monitoring plant operational condition. The key challenging issue with the implementation of wireless sensor networks is the limiting energy constraint of sensor nodes. This paper proposes a novel approach for an effective energy efficient data forwarding technique based on the state information monitored by the sensor nodes. The sensed data is checked against a fuzzy rule database and a forward decision is made only if any rule in the database is triggered. This approach reduces the data transmission overhead thereby improving lifetime of sensor nodes in the wireless sensor networks.
工业控制系统采用无线传感器网络来监测工厂的运行状况。无线传感器网络实现的关键挑战问题是传感器节点的极限能量约束。本文提出了一种基于传感器节点监测状态信息的高效节能数据转发技术。根据模糊规则数据库检查感知到的数据,只有当数据库中的任何规则被触发时,才做出向前的决策。该方法减少了数据传输开销,从而提高了无线传感器网络中传感器节点的寿命。
{"title":"Fuzzy rule based data forwarding for energy efficient wireless sensor networks in industrial control system","authors":"S. Jisha, Sangeetha Jamal","doi":"10.1109/ICCCNT.2013.6726638","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726638","url":null,"abstract":"Industrial Control System employ wireless sensor networks for monitoring plant operational condition. The key challenging issue with the implementation of wireless sensor networks is the limiting energy constraint of sensor nodes. This paper proposes a novel approach for an effective energy efficient data forwarding technique based on the state information monitored by the sensor nodes. The sensed data is checked against a fuzzy rule database and a forward decision is made only if any rule in the database is triggered. This approach reduces the data transmission overhead thereby improving lifetime of sensor nodes in the wireless sensor networks.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"8 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83062617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure multicast transmission 安全组播传输
W. R. S. Jeyaseelan, S. Hariharan
The group communication has been implemented by Multicast Authentication Batch Signature (MABS). This eliminates the network overheads such as packet loss, latency computation and communication overhead. The Batch signature is the effective cryptographic primitive which authenticates any number of packets simultaneously. This paper gives the solution by introducing Enhanced Multicast Authentication Batch Signature (MABS-E) by eliminating DOS impact. The sender side file content is displayed in both sender and receiver. The receiver can send the request to the sender by sending the file name. The authentication is verified by the sender by use of batch verify(). Then sender splits the file content into packets and signs each packet by generating the key then encrypts the packets and sends to the receiver. The receiver verifies the packets and then decrypts the message using sender's public key.
组间通信采用组播认证批签名(MABS)实现。这消除了网络开销,如数据包丢失、延迟计算和通信开销。批签名是一种有效的加密原语,可以同时对任意数量的数据包进行身份验证。本文通过引入增强型组播认证批签名(MABS-E)来消除DOS的影响,给出了解决方案。发送端文件内容显示在发送端和接收端。接收方可以通过发送文件名将请求发送给发送方。身份验证由发送方使用批处理验证()进行验证。然后发送方将文件内容分成数据包,并通过生成密钥对每个数据包进行签名,然后对数据包进行加密并发送给接收方。接收方验证数据包,然后使用发送方的公钥解密消息。
{"title":"Secure multicast transmission","authors":"W. R. S. Jeyaseelan, S. Hariharan","doi":"10.1109/ICCCNT.2013.6726783","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726783","url":null,"abstract":"The group communication has been implemented by Multicast Authentication Batch Signature (MABS). This eliminates the network overheads such as packet loss, latency computation and communication overhead. The Batch signature is the effective cryptographic primitive which authenticates any number of packets simultaneously. This paper gives the solution by introducing Enhanced Multicast Authentication Batch Signature (MABS-E) by eliminating DOS impact. The sender side file content is displayed in both sender and receiver. The receiver can send the request to the sender by sending the file name. The authentication is verified by the sender by use of batch verify(). Then sender splits the file content into packets and signs each packet by generating the key then encrypts the packets and sends to the receiver. The receiver verifies the packets and then decrypts the message using sender's public key.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"20 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79089413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Defense mechanism against selective forwarding attack in wireless sensor networks 无线传感器网络对选择性转发攻击的防御机制
P. C. Geethu, M. Rameez
Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory make sensor networks incompatible with conventional security solutions, which need complex computations and high memory. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. In such an attack compromised nodes drop packets selectively, which may deteriorate the network efficiency. In this paper multipath routing scheme is used as defense mechanism against selective forwarding attack. When a node detects packet drop during the routing, it will resend the packet through alternate route. Due to the resending mechanism reliability of the routing scheme is improved.
电子和无线通信技术的最新进展使大规模无线传感器网络的发展成为可能,这些网络由许多低功耗、低成本和小尺寸的传感器节点组成。无线传感器网络(WSN)由于其在军事和民用领域的广泛应用,正成为一种新兴的主流技术。这些网络很容易受到安全攻击,因为一旦部署,这些网络就无人值守和不受保护。一些固有的特性,如有限的电池和低内存,使得传感器网络与传统的安全解决方案不兼容,传统的安全解决方案需要复杂的计算和高内存。选择性转发攻击是针对传感器网络的一种有害攻击,可以影响整个传感器网络的通信。在这种攻击中,被攻破的节点会选择性地丢弃报文,这可能会降低网络的效率。本文采用多路径路由方案作为选择性转发攻击的防御机制。当一个节点在路由过程中检测到丢包时,它将通过备用路由重新发送数据包。由于重发机制的存在,提高了路由方案的可靠性。
{"title":"Defense mechanism against selective forwarding attack in wireless sensor networks","authors":"P. C. Geethu, M. Rameez","doi":"10.1109/ICCCNT.2013.6726833","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726833","url":null,"abstract":"Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory make sensor networks incompatible with conventional security solutions, which need complex computations and high memory. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. In such an attack compromised nodes drop packets selectively, which may deteriorate the network efficiency. In this paper multipath routing scheme is used as defense mechanism against selective forwarding attack. When a node detects packet drop during the routing, it will resend the packet through alternate route. Due to the resending mechanism reliability of the routing scheme is improved.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"23 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87300491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Detection of lung cancer nodules using automatic region growing method 自动区域生长法检测肺癌结节
Kenji Suzuki, H. Abe, H. MacMahon
Image Segmentation is an important part of image processing. It is used in medical field to detect and to diagnose the death threatening diseases. Manual readings can be done to analyze the medical images. But still the result leads to misdiagnosis by manual segmentation and the accuracy is not so high. Many Computer Aided Detection systems arise to increase the accuracy and performance rate. In the field of medical diagnosis, imaging techniques is presently available, such as radiography, computed tomography (CT) and magnetic resonance imaging (MRI). Medical image segmentation is more crucial part in analyzing the images. Although the conventional region growing algorithm yields in better result, it lacks with the concept of manual selection of seed points. A new approach is used to segment the images to identify the focal areas in lung nodules. Threat Points Identification is used with region growing method for segmenting the suspicious region. Experiment is carried out using real time images to investigate our method.
图像分割是图像处理的重要组成部分。它在医学领域用于检测和诊断危及生命的疾病。人工读数可以用来分析医学图像。但结果仍然导致人工分割的误诊,准确率不高。许多计算机辅助检测系统的出现是为了提高准确性和性能。在医学诊断领域,成像技术目前是可用的,如放射照相,计算机断层扫描(CT)和磁共振成像(MRI)。医学图像分割是医学图像分析的关键环节。传统的区域生长算法虽然效果较好,但缺乏人工选择种子点的概念。采用一种新的方法对图像进行分割,以识别肺结节的病灶区域。威胁点识别采用区域生长法分割可疑区域。利用实时图像对该方法进行了实验验证。
{"title":"Detection of lung cancer nodules using automatic region growing method","authors":"Kenji Suzuki, H. Abe, H. MacMahon","doi":"10.1109/ICCCNT.2013.6726669","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726669","url":null,"abstract":"Image Segmentation is an important part of image processing. It is used in medical field to detect and to diagnose the death threatening diseases. Manual readings can be done to analyze the medical images. But still the result leads to misdiagnosis by manual segmentation and the accuracy is not so high. Many Computer Aided Detection systems arise to increase the accuracy and performance rate. In the field of medical diagnosis, imaging techniques is presently available, such as radiography, computed tomography (CT) and magnetic resonance imaging (MRI). Medical image segmentation is more crucial part in analyzing the images. Although the conventional region growing algorithm yields in better result, it lacks with the concept of manual selection of seed points. A new approach is used to segment the images to identify the focal areas in lung nodules. Threat Points Identification is used with region growing method for segmenting the suspicious region. Experiment is carried out using real time images to investigate our method.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"47 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84732932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
A methodology for ranking cloud system vulnerabilities 一种对云系统漏洞进行排名的方法
Patrick Kamongi, Srujan Kotikela, M. Gomathisankaran, K. Kavi
Nowadays there is a high demand for security assurance within Cloud Computing world. To meet this demand, security practitioners attempt to assess security vulnerabilities that any given cloud system may have, however this task present some challenges when exposed to a complex cloud system. Different security tools have been developed to facilitate the vulnerabilities discovery process. In this paper we propose a new methodology for ranking cloud system vulnerabilities. We have designed and developed a working model. It starts with vulnerabilities discovery process from our custom cloud web application and ends up with a unified and simple view of ranked vulnerabilities mounted on each of the prioritized and generated attack paths.
如今,云计算领域对安全保障的需求很高。为了满足这一需求,安全从业者试图评估任何给定云系统可能存在的安全漏洞,然而,当暴露于复杂的云系统时,这项任务带来了一些挑战。已经开发了不同的安全工具来促进漏洞发现过程。本文提出了一种对云系统漏洞进行排序的新方法。我们已经设计并开发了一个工作模型。它从我们自定义的云web应用程序的漏洞发现过程开始,并以一个统一和简单的视图结束,该视图显示了安装在每个优先级和生成的攻击路径上的漏洞排名。
{"title":"A methodology for ranking cloud system vulnerabilities","authors":"Patrick Kamongi, Srujan Kotikela, M. Gomathisankaran, K. Kavi","doi":"10.1109/ICCCNT.2013.6726854","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726854","url":null,"abstract":"Nowadays there is a high demand for security assurance within Cloud Computing world. To meet this demand, security practitioners attempt to assess security vulnerabilities that any given cloud system may have, however this task present some challenges when exposed to a complex cloud system. Different security tools have been developed to facilitate the vulnerabilities discovery process. In this paper we propose a new methodology for ranking cloud system vulnerabilities. We have designed and developed a working model. It starts with vulnerabilities discovery process from our custom cloud web application and ends up with a unified and simple view of ranked vulnerabilities mounted on each of the prioritized and generated attack paths.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"83 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90624213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An effective numbering and classification system for dental panoramic radiographs 牙科全景x线片的有效编号和分类系统
Vijayakumari Pushparaj, U. Gurunathan, B. Arumugam, Abhinaya Baskaran, Alamelu Valliappan
In the current scenario, identifying a person in mass disasters is a challenging problem if adequate biometric information is not available. It can be handled by using dental radiographs as a suitable biometric means in such a circumstance. Forensic Odontology is a branch under biometrics which uses dental radiographs for human identification. In this paper an attempt is made to develop an algorithm for teeth numbering and classification, which is a major section in Automated Dental Identification system. Individual identification using dental panoramic images is an issue addressed in the literature. Hence, this work makes use of panoramic images for emerging this algorithm. The dental radiographs are initially preprocessed and each tooth is isolated for further processing. This image is subjected to Support Vector Machine classifier to segregate the tooth as Molar or Premolar. Then template matching algorithm followed by Universal numbering system is used to number the teeth. Experimental results show that this algorithm has numbering accuracy of 93.3% for Molar and 92% for premolar.
在目前的情况下,如果没有足够的生物特征信息,在大规模灾难中识别一个人是一个具有挑战性的问题。在这种情况下,它可以通过使用牙科x光片作为合适的生物识别手段来处理。法医牙医学是生物计量学的一个分支,它使用牙科x光片进行人体识别。本文试图开发一种牙齿编号和分类算法,这是牙齿自动识别系统的一个重要部分。使用牙科全景图像的个人识别是一个在文献中解决的问题。因此,本工作利用全景图像来提出该算法。牙科x光片最初是预处理的,每颗牙齿被分离出来进行进一步处理。该图像经过支持向量机分类器将牙齿分离为臼齿或前臼齿。然后采用模板匹配算法和通用编号系统对牙齿进行编号。实验结果表明,该算法对臼齿的编号精度为93.3%,对前臼齿的编号精度为92%。
{"title":"An effective numbering and classification system for dental panoramic radiographs","authors":"Vijayakumari Pushparaj, U. Gurunathan, B. Arumugam, Abhinaya Baskaran, Alamelu Valliappan","doi":"10.1109/ICCCNT.2013.6726480","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726480","url":null,"abstract":"In the current scenario, identifying a person in mass disasters is a challenging problem if adequate biometric information is not available. It can be handled by using dental radiographs as a suitable biometric means in such a circumstance. Forensic Odontology is a branch under biometrics which uses dental radiographs for human identification. In this paper an attempt is made to develop an algorithm for teeth numbering and classification, which is a major section in Automated Dental Identification system. Individual identification using dental panoramic images is an issue addressed in the literature. Hence, this work makes use of panoramic images for emerging this algorithm. The dental radiographs are initially preprocessed and each tooth is isolated for further processing. This image is subjected to Support Vector Machine classifier to segregate the tooth as Molar or Premolar. Then template matching algorithm followed by Universal numbering system is used to number the teeth. Experimental results show that this algorithm has numbering accuracy of 93.3% for Molar and 92% for premolar.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"77 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80591980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Adoption of business intelligence: In hotel industry 采用商业智能:在酒店行业
Mehdi Daryaei, M. Shirzad, Vinod Kumar
These days using Business Intelligence systems are widely popular in the world. Global financial crises make every enterprise to organize a new strategy to stay abreast of rapidly changes. Making decision under time pressure, unpredictable market demand, dramatic market changes, competitors and several other factors compel force senior managers to adopt Intelligence systems [1]. The approach of Business Intelligence needs specific considerations, which are examined in this study in detail. The adoption process has closely affected to implementation process and some facts should be concerned carefully. Thus any failed applying procedures may have a source on adoption routine. Although one of the possible course of action is to care about individuals' behavior. In this study theories were developed to emerge a conceptual model. The survey is conducted to find weight and relations between the factors which are affecting the adoption process and the intention to use. Hypotheses were examined in order to investigate the impact of these factors to BI adoption.
如今,使用商业智能系统在世界上广泛流行。全球金融危机使每个企业都要组织新的战略,以跟上瞬息万变的步伐。在时间压力、不可预测的市场需求、剧烈的市场变化、竞争对手等因素的影响下做出决策,迫使高级管理者不得不采用智能系统[1]。商业智能的方法需要特定的考虑,这在本研究中进行了详细的检查。通过过程对实施过程有着密切的影响,一些事实应予以认真关注。因此,任何失败的申请程序都可能源于收养程序。尽管一个可能的行动方针是关心个人的行为。在这项研究中,理论被发展成一个概念模型。进行调查是为了找出影响采用过程和使用意图的因素之间的权重和关系。为了调查这些因素对BI采用的影响,我们检验了假设。
{"title":"Adoption of business intelligence: In hotel industry","authors":"Mehdi Daryaei, M. Shirzad, Vinod Kumar","doi":"10.1109/ICCCNT.2013.6726506","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726506","url":null,"abstract":"These days using Business Intelligence systems are widely popular in the world. Global financial crises make every enterprise to organize a new strategy to stay abreast of rapidly changes. Making decision under time pressure, unpredictable market demand, dramatic market changes, competitors and several other factors compel force senior managers to adopt Intelligence systems [1]. The approach of Business Intelligence needs specific considerations, which are examined in this study in detail. The adoption process has closely affected to implementation process and some facts should be concerned carefully. Thus any failed applying procedures may have a source on adoption routine. Although one of the possible course of action is to care about individuals' behavior. In this study theories were developed to emerge a conceptual model. The survey is conducted to find weight and relations between the factors which are affecting the adoption process and the intention to use. Hypotheses were examined in order to investigate the impact of these factors to BI adoption.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"40 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91028614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data mining based CIDS: Cloud intrusion detection system for masquerade attacks [DCIDSM] 基于数据挖掘的CIDS:伪装攻击的云入侵检测系统[DCIDSM]
Jain Pratik, Madhu B R
Data mining has been gaining popularity in knowledge discovery field. In recent years, data mining based intrusion detection systems (IDSs) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behavior in a changing environment. Still, significant challenges exist in design and implementation of production quality IDSs. Masquerade attacks pose a serious threat for cloud system due to the massive amount of resource of these systems. This paper presents a Cloud Intrusion Detection System (CIDS) for CIDD dataset, which contains the complete audit parameters that help in detecting more than hundred instances of attacks and masquerades that exist in CIDD. It also offers numerous advantages in terms of alert infrastructure, security, scalability, reliability and also has data analysis tools.
数据挖掘在知识发现领域得到了广泛的应用。近年来,基于数据挖掘的入侵检测系统(ids)显示出较高的准确率,对新型入侵具有良好的泛化能力,并且在不断变化的环境中具有鲁棒性。尽管如此,在设计和实现生产质量的ids方面仍然存在重大挑战。由于云系统拥有大量的资源,伪装攻击对云系统构成了严重的威胁。本文提出了一种针对CIDD数据集的云入侵检测系统(CIDS),该数据集包含完整的审计参数,有助于检测CIDD中存在的一百多个攻击和伪装实例。它还在警报基础设施、安全性、可扩展性、可靠性方面提供了许多优势,并且还具有数据分析工具。
{"title":"Data mining based CIDS: Cloud intrusion detection system for masquerade attacks [DCIDSM]","authors":"Jain Pratik, Madhu B R","doi":"10.1109/ICCCNT.2013.6726497","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726497","url":null,"abstract":"Data mining has been gaining popularity in knowledge discovery field. In recent years, data mining based intrusion detection systems (IDSs) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behavior in a changing environment. Still, significant challenges exist in design and implementation of production quality IDSs. Masquerade attacks pose a serious threat for cloud system due to the massive amount of resource of these systems. This paper presents a Cloud Intrusion Detection System (CIDS) for CIDD dataset, which contains the complete audit parameters that help in detecting more than hundred instances of attacks and masquerades that exist in CIDD. It also offers numerous advantages in terms of alert infrastructure, security, scalability, reliability and also has data analysis tools.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"66 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89867815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1