首页 > 最新文献

2014 17th International Conference on Computer and Information Technology (ICCIT)最新文献

英文 中文
Remote Login Password Authentication Scheme Based on Cuboid Using Biometric 基于长方体生物特征的远程登录密码认证方案
S. Kumari, H. Om
In this paper, we propose a remote password authentication scheme based on 3-D geometry with biometric value of a user. It is simple and practically useful and also a legal user can freely choose and change his password using smart card that contains some information. The security of the system depends on the points on the diagonal of a cuboid in 3D environment. Using biometric value makes the points more secure because the characteristics of the body parts cannot be copied or stolen.
本文提出了一种基于三维几何图形和用户生物特征值的远程密码认证方案。它简单实用,合法用户可以使用包含一些信息的智能卡自由选择和更改密码。在三维环境中,系统的安全性取决于长方体对角线上的点。使用生物特征值使积分更加安全,因为身体部位的特征无法复制或窃取。
{"title":"Remote Login Password Authentication Scheme Based on Cuboid Using Biometric","authors":"S. Kumari, H. Om","doi":"10.1109/ICIT.2014.48","DOIUrl":"https://doi.org/10.1109/ICIT.2014.48","url":null,"abstract":"In this paper, we propose a remote password authentication scheme based on 3-D geometry with biometric value of a user. It is simple and practically useful and also a legal user can freely choose and change his password using smart card that contains some information. The security of the system depends on the points on the diagonal of a cuboid in 3D environment. Using biometric value makes the points more secure because the characteristics of the body parts cannot be copied or stolen.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"15 1","pages":"190-194"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80745061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Energy Efficient Routing Protocol under Distance, Energy and Load Parameter for Heterogeneous Wireless Sensor Networks 基于距离、能量和负载参数的异构无线传感器网络节能路由协议
Sonam Maurya, A. K. Daniel
In wireless sensor network sensor nodes are inexpensive portable devices with limited processing power and energy resources. To maximizing the lifetime of wireless sensor network we need an effective routing approach. The proposed routing protocol uses Region-Based static clustering approach to provide efficient utilization of total coverage area and Hybrid Routing approach is used for transmitting data to base station that enhances lifetime of the network. The fuzzy logic technique is used for cluster head selection based on distance, residual energy and load parameters, minimizes the overall energy consumption among the nodes. Simulation results shows that proposed protocol improves the overall network performance in terms of throughput and lifetime.
在无线传感器网络中,传感器节点是处理能力和能源有限的廉价便携式设备。为了使无线传感器网络的寿命最大化,需要一种有效的路由方法。所提出的路由协议采用基于区域的静态聚类方法有效利用总覆盖面积,采用混合路由方法向基站传输数据,提高了网络的寿命。基于距离、剩余能量和负载参数,采用模糊逻辑技术进行簇头选择,使节点间的总能量消耗最小。仿真结果表明,该协议在吞吐量和生存期方面提高了网络的整体性能。
{"title":"An Energy Efficient Routing Protocol under Distance, Energy and Load Parameter for Heterogeneous Wireless Sensor Networks","authors":"Sonam Maurya, A. K. Daniel","doi":"10.1109/ICIT.2014.63","DOIUrl":"https://doi.org/10.1109/ICIT.2014.63","url":null,"abstract":"In wireless sensor network sensor nodes are inexpensive portable devices with limited processing power and energy resources. To maximizing the lifetime of wireless sensor network we need an effective routing approach. The proposed routing protocol uses Region-Based static clustering approach to provide efficient utilization of total coverage area and Hybrid Routing approach is used for transmitting data to base station that enhances lifetime of the network. The fuzzy logic technique is used for cluster head selection based on distance, residual energy and load parameters, minimizes the overall energy consumption among the nodes. Simulation results shows that proposed protocol improves the overall network performance in terms of throughput and lifetime.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"1990 1","pages":"161-166"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89807527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Mining Regular Patterns in Weighted-Directed Networks 加权有向网络规则模式挖掘
Anand Gupta, H. Thakur, Pragya Kishore
Mining of regular patterns in dynamic networks finds immense application in characterizing the local properties of the networks, like behaviour (friendship relation), event occurrence (football matches). They in then are used to predict their future trends. But if they do not entail weight and direction aspects of the dynamic network, there can be loss of several significant details, such as strength of a relationship or event, specification of the person responsible for it in a relationship, winning or losing in case of events. To the best of our knowledge, no work has been reported yet to extract regular patterns that take into account weight and direction aspects of dynamic networks. We thus propose a novel method to mine regular patterns in weighted and directed networks. In the proposed method, different snapshots of the dynamic network are taken, and through the concept of Regular Expression, we obtain repetition rule for each of: occurrence sequence, weight sequence, direction sequence and weight-direction sequence. For each of these four categories, edges having same rule are grouped to obtain evolution patterns. To ensure the practical feasibility of the approach, experimental evaluation is done on the real world dataset of Enron emails. The results obtained show that, 2.39%, 6.92%, 9.96% and 1.81% of the edges are found to be regular on weight, direction, occurrence and weight-direction respectively.
动态网络中规则模式的挖掘在描述网络的局部属性方面有着巨大的应用,比如行为(友谊关系)、事件发生(足球比赛)。然后用它们来预测它们的未来趋势。但是,如果它们不涉及动态网络的权重和方向方面,则可能会丢失几个重要的细节,例如关系或事件的强度,在一段关系中负责该事件的人的规格,在事件发生时的输赢。据我们所知,目前还没有关于提取考虑到动态网络的权重和方向方面的规则模式的报道。因此,我们提出了一种新的方法来挖掘加权和有向网络中的规则模式。在该方法中,对动态网络进行不同的快照,通过正则表达式的概念,得到发生序列、权值序列、方向序列和权值-方向序列的重复规则。对于这四种类型中的每一种,将具有相同规则的边分组以获得进化模式。为了确保该方法的实际可行性,在安然电子邮件的真实世界数据集上进行了实验评估。结果表明:2.39%、6.92%、9.96%和1.81%的边缘在权值、方向、出现率和权值方向上都是规则的;
{"title":"Mining Regular Patterns in Weighted-Directed Networks","authors":"Anand Gupta, H. Thakur, Pragya Kishore","doi":"10.1109/ICIT.2014.44","DOIUrl":"https://doi.org/10.1109/ICIT.2014.44","url":null,"abstract":"Mining of regular patterns in dynamic networks finds immense application in characterizing the local properties of the networks, like behaviour (friendship relation), event occurrence (football matches). They in then are used to predict their future trends. But if they do not entail weight and direction aspects of the dynamic network, there can be loss of several significant details, such as strength of a relationship or event, specification of the person responsible for it in a relationship, winning or losing in case of events. To the best of our knowledge, no work has been reported yet to extract regular patterns that take into account weight and direction aspects of dynamic networks. We thus propose a novel method to mine regular patterns in weighted and directed networks. In the proposed method, different snapshots of the dynamic network are taken, and through the concept of Regular Expression, we obtain repetition rule for each of: occurrence sequence, weight sequence, direction sequence and weight-direction sequence. For each of these four categories, edges having same rule are grouped to obtain evolution patterns. To ensure the practical feasibility of the approach, experimental evaluation is done on the real world dataset of Enron emails. The results obtained show that, 2.39%, 6.92%, 9.96% and 1.81% of the edges are found to be regular on weight, direction, occurrence and weight-direction respectively.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"17 1","pages":"215-220"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79548455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Quantum Inspired Binary Neural Network Algorithm 量子启发二进制神经网络算法
O. Patel, Aruna Tiwari
In this paper a novel quantum based binary neural network learning algorithm is proposed. It forms three layer network structure. The proposed method make use of quantum concept for updating and finalizing weights of the neurons and it works for two class problem. The use of quantum concept form an optimized network structure. Also performance in terms of number of neurons and classification accuracy is improved. Same is compared with a quantum-based algorithm for optimizing artificial neural networks algorithm (QANN). It is found that there is improvement in the form of number of neurons at hidden layer, number of iterations, training accuracy and generalization accuracy.
本文提出了一种新的基于量子的二元神经网络学习算法。形成三层网络结构。该方法利用量子概念更新和确定神经元权值,适用于两类问题。利用量子概念形成优化的网络结构。在神经元数量和分类精度方面也得到了提高。并与基于量子的人工神经网络优化算法(QANN)进行了比较。结果表明,该方法在隐层神经元数、迭代次数、训练精度和泛化精度等方面均有提高。
{"title":"Quantum Inspired Binary Neural Network Algorithm","authors":"O. Patel, Aruna Tiwari","doi":"10.1109/ICIT.2014.29","DOIUrl":"https://doi.org/10.1109/ICIT.2014.29","url":null,"abstract":"In this paper a novel quantum based binary neural network learning algorithm is proposed. It forms three layer network structure. The proposed method make use of quantum concept for updating and finalizing weights of the neurons and it works for two class problem. The use of quantum concept form an optimized network structure. Also performance in terms of number of neurons and classification accuracy is improved. Same is compared with a quantum-based algorithm for optimizing artificial neural networks algorithm (QANN). It is found that there is improvement in the form of number of neurons at hidden layer, number of iterations, training accuracy and generalization accuracy.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"52 1","pages":"270-274"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80368655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Implementation of Unicode Complaint Odia Keyboard and Its Evaluation Using Cognitive Model Unicode投诉Odia键盘的实现及其认知模型评价
Gouranga Charan Jena, Tirthankar Dasgupta, A. Basu
Odia is the principal regional language of Odisha and the sixth classical language of India. There are more than 33 million people of Odisha speak Odia in their day to day life. However, standard input methods for typing Odia are not very widespread among Odia users. In this paper we present the design and development of a novel Odia keyboard layout that can be used to type Unicode enabled Odia texts in a standard text editor using any QWERTY keyboard. The keyboard layout is based on Unicode 5.0 standard. We have evaluated the performance of our proposed layout with the existing Odia keyboard layouts. We have done this evaluation using cognitive model. Our primary evaluation shows a significant improvement in reducing time irrespective of keystroke, increasing typing speed, reducing error rates as well as easing of learning. We have designed a typing s/w (Baishakhi key logger) for all Odias to learn Odia typing.
奥迪亚语是奥里萨邦的主要地区语言,也是印度的第六种古典语言。奥里萨邦有超过3300万人在日常生活中说奥里萨邦语。然而,用于输入Odia的标准输入法在Odia用户中并不是很普遍。在本文中,我们提出了一种新的Odia键盘布局的设计和开发,该布局可用于在使用任何QWERTY键盘的标准文本编辑器中键入支持Unicode的Odia文本。键盘布局基于Unicode 5.0标准。我们已经用现有的Odia键盘布局评估了我们提出的布局的性能。我们使用认知模型进行了评估。我们的初步评估显示,在减少敲击键盘的时间、提高打字速度、降低错误率以及简化学习方面有了显著的改进。我们为所有奥迪亚人设计了一个打字记录仪(白沙基键盘记录仪)来学习奥迪亚打字。
{"title":"Implementation of Unicode Complaint Odia Keyboard and Its Evaluation Using Cognitive Model","authors":"Gouranga Charan Jena, Tirthankar Dasgupta, A. Basu","doi":"10.1109/ICIT.2014.58","DOIUrl":"https://doi.org/10.1109/ICIT.2014.58","url":null,"abstract":"Odia is the principal regional language of Odisha and the sixth classical language of India. There are more than 33 million people of Odisha speak Odia in their day to day life. However, standard input methods for typing Odia are not very widespread among Odia users. In this paper we present the design and development of a novel Odia keyboard layout that can be used to type Unicode enabled Odia texts in a standard text editor using any QWERTY keyboard. The keyboard layout is based on Unicode 5.0 standard. We have evaluated the performance of our proposed layout with the existing Odia keyboard layouts. We have done this evaluation using cognitive model. Our primary evaluation shows a significant improvement in reducing time irrespective of keystroke, increasing typing speed, reducing error rates as well as easing of learning. We have designed a typing s/w (Baishakhi key logger) for all Odias to learn Odia typing.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"68 1","pages":"82-87"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89396699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Half-Perimeter Wirelength Model for VLSI Analytical Placement VLSI分析放置的半周长模型
B. Ray, A. Tripathy, Pralipta Samal, Manimay Das, Pushpanjali Mallik
Placement is a crucial stage in physical design of VLSI. At this stage, analytical placer uses half perimeter wire length (HPWL) of the circuit as an objective function to place blocks optimally within chip. Inspired by popularly used log-sum-exp (LSE) wire length model [9], absolute (ABS) wire length model [7] and weighted average (WA) wire length model [3], we propose a new smooth wire length model for HPWL, providing smooth approximations to max function. The convergence. Properties, error upper bounds of the new model are studied. The accuracy of the new model is sharper than LSE, WA and ABS wire length model. Wire length is validated by global and detail placements generated by NTU Placer [1] on ISPD 2004 benchmark suits. Experimental results show that our model provides closest approximation to HPWL than all wire length models, with an average of 2% error in total wire length.
封装是超大规模集成电路物理设计的关键环节。在这一阶段,分析砂矿机使用电路的半周长(HPWL)作为目标函数,在芯片内最佳地放置块。受常用的对数和exp (LSE)导线长度模型[9]、绝对(ABS)导线长度模型[7]和加权平均(WA)导线长度模型[3]的启发,我们提出了一种新的HPWL平滑导线长度模型,提供了对max函数的平滑逼近。收敛。研究了新模型的性质和误差上界。新模型的精度比LSE、WA和ABS线长模型的精度更高。电线长度通过NTU Placer[1]在ISPD 2004基准套装上生成的全局和细节放置来验证。实验结果表明,该模型比所有线长模型更接近HPWL,总线长误差平均为2%。
{"title":"Half-Perimeter Wirelength Model for VLSI Analytical Placement","authors":"B. Ray, A. Tripathy, Pralipta Samal, Manimay Das, Pushpanjali Mallik","doi":"10.1109/ICIT.2014.61","DOIUrl":"https://doi.org/10.1109/ICIT.2014.61","url":null,"abstract":"Placement is a crucial stage in physical design of VLSI. At this stage, analytical placer uses half perimeter wire length (HPWL) of the circuit as an objective function to place blocks optimally within chip. Inspired by popularly used log-sum-exp (LSE) wire length model [9], absolute (ABS) wire length model [7] and weighted average (WA) wire length model [3], we propose a new smooth wire length model for HPWL, providing smooth approximations to max function. The convergence. Properties, error upper bounds of the new model are studied. The accuracy of the new model is sharper than LSE, WA and ABS wire length model. Wire length is validated by global and detail placements generated by NTU Placer [1] on ISPD 2004 benchmark suits. Experimental results show that our model provides closest approximation to HPWL than all wire length models, with an average of 2% error in total wire length.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"30 1","pages":"287-292"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73343311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Semi-automated System for Optic Nerve Head Segmentation in Digital Retinal Images 数字视网膜图像中视神经头分割的半自动化系统
Sayan Chakraborty, Aniruddha Mukherjee, Debmalya Chatterjee, Prasenjit Maji, S. Acharjee, N. Dey
Out of the twelve pairs of cranial nerves, optic nerve is the most important cranial nerve. Optic nerve establishes a connection from eyeball to brain. The four segments present in optic are: intraocular, intra-orbital, intracanalicular, and intracranial. Optical nerve head segmentation may lead to detection of many diseases such as glaucoma, eye hypertension. We propose a semi-automated system, where independent contours are defined, and then with the help of those ground truths, a person with medical education and solid experience in ophthalmology will be able to manually set the contours. Such a process would result in extracting information regarding optic diseases like glaucoma, diabetic retinopathy, age-related macular degeneration, retinal vascular occlusion.
在十二对脑神经中,视神经是最重要的脑神经。视神经连接眼球和大脑。视神经有四个节段:眼内、眶内、管内和颅内。视神经头分割可用于青光眼、眼高血压等多种疾病的检测。我们提出了一个半自动化的系统,其中独立的轮廓被定义,然后在这些基本事实的帮助下,具有医学教育和扎实的眼科经验的人将能够手动设置轮廓。这样的过程将导致提取信息的光学疾病,如青光眼,糖尿病视网膜病变,年龄相关性黄斑变性,视网膜血管闭塞。
{"title":"A Semi-automated System for Optic Nerve Head Segmentation in Digital Retinal Images","authors":"Sayan Chakraborty, Aniruddha Mukherjee, Debmalya Chatterjee, Prasenjit Maji, S. Acharjee, N. Dey","doi":"10.1109/ICIT.2014.51","DOIUrl":"https://doi.org/10.1109/ICIT.2014.51","url":null,"abstract":"Out of the twelve pairs of cranial nerves, optic nerve is the most important cranial nerve. Optic nerve establishes a connection from eyeball to brain. The four segments present in optic are: intraocular, intra-orbital, intracanalicular, and intracranial. Optical nerve head segmentation may lead to detection of many diseases such as glaucoma, eye hypertension. We propose a semi-automated system, where independent contours are defined, and then with the help of those ground truths, a person with medical education and solid experience in ophthalmology will be able to manually set the contours. Such a process would result in extracting information regarding optic diseases like glaucoma, diabetic retinopathy, age-related macular degeneration, retinal vascular occlusion.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"69 1","pages":"112-117"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74523044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
TabSol: An Efficient Framework to Defend Tabnabbing TabSol:一个有效的框架来保护Tabnabbing
Amandeep Singh, S. Tripathy
Phishing attack is one of the most common cyber attacks causing serious threat to global cyber world and economy. Tab nabbing is a variant of phishing attack evolved recently, in which a malicious page opened in the tab disguises itself to the login page of a popular one, like gmail or facebook, so as to defeat the traditional phish detection mechanisms. In this paper, we propose an efficient security framework called Tab Sol to defend against Tab nabbing attack while detecting the other variants of phishing attacks. We developed and tested Tab Sol in the Google chrome browser and found to be effective. The proposed framework is compared with the existing frameworks and fund to more effective. The most attractive features of Tab Sol includes its simple and fast implementation with less false positive.
网络钓鱼攻击是最常见的网络攻击之一,对全球网络世界和经济造成严重威胁。标签劫持是最近发展起来的网络钓鱼攻击的一种变体,在标签中打开的恶意页面将自己伪装成流行页面的登录页面,如gmail或facebook,以挫败传统的网络钓鱼检测机制。在本文中,我们提出了一个称为Tab Sol的有效安全框架,以防御Tab抓取攻击,同时检测其他类型的网络钓鱼攻击。我们在Google chrome浏览器中开发并测试了Tab Sol,发现它很有效。所提出的框架与现有的框架和基金进行了比较,更加有效。Tab Sol最吸引人的特点包括其简单、快速的实现和较少的误报。
{"title":"TabSol: An Efficient Framework to Defend Tabnabbing","authors":"Amandeep Singh, S. Tripathy","doi":"10.1109/ICIT.2014.56","DOIUrl":"https://doi.org/10.1109/ICIT.2014.56","url":null,"abstract":"Phishing attack is one of the most common cyber attacks causing serious threat to global cyber world and economy. Tab nabbing is a variant of phishing attack evolved recently, in which a malicious page opened in the tab disguises itself to the login page of a popular one, like gmail or facebook, so as to defeat the traditional phish detection mechanisms. In this paper, we propose an efficient security framework called Tab Sol to defend against Tab nabbing attack while detecting the other variants of phishing attacks. We developed and tested Tab Sol in the Google chrome browser and found to be effective. The proposed framework is compared with the existing frameworks and fund to more effective. The most attractive features of Tab Sol includes its simple and fast implementation with less false positive.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"122 1","pages":"173-178"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77528095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Non-intrusive Water Surface Velocity Measurement Using Spatial Cross Correlation Technique 空间相互关技术的非侵入式水面速度测量
Nitika Sharma, Apurva Naik, M. Balan
The limitation with the method of calculating surface water velocity is the direct contact of the velocity measurement tool to the flowing water which results in the mechanical wear and high maintenance cost. This paper describes the flow visualization and surface water velocity measurement technique using the non-intrusive method. This system gives the instantaneous results and is reliable, flexible method which can be applied successfully in many engineering applications. It is a distension of a video imaging technique to measure the velocity using the pattern matching method. The system was indigenously developed with the help of CMOS camera and paper particles which were used as the tracer particles. If video is taken from far distance then ortho-rectification is applied to calculate accurate results. Video was recorded at Bombay airport model, CWPRS, Pune under different environmental conditions. The code is written in MATLAB which includes segmentation, pattern matching and post processing steps.
地表水速度计算方法的局限性是测速工具与流动的水直接接触,造成机械磨损,维修费用高。本文介绍了采用非侵入式方法的流动显示和地表水速度测量技术。该系统具有快速、可靠、灵活的特点,可成功应用于多种工程应用中。利用模式匹配法测量速度是视频成像技术的一个扩展。该系统是利用CMOS相机和纸粒子作为示踪粒子,自主开发的。如果视频是从远处拍摄的,则应用正交校正来计算准确的结果。视频是在孟买机场模型,CWPRS,浦那在不同的环境条件下录制的。该代码是用MATLAB编写的,包括分割,模式匹配和后处理步骤。
{"title":"Non-intrusive Water Surface Velocity Measurement Using Spatial Cross Correlation Technique","authors":"Nitika Sharma, Apurva Naik, M. Balan","doi":"10.1109/ICIT.2014.52","DOIUrl":"https://doi.org/10.1109/ICIT.2014.52","url":null,"abstract":"The limitation with the method of calculating surface water velocity is the direct contact of the velocity measurement tool to the flowing water which results in the mechanical wear and high maintenance cost. This paper describes the flow visualization and surface water velocity measurement technique using the non-intrusive method. This system gives the instantaneous results and is reliable, flexible method which can be applied successfully in many engineering applications. It is a distension of a video imaging technique to measure the velocity using the pattern matching method. The system was indigenously developed with the help of CMOS camera and paper particles which were used as the tracer particles. If video is taken from far distance then ortho-rectification is applied to calculate accurate results. Video was recorded at Bombay airport model, CWPRS, Pune under different environmental conditions. The code is written in MATLAB which includes segmentation, pattern matching and post processing steps.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"74 5S 1","pages":"356-361"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87148569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hierarchical Homomorphic Encryption Based Privacy Preserving Distributed Association Rule Mining 基于分层同态加密的隐私保护分布式关联规则挖掘
Shubhra Rana, P. S. Thilagam
Privacy is an important issue in the field of distributed association rule mining, where multiple parties collaborate to perform mining on the collective data. The parties do not want to reveal sensitive data to other parties. Most of the existing techniques for privacy preserving distributed association rule mining suffer from weak privacy guarantees and have a high computational cost involved. We propose a novel privacy preserving distributed association rule mining scheme based on Paillier additive homomorphic cryptosystem. The experimental results demonstrate that the proposed scheme is more efficient and scalable compared to the existing techniques based on homomorphic encryption.
隐私是分布式关联规则挖掘领域的一个重要问题,在分布式关联规则挖掘中,多方协作对集体数据进行挖掘。双方不希望将敏感数据泄露给其他各方。现有的保护隐私的分布式关联规则挖掘技术大多存在隐私保障不强、计算成本高的问题。提出了一种新的基于Paillier加性同态密码系统的隐私保护分布式关联规则挖掘方案。实验结果表明,与现有的基于同态加密的方案相比,该方案具有更高的效率和可扩展性。
{"title":"Hierarchical Homomorphic Encryption Based Privacy Preserving Distributed Association Rule Mining","authors":"Shubhra Rana, P. S. Thilagam","doi":"10.1109/ICIT.2014.14","DOIUrl":"https://doi.org/10.1109/ICIT.2014.14","url":null,"abstract":"Privacy is an important issue in the field of distributed association rule mining, where multiple parties collaborate to perform mining on the collective data. The parties do not want to reveal sensitive data to other parties. Most of the existing techniques for privacy preserving distributed association rule mining suffer from weak privacy guarantees and have a high computational cost involved. We propose a novel privacy preserving distributed association rule mining scheme based on Paillier additive homomorphic cryptosystem. The experimental results demonstrate that the proposed scheme is more efficient and scalable compared to the existing techniques based on homomorphic encryption.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"72 1","pages":"379-385"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90727998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2014 17th International Conference on Computer and Information Technology (ICCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1