首页 > 最新文献

2014 17th International Conference on Computer and Information Technology (ICCIT)最新文献

英文 中文
A Robust Watermarking Scheme Based Walsh-Hadamard Transform and SVD Using ZIG ZAG Scanning 基于Walsh-Hadamard变换和奇异值分解的zigzag扫描鲁棒水印方案
K. Meenakshi, C. Rao, K. Prasad
This paper presents a robust watermarking for still digital images based on Fast Walsh-Hadamard Transform (FWHT) and Singular Value Decomposition (SVD) using Zigzag scanning. In this paper, after applying Fast Walsh-Hadamard transform to the whole cover image, the Walsh-Hadamard coefficients are arranged in zigzag order and mapped into four quadrants-Q1, Q2, Q3, Q4. These four quadrants represent different frequency bands from the lowest to highest. The quadrant Q1 again divided into no overlapping blocks and in it the highest entropy block is selected and Singular Value Decomposition is applied and the singular values of that blocks is modified with the singular values of the Fast-Walsh-Hadamard transforms coefficients of watermark. A comparative analysis is carried with recents works on Hadamard Transform and results of the proposed method are found to be superior in terms of imperceptibility and robustness at the expense of increased computational complexity.
提出了一种基于快速沃尔什-阿达玛变换(FWHT)和奇异值分解(SVD)的锯齿形扫描静态数字图像鲁棒水印方法。本文对整个封面图像进行Fast Walsh-Hadamard变换后,将Walsh-Hadamard系数按之字形顺序排列,映射到q1、Q2、Q3、Q4四个象域。这四个象限表示从最低到最高的不同频段。象限Q1再次划分为不重叠的块,选取熵值最高的块,应用奇异值分解,用水印的Fast-Walsh-Hadamard变换系数的奇异值修改该块的奇异值。通过与Hadamard变换的比较分析,发现该方法在隐蔽性和鲁棒性方面具有优势,但代价是增加了计算复杂度。
{"title":"A Robust Watermarking Scheme Based Walsh-Hadamard Transform and SVD Using ZIG ZAG Scanning","authors":"K. Meenakshi, C. Rao, K. Prasad","doi":"10.1109/ICIT.2014.53","DOIUrl":"https://doi.org/10.1109/ICIT.2014.53","url":null,"abstract":"This paper presents a robust watermarking for still digital images based on Fast Walsh-Hadamard Transform (FWHT) and Singular Value Decomposition (SVD) using Zigzag scanning. In this paper, after applying Fast Walsh-Hadamard transform to the whole cover image, the Walsh-Hadamard coefficients are arranged in zigzag order and mapped into four quadrants-Q1, Q2, Q3, Q4. These four quadrants represent different frequency bands from the lowest to highest. The quadrant Q1 again divided into no overlapping blocks and in it the highest entropy block is selected and Singular Value Decomposition is applied and the singular values of that blocks is modified with the singular values of the Fast-Walsh-Hadamard transforms coefficients of watermark. A comparative analysis is carried with recents works on Hadamard Transform and results of the proposed method are found to be superior in terms of imperceptibility and robustness at the expense of increased computational complexity.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"9 2 1","pages":"167-172"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81237172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A SINR Based Clustering Protocol for Cognitive Radio Ad Hoc Network (CRAHN) 基于SINR的认知无线电自组网聚类协议
N. Dutta, H. Sarma, Ashish Kr. Srivastava, S. Verma
A novel clustering approach for cognitive nodes in CRN based Ad Hoc Networks (CRAHNs) is proposed in this paper. The Signal to Interference plus Noise Ratio (SINR) produced by Primary Users (PUs) on collocated Cognitive Users (CUs) along with Expected Transmission Time (ETT) among CUs is taken into account in order to form the clusters. The operation of CUs, either during cluster formation or data transmission no way harms the ongoing transmission of PU. The main aim here is to find suitable method of cluster formation so that the findings of this work can be used for developing efficient cluster based routing protocol for CRAHN. A medium scale network with up to 200 CUs are taken for experiment and some reasonable values for influential parameters are presented here.
提出了一种基于CRN的自组织网络中认知节点聚类的新方法。主要用户(pu)对并发认知用户(cu)产生的信噪比(SINR)以及cu之间的预期传输时间(ETT)被考虑在内,以形成集群。无论是在集群形成过程中,还是在数据传输过程中,cu的运行都不会影响PU正在进行的传输。本文的主要目的是寻找合适的簇形成方法,以便本工作的发现可以用于开发高效的基于簇的CRAHN路由协议。本文以200个cu的中等规模网络为实验对象,给出了影响参数的合理取值。
{"title":"A SINR Based Clustering Protocol for Cognitive Radio Ad Hoc Network (CRAHN)","authors":"N. Dutta, H. Sarma, Ashish Kr. Srivastava, S. Verma","doi":"10.1109/ICIT.2014.76","DOIUrl":"https://doi.org/10.1109/ICIT.2014.76","url":null,"abstract":"A novel clustering approach for cognitive nodes in CRN based Ad Hoc Networks (CRAHNs) is proposed in this paper. The Signal to Interference plus Noise Ratio (SINR) produced by Primary Users (PUs) on collocated Cognitive Users (CUs) along with Expected Transmission Time (ETT) among CUs is taken into account in order to form the clusters. The operation of CUs, either during cluster formation or data transmission no way harms the ongoing transmission of PU. The main aim here is to find suitable method of cluster formation so that the findings of this work can be used for developing efficient cluster based routing protocol for CRAHN. A medium scale network with up to 200 CUs are taken for experiment and some reasonable values for influential parameters are presented here.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"93 1","pages":"69-75"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83815512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Data Flow Testing of CGI Based Web Applications 基于CGI的Web应用程序数据流测试
M. Sahu, D. Mohapatra
The functionality of most programs is delivered in terms of data. The values are somehow received by variables, which represent data and these values are used in computation of values for other variables. Data flow testing focuses on variable definition and variable usage. One of the fastest growing and most wide-spread application domains is the web application domain. The wide acceptance of Internet Technology requires sophisticated and high quality web applications. There are some sorts of entry forms that are provided by many web pages. These web pages require the user to supply input to the forms and click on the button or image. Sometimes, this program (commonly known as CGI program) is just an interface to an existing database, massaging user input into a database understandable format and massaging the database's output into the web browser understandable format (usually HTML). In this paper, we propose a technique for data flow testing of CGI programs that are written in Perl. We first propose a data flow model and compute definition-use chains. Then, we identify the paths to be exercised for each of these definition-use pairs.
大多数程序的功能都是以数据的形式交付的。这些值以某种方式被表示数据的变量接收,这些值用于计算其他变量的值。数据流测试侧重于变量定义和变量使用。发展最快和最广泛的应用领域之一是web应用领域。Internet技术的广泛接受需要复杂和高质量的web应用程序。许多网页都提供了一些类型的参赛表格。这些网页要求用户向表单提供输入,然后点击按钮或图像。有时,这个程序(通常称为CGI程序)只是一个现有数据库的接口,将用户输入转换为数据库可理解的格式,并将数据库的输出转换为web浏览器可理解的格式(通常是HTML)。本文提出了一种对用Perl编写的CGI程序进行数据流测试的技术。我们首先提出了一个数据流模型并计算了定义-使用链。然后,我们为每个定义-使用对确定要执行的路径。
{"title":"Data Flow Testing of CGI Based Web Applications","authors":"M. Sahu, D. Mohapatra","doi":"10.1109/ICIT.2014.27","DOIUrl":"https://doi.org/10.1109/ICIT.2014.27","url":null,"abstract":"The functionality of most programs is delivered in terms of data. The values are somehow received by variables, which represent data and these values are used in computation of values for other variables. Data flow testing focuses on variable definition and variable usage. One of the fastest growing and most wide-spread application domains is the web application domain. The wide acceptance of Internet Technology requires sophisticated and high quality web applications. There are some sorts of entry forms that are provided by many web pages. These web pages require the user to supply input to the forms and click on the button or image. Sometimes, this program (commonly known as CGI program) is just an interface to an existing database, massaging user input into a database understandable format and massaging the database's output into the web browser understandable format (usually HTML). In this paper, we propose a technique for data flow testing of CGI programs that are written in Perl. We first propose a data flow model and compute definition-use chains. Then, we identify the paths to be exercised for each of these definition-use pairs.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"19 1","pages":"106-111"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75108213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design Methodologies of Transaction-Safe Cluster Allocations in TFAT File System for Embedded Storage Devices 嵌入式存储设备TFAT文件系统中事务安全集群分配的设计方法
Keshava Munegowda, G. Raju, V. Raju, T. N. Manjunath
The File Allocation Table (FAT) file system is widely used file system in tablet personal computers, mobile phones, digital cameras and other embedded devices for data storage and multi-media applications such as video imaging, audio/video playback and recording. The FAT file system is not power fail-safe. This means that, the uncontrolled power loss or abrupt removal of storage device from computer/embedded system causes the file system corruption. The TFAT (Transaction safe FAT) file system is an extension of FAT file system to provide power fail-safe feature to the FAT file system. This paper explores the design methodologies of cluster allocation algorithms of TFAT file system by conducting various combinations of file system operations in Windows CE (Compact Embedded) 6.0 Operating System (OS). This paper also records the performance bench-marking of TFAT file system in comparison with FAT File system.
文件分配表(File Allocation Table, FAT)文件系统是一种广泛应用于平板个人电脑、移动电话、数码相机等嵌入式设备的文件系统,用于数据存储和视频成像、音频/视频回放和录制等多媒体应用。FAT文件系统不是电源故障安全的。这意味着,不受控制的断电或突然从计算机/嵌入式系统中移除存储设备会导致文件系统损坏。TFAT(事务安全FAT)文件系统是FAT文件系统的扩展,为FAT文件系统提供电源故障安全功能。本文通过在Windows CE (Compact Embedded) 6.0操作系统中对文件系统操作进行各种组合,探讨了TFAT文件系统集群分配算法的设计方法。本文还记录了TFAT文件系统与FAT文件系统的性能基准测试。
{"title":"Design Methodologies of Transaction-Safe Cluster Allocations in TFAT File System for Embedded Storage Devices","authors":"Keshava Munegowda, G. Raju, V. Raju, T. N. Manjunath","doi":"10.1109/ICIT.2014.22","DOIUrl":"https://doi.org/10.1109/ICIT.2014.22","url":null,"abstract":"The File Allocation Table (FAT) file system is widely used file system in tablet personal computers, mobile phones, digital cameras and other embedded devices for data storage and multi-media applications such as video imaging, audio/video playback and recording. The FAT file system is not power fail-safe. This means that, the uncontrolled power loss or abrupt removal of storage device from computer/embedded system causes the file system corruption. The TFAT (Transaction safe FAT) file system is an extension of FAT file system to provide power fail-safe feature to the FAT file system. This paper explores the design methodologies of cluster allocation algorithms of TFAT file system by conducting various combinations of file system operations in Windows CE (Compact Embedded) 6.0 Operating System (OS). This paper also records the performance bench-marking of TFAT file system in comparison with FAT File system.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"314 1","pages":"316-320"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73747577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Co-expressed miRNAs using Multiobjective Optimization 利用多目标优化技术鉴定共表达mirna
S. Acharya, S. Saha
The micro RNAs or miRNAs are short non-coding RNAs, which are capable in regulating gene expression in post-transcriptional level. A huge volume of data is generated by expression profiling of miRNAs. From various studies it has been proved that a large proportion of miRNAs tend to form clusters on chromosome. So, in this article we are proposing a multi-objective optimization based clustering algorithm for extraction of relevant information from expression data of miRNA. The proposed method integrates the ability of point symmetry based distance and existing Multi-objective optimization based clustering technique-AMOSA to identify co-regulated or co-expressed miRNA clusters. The superiority of our proposed approach by comparing it with other state-of-the-art clustering methods, is demonstrated on two publicly available miRNA expression data sets using Davies-Bouldin index - an external cluster validity index.
微rna或mirna是短链非编码rna,能够在转录后水平调控基因表达。mirna的表达谱分析产生了大量的数据。各种研究已经证明,很大一部分mirna倾向于在染色体上形成簇。因此,本文提出了一种基于多目标优化的聚类算法,用于从miRNA表达数据中提取相关信息。该方法结合了基于点对称距离的能力和现有的基于多目标优化的聚类技术- amosa来识别共调控或共表达的miRNA簇。通过与其他最先进的聚类方法进行比较,我们提出的方法的优越性在使用Davies-Bouldin指数(外部聚类有效性指数)的两个公开可用的miRNA表达数据集上得到了证明。
{"title":"Identifying Co-expressed miRNAs using Multiobjective Optimization","authors":"S. Acharya, S. Saha","doi":"10.1109/ICIT.2014.69","DOIUrl":"https://doi.org/10.1109/ICIT.2014.69","url":null,"abstract":"The micro RNAs or miRNAs are short non-coding RNAs, which are capable in regulating gene expression in post-transcriptional level. A huge volume of data is generated by expression profiling of miRNAs. From various studies it has been proved that a large proportion of miRNAs tend to form clusters on chromosome. So, in this article we are proposing a multi-objective optimization based clustering algorithm for extraction of relevant information from expression data of miRNA. The proposed method integrates the ability of point symmetry based distance and existing Multi-objective optimization based clustering technique-AMOSA to identify co-regulated or co-expressed miRNA clusters. The superiority of our proposed approach by comparing it with other state-of-the-art clustering methods, is demonstrated on two publicly available miRNA expression data sets using Davies-Bouldin index - an external cluster validity index.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"25 1","pages":"245-250"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74582111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Design Based Software Coupling Metric 一种基于设计的软件耦合度量
Anshu Maheshwari, Aprna Tripathi, D. S. Kushwaha
The increasing need for software quality measurements has led to extensive research into software metrics and the development of software metric tools. Creating components which are reusable is seen as one of the best practice in industry today. To create reusable components the dependency between each component should be as low as possible. Hence, to maintain high quality software, developers need to strive for a low-coupled and highly cohesive design. However, as mentioned by many researchers, coupling and cohesion metrics lack formal and standardized definitions and thus for each metric there is more than one interpretation. This paper introduces our view of measurement of coupling for Java projects and our implementation approach. Coupling metrics are calculated at class level by considering the relationships between the methods of classes.
对软件质量度量的日益增长的需求导致了对软件度量的广泛研究和软件度量工具的开发。创建可重用的组件被视为当今行业的最佳实践之一。要创建可重用的组件,每个组件之间的依赖关系应该尽可能低。因此,为了维护高质量的软件,开发人员需要努力实现低耦合和高度内聚的设计。然而,正如许多研究人员所提到的,耦合和内聚度量缺乏正式和标准化的定义,因此每个度量都有不止一种解释。本文介绍了我们对Java项目耦合度量的看法以及我们的实现方法。耦合度量是通过考虑类的方法之间的关系在类级别上计算的。
{"title":"A New Design Based Software Coupling Metric","authors":"Anshu Maheshwari, Aprna Tripathi, D. S. Kushwaha","doi":"10.1109/ICIT.2014.77","DOIUrl":"https://doi.org/10.1109/ICIT.2014.77","url":null,"abstract":"The increasing need for software quality measurements has led to extensive research into software metrics and the development of software metric tools. Creating components which are reusable is seen as one of the best practice in industry today. To create reusable components the dependency between each component should be as low as possible. Hence, to maintain high quality software, developers need to strive for a low-coupled and highly cohesive design. However, as mentioned by many researchers, coupling and cohesion metrics lack formal and standardized definitions and thus for each metric there is more than one interpretation. This paper introduces our view of measurement of coupling for Java projects and our implementation approach. Coupling metrics are calculated at class level by considering the relationships between the methods of classes.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"351-355"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76356017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of Ocean Acoustic Tomography in Shape Reconstruction of Underwater Objects 海声层析成像在水下物体形状重建中的应用
T. Mani, O. V. Kumar, Raj Kumar
Underwater surveillance and sensing is generally based on acoustics i.e. Sonar. This paper presents the application of acoustic reflection tomography methods for reconstruction of reflectivity of the underwater objects in active sonar environment. Based on the physical optics approximate, and by exploiting the relation between ramp response and the profile function in the illuminated region of the object, the profile function is obtained by time frequency analysis,. The study indicates that fairly good profile function can be obtained by application of time frequency analysis methods using limited frequency domain data. Reflectivity of the object is computed by applying tomography technique on the profiles obtained from the acoustic data, reflected by the object. These results obtained are found to be sufficient for visual identification /classification of the underwater objects.
水下监视和传感通常基于声学,即声纳。本文介绍了声反射层析成像方法在主动声呐环境下水下目标反射率重建中的应用。在物理光学近似的基础上,利用物体照射区域的斜坡响应与轮廓函数之间的关系,通过时频分析得到轮廓函数。研究表明,应用时频分析方法,利用有限的频域数据,可以得到较好的剖面函数。物体的反射率是通过对从声学数据中获得的被物体反射的剖面应用层析成像技术来计算的。这些结果被认为足以用于水下物体的视觉识别/分类。
{"title":"Application of Ocean Acoustic Tomography in Shape Reconstruction of Underwater Objects","authors":"T. Mani, O. V. Kumar, Raj Kumar","doi":"10.1109/ICIT.2014.64","DOIUrl":"https://doi.org/10.1109/ICIT.2014.64","url":null,"abstract":"Underwater surveillance and sensing is generally based on acoustics i.e. Sonar. This paper presents the application of acoustic reflection tomography methods for reconstruction of reflectivity of the underwater objects in active sonar environment. Based on the physical optics approximate, and by exploiting the relation between ramp response and the profile function in the illuminated region of the object, the profile function is obtained by time frequency analysis,. The study indicates that fairly good profile function can be obtained by application of time frequency analysis methods using limited frequency domain data. Reflectivity of the object is computed by applying tomography technique on the profiles obtained from the acoustic data, reflected by the object. These results obtained are found to be sufficient for visual identification /classification of the underwater objects.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"32 1","pages":"327-332"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90716746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Design and Pipelined Architecture for Reversible Watermarking Based on Difference Expansion Using FPGA 基于FPGA差分扩展的可逆水印数字化设计与流水线结构
Sudip Ghosh, N. Das, Subhajit Das, S. Maity, H. Rahaman
The additional operation of retrieval of the cover image at the decoder is necessary for lossless watermarking system. Taking into account this major issue, efficient implementation of reversible image watermarking needs to be addressed. This can be solved using hardware implementation. This paper focus on the digital design with pipelined architecture of reversible watermarking algorithm based on Difference Expansion (DE) which is linear and whose running time is O (n). There are three different digital architectures proposed in this paper namely dataflow architecture, optimized dataflow architecture using pipelining and the modified architecture using pipelining. All the three design is implemented on Xilinx based FPGA. To the best of our knowledge this is the first digital design and pipelined architecture proposed in the literature for reversible watermarking using difference expansion.
在解码器处附加检索封面图像的操作是无损水印系统所必需的。考虑到这一主要问题,需要解决可逆图像水印的高效实现问题。这可以通过硬件实现来解决。本文重点研究了基于差分展开(DE)的线性、运行时间为O (n)的可逆水印算法的流水线架构的数字化设计。本文提出了三种不同的数字架构,即数据流架构、基于流水线的优化数据流架构和基于流水线的改进架构。三种设计均在基于Xilinx的FPGA上实现。据我们所知,这是文献中第一个使用差分扩展的可逆水印的数字设计和流水线架构。
{"title":"Digital Design and Pipelined Architecture for Reversible Watermarking Based on Difference Expansion Using FPGA","authors":"Sudip Ghosh, N. Das, Subhajit Das, S. Maity, H. Rahaman","doi":"10.1109/ICIT.2014.26","DOIUrl":"https://doi.org/10.1109/ICIT.2014.26","url":null,"abstract":"The additional operation of retrieval of the cover image at the decoder is necessary for lossless watermarking system. Taking into account this major issue, efficient implementation of reversible image watermarking needs to be addressed. This can be solved using hardware implementation. This paper focus on the digital design with pipelined architecture of reversible watermarking algorithm based on Difference Expansion (DE) which is linear and whose running time is O (n). There are three different digital architectures proposed in this paper namely dataflow architecture, optimized dataflow architecture using pipelining and the modified architecture using pipelining. All the three design is implemented on Xilinx based FPGA. To the best of our knowledge this is the first digital design and pipelined architecture proposed in the literature for reversible watermarking using difference expansion.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"43 1","pages":"123-128"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89801783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Comparative Performance Analysis of AESCRT Using NS2 采用NS2的AESCRT性能比较分析
Ditipriya Sinha, R. Chaki
MANETs are normally used in applications which are highly confidential in nature, such as defense, disaster management, etc. Secure data transmission is one of the challenging issues in MANET. Secret sharing has been one of the popular techniques for implementing security in MANETs. The existing logics for securing the packet delivery seem to involve too many control signal interchanges. This paper discusses the performance of a multiple agent based secured routing scheme to detect secure routes with minimum load on the network. The Chinese remainder theorem is used in generating the secure key by the source node. Source node shares the secure key among all probable routes using multiple agents. The three phased approach is aimed to increase the overall performance in the network. Performance metrics which are used to evaluate the performance of AESCRT are delivery rate, load, malicious nodes and packet dropped. Simulation analysis shows that performance of AESCRT give better result compared to other existing routing protocols.
manet通常用于高度机密的应用,如国防、灾害管理等。安全的数据传输是MANET中最具挑战性的问题之一。秘密共享已成为实现无线网络安全的常用技术之一。现有的保护数据包传输的逻辑似乎涉及太多的控制信号交换。本文讨论了一种基于多代理的安全路由方案的性能,以检测网络上最小负载的安全路由。在源节点生成安全密钥时,采用了中国剩余定理。源节点使用多个代理在所有可能的路由之间共享安全密钥。分三个阶段的方法旨在提高网络的整体性能。用于评估AESCRT性能的性能指标有传输速率、负载、恶意节点和丢包。仿真分析表明,与现有的路由协议相比,AESCRT具有更好的性能。
{"title":"Comparative Performance Analysis of AESCRT Using NS2","authors":"Ditipriya Sinha, R. Chaki","doi":"10.1109/ICIT.2014.42","DOIUrl":"https://doi.org/10.1109/ICIT.2014.42","url":null,"abstract":"MANETs are normally used in applications which are highly confidential in nature, such as defense, disaster management, etc. Secure data transmission is one of the challenging issues in MANET. Secret sharing has been one of the popular techniques for implementing security in MANETs. The existing logics for securing the packet delivery seem to involve too many control signal interchanges. This paper discusses the performance of a multiple agent based secured routing scheme to detect secure routes with minimum load on the network. The Chinese remainder theorem is used in generating the secure key by the source node. Source node shares the secure key among all probable routes using multiple agents. The three phased approach is aimed to increase the overall performance in the network. Performance metrics which are used to evaluate the performance of AESCRT are delivery rate, load, malicious nodes and packet dropped. Simulation analysis shows that performance of AESCRT give better result compared to other existing routing protocols.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"47 1","pages":"35-40"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76168938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimation of Blocking Performances in Mobile WiMAX Cellular Networks 移动WiMAX蜂窝网络中阻塞性能的估计
Anindita Chhotray, H. K. Pati
In this paper, we have estimated new call block and handoff call drop performances in Cellular WiMAX. Call Admission Control (CAC) is the process of regulating voice communication, particularly in wireless mobile networks. Further it is a fundamental mechanism used for QoS provisioning in a network. It restricts the access to the network based on resource availability in order to prevent network congestion and service degradation for already supported users. CAC decides whether a new connection can be established or not. Permission is granted only when QoS requirement of the new incoming flow is met without degrading those of the existing flows. The IEEE802.16e standard support for handover (HO) and various services like with Unsolicited Grant Service (UGS), real-time Polling Service (rtPS), non-real-time Polling Service (nrtPS), Best-Effort (BE), and extended real time Polling Service (ertPS). The Quality-of-Service (QoS) parameters used are the new and handoff call blocking. In this paper we investigate the blocking performances of three channel assignment schemes in the context of Cellular WiMAX network. Numerical results are found including the performance of these schemes.
在本文中,我们估计了蜂窝WiMAX的新呼叫阻塞和切换呼叫丢失性能。呼叫接纳控制(Call Admission Control, CAC)是对语音通信进行控制的过程,特别是在无线移动网络中。此外,它是用于在网络中提供QoS的基本机制。它根据资源可用性限制对网络的访问,以防止已经支持的用户出现网络拥塞和服务降级。CAC决定是否可以建立新的连接。只有在不降低现有流的QoS要求的情况下,满足新流入流的QoS要求时才授予权限。IEEE802.16e标准支持切换(HO)和各种服务,如非请求授权服务(UGS)、实时轮询服务(rtPS)、非实时轮询服务(nrtPS)、尽力而为服务(BE)和扩展实时轮询服务(ertPS)。使用的服务质量(QoS)参数是新的和切换的呼叫阻塞。本文研究了蜂窝WiMAX网络中三种信道分配方案的阻塞性能。数值结果反映了这些方案的性能。
{"title":"Estimation of Blocking Performances in Mobile WiMAX Cellular Networks","authors":"Anindita Chhotray, H. K. Pati","doi":"10.1109/ICIT.2014.62","DOIUrl":"https://doi.org/10.1109/ICIT.2014.62","url":null,"abstract":"In this paper, we have estimated new call block and handoff call drop performances in Cellular WiMAX. Call Admission Control (CAC) is the process of regulating voice communication, particularly in wireless mobile networks. Further it is a fundamental mechanism used for QoS provisioning in a network. It restricts the access to the network based on resource availability in order to prevent network congestion and service degradation for already supported users. CAC decides whether a new connection can be established or not. Permission is granted only when QoS requirement of the new incoming flow is met without degrading those of the existing flows. The IEEE802.16e standard support for handover (HO) and various services like with Unsolicited Grant Service (UGS), real-time Polling Service (rtPS), non-real-time Polling Service (nrtPS), Best-Effort (BE), and extended real time Polling Service (ertPS). The Quality-of-Service (QoS) parameters used are the new and handoff call blocking. In this paper we investigate the blocking performances of three channel assignment schemes in the context of Cellular WiMAX network. Numerical results are found including the performance of these schemes.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"27 1","pages":"148-154"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75165464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 17th International Conference on Computer and Information Technology (ICCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1