首页 > 最新文献

2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)最新文献

英文 中文
Design of faster & power efficient sense amplifier using VLSI technology 利用VLSI技术设计更快、更节能的感测放大器
A. Pathrikar, R. Deshpande
In this paper we have designed Faster & Power Efficient Sense Amplifier for CMOS SRAM using VLSI Technology i.e. primarily schematic of sense amplifier is designed & simulated using ADS (Advanced Design System). The sense amplifier then implemented & analyzed at chip level using Microwind 3.1- a layout editor. The 45 nm & 32 nm technologies are used to analyze performance of Sense Amplifier. Our focus will be to reduce the size, to improve the power consumption and also to improve the response time of sense amplifier.
在本文中,我们利用VLSI技术为CMOS SRAM设计了更快、更节能的感测放大器,即使用ADS (Advanced Design System)设计和模拟了感测放大器的主要原理图。然后使用Microwind 3.1(一个布局编辑器)在芯片级实现和分析了该传感器放大器。采用45纳米和32纳米技术分析了感测放大器的性能。我们的重点将是缩小尺寸,提高功耗,并提高感测放大器的响应时间。
{"title":"Design of faster & power efficient sense amplifier using VLSI technology","authors":"A. Pathrikar, R. Deshpande","doi":"10.1109/ICAECCT.2016.7942613","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942613","url":null,"abstract":"In this paper we have designed Faster & Power Efficient Sense Amplifier for CMOS SRAM using VLSI Technology i.e. primarily schematic of sense amplifier is designed & simulated using ADS (Advanced Design System). The sense amplifier then implemented & analyzed at chip level using Microwind 3.1- a layout editor. The 45 nm & 32 nm technologies are used to analyze performance of Sense Amplifier. Our focus will be to reduce the size, to improve the power consumption and also to improve the response time of sense amplifier.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"173 1","pages":"358-361"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72690515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Iris detection for person identification using multiclass SVM 基于多类支持向量机的虹膜检测人脸识别
Ruchi Luhadiya, Anagha P. Khedkar
There are critical applications which need high confidentiality and high security. For this, biometric devices are great tools. In the proposed system, the biometric authentication system using iris detection is presented. In this iris image is preprocessed then Hough transform is applied and finally, the image is normalized using Daugman's rubbersheet model. Feature extraction is done using Gray Level Co-occurrence (GLCM) technique and classification is done using multiclass SVM. This system is evaluated on UPOL database and it gives 94.23% accuracy.
有些关键应用需要高保密性和高安全性。为此,生物识别设备是很好的工具。在该系统中,提出了一种基于虹膜检测的生物特征认证系统。首先对虹膜图像进行预处理,然后对虹膜图像进行霍夫变换,最后利用道格曼模型对虹膜图像进行归一化处理。采用灰度共生(GLCM)技术进行特征提取,采用多类支持向量机进行分类。该系统在UPOL数据库上进行了测试,准确率达到94.23%。
{"title":"Iris detection for person identification using multiclass SVM","authors":"Ruchi Luhadiya, Anagha P. Khedkar","doi":"10.1109/ICAECCT.2016.7942619","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942619","url":null,"abstract":"There are critical applications which need high confidentiality and high security. For this, biometric devices are great tools. In the proposed system, the biometric authentication system using iris detection is presented. In this iris image is preprocessed then Hough transform is applied and finally, the image is normalized using Daugman's rubbersheet model. Feature extraction is done using Gray Level Co-occurrence (GLCM) technique and classification is done using multiclass SVM. This system is evaluated on UPOL database and it gives 94.23% accuracy.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"1 1","pages":"387-392"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75070507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Google Cloud Storage using tilt gesture 谷歌云存储使用倾斜手势
A. Prasad, G. P. Mohole, K. Deore, Rajani Shukla, Kiran Thete
The awareness is to upload and download the files into cloud using gesture. Several types of file can be uploaded into cloud such as picture, video, pdf or any kind of confidential document. This is proficient using an application analogous to gallery. To accomplish the chore the application is raised to view a particular picture or video which we want to upload. Once the device is slanted from its real inspecting position in the downward direction within a extent of two instants, the gesture is acknowledged and presently viewed file is uploaded into cloud. Cloud storage services have become progressively popular. Henceforth, in excess of this application the files can be uploaded into cloud over a tilt gesture effortlessly and meritoriously. While storing files into cloud user is concerned about privacy. For securing data, several cloud storage encryption systems have been have anticipated to defend data from those who do not have admittance. All such systems presumed that cloud storage earners are innocuous and hacking is not possible. Subsequently professionals cannot tell the acquired secrets are true or false. The cloud storage suppliers make sure that the handler's confidentiality is quiet securely conveyed. Certain consultants may divert the communication among Consumers and cloud storage suppliers and at that moment induce storage suppliers to issue user confidences by using régime authority. We ruminate the problem of edifice a secure cloud storage service on top of a public cloud structure where the service earner is not completely reliable by the customer. We familiarize a new scheme for the security in cloud using key protocol. This system creates a key for every user who have access to the file on the cloud server. Then this system is based on key protocol, the coercers will not be able to attack the file thus preserving a high security.
意识是通过手势上传和下载文件到云端。有几种类型的文件可以上传到云端,如图片、视频、pdf或任何类型的机密文件。这是熟练使用类似于画廊的应用程序。为了完成这项工作,应用程序被启动以查看我们想要上传的特定图片或视频。一旦设备在两秒钟内从实际检测位置向下倾斜,该手势就会被识别,当前查看的文件就会被上传到云端。云存储服务日益普及。从此以后,除了这个应用程序之外,文件可以通过倾斜手势毫不费力地上传到云端。在将文件存储到云端时,用户担心隐私问题。为了确保数据的安全,一些云存储加密系统已经被预期可以保护那些没有权限的人的数据。所有这些系统都假定云存储收入是无害的,黑客攻击是不可能的。随后,专业人士无法分辨获得的秘密是真是假。云存储供应商确保处理程序的机密性被安静安全地传递。某些顾问可能会转移消费者和云存储供应商之间的沟通,并在此时诱使存储供应商利用汇汇制授权发布用户保证书。我们反复思考在公共云结构之上建立一个安全的云存储服务的问题,在这个结构中,服务提供者对客户来说不是完全可靠的。介绍了一种利用密钥协议实现云安全的新方案。该系统为访问云服务器上文件的每个用户创建一个密钥。该系统是基于密钥协议的,保证了文件的安全性。
{"title":"Google Cloud Storage using tilt gesture","authors":"A. Prasad, G. P. Mohole, K. Deore, Rajani Shukla, Kiran Thete","doi":"10.1109/ICAECCT.2016.7942609","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942609","url":null,"abstract":"The awareness is to upload and download the files into cloud using gesture. Several types of file can be uploaded into cloud such as picture, video, pdf or any kind of confidential document. This is proficient using an application analogous to gallery. To accomplish the chore the application is raised to view a particular picture or video which we want to upload. Once the device is slanted from its real inspecting position in the downward direction within a extent of two instants, the gesture is acknowledged and presently viewed file is uploaded into cloud. Cloud storage services have become progressively popular. Henceforth, in excess of this application the files can be uploaded into cloud over a tilt gesture effortlessly and meritoriously. While storing files into cloud user is concerned about privacy. For securing data, several cloud storage encryption systems have been have anticipated to defend data from those who do not have admittance. All such systems presumed that cloud storage earners are innocuous and hacking is not possible. Subsequently professionals cannot tell the acquired secrets are true or false. The cloud storage suppliers make sure that the handler's confidentiality is quiet securely conveyed. Certain consultants may divert the communication among Consumers and cloud storage suppliers and at that moment induce storage suppliers to issue user confidences by using régime authority. We ruminate the problem of edifice a secure cloud storage service on top of a public cloud structure where the service earner is not completely reliable by the customer. We familiarize a new scheme for the security in cloud using key protocol. This system creates a key for every user who have access to the file on the cloud server. Then this system is based on key protocol, the coercers will not be able to attack the file thus preserving a high security.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"380 1","pages":"338-342"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76181724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computationally efficient vanishing point detection algorithm based road segmentation in road images 基于消失点检测的道路图像分割算法
V. Mistry, R. Makwana
Road segmentation is one of the most challenging task in a vision based autonomous road navigation system. Adaptability to detect various types of roads and reduction in computational complexity are the two main challenges in existing vision based road navigation algorithms. This paper modifies existing vanishing point based road segmentation algorithm and presents computationally efficient reduced voter scheme for general road segmentation. The goal of this paper is to present an accurate and precise road segmentation algorithm that can work on structured, semi-structured and unstructured roads in presence of different surrounding environments and various illumination variations in daytime. The major contribution of this algorithm is reduction of total number of voters used for voting process of vanishing point detection and analysis of general road segmentation results for various types of roads. The algorithm is implemented on MATLAB. Various qualitative and quantitative results are presents.
道路分割是基于视觉的自主道路导航系统中最具挑战性的任务之一。在现有的基于视觉的道路导航算法中,检测各种道路类型的适应性和降低计算复杂度是两大主要挑战。本文对现有的基于消失点的道路分割算法进行了改进,提出了一种计算效率高的通用道路分割精简选民方案。本文的目标是提出一种精确的道路分割算法,该算法可以在不同的周围环境和白天各种光照变化的情况下对结构化、半结构化和非结构化道路进行分割。该算法的主要贡献在于减少了用于投票过程中消失点检测和对各类道路的一般道路分割结果进行分析的选民总数。该算法在MATLAB上实现。给出了各种定性和定量结果。
{"title":"Computationally efficient vanishing point detection algorithm based road segmentation in road images","authors":"V. Mistry, R. Makwana","doi":"10.1109/ICAECCT.2016.7942564","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942564","url":null,"abstract":"Road segmentation is one of the most challenging task in a vision based autonomous road navigation system. Adaptability to detect various types of roads and reduction in computational complexity are the two main challenges in existing vision based road navigation algorithms. This paper modifies existing vanishing point based road segmentation algorithm and presents computationally efficient reduced voter scheme for general road segmentation. The goal of this paper is to present an accurate and precise road segmentation algorithm that can work on structured, semi-structured and unstructured roads in presence of different surrounding environments and various illumination variations in daytime. The major contribution of this algorithm is reduction of total number of voters used for voting process of vanishing point detection and analysis of general road segmentation results for various types of roads. The algorithm is implemented on MATLAB. Various qualitative and quantitative results are presents.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"54 1","pages":"103-110"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74173458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
New approach for load rebalancer, scheduler in big data with security mechanism in cloud environment 基于云环境下安全机制的大数据负载重平衡、调度器新方法
Priyanka A. Dhande, A. Kadam
In cloud applications, distributed file system is very core technology. Many functionalities of computing applications can be performed with the help of file system, such applications is rely on the distributed programming and having a number of distributed chunks are assign to each nodes; node receive each separate chunk that performs in parallel. But failure of node is the major issue, this issue may be recovered in cloud also replaced and added to the nodes. Facing load imbalance problem; that is, the file chunks are not assigning correctly among all the nodes. For that purpose the load rebalancing technique comes into picture, load rebalancing has the more efficiency that makes system more efficient. For load imbalance we use a secure load rebalancing algorithm that merges with the MD5 with DES encryption algorithm. The result shows performs the system in terms of security parameters message overhead and the movement cost for our proposed scheme. For this work we are implementing in distributed file system of the EC2.
在云应用中,分布式文件系统是非常核心的技术。计算应用程序的许多功能可以借助文件系统来完成,这类应用程序依赖于分布式编程,并将许多分布式块分配给每个节点;节点接收并行执行的每个单独块。但是节点故障是主要问题,这个问题可以在云上恢复也可以替换和添加到节点上。面对负载不平衡问题;也就是说,文件块没有在所有节点之间正确分配。为此,负载再平衡技术应运而生,负载再平衡具有更高的效率,使系统更高效。对于负载不平衡,我们使用了一种安全的负载再平衡算法,该算法与MD5和DES加密算法合并。结果表明,该方案在安全参数、消息开销和移动开销方面表现良好。对于这项工作,我们是在EC2的分布式文件系统中实现的。
{"title":"New approach for load rebalancer, scheduler in big data with security mechanism in cloud environment","authors":"Priyanka A. Dhande, A. Kadam","doi":"10.1109/ICAECCT.2016.7942592","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942592","url":null,"abstract":"In cloud applications, distributed file system is very core technology. Many functionalities of computing applications can be performed with the help of file system, such applications is rely on the distributed programming and having a number of distributed chunks are assign to each nodes; node receive each separate chunk that performs in parallel. But failure of node is the major issue, this issue may be recovered in cloud also replaced and added to the nodes. Facing load imbalance problem; that is, the file chunks are not assigning correctly among all the nodes. For that purpose the load rebalancing technique comes into picture, load rebalancing has the more efficiency that makes system more efficient. For load imbalance we use a secure load rebalancing algorithm that merges with the MD5 with DES encryption algorithm. The result shows performs the system in terms of security parameters message overhead and the movement cost for our proposed scheme. For this work we are implementing in distributed file system of the EC2.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"1 1","pages":"247-250"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83166556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multilevel biometric authentication by using different techniques 采用不同技术的多层次生物识别认证
S.S. Gundecha, M. Naidu
A need objective of the utilization of biometrics is to give character confirmation or the capacity to precisely perceive people. Biometric frameworks have fundamentally enhanced individual recognizable proof and confirmation, assuming a critical part in individual, national and worldwide security. Three biometric recognition are utilized as a part of this project. Face recognition, Fingerprint recognition, Iris recognition is done in this project. Daugman's calculation is utilized for iris recognition, Euclidean distance calculation is utilized for face, fingerprint recognition. The proposed approach displays high level of precision. The database of authorized and unauthorized is used in this project. This project is software based.
生物特征识别技术应用的一个重要目标是提供人物识别或准确感知人的能力。生物识别框架从根本上增强了个人可识别的证据和确认,在个人、国家和全球安全方面发挥着关键作用。三种生物特征识别被用作这个项目的一部分。本课题完成了人脸识别、指纹识别、虹膜识别。虹膜识别采用道格曼计算,人脸、指纹识别采用欧氏距离计算。该方法具有较高的精度。本项目使用授权和未授权数据库。这个项目是基于软件的。
{"title":"Multilevel biometric authentication by using different techniques","authors":"S.S. Gundecha, M. Naidu","doi":"10.1109/ICAECCT.2016.7942554","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942554","url":null,"abstract":"A need objective of the utilization of biometrics is to give character confirmation or the capacity to precisely perceive people. Biometric frameworks have fundamentally enhanced individual recognizable proof and confirmation, assuming a critical part in individual, national and worldwide security. Three biometric recognition are utilized as a part of this project. Face recognition, Fingerprint recognition, Iris recognition is done in this project. Daugman's calculation is utilized for iris recognition, Euclidean distance calculation is utilized for face, fingerprint recognition. The proposed approach displays high level of precision. The database of authorized and unauthorized is used in this project. This project is software based.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"49 1","pages":"50-54"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84871317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Human gesture analysis for action recognition 用于动作识别的人类手势分析
Kaveri V Sonani, M. Zaveri, Sanjay Garg
In this paper, we propose an algorithm for human gesture analysis for the action recognition using Microsoft kinect sensor to build physiotherapy application. Kinect is able to generate depth image from RGB image and generate human skeleton from the depth image. In this method, therapist may record the exercise and patients are required to mimic that exercise at home. This system is able to track their progress as well as recognize the action of patients. If a patient do not perform properly, then it gives the suggestion based on the information of angle between joints of human skeleton. We design codebook for each action, which contains different key posture frames for each action. To find the match between two frames, we make the use of the concept of star distance. We evaluate our proposed system with large number of scenarios and analysed with Hidden Markov Model to recognise the action.
在本文中,我们提出了一种人类手势分析算法,用于使用微软kinect传感器进行动作识别,以构建物理治疗应用。Kinect能够从RGB图像生成深度图像,并从深度图像生成人体骨骼。在这种方法中,治疗师可以记录运动,并要求患者在家中模仿该运动。该系统能够跟踪他们的进展,并识别患者的动作。如果患者表现不佳,则根据人体骨骼关节之间的角度信息给出建议。我们为每个动作设计了码本,其中包含每个动作不同的关键姿态帧。为了找到两帧之间的匹配,我们使用了星距的概念。我们用大量的场景来评估我们提出的系统,并使用隐马尔可夫模型进行分析以识别动作。
{"title":"Human gesture analysis for action recognition","authors":"Kaveri V Sonani, M. Zaveri, Sanjay Garg","doi":"10.1109/ICAECCT.2016.7942571","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942571","url":null,"abstract":"In this paper, we propose an algorithm for human gesture analysis for the action recognition using Microsoft kinect sensor to build physiotherapy application. Kinect is able to generate depth image from RGB image and generate human skeleton from the depth image. In this method, therapist may record the exercise and patients are required to mimic that exercise at home. This system is able to track their progress as well as recognize the action of patients. If a patient do not perform properly, then it gives the suggestion based on the information of angle between joints of human skeleton. We design codebook for each action, which contains different key posture frames for each action. To find the match between two frames, we make the use of the concept of star distance. We evaluate our proposed system with large number of scenarios and analysed with Hidden Markov Model to recognise the action.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"6 1","pages":"144-149"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87569670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Intelligent Virtual Machine Monitoring System Using KVM for Reliable And Secure Environment in Cloud 基于KVM的云环境下可靠安全的智能虚拟机监控系统
Swarupa Mahesh Deshpande, B. Ainapure
The KVM (Kernel-based Virtual Machine Manager) hypervisor manages many VMs (Virtual Machine) on single host. The virtualization environment for cloud systems in IaaS (Infrastructure as a Service) layer supports heterogeneous operating systems in homogeneous environment. An Intelligent Virtualization Monitoring System Using KVM monitors the virtual machines under KVM hypervisor. The KVM is a type II hypervisor that is Linux kernel based virtual machine manager which comes with Linux OS. The VMs are the target for the malicious or abnormal attacks. To protect the VMs from the attack, the proposed system uses the VM monitoring script to get the status of the VMs. An intelligent virtualization monitoring system is incorporated as a part of KVM by sending the status of each VM running on hypervisor. The intelligent system categorizes attack patterns and actively rectify the attack. The necessary action taken will be communicated through the cloud API.
KVM (Kernel-based Virtual Machine Manager)虚拟化环境可以管理单个主机上的多台虚拟机(Virtual Machine)。IaaS(基础设施即服务)层的云系统虚拟化环境支持同构环境下的异构操作系统。基于KVM的智能虚拟化监控系统对KVM管理环境下的虚拟机进行监控。KVM是一个II型管理程序,它是Linux操作系统附带的基于Linux内核的虚拟机管理器。虚拟机是恶意或异常攻击的目标。为了保护虚拟机免受攻击,该系统使用虚拟机监控脚本来获取虚拟机的状态。将智能虚拟化监控系统作为KVM的一部分,发送运行在hypervisor上的每个虚拟机的状态。智能系统对攻击模式进行分类,并对攻击进行主动纠正。所采取的必要行动将通过云API进行沟通。
{"title":"An Intelligent Virtual Machine Monitoring System Using KVM for Reliable And Secure Environment in Cloud","authors":"Swarupa Mahesh Deshpande, B. Ainapure","doi":"10.1109/ICAECCT.2016.7942605","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942605","url":null,"abstract":"The KVM (Kernel-based Virtual Machine Manager) hypervisor manages many VMs (Virtual Machine) on single host. The virtualization environment for cloud systems in IaaS (Infrastructure as a Service) layer supports heterogeneous operating systems in homogeneous environment. An Intelligent Virtualization Monitoring System Using KVM monitors the virtual machines under KVM hypervisor. The KVM is a type II hypervisor that is Linux kernel based virtual machine manager which comes with Linux OS. The VMs are the target for the malicious or abnormal attacks. To protect the VMs from the attack, the proposed system uses the VM monitoring script to get the status of the VMs. An intelligent virtualization monitoring system is incorporated as a part of KVM by sending the status of each VM running on hypervisor. The intelligent system categorizes attack patterns and actively rectify the attack. The necessary action taken will be communicated through the cloud API.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"59 1","pages":"314-319"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84915785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Document Summarization by Agglomerative nested clustering approach 基于凝聚嵌套聚类方法的文档摘要
Aakanksha Sharaff, Hari Shrawgi, Priyank Arora, Anshul Verma
Digital documents are ubiquitous in this age and every person faces an inundation of data today. In an era where being expeditious in work is becoming a necessity, providing people with the gist of verbose documents is an essential task. Thus in this paper, we document the process of Text Summarization in which a concise summary of a larger text is generated. We propose an Extractive Model of Document Summarization based on Agglomerative clustering which ranks sentences and forms a summary of the highly ranked sentences.
数字文档在这个时代无处不在,今天每个人都面临着数据泛滥。在一个工作速度越来越快的时代,向人们提供冗长文件的要点是一项必不可少的任务。因此,在本文中,我们记录了文本摘要的过程,在这个过程中,一个更大的文本的简明摘要被生成。提出了一种基于凝聚聚类的文档摘要抽取模型,该模型对句子进行排序,并对排名较高的句子进行汇总。
{"title":"Document Summarization by Agglomerative nested clustering approach","authors":"Aakanksha Sharaff, Hari Shrawgi, Priyank Arora, Anshul Verma","doi":"10.1109/ICAECCT.2016.7942580","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942580","url":null,"abstract":"Digital documents are ubiquitous in this age and every person faces an inundation of data today. In an era where being expeditious in work is becoming a necessity, providing people with the gist of verbose documents is an essential task. Thus in this paper, we document the process of Text Summarization in which a concise summary of a larger text is generated. We propose an Extractive Model of Document Summarization based on Agglomerative clustering which ranks sentences and forms a summary of the highly ranked sentences.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"31 1","pages":"187-191"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73771408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An enhancement in detection of brain cancer through image fusion 图像融合技术在脑癌检测中的应用
R. Atyali, S. R. Khot
An important information provided by the medical image to diagnose the disease can be enhanced through image fusion using different modalities. This paper introduces the fusion process which allows combination of features of different modality images. It consists of application of Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA) based fusion to multi-modality medical images, results in an easy and reliable technique to detect cancerous tissues through image fusion. The system defined below covers the PCA and DWT based image fusion quality analysis for detection of cancer tumour and the experimental results gives the effectiveness of fusion rule based on principal component analysis and discrete wavelet transform which preserves the original structural information from source image and also enhances the relevant information from the same.
通过不同方式的图像融合可以增强医学图像提供的诊断疾病的重要信息。本文介绍了一种将不同模态图像的特征进行融合的方法。将离散小波变换(DWT)和基于主成分分析(PCA)的融合技术应用于多模态医学图像,实现了一种简单、可靠的图像融合检测技术。该系统涵盖了基于PCA和DWT的图像融合质量分析用于肿瘤检测,实验结果表明,基于主成分分析和离散小波变换的融合规则既保留了源图像的原始结构信息,又增强了源图像的相关信息。
{"title":"An enhancement in detection of brain cancer through image fusion","authors":"R. Atyali, S. R. Khot","doi":"10.1109/ICAECCT.2016.7942628","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942628","url":null,"abstract":"An important information provided by the medical image to diagnose the disease can be enhanced through image fusion using different modalities. This paper introduces the fusion process which allows combination of features of different modality images. It consists of application of Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA) based fusion to multi-modality medical images, results in an easy and reliable technique to detect cancerous tissues through image fusion. The system defined below covers the PCA and DWT based image fusion quality analysis for detection of cancer tumour and the experimental results gives the effectiveness of fusion rule based on principal component analysis and discrete wavelet transform which preserves the original structural information from source image and also enhances the relevant information from the same.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"9 1","pages":"438-442"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74262234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1